-
Language:
English
-
Language:
English
3.11.1 Release Notes
Red Hat Openshift Container Storage 3.11.1
Release Notes for Red Hat Openshift Container Storage
Edition 1
Abstract
These release notes provide high-level coverage of the improvements and additions that have been implemented in Red Hat Openshift Container Storage 3.11.1.
Chapter 1. Notable Bug Fixes
This chapter describes bugs fixed in this release of Red Hat Openshift Container Storage that have significant impact on users.
heketi
- BZ#1641668
- Previously, an ongoing operation interrupted by a server restart or failure was not immediately recoverable and would leave a stale operation in the heketi data base. These stale and failed operations captured the state of the system which had to be manually resolved. With this fix, Heketi supports an automatic clean up feature that can also be activated offline or on demand.
- BZ#1641680
- This release introduces two diagnostics features in Heketi:
- The new command `heketi-cli db check` and its offline server variant `heketi db check` check the consistency of heketi's database.
- The new command `heketi-cli server state examine gluster` and its server counterpart `heketi offline state examine gluster` compare data from Gluster with that in heketi's database to detect out-of-sync situations.
kubernetes
- BZ#1622493
- Previously, endpoint creation failed when persistent volume claim (PVC) was created with a name consisting of 45 to 63 characters. As a fix, the service name format is changed from ‘glusterfs-dynamic-pvcname’ to ‘glusterfs-dynamic-pvcuid’. This allows users to create PVC with 45 to 63 characters.
- BZ#1643180
- Previously, if a PVC was deleted and created without any delay, the original PV and PVC would get deleted. With the new PV and PVC being provisioned, the service and endpoints are deleted and not recreated as they already exist at that point in time of endpoint creation/validation. With this fix, the PVC endpoint and service name format have been changed from ‘glusterfs-dynamic-PVCname’ to ‘glusterfs-dynamic-UID’. As a result,the older pvc and its related resources are deleted and the new pvc is created with new endpoint and service.
gluster-block
- BZ#1643185
- With this release of OCS-3.11.1, the minimum kernel version required for gluster-block is kernel-3.10.0-862.14.4 on RHEL-7.5.4.
- BZ#1643074
- Block volumes created before the introduction of the load balancing feature were not reconfigured to take advantage of load balancing. With this fix, pre-existing volumes will be reconfigured automatically to do load-balancing properly.
rhgs-server-container
- BZ#1632896
- Earlier, the brick multiplex environment variable passed through the DeamonSet config file was not honoured. Hence users were unable to disable the Gluster Brick multiplexing configuration option by editing DaemonSet. With this fix, the brickmultiplex environment variable is passed through the gluster-brickmultiplex service in docker container. Now, users can disable Gluster multiplexing by means of GLUSTER_BRICKMULTIPLEX variable in the DeamonSet.
Chapter 2. Technology Preview
This chapter provides an overview of Technology Preview features introduced or updated in this release of Red Hat Openshift Container Storage.
Important
Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend to use them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information on Red Hat Technology Preview features support scope, see https://access.redhat.com/support/offerings/techpreview/.
2.1. CRI-O
CRI-O is supported as a Technology Preview. Information about CRI-O is available in the OpenShift Container Platform cri-o Runtime Guide (https://access.redhat.com/documentation/en-us/openshift_container_platform/3.11/html-single/cri-o_runtime/).
Chapter 3. Known Issues
This chapter provides a list of known issues at the time of release.
- A block hosting volume stop request, sometimes, fails to detach a brick instance from the running parent brick process. This results further deletion request for the block hosting volume to fail with "resource busy" error. Due to this, heketi has stale block hosting volume entry maintained in it's database. To workaround this issue, the system state can be corrected by restarting the gluster pod where a dangling resource for the brick instance of the block hosting volume exists. Heketidb can be repaired by removing the block hosting volume entry.However, it is advised NOT to delete block hosting volumes as the workaround steps are complex.
- Brick multiplexing is not automatically enabled in any of the deployment modes of gluster. Brick multiplexing is required to meet the OCS supported volume limits and hence it must be manually enabled if the trusted storage pool will be used with OCS in independent mode.
- Few paths are missing for iscsi mpath device. This is because, either CHAP security values mismatch or iscsi CSG: stage 0 has been skipped. Both will result in iSCSI login negotiation to fail.To workaround this issue, delete the app pod which will trigger the restart of the pod. The pod start will then update the credentials and relogins.
Appendix A. Revision History
| Revision History | |||
|---|---|---|---|
| Revision 1.0-1 | Thu Feb 07 2019 | Bhavana Mohan | |
| |||
Index
Legal Notice
Copyright © 2019 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.