Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2015:0039 - Bug Fix Advisory
Issued:
2015-01-15
Updated:
2015-01-15

RHBA-2015:0039 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat Storage Console 3.0 enhancement and bug fix update #3

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gluster-nagios-common, rhsc-monitoring-uiplugin,
rhsc-setup-plugins, org.ovirt.engine-root, rhevm-branding-rhev,
otopi, ovirt-host-deploy, nagios-server-addons, and rhsc-doc
packages that fix multiple bugs and adds various enhancements
are now available for Red Hat Storage Console 3.

Description

Red Hat Storage Console is a powerful and simple web based Graphical User
Interface for managing a Red Hat Storage environment. It helps storage
administrators to easily create and manage multiple storage pools.

This advisory fixes various bugs in the Red Hat Storage Console Monitoring
User Interface Plug-in, Red Hat Storage Console Setup Plug-in, and Red Hat
Storage Console nagios-server-addons. Space precludes documenting all of
these changes in this advisory. Users are directed to the Red Hat Storage
3 Technical Notes, linked to in the References section, for information on
the most significant of these changes.

This update also adds the following new enhancements:

  • A navigation link is added to the GlusterFS Monitoring Home page

in the Trends tab of Red Hat Storage Console. (BZ# 1138143)

  • A new command is introduced to enable and disable monitoring using

the command line interface (CLI) after setting up Red Hat Storage Console.
When monitoring is enabled on the server, the Trends tab is displayed
with host and cluster utilization details. (BZ# 1111079)

  • An enhancement has been added to brick utilization to display both the

thin-logical volume utilization and the actual thin pool utilization for
bricks with thin-logical volume. (BZ# 1143995)

All users of Red Hat Storage are advised to install these updated packages.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64
  • Red Hat Gluster Storage Management Console (for RHEL Server) 3 x86_64
  • Red Hat Gluster Storage Nagios Server 3 for RHEL 6 x86_64

Fixes

  • BZ - RHBA-2015:0039 - [RHSC] Host after being rebooted, goes to non-responsive state momentarily before coming UP
  • BZ - RHBA-2015:0039 - [RHSC] Adding Host - Error while executing action: A Request to the Server failed
  • BZ - RHBA-2015:0039 - [RHSC] "VdcBLLException: NO_UP_SERVER_FOUND" in seen in engine logs
  • BZ - RHBA-2015:0039 - From GuideMe link, adding Host using SSH PublicKey Authentication fails with "Error while executing action: Cannot install Host with empty password."
  • BZ - RHBA-2015:0039 - [Nagios] - When glusterd is stopped, all the process displays incorrect status information.
  • BZ - RHBA-2015:0039 - [RHSC] - Editing server when in Maintenance to move it to a different cluster, results in "Error While executing action: Host CPU type is not supported in this cluster compatibility version or is not supported at all".
  • BZ - RHBA-2015:0039 - [Nagios] - nagios_server.conf gets overridden when updating nagios server and nodes with the latest rpms.
  • BZ - RHBA-2015:0039 - [Nagios] Typo error in auto-config message
  • BZ - RHBA-2015:0039 - Summary message during "rhsc-setup" regarding upgrading the RHS nodes to 3.0 to enable Nagios monitoring is missing the tag
  • BZ - RHBA-2015:0039 - [Nagios] Cluster - quorum service displays information about a volume even after it is deleted
  • BZ - RHBA-2015:0039 - [Nagios] Cluster auto-config service is warning with "(null)" status information when glusterd is down on some nodes in the cluster
  • BZ - RHBA-2015:0039 - [Nagios] - when one brick in replicate volume goes faulty and if the other one is active geo replication volume status should be shown as 'PARTIAL_FAULTY'
  • BZ - RHBA-2015:0039 - [New] - Geo-Replication status says "warning" and status informtion says "georeplication status could not be determined - Another transaction is in progress for vol_repmaster.Please try again after some time"
  • BZ - RHBA-2015:0039 - [Nagios] Volume utilization is unknown with status information "Invalid host name <hostname-of-RHS-node>" when glusterd is stopped
  • BZ - RHBA-2015:0039 - No option provided to DISABLE Nagios Monitoring either from RHSC UI or from CLI
  • BZ - RHBA-2015:0039 - No option provided to RE-ENABLE Nagios Monitoring either from RHSC UI or from CLI, after disabling it once
  • BZ - RHBA-2015:0039 - [Trends] Print icon and Refresh icon doesn't look like clickable buttons
  • BZ - RHBA-2015:0039 - [Nagios] - Error message needs to be improved when discovery.py is run with a host which has the same host name of the host which is already being monitored by nagios.
  • BZ - RHBA-2015:0039 - [Nagios] - When nagios-server-addons rpm is updated, default host and default service comes back.
  • BZ - RHBA-2015:0039 - [Nagios] - When nagios-server-addons rpm is updated, email and snmp config files gets overriden.
  • BZ - RHBA-2015:0039 - [Nagios] - Show y-axis values in percentage in the cluster utilization graph, the scale of the graph should not change as per utilization
  • BZ - RHBA-2015:0039 - [EARLY ACCESS] glusterpmd.log very chatty
  • BZ - RHBA-2015:0039 - [Nagios] - When all the nodes in a cluster are down, cluster status shows 'UP' with status information as 'OK:None of the volumes are in critical state'
  • BZ - RHBA-2015:0039 - [Nagios] Volume status is seen to be in warning status with status information "null" when glusterd is stopped on one RHS node.
  • BZ - RHBA-2015:0039 - [RHSC] Installation of host, should start the glusterpmd service if monitoring is enabled
  • BZ - RHBA-2015:0039 - [RFE][RHSC] Provide a link to nagios web interface from RHSC in case monitoring is enabled
  • BZ - RHBA-2015:0039 - [Nagios] - Discovery.py does not check for the correctness of nagios configuration before restarting nagios service
  • BZ - RHBA-2015:0039 - [Nagios] Auto-config removes all the configuration if the host used for discovery is detached from the cluster.
  • BZ - RHBA-2015:0039 - [Nagios] Quorum service is seen to be OK when it should actually be in CRITICAL state
  • BZ - RHBA-2015:0039 - Brick utilization shows incorrect data for thinly provisioned LVs
  • BZ - RHBA-2015:0039 - gluster bricks marked down in ovirt after vdsm restarted
  • BZ - RHBA-2015:0039 - [RHSC] - Upgrading RHSC from 3.0.2 to 3.0.3 fails.
  • BZ - RHBA-2015:0039 - [Nagios] - PING service status shows UNKNOWN with status information as "check_ping: %s:Warning threshold must be integer or percentage!"
  • BZ - RHBA-2015:0039 - Add an info msg in rhsc-setup to ask the user to run auto-discovery to start monitoring
  • BZ - RHBA-2015:0039 - [RHSC] - Updating from 2.1U5 to 3.0.3 fails with error ***L:ERROR Internal error: type object 'Stages' has no attribute 'CONFIG_DB_CREDENTIALS'
  • BZ - RHBA-2015:0039 - [RHSC] - yum update rhsc-setup does not pull in ovirt-host-deploy package.
  • BZ - RHBA-2015:0039 - [RHSC] - Reinstalling of host does not change the status to up.

CVEs

(none)

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 3 for RHEL 6

SRPM
gluster-nagios-common-0.1.4-1.el6rhs.src.rpm SHA-256: 95d868f074dbdb3988019635287ea84eb67abaed671cf9a6e4738a1aa0a9541f
x86_64
gluster-nagios-common-0.1.4-1.el6rhs.noarch.rpm SHA-256: 295e8697cdc1f48c07c9546987c90035749b64655faad9ac0c28351b27cf20ae

Red Hat Gluster Storage Management Console (for RHEL Server) 3

SRPM
otopi-1.2.2-1.el6ev.src.rpm SHA-256: 261c76829307e1eec51809f93522e25a667fb4f2a04c2da517a5873a65a637b2
ovirt-host-deploy-1.2.5-1.el6ev.src.rpm SHA-256: a7b290db122ec62f6a4666458b2b715bb4f1e8801f89b024628267df3f64cdca
rhevm-branding-rhev-3.4.0-2.el6ev.src.rpm SHA-256: 01449c72ebb62fa3762d15c9d38b3c093780e1a47ba1c5cd72d550185c9a0b7a
rhsc-3.0.3-1.20.el6rhs.src.rpm SHA-256: 8d5971d74c8847282dfd70de6618c8567438723d99ef9f0b61c3a1b37a60c0a6
rhsc-doc-3.0.0-7.el6rhs.src.rpm SHA-256: d9497038791aefe2f0d98fe4694adc863e9ae4ca8933c05304a013150f79fe02
rhsc-monitoring-uiplugin-0.1.3-1.el6rhs.src.rpm SHA-256: 248b7106547e978c241499b89c49d7a2e352e9f293a650490adda9eb92d3d1b1
rhsc-setup-plugins-3.0.3-1.1.el6rhs.src.rpm SHA-256: bc86573e94401c810ff64ef29651e11793a73870874ba38ad609399159db92ac
x86_64
otopi-1.2.2-1.el6ev.noarch.rpm SHA-256: 51e38623875d04a54beb1065f89a35a0f3b030abad27293d8366695230cc2407
otopi-devtools-1.2.2-1.el6ev.noarch.rpm SHA-256: f1c1809f662fb0507b655f7850b8972a2433dd1ca617d5a6e85b9138c61dae5f
otopi-java-1.2.2-1.el6ev.noarch.rpm SHA-256: eb5488d722015ec68ff47c95d69051bb19a0fd6248567fb828ed4a8e1410adcf
otopi-repolib-1.2.2-1.el6ev.noarch.rpm SHA-256: 10c7eabe1e6927cc1eab19d0e157ab8bb89c7f4c2c9b79985e91d9d875965cac
ovirt-host-deploy-1.2.5-1.el6ev.noarch.rpm SHA-256: 6f00e1f4aa6c004cf934447667c5d0a3b61e4cffe033e4633b3ed35027600bb2
ovirt-host-deploy-java-1.2.5-1.el6ev.noarch.rpm SHA-256: b3906ce8692423d2c559972e7490de8b719eac33b3e9c32750cdd4f91d98c04a
ovirt-host-deploy-repolib-1.2.5-1.el6ev.noarch.rpm SHA-256: 621bd073249810611edb8975e0cbe3d0af92fab89982a5b492e9ff0764fb75e0
rhevm-branding-rhev-3.4.0-2.el6ev.noarch.rpm SHA-256: d1d71e5fe98f01a9015c62b8710623dac697ddb188e6ed5aa548071aef83c67d
rhsc-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: ebb350b98d5a1b22f87c08ea1d56bc8cc8882d1654860ebfca0b7b678b5100dc
rhsc-backend-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: 2651bb7533117193ea110d9098bc062fcaa94c4ddbee12d371af7bc6dd53f042
rhsc-dbscripts-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: 903b54c5bf95e24bd3c0829ec2795992ac5aff84afff49ee76e2931dbaef8d60
rhsc-doc-3.0.0-7.el6rhs.noarch.rpm SHA-256: 5a56f97952fda924ad81ced64055007d48bbb5be012070bda9888c31cb8f27df
rhsc-lib-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: dcfa19310eddfa6e6ee4945de7cd4cd2be300c718e2dfdd6170804c6152b2ff3
rhsc-monitoring-uiplugin-0.1.3-1.el6rhs.noarch.rpm SHA-256: 61469d9c74103904d9d3efe95d6325b94bc9a19fb3c2ae8b7675cf1b63c9357b
rhsc-restapi-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: cf0f5082a6fe40db466504344ad76c6dbfd574b6093ddaf4db17ad2ece93015f
rhsc-setup-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: 4f7b4b8233c71f61e7c491e2207f9a6cbc4d2873de459819d3513cbc7c4cf61a
rhsc-setup-base-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: f46af729fe74757521ba1d68d99b29abbb258c6f80057f9cd9be99d62f13c7b5
rhsc-setup-plugin-ovirt-engine-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: 4bdc54b2a310218589d963efd3f2a475b3ad384f54fba11c0bbded6e064fe426
rhsc-setup-plugin-ovirt-engine-common-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: 7ad272a88663444d42ab90e1c7735fb55f41b5cb0b43e9935cc105b1501c81a4
rhsc-setup-plugins-3.0.3-1.1.el6rhs.noarch.rpm SHA-256: 725c864591ca012e30821947a347b8f0d34ac7ba476697350f7232aea107b8a0
rhsc-tools-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: fcc59a0fbb90cd6b3249c9768ed10676ba7b1d842c6f6f3d20e84dc0c57c4814
rhsc-webadmin-portal-3.0.3-1.20.el6rhs.noarch.rpm SHA-256: f8d90a251b611d002cfd8bcf6796457eff54616dc1af4bed2629389f035b3497

Red Hat Gluster Storage Nagios Server 3 for RHEL 6

SRPM
gluster-nagios-common-0.1.4-1.el6rhs.src.rpm SHA-256: 95d868f074dbdb3988019635287ea84eb67abaed671cf9a6e4738a1aa0a9541f
nagios-server-addons-0.1.11-1.el6rhs.src.rpm SHA-256: de77b50b19b0f7218abcaced965f8a260ab3bbde996fab9bb2bac67ad37a2af6
x86_64
gluster-nagios-common-0.1.4-1.el6rhs.noarch.rpm SHA-256: 295e8697cdc1f48c07c9546987c90035749b64655faad9ac0c28351b27cf20ae
nagios-server-addons-0.1.11-1.el6rhs.noarch.rpm SHA-256: 2e293f928c8453a96eebc07a301781847f665ecea3bd54206319141ead09e443

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility