- Issued:
- 2016-02-23
- Updated:
- 2016-02-23
RHBA-2016:0293 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift packages that fix several bugs are now available for Red Hat OpenShift Enterprise 3.1.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
This update fixes the following bugs:
- Previously, secrets were updated for the internal OAuth clients on every startup. This caused problems when retrieving tokens in highly-available (HA) environments, yielding the error "Invalid status code (400): 400 Bad Request". This bug fix preserves existing client secrets and now OpenShift Enterprise updates only the challenge and redirect URI settings on startup. (BZ#1302946)
- Pods using the host network interface, such as the default HAProxy router, were getting the default IP from the node entry for their liveness probe. In some common misconfigurations, this IP would not actually be physically present on the node running the probes, and therefore would not be short-circuited to use the loopback interface. In those cases, the probes would fail unless a cluster administrator manually opened up port 1936 to allow the probe to pass. This bug fix updates the router to use localhost for liveness and readiness probes, and the OpenShift Enterprise installer now ensures that `openshift_hostname` variables in inventory files resolve to an IP address on the host in question. If it detects that the host name does not, it pauses the installation waiting for the user to abort or continue. This behavior can be overridden by setting `openshift_override_hostname_check=true`, which will simply pause the installation for 10 seconds then move on. (BZ#1293578)
- When restarting all masters in large clusters at the same time, one or all could fail with an "Unable to perform initial IP allocation check" error. This was due to a race condition between the service IP allocator and updates to services. This bug fix adds a retry loop on such conflicts, and as a result the master services can be started successfully. BZ#1294864)
- The default mode for the kubelet proxy on nodes was recently changed from userspace to iptables, causing the node to start in iptables mode by default. This bug fix adds the ability to configure this proxy mode by setting the `proxyArguments.proxy-mode` parameter in the node configuration file (/etc/origin/node/node-config.yaml) to either `iptables` or `userspace`. Restart the atomic-openshift-node service for any changes to take effect. (BZ#1308701)
- Previously, when an AWS EBS volume was detached from a pod, it could not be attached to different pod on the same node. This bug fix updates the AWS provider to ensure that when detaching an AWS volume it is removed from the internal cache of attached volumes. As a result, subsequent requests can attach it again. (BZ#1304752)
All OpenShift Enterprise 3 users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
After ensuring all packages on each host have been updated, restart the atomic-openshift-master service on each master to complete this update.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.1 x86_64
Fixes
- BZ - 1293578 - Ansible should open port '1936' in iptables
- BZ - 1294864 - atomic-openshift-master-api fails when all are restarted together
- BZ - 1302946 - Sometime can't get token when access token/request api in v3 stage env
- BZ - 1308701 - Kubelet proxy must be able to run in userspace and iptables mode
CVEs
(none)
Red Hat OpenShift Container Platform 3.1
SRPM | |
---|---|
atomic-openshift-3.1.1.6-3.git.16.5327e56.el7aos.src.rpm | SHA-256: c3efc3bad3812fef7f6a0577bbefaff6cf3bc525e423ab7dc52db242be38431d |
x86_64 | |
atomic-openshift-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: 1aa25fea36d36e94fffa2fd15a74dbb79374a2c76004b0cb16f07b42fdc89df6 |
atomic-openshift-clients-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: c068af54227321fe2cf89df73f2bc1cda1de43eb9a8f62eafebb0db3220a4412 |
atomic-openshift-clients-redistributable-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: 3e9ab404375ec373a823daee5422f5e0a10473ae30077f928390d13512f65eb7 |
atomic-openshift-dockerregistry-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: c896ce66e0dbea48a54434195bfcbfb8cc8faa05423d2128fd493e989c84c040 |
atomic-openshift-master-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: e96d84be6aac55d0db49cdf4ae83af229ed03c1ce632c2c317eeefab28b6acb7 |
atomic-openshift-node-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: f1924b3ffc719989adfdab6e982cc62574b2812064bcb53e53efc181176b3388 |
atomic-openshift-pod-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: 1ffae6a2823d93ac403cdd1f93bc79460a6985ab3c42c4f9bcdf816f7d08a931 |
atomic-openshift-recycle-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: 3ffe354892521406e4a3f0bbd890193797510b0f409b78a793007637c57827d3 |
atomic-openshift-sdn-ovs-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: cc7f41ff6ee2cab5a7f24410d2daa55b8fcff0bb577719dd95baad59b6c84498 |
tuned-profiles-atomic-openshift-node-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm | SHA-256: 2a45f0a6a7083917f0806e600d91433c7c7e55fbd8b3511b31be09b34b87573c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.