- Issued:
- 2016-02-29
- Updated:
- 2016-02-29
RHBA-2016:0320 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift packages that fix a bug are now available for Red Hat OpenShift Enterprise 3.1.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
This update fixes the following bug:
- Previously when running OpenShift Enterprise on environments with jumbo frames enabled, applications could report timeouts for large payloads between services if the services ended up on pods on different node hosts. This was due to incorrectly configured MTU settings in the SDN. This bug fix updates the SDN to set the MTU on the vovsbr and vlinuxbr interfaces to match the MTU used by Docker veths and the OVS bridge, and as a result large payloads are correctly sent without timeout issues. (BZ#1302907)
This update includes the following images:
openshift3/node:v3.1.1.6
openshift3/ose:v3.1.1.6
openshift3/ose-deployer:v3.1.1.6
openshift3/ose-f5-router:v3.1.1.6
openshift3/ose-docker-builder:v3.1.1.6
openshift3/ose-sti-builder:v3.1.1.6
All OpenShift Enterprise 3 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
After ensuring all packages on each host have been updated, restart the atomic-openshift-master service on each master to complete this update.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
The Red Hat Enterprise Linux container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the "docker pull" command. Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.
Affected Products
- Red Hat OpenShift Container Platform 3.1 x86_64
Fixes
- BZ - 1302907 - Correctly set MTU on vovsbr and vlinuxbr
CVEs
(none)
Red Hat OpenShift Container Platform 3.1
| SRPM | |
|---|---|
| atomic-openshift-3.1.1.6-4.git.21.cd70c35.el7aos.src.rpm | SHA-256: a8af8bfe96f82ed6ae3c130e923cc42b0c85457c088eb8a91603d3d19e2e1be8 |
| x86_64 | |
| atomic-openshift-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 6a34e0649a2dc66cccad045f7ba854a61d50e86b83da7f57279acc127b591ba2 |
| atomic-openshift-clients-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 5767a884245f62c1b3455976c381cffba37d2d7d084d2affc9626ae1bf19bfb1 |
| atomic-openshift-clients-redistributable-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 1172c5488afa807c34f429e49a144944dd294dcb0751d65c07de872b762e977f |
| atomic-openshift-dockerregistry-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 0caa15f1fe72c39d06a673a025754337bcf1dffa1129482052888ef218e7ba5d |
| atomic-openshift-master-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 7fdd9c14359760c081b1ff8e6551d01037e55da3aeb18b02ead16303ea8ba703 |
| atomic-openshift-node-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 0a57833f77f40be33f3d5473666ea4f6e2343bfab9da4530d21e59235906c1d4 |
| atomic-openshift-pod-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 69315c6a9da388709d313ab1e345ea7b922953b78c5b4f6e38234da464450572 |
| atomic-openshift-recycle-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 0c3ca091b935a35b30b922f24ca667a3165aa7b74d0b6cd8b926f5f4a0994b54 |
| atomic-openshift-sdn-ovs-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 900eeb03d9da7665a26d63e2230fd160d5925cd3c7a83fe47a5c2fba0ea731e0 |
| tuned-profiles-atomic-openshift-node-3.1.1.6-4.git.21.cd70c35.el7aos.x86_64.rpm | SHA-256: 0515437774218f0474953750b5f12fc107730635fda9d239283f26a15e7fdbd1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.