- Issued:
- 2017-11-21
- Updated:
- 2017-11-21
RHBA-2017:3255 - Bug Fix Advisory
Synopsis
OpenShift Container Platform atomic-openshift-utils bug fix and enhancement
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift-utils and openshift-ansible packages that fix several bugs and add enhancements are now available for OpenShift Container Platform 3.6 and 3.5.
Description
Red Hat OpenShift Container Platform (OCP) is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The atomic-openshift-utils and openshift-ansible packages contain the installation utility and Ansible requirements for installing and upgrading OpenShift Container Platform 3.
This update fixes the following bugs:
Installer component:
- With this bug fix, the `imagePullPolicy` for logging and metrics images is now set to `IfNotPresent` rather than `Always`, which prevents unnecessary image pulls. (BZ#1452939)
- Previously multiple router shards would not upload certificates properly for each corresponding shard. Now, the shards certificates are properly uploaded for each router. (BZ#1511404)
Logging component:
- The logging role of `openshift-installer` did not consider the replica count from the gathered facts when re-installing causing the replica counts to be set to the role defaults. Now, the `openshift-installer` evaluates and reapplies the value from the facts, preserving the counts. (BZ#1489498)
- Elasticsearch had a timing issue trying to seed its ACL index. This caused Elasticsearch to have difficulty starting and did not allow traffic because the ACLs were not properly seeded. This bux fix uses the `DC_NAME` instead of the pod name, resulting in SearchGuard more reliably allowing traffic to flow because ACLs are seeded. (BZ#1493820)
Upgrade component:
- With this bug fix, `openshift_install_examples` is now recognized during installation and upgrades, allowing administrators to choose to manage image streams and templates on their own. (BZ#1506578)
- Previously, a host was unreachable during fact gathering and failed. Later when the task ran and stepped through each host to map hostnames, the failed host did not have any facts defined causing that task to fail. With this bug fix, hosts are reachable and the task succeeds. (BZ#1499254)
- The default value for `etcd_quota_backend_bytes` was not available for `etcd_upgrade` role, causing an undefined variable error when running the `etcd_upgrade` role. This bug fix moved the `etcd_quota_backend_bytes` default from the `etcd` role to the `etcd_common` role, resulting in the `etcd_quota_backend_bytes` default variable being available for both `etcd` and `etcd_upgrade` roles. (BZ#1507934)
In addition, this update adds the following enhancements:
- With this bug fix, the `docker_image_availability` check now passes authentication credentials when checking for image availability. (BZ#1500698)
- With this bug fix, the upgrade playbooks were updated to pass authentication credentials when pulling requisite images from an authenticated registry. (BZ#1506896)
All OpenShift Container Platform users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures:
# yum update atomic-openshift-utils
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at:
Affected Products
- Red Hat OpenShift Container Platform 3.6 x86_64
- Red Hat OpenShift Container Platform 3.5 x86_64
Fixes
- BZ - 1452939 - [3.5] Should use "imagePullPolicy: IfNotPresent" instead of "imagePullPolicy: Always" in logging and metrics deployer images
- BZ - 1483787 - Unable to deploy service catalog as part of advanced installation
- BZ - 1489498 - [3.5] Upgrade of 3.4 to 3.5 does not preserve replica count settings for Elasticsearch indices
- BZ - 1491636 - [3.6] openshift_logging_es_ops_nodeselector didn't take affect
- BZ - 1493820 - [3.5] Elastic search pod fails start and gives error "ERR: Timed out while waiting for a green or yellow cluster state."
- BZ - 1499254 - [3.6] Unable to update nodes to 3.6 - 'dict object' has no attribute 'openshift'
- BZ - 1500698 - [3.6] docker_image_availability check failed when running testing against an authenticated registry
- BZ - 1501599 - [3.6] Exempt the logging project from cluster-wide over-commit resource restrictions
- BZ - 1506578 - [3.6] openshift_install_examples not respected in upgrades
- BZ - 1506896 - [3.6]Fail to upgrade when use an authenticated registry
- BZ - 1507934 - [3.6] etcd_quota_backend_bytes undefined during etcd upgrade
- BZ - 1511404 - [3.6] customized router certificate files defined in openshift_hosted_routers are not uploaded to master
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.6
| SRPM | |
|---|---|
| openshift-ansible-3.6.173.0.75-1.git.0.0a44128.el7.src.rpm | SHA-256: 3332eff74b6fe248647827741b457d04757ae4c51e218881223ddb927f130f5f |
| x86_64 | |
| atomic-openshift-utils-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: 29261ad774218abac7100d4949bf9f74fd6303a2ded7e363e6d76835547c8455 |
| openshift-ansible-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: abdc813040533d84ec96b4f5551a1d8bd6ea4357ffc0936cfdfc5be5a6cd0975 |
| openshift-ansible-callback-plugins-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: 4066e7c5454eadf9a62925fbcf4a1c0cd89607b73a5f4d1dc15c123fbfcd8fc1 |
| openshift-ansible-docs-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: 8f43604acc0797f55585bbe64632657d51e31b24cd199f4bd46b2b53eb5e9c85 |
| openshift-ansible-filter-plugins-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: d65187cd60289e8bed39283a739b4505b02b0d7fae375086068bff6c8ce0c470 |
| openshift-ansible-lookup-plugins-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: 1e4b3d837bb86b6431a2459bdc795ad677e5f74aefd3fc196cdc3d5ebbcc788c |
| openshift-ansible-playbooks-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: 4283291d2e802e5b4b2eb20044273e2438daece6c035671df118c8ed7c73163b |
| openshift-ansible-roles-3.6.173.0.75-1.git.0.0a44128.el7.noarch.rpm | SHA-256: 1f6ab1d66cdd65cf74b74eabf9c0306b0f605d2cb43708a00aa5ac7fb50733d8 |
Red Hat OpenShift Container Platform 3.5
| SRPM | |
|---|---|
| openshift-ansible-3.5.145-1.git.0.e1e330f.el7.src.rpm | SHA-256: e7c8222711dd580f658f655b326754fd681fffb1f7fa2e0092350f87268e93e1 |
| x86_64 | |
| atomic-openshift-utils-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: 4c36e306c3167e87b8ec3ad2c65dc2d8c73f6d47bb44ad61e8a519e67e888ea6 |
| openshift-ansible-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: 4c4de1eb7e22912cf15b73b357caa88fa16148766ecc020207d99f30f2ad8aef |
| openshift-ansible-callback-plugins-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: 406127fa3d35944f396d7acc25d9e35b3473b3df4831ac9783d9cb9b1aa6ab87 |
| openshift-ansible-docs-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: 3cef911db86ec437e933e1d1ceb34bf59817175297bbc3f30cbf796e0457cdfd |
| openshift-ansible-filter-plugins-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: 602d2005c9a59f7c362ec0de299a0371fe134bbaac5360808c47af5fd2ee5122 |
| openshift-ansible-lookup-plugins-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: e376e0fa7f48aa023c03a8ecd1885d490ecd4b827cc0693874ef280038f0b4d0 |
| openshift-ansible-playbooks-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: e7b9fbc2e3c49acf6c93bcfe6ba59639670be7435832a5c2083ef4af3aae99e5 |
| openshift-ansible-roles-3.5.145-1.git.0.e1e330f.el7.noarch.rpm | SHA-256: 6fa9f5581b46b55377290d6e15ea1fc38f312d27f5fae8d61e15ae133b487c97 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.