- Issued:
- 2018-05-17
- Updated:
- 2018-05-17
RHBA-2018:1602 - Bug Fix Advisory
Synopsis
openstack-cinder bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenStack Block Storage packages that resolve various issues are
now available for Red Hat OpenStack Platform 10.0 (Newton) for RHEL 7.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware. This advisory includes
packages for:
- OpenStack Block Storage service
OpenStack Block Storage (cinder) manages block storage mounting and the
presentation of such mounted block storage to instances. The back-end
physical storage can consist of local disks, Fiber Channel, iSCSI, and/or
NFS mounts attached to Compute nodes. In addition, Block Storage supports
volume backups, and snapshots for temporary save and restore operations.
Programmatic management is available through the Block Storage service's
API.
Changes to the openstack-cinder component:
- With debug logging enabled, Cinder logged the RabbitMQ password into log files. This update masks the password in the log files. (BZ#1547600)
- The volume service reports statistics from the storage backend. However, race conditions caused the volume service scheduler to use out of date statistics and create more volumes than it should. This fix removes the race conditions. The scheduler now uses up to date statistics and creates volumes closer to the configured limits. (BZ#1553738)
- This update improves the debug log messages the scheduler outputs. This provides more information on scheduler decision making and the data used in the decision making process. (BZ#1543823)
- This update provides support for volume migration between different availability zones. (BZ#1554784)
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 10 runs on Red Hat Enterprise Linux 7.4.
The Red Hat OpenStack Platform 10 Release Notes contain the following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat OpenStack Platform 10, including which
channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en/red-hat-openstack-platform/10/paged/release-notes
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack 10 x86_64
Fixes
- BZ - 1506312 - Backport: Dell EMC PS: Fix extend volume creating unmanaged snapshots
- BZ - 1530126 - Request CHAP fix for Cinder 3PAR iSCSI Driver
- BZ - 1535792 - [Back-Port request to OSP10] Need to remove Cinder extension warning messages
- BZ - 1543823 - Improve Capacity filter logging
- BZ - 1547600 - Cinder logs rabbitmq password in debug log
- BZ - 1553738 - Delay in stats reporting in cinder
- BZ - 1554784 - [RFE] Migration between Cinder AZs
- BZ - 1556999 - Backport: Dell EMC SC: ISCSI initialize_connection fixes.
CVEs
(none)
References
(none)
Red Hat OpenStack 10
| SRPM | |
|---|---|
| openstack-cinder-9.1.4-33.el7ost.src.rpm | SHA-256: 62bff94319a51715921c4f47e47e51e83afa79ae659e07ebb96a638edc0f0700 |
| x86_64 | |
| openstack-cinder-9.1.4-33.el7ost.noarch.rpm | SHA-256: ddfa11a019b0194bd35ef5c06a08102d62938c72c64c8084514d8da8e1f919e9 |
| python-cinder-9.1.4-33.el7ost.noarch.rpm | SHA-256: c80d8d1762f78b90bc9db9057542bce45d7a314aebd45fdefd1c7b2f9ba34b37 |
| python-cinder-tests-9.1.4-33.el7ost.noarch.rpm | SHA-256: 5aa1815424d628ba97f65891eb8f1fa9a7249575673f52023f8ee60a9d56199a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.