- Issued:
- 2018-08-09
- Updated:
- 2018-08-09
RHBA-2018:2375 - Bug Fix Advisory
Synopsis
Red Hat Ceph Storage 3.0 Bug Fix and Enhancement Update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for ceph is now available for Red Hat Ceph Storage 3.0 for Red
Hat Enterprise Linux 7.
Description
Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.
Bug Fix(es):
- Ceph installation no longer fails when using NVME disk. (BZ#1541016)
- In the Ceph Object Gateway, a buffer used to transfer incoming PUT data was incorrectly sized at the maximum chunk value of 4 MB. This lead to a space leak of unused buffer space when PUTs of smaller objects were processed. RGW could leak space when processing large numbers of PUT requests less than 4M in size. With this update, the incorrect buffer sizing logic has been fixed. (BZ#1595937)
- OSD memory usage has been reduced to avoid unnecessary usage, especially for Ceph Object Gateway workloads. (BZ#)1599856
- Ceph Object Gateway multisite sync's sync error log could grow in size during transient sync failures, but no mechanism was provided to remove old entries. With this update, a "sync error trim" subcommand has been added to "radosgw-admin". Now, large sync error logs can be trimmed. (BZ#1600701)
- In rare circumstances after a PG has been repaired and the primary changes, the inconsistent state falsely reappeared, even without a scrub being performed. This bug fix cleans up stray scrub error counts to prevent this. (BZ#1601080)
- In cluster configurations with multiple active metadata servers, it was possible for an MDS to become stuck in "up:resolve" during recovery. With this update, MDSs no longer miss updates from the Monitors that indicated another MDS failed, and MDSs continue recovery. (BZ#1601138)
- A normal result of subtree migration, missing inodes in the MDS cache, was broadcasted as a verbose debug log message. With this update, the debug log message has been reduced, and the MDS debug logs will have fewer entries in normal operation. (BZ#1607596)
- An MDS now dumps the MDSMap it is processing from the monitors at a low debug setting to assist with evaluating issues in multiple active metadata server configurations. (BZ#1607606)
- The default values for "libcurl" slow request handling could lead to multisite sync hangs during sync. Now non-default low-speed timeouts for "libssl" may be specified to avoid multisite sync hangs. (BZ#1608977)
- The MDS now dumps recent log events in memory but not necessarily logged to the debug log file when the MDS respawns because the monitors have removed it from the MDSMap. This may occur when the MDS becomes stuck working on a long running operation. This is to help evaluate what the MDS was doing that resulted in the respawn. (BZ#1607601)
- "EEXIST" condition handling has been corrected in "RGWPutObj::execute()". (BZ#1609005)
Enhancement(s):
- For S3 and Swift protocols, an option to list buckets/containers in natural order has been added. Listing containers in sorted order is canonical in both protocols, but is costly, and not required by some client applications. The performance and workload cost of S3 and Swift bucket/container listings is reduced for sharded buckets/containers when the "allow_unordered" extension is used. (BZ#1595942)
- An asynchronous mechanism for executing the Ceph Object Gateway garbage collection using the "librados" APIs has been introduced. The original garbage collection mechanism serialized all processing, and lagged behind applications in specific workloads. Garbage collection performance has been significantly improved, and can be tuned to specific site requirements. (BZ#1595946)
- A "trim delay" option has been added to the "radosgw-admin sync error trim" command in Ceph Object Gateway multisite. Previously, many OMAP keys could have been deleted by the full operation, leading to potential for impact on client workload. With the next option, trimming can be requested with low client workload impact. (BZ#1600702)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Ceph Storage MON 3 x86_64
- Red Hat Ceph Storage OSD 3 x86_64
Fixes
- BZ - 1541016 - Ceph installation fails when using NVME disk
- BZ - 1576551 - [CephFS] IOs from fuse-clients were hung
- BZ - 1590450 - Ceph Unable to delete/remove swift ACL's
- BZ - 1593031 - MDSMonitor sends redundant health messages to the cluster log
- BZ - 1593093 - [CephFS][CodeChange] mds: scrub stuck at trimming log segments
- BZ - 1593100 - [CephFS]: mds crash if client get evicted in the middle of mds failover
- BZ - 1593123 - [CephFS]: missing dentries in ceph-fuse readdir result
- BZ - 1593311 - Unable to repair damaged purge queue journal
- BZ - 1593322 - load might become zero on a MDS in multi-MDS setup
- BZ - 1593329 - Journaler::flush() may flush less data than expected, which causes flush waiter to hang
- BZ - 1593335 - client: allow client to use caps that are revoked but not yet returned
- BZ - 1594278 - client: prevent fallback to remount when dentry_invalidate_cb is true but root->dir is NULL
- BZ - 1594283 - Client wrongly sets inode state from out-of-date non-auth MDS caps
- BZ - 1594307 - MDS leaks memory due to cache/message ref count mismanagement
- BZ - 1594323 - umount on evicted kclient blocks forever
- BZ - 1594457 - repeated eviction of idle client until some IO happens when authority for its caps are exported
- BZ - 1594604 - CephFS Client library (ceph-fuse) drops incorrect caps during setattr
- BZ - 1594616 - CephFS client library (ceph-fuse) gives stats for "." instead of the parent for the ".." dentry during readdir traversal
- BZ - 1594620 - CephFS Client library (ceph-fuse) should drop file cache capability after invalidating its cache
- BZ - 1594674 - Blocked lock request(s) on a file are reported as slow requests
- BZ - 1594741 - client may report incorrect directory stat
- BZ - 1594868 - client: client does not respond to cap revoke from non-auth mds
- BZ - 1595937 - RGW Memory Leak
- BZ - 1595942 - [RFE] rgw: implement partial order bucket/container listing (perf)
- BZ - 1595946 - [RFE] implement parallel async/mt garbage collection
- BZ - 1599856 - [Continuous OSD memory usage growth in a HEALTH_OK cluster] RGW workload makes OSD memory explode
- BZ - 1600702 - [RFE] Add option --trim-delay-ms in radosgw-admin sync error trim command - to limit the frequency of osd ops
- BZ - 1601138 - MDS stuck in up:resolve during many concurrent failovers
- BZ - 1607583 - MDS handles inter-MDS write locks inefficiently during create/remove workflows on a common directory
- BZ - 1607596 - MDS spams logs with unnecessary warnings about missing inodes during subtree migrations
- BZ - 1607601 - MDS should dump recent log messages in memory before respawn
- BZ - 1607606 - MDs should dump MDSMap epoch currently being processed at low debug level
- BZ - 1609005 - Intermittent http_status=409 with op status=-17 on ceph rgw with compression enabled
- BZ - 1609006 - rgw_gc_list may fail to report end of list
- BZ - 1611056 - MDS cluster degraded flag not set before handling MDS failures
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 7
| SRPM | |
|---|---|
| ceph-12.2.4-42.el7cp.src.rpm | SHA-256: 0cd5ed4d51494cba1c7a18f9d41cad7fd3cf13da54adc53842449661d6c5ad04 |
| cephmetrics-1.0.2-1.el7cp.src.rpm | SHA-256: f55ab5f6945e1a9774b24ebc6ca583d98f4c0f93d13f4e55de3b34756e7dbb64 |
| x86_64 | |
| ceph-base-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 97e7ebe792774998990483af1671781f32b09a047c47bc3c58dac8f89788ffc1 |
| ceph-common-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3de1390b2ad59181c4e89b048cb35b7cf6ce5d73088bd9da88d19324cde0c86f |
| ceph-debuginfo-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 5740407ec69de613a1f52e5085f14b4258ba4a1e6be94d0cc149ca584e518733 |
| ceph-fuse-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 995a85755971f306f4b3e8935c945f12487298fe0b413312ba44af1ebd626414 |
| ceph-mds-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 28b98de1986a49514f531b612d1a6f1d48d8ebe885ba9e1151bfcafbf57e4125 |
| ceph-radosgw-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 7afbc05acfbd339d01415c218e926f9293b211a3bf11e50d5e1ce6710911bec0 |
| ceph-selinux-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3d506d9840f697cd9d4b8a0a2d60a96351db18ea341651cd8cab5f3e12d46c9e |
| cephmetrics-1.0.2-1.el7cp.x86_64.rpm | SHA-256: 059e8c72e53c40866329007f989101cf94f54bed2c8b266e37eab40da1a55fb4 |
| cephmetrics-ansible-1.0.2-1.el7cp.x86_64.rpm | SHA-256: 93f89d0eb15c5631e912c35114b1cbd603560e3f971fea970c0f57454f174579 |
| cephmetrics-collectors-1.0.2-1.el7cp.x86_64.rpm | SHA-256: 28bea0c0fc19e8ec299980f8b119afef723461f5002a39ee04c71508f9940ef0 |
| cephmetrics-grafana-plugins-1.0.2-1.el7cp.x86_64.rpm | SHA-256: dc77f8073b8f04607daa3bb329994423230e8aab8ba2ef670862c944a90314d3 |
| libcephfs-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: f81ce19cc7a19ef305c08cd44fb3283402bf3256806b10d33c2b55eb583aef64 |
| libcephfs2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 1ed7a79b38a2d66ae93d78681fcf710fa5975a83d2eacfa67bf127720ec8d5aa |
| librados-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 4f597e15db950a48edd9a2909355ba72188537fc6204c73da94faa103a4ed829 |
| librados2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: ebebe6d4d5a8c7cb31c77c1fb5fc590e323268ac1bdba6f21a5d5e87f2314bb3 |
| libradosstriper1-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 4ebcc4c1933ad843241f91447fb95cb78b785b348fb0a23fa25584799f045d65 |
| librbd-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 7cccf91654dd6a1b2e73b964f05ab81398dbe42f5a128e8d795269d22c336f68 |
| librbd1-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 8fff0ac15cc5a94c389645d05281c2537bd9cfada69ca4656e4b59d81e5ef31f |
| librgw-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3417878b89e98dcc20364d8013ac01084076329842025cefd2726c29fab2dc2f |
| librgw2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 738b741b0d465f44f7d08fefd34078fb1a8da6fbfc478a5b5aadeb83ab889995 |
| python-cephfs-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 8676b8fd81e02b757466d2c2773116982ca0c84867c51a6ab6ffbf7b139d675b |
| python-rados-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 948180be8f60d1f9268277f1cb37e557366d05f3988d5602948fdb37c3c67dd9 |
| python-rbd-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 97c4d9395b1cb9104b488d5b35f63c859db434ea589b86e1afe9a5d96e4c9b5a |
| python-rgw-12.2.4-42.el7cp.x86_64.rpm | SHA-256: aac8badb1a4f92a37324b19507ff16adff1bb3a71169b0a8e72913b6077067c3 |
| rbd-mirror-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 503330a1e33ec6cc53de917cab6f7f6119024540366a7f9ebe9b2a4146da67de |
Red Hat Ceph Storage MON 3
| SRPM | |
|---|---|
| ceph-12.2.4-42.el7cp.src.rpm | SHA-256: 0cd5ed4d51494cba1c7a18f9d41cad7fd3cf13da54adc53842449661d6c5ad04 |
| cephmetrics-1.0.2-1.el7cp.src.rpm | SHA-256: f55ab5f6945e1a9774b24ebc6ca583d98f4c0f93d13f4e55de3b34756e7dbb64 |
| x86_64 | |
| ceph-base-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 97e7ebe792774998990483af1671781f32b09a047c47bc3c58dac8f89788ffc1 |
| ceph-common-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3de1390b2ad59181c4e89b048cb35b7cf6ce5d73088bd9da88d19324cde0c86f |
| ceph-debuginfo-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 5740407ec69de613a1f52e5085f14b4258ba4a1e6be94d0cc149ca584e518733 |
| ceph-mgr-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 834611622e6dcbdea153d3d2a93ff60717edc87e98088921ab0de5cb457ef7dc |
| ceph-mon-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 49b91b219b0cb5eb2c8308a5a40ac2b8866a460cc7ab0c4be9d4d0c31f2eb46a |
| ceph-selinux-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3d506d9840f697cd9d4b8a0a2d60a96351db18ea341651cd8cab5f3e12d46c9e |
| ceph-test-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 5e1550e078ecbbb687676b2c4512cb5b5fc3f89a3d91df7c53ea7d86ddff1584 |
| cephmetrics-collectors-1.0.2-1.el7cp.x86_64.rpm | SHA-256: 28bea0c0fc19e8ec299980f8b119afef723461f5002a39ee04c71508f9940ef0 |
| libcephfs-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: f81ce19cc7a19ef305c08cd44fb3283402bf3256806b10d33c2b55eb583aef64 |
| libcephfs2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 1ed7a79b38a2d66ae93d78681fcf710fa5975a83d2eacfa67bf127720ec8d5aa |
| librados-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 4f597e15db950a48edd9a2909355ba72188537fc6204c73da94faa103a4ed829 |
| librados2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: ebebe6d4d5a8c7cb31c77c1fb5fc590e323268ac1bdba6f21a5d5e87f2314bb3 |
| libradosstriper1-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 4ebcc4c1933ad843241f91447fb95cb78b785b348fb0a23fa25584799f045d65 |
| librbd-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 7cccf91654dd6a1b2e73b964f05ab81398dbe42f5a128e8d795269d22c336f68 |
| librbd1-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 8fff0ac15cc5a94c389645d05281c2537bd9cfada69ca4656e4b59d81e5ef31f |
| librgw-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3417878b89e98dcc20364d8013ac01084076329842025cefd2726c29fab2dc2f |
| librgw2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 738b741b0d465f44f7d08fefd34078fb1a8da6fbfc478a5b5aadeb83ab889995 |
| python-cephfs-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 8676b8fd81e02b757466d2c2773116982ca0c84867c51a6ab6ffbf7b139d675b |
| python-rados-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 948180be8f60d1f9268277f1cb37e557366d05f3988d5602948fdb37c3c67dd9 |
| python-rbd-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 97c4d9395b1cb9104b488d5b35f63c859db434ea589b86e1afe9a5d96e4c9b5a |
| python-rgw-12.2.4-42.el7cp.x86_64.rpm | SHA-256: aac8badb1a4f92a37324b19507ff16adff1bb3a71169b0a8e72913b6077067c3 |
Red Hat Ceph Storage OSD 3
| SRPM | |
|---|---|
| ceph-12.2.4-42.el7cp.src.rpm | SHA-256: 0cd5ed4d51494cba1c7a18f9d41cad7fd3cf13da54adc53842449661d6c5ad04 |
| cephmetrics-1.0.2-1.el7cp.src.rpm | SHA-256: f55ab5f6945e1a9774b24ebc6ca583d98f4c0f93d13f4e55de3b34756e7dbb64 |
| x86_64 | |
| ceph-base-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 97e7ebe792774998990483af1671781f32b09a047c47bc3c58dac8f89788ffc1 |
| ceph-common-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3de1390b2ad59181c4e89b048cb35b7cf6ce5d73088bd9da88d19324cde0c86f |
| ceph-debuginfo-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 5740407ec69de613a1f52e5085f14b4258ba4a1e6be94d0cc149ca584e518733 |
| ceph-osd-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 9ebe7bb42793f16abe3fbeb1e6bd21b32eac0726f77a953b302acbe0e68667d2 |
| ceph-selinux-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3d506d9840f697cd9d4b8a0a2d60a96351db18ea341651cd8cab5f3e12d46c9e |
| ceph-test-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 5e1550e078ecbbb687676b2c4512cb5b5fc3f89a3d91df7c53ea7d86ddff1584 |
| cephmetrics-collectors-1.0.2-1.el7cp.x86_64.rpm | SHA-256: 28bea0c0fc19e8ec299980f8b119afef723461f5002a39ee04c71508f9940ef0 |
| libcephfs-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: f81ce19cc7a19ef305c08cd44fb3283402bf3256806b10d33c2b55eb583aef64 |
| libcephfs2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 1ed7a79b38a2d66ae93d78681fcf710fa5975a83d2eacfa67bf127720ec8d5aa |
| librados-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 4f597e15db950a48edd9a2909355ba72188537fc6204c73da94faa103a4ed829 |
| librados2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: ebebe6d4d5a8c7cb31c77c1fb5fc590e323268ac1bdba6f21a5d5e87f2314bb3 |
| libradosstriper1-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 4ebcc4c1933ad843241f91447fb95cb78b785b348fb0a23fa25584799f045d65 |
| librbd-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 7cccf91654dd6a1b2e73b964f05ab81398dbe42f5a128e8d795269d22c336f68 |
| librbd1-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 8fff0ac15cc5a94c389645d05281c2537bd9cfada69ca4656e4b59d81e5ef31f |
| librgw-devel-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 3417878b89e98dcc20364d8013ac01084076329842025cefd2726c29fab2dc2f |
| librgw2-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 738b741b0d465f44f7d08fefd34078fb1a8da6fbfc478a5b5aadeb83ab889995 |
| python-cephfs-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 8676b8fd81e02b757466d2c2773116982ca0c84867c51a6ab6ffbf7b139d675b |
| python-rados-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 948180be8f60d1f9268277f1cb37e557366d05f3988d5602948fdb37c3c67dd9 |
| python-rbd-12.2.4-42.el7cp.x86_64.rpm | SHA-256: 97c4d9395b1cb9104b488d5b35f63c859db434ea589b86e1afe9a5d96e4c9b5a |
| python-rgw-12.2.4-42.el7cp.x86_64.rpm | SHA-256: aac8badb1a4f92a37324b19507ff16adff1bb3a71169b0a8e72913b6077067c3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.