- Issued:
- 2019-01-30
- Updated:
- 2019-01-30
RHBA-2019:0101 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 3.6 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 3.6.173.0.146 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.6.173.0.146. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2019:0102
This update fixes the following bug:
- The `openshift_push_via_dns` option was not respected during upgrade. Therefore, `OPENSHIFT_DEFAULT_REGISTRY` was always removed during upgrade. With this bug fix, the `openshift_push_via_dns` option is set if the existing registry DC has the `OPENSHIFT_DEFAULT_REGISTRY` environment variable and the existing `OPENSHIFT_DEFAULT_REGISTRY` environment variable is not removed during upgrade. (BZ#1580354)
All OpenShift Container Platform 3.6 users are advised to upgrade to these
updated packages.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.6.173.0.146, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.6/release_notes/ocp_3_6_release_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.6 x86_64
Fixes
- BZ - 1580354 - [3.6] upgrade_control_plane.yml removes OPENSHIFT_DEFAULT_REGISTRY=docker-registry.default.svc:5000 from /etc/sysconfig/atomic-openshift-master-{api,controllers}
- BZ - 1611941 - [3.6]hawkular-metrics pod failed to start up due to unsuccessful version check
- BZ - 1613902 - RBD bind mount on RHEL does not transistively acquire _netdev from original mount
- BZ - 1649136 - OCP 3.6 Placeholder
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.6
SRPM | |
---|---|
atomic-openshift-3.6.173.0.146-1.git.0.0eb8968.el7.src.rpm | SHA-256: d312015a8e8085f6942330e4dab1c4b1ebaf673f9d1de74d388661ec213bb81a |
openshift-ansible-3.6.173.0.146-1.git.0.e6f198d.el7.src.rpm | SHA-256: fa9bd07155ddb2a1b3ae0aa024ba1a6dc2358d9ca4fb50aba55e08fa67f1769b |
x86_64 | |
atomic-openshift-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 1649c4ff34f8c0aff281e37f8b92f085b27bc8af06084361f4bc62781d18709d |
atomic-openshift-clients-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 350d7753c3b86769786dcd92299a42499f70664a7993c70686da0ec9b671c786 |
atomic-openshift-clients-redistributable-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 224eca0275edf23558da79131764cf7440d4ae3ce9cd5af32aa4952bbae7529a |
atomic-openshift-cluster-capacity-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 940e871c496bea65be0f1bfacc9a6d849e6d8e53eff6201e1c3bf47747ae7ff3 |
atomic-openshift-docker-excluder-3.6.173.0.146-1.git.0.0eb8968.el7.noarch.rpm | SHA-256: bb59326b99557223a3bfb37344043030f3da07b6c072d0672aec7affe42dbbdf |
atomic-openshift-dockerregistry-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 3e03cafeaa59124bcc3983cf7d1e851ef8fafc2a186fe6bbc7c33a0deee558d3 |
atomic-openshift-excluder-3.6.173.0.146-1.git.0.0eb8968.el7.noarch.rpm | SHA-256: 9601a6cc5894a4a84ae34037364459fa3c2524e014821e47f872e588014fb627 |
atomic-openshift-federation-services-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: ac04ae0a68b472e0ffdb13a8be2b0e449a45a4960065d09b5f2d2ff5d713bc46 |
atomic-openshift-master-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 7be85cdfce94b7e6ad5ae7546c590dfdc0f2ee08c6fa9c553086b00ea56d7f81 |
atomic-openshift-node-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: cd008865dcf5136acf2650fa7190bb49a96b0654b19934b4f6b5ae57f50f1a50 |
atomic-openshift-pod-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 9dfa5f648156031a5397602cee77ecf809fbdf633109e7cf061c93297d00b14f |
atomic-openshift-sdn-ovs-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: 89a738975ee6c49902f549838628614bd48b977f13193da9271435a12da9443e |
atomic-openshift-service-catalog-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: a223bb579b2f099dfe9d6f00a8331b6375a51448f74354b17b275bc78adc8fb7 |
atomic-openshift-tests-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: b0aaa3c7958a53036ea663bbafc3761743b67a97e8370021360098a2cc67ab33 |
atomic-openshift-utils-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: 62aa675d8b84237d20648209486f79d038dc3e6da3066e9c3a8bff9ad505f1a0 |
openshift-ansible-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: cdaef521f9d78b53b916540ac50d1622a1bdd0352056dae430e3567e0a204407 |
openshift-ansible-callback-plugins-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: a3ffbddfa6f4a8671ee47d6fe06f14cc2b8bb27f925fdb3056525ae330af8f96 |
openshift-ansible-docs-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: 8f5595978d59373df8269d999ff93ec22a1886e6e1de510a136128fbe0c2c1fa |
openshift-ansible-filter-plugins-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: f0c4706755368646aa59ec77b90d668d19cda88eae71b88508f8767acc21b234 |
openshift-ansible-lookup-plugins-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: 609c73aea676bef8833cadd376064523fea86c484805099401a553cea94b62f9 |
openshift-ansible-playbooks-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: 13096fedcea2ed140d3ac33e3b3c7258e6321442a9d0e0a9a70850ba90196d1c |
openshift-ansible-roles-3.6.173.0.146-1.git.0.e6f198d.el7.noarch.rpm | SHA-256: d9ab5b7e86ee86afbe4fe176fc8da78762b85de74993a222024f8f1fb9d69dc4 |
tuned-profiles-atomic-openshift-node-3.6.173.0.146-1.git.0.0eb8968.el7.x86_64.rpm | SHA-256: dcb414bfd2d68c8e822356ccdbdefa4fc7227c2a8d0ff57fa618dd89fbe45c85 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.