- Issued:
- 2019-02-20
- Updated:
- 2019-02-20
RHBA-2019:0328 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 3.10 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 3.10.111 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.10.111. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2019:0329
This update includes the following bugs:
- The default firewall settings blocked the router stats/metrics port. This prevented `Prometheus` from collecting the metrics from the OpenShift router. Now, the firewall will allow connections to the router stats port and `Prometheus` can collect metrics from the router. (BZ#1552235)
- All Docker related packages were not removed during the uninstallation process. Therefore, `docker` would not be reinstalled properly during the installation process, causing the `docker` CLI tasks to fail. Now, all related `docker` packages are removed successfully during the uninstallation, and a reinstall succeeds with the `Ansible` uninstall playbook. (BZ#1655684)
- The 'oa' code used the wrong data when checking SAN certificates using the `pyOpenSSL` library. As a result, `oa` would not find the SAN certificates. This would cause updates from 3.9 to 3.10 to fail. Now, the correct data type, `oa` finds the certificates for the SAN devices. 3.9 to 3.10 upgrades complete successfully. (BZ#1656526)
- The tasks that verify relevant API services have returned to service used the default `kubeconfig`, which may have been updated by the admin to use a user which does not have requisite permissions to verify those APIs. The tasks have been updated to use the admin `kubeconfig` in all situations, avoiding this issue. (BZ#1656645)
- The OpenShift SDN/OVS DaemonSets were upgraded during control plane upgrades with an `updateStrategy` of `RollingUpdate`; an upgrade of the pods in the entire cluster was performed. This caused unexpected network and application outages on nodes. This bug changed the `updateStrategy` for SDN/OVS pods to `OnDelete` in the template, affecting only new installations. Control plane upgrade tasks were added to modify SDN/OVS daemonsets to use `OnDelete` `updateStrategy`. Node upgrade tasks were added to delete all SDN/OVS pods while nodes are drained. Network outages for nodes should only occur during the node upgrade when nodes are drained. (BZ#1660880)
- Previously, `etcd` certificates were owned by root, as `etcd` was expected to run as root in a static pod co-located on master nodes. Environments running standalone `etcd` clusters that had upgraded from previous minor releases were experiencing permission denials when `etcd` tried to access, upgrade, or redeploy certificates. Now, upgrading standalone `etcd` clusters is possible by changing the owner of `etcd` if existing certificates have `etcd` as the owner. If `etcd` is running in a standalone cluster, certificates have owner and group owner listed as `etcd` and `etcd`, these certificates can be accessed, allowing upgrade or redeployment. (BZ#1664889)
- The `sysconfig` files located in `/etc/sysconfig` contained a broken link
to documentation. Those links are now updated. (BZ#1668221)
- The cluster role `system:image-pruner` was required for all DELETE
requests to the registry. As a result, the regular client could not cancel
its uploads, and the `S3 multipart` uploads were accumulating. Now, the
cluster role `system:image-pruner` will accept DELETE requests for uploads
from clients who are allowed to write into them. (BZ#1668411)
https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html
All OpenShift Container Platform 3.10 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.10.111, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.10 x86_64
- Red Hat OpenShift Container Platform for Power 3.10 ppc64le
Fixes
- BZ - 1552235 - Prometheus is unable to scrape hosted router components due to iptables rules from openshift-ansible
- BZ - 1593209 - The openshift exclude packages need update
- BZ - 1608279 - uninstall playbook fails after unfinished provision
- BZ - 1655684 - [3.10] uninstall will remove the all the docker related files and reinstall on the same cluster fails
- BZ - 1656526 - 3.9 to 3.10 upgrade results in /etc/etcd/peer.crt: permission denied when certs get redeployed.
- BZ - 1656645 - Upgrade fails on Check for apiservices/v1beta1.metrics.k8s.io registration
- BZ - 1659204 - Conntrack rule for UDP traffic is not removed when using NodePort
- BZ - 1660880 - 3.10.14 to v3.10.72 upgrade - control plane upgrade upgrades the ovs and sdn pods on all node network causing downtime on the nodes
- BZ - 1661841 - Redeployment of metrics fail for OCP v3.10
- BZ - 1664799 - Service Catalog readiness probe should be split from liveness probe
- BZ - 1664889 - Redeploy certificates playbook fails due to etcd related permissions issues
- BZ - 1667803 - Block PVC not getting Bound on OCP 3.10.101 and OCS 3.11.1
- BZ - 1668221 - Link to "Proxy configuration" in file /etc/origin/master/master.env show 404.
- BZ - 1668411 - [3.10] When using the oc new-app to create a new build, the builds are creating incomplete multipart uploads to S3 and incomplete uploads are not cleaned automatically
- BZ - 1669919 - [3.10] HostAlreadyClaimed route issue on path based route
- BZ - 1670390 - Openshift node problem detector ignores internal registries
- BZ - 1672454 - [3.10] oc_adm_router doesn't create router-metrics-tls secret
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.10
SRPM | |
---|---|
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.src.rpm | SHA-256: b9f681c5239f22d1198e9b584ac557c1d662543069284c3d472e40d3597ec369 |
atomic-openshift-3.10.111-1.git.0.84b439a.el7.src.rpm | SHA-256: 283277f981d1e4fc67eb746db6e1c45df97b48be6555fbf20f8144ee207b99ca |
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.src.rpm | SHA-256: f9ff95188f1d9fbe663fea54542a69e5f38dfe6bc9f0304ba2c12f89779d169f |
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.src.rpm | SHA-256: 4886c5b4f8fadbd5c649a326f6f69a50822c97a8966215e18ba8d1c459a5f08e |
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.src.rpm | SHA-256: e2120b293b9471e6d812e7784cdcdf202dcb18e675398d0946072b7159ca2d3d |
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.src.rpm | SHA-256: 7bf0943b4b51a80c1ea49c83b3170a8ff6f87cfb3b8ae77eba3e5a4900ce199c |
golang-github-prometheus-node_exporter-3.10.111-1.git.2.74c9bae.el7.src.rpm | SHA-256: bdbd5667370c60100d3fd9deed112ba0afa503de0f8bf41cd437d18bc1ce2686 |
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.src.rpm | SHA-256: c7ece1e5f52158211d8812f0021ea7317d767f922e307d471d3859a2b1082908 |
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.src.rpm | SHA-256: 44195f54f842f3d52129c35566f56a81863263586e59e3b0efc0424750e224fb |
x86_64 | |
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.x86_64.rpm | SHA-256: 45eb4bf0e28f36e6c887b5a9f4adb7ae29358add047bcbd93767acbee7ea52e2 |
atomic-enterprise-service-catalog-svcat-3.10.111-1.git.2.37cd116.el7.x86_64.rpm | SHA-256: 7b2f84832bbcfa34b1a6c1bb1a13f15f505bb6aa71e11f9e241a554703392c1c |
atomic-openshift-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 515a99ddc888add3f7f5a48db415a39c873fd63c5de107a8b3e7f7107b731ede |
atomic-openshift-clients-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 55d340a16e5ac1e590441282f0b8170ee9669191a863068ec6ee1109412f4dc4 |
atomic-openshift-clients-redistributable-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 4799d80a107658ae724e61bce4f8b2ecedcd2ef17e0df54c6b15e294fc49ea35 |
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.x86_64.rpm | SHA-256: a9044245894245ac675e5ca3236a5874a0eb457f597658242b81a5722a4352bb |
atomic-openshift-docker-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm | SHA-256: 51e98c72bbb1b330d0d542dabe1881fc284ab90e7e0cc73c319a480b585eb788 |
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.x86_64.rpm | SHA-256: dd7b96dfeefb908183e03d3ba37dbb89965e87d9504725c2645cda89fd95d6e2 |
atomic-openshift-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm | SHA-256: 5897573c23d49641d174afc1bab9bf53cbffd97fc10a59faaee156ef7a906587 |
atomic-openshift-hyperkube-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 298f0cf5714972ca07e4cdeec5b4fb2fcdc9feef02de08c8da8913c90518bee7 |
atomic-openshift-hypershift-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 4afdef27b5bc159695bd117678138e808318c519efb0f1e7da693016344d2d23 |
atomic-openshift-master-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 24720cf9b7833a7953c57196fd43c1afa8a5f8dbb2769d051cfb50c83425233a |
atomic-openshift-node-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 9035ed8d73b0f2c591114e789bfab8bb61381b581000d49a0f23eb6ddd0cddf8 |
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.x86_64.rpm | SHA-256: 13c36a14be11131a9152ccf5bc324fa728e5d9db3cd9468b64b0d24b046de502 |
atomic-openshift-pod-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 17e438ec44e83e3e720c1de6e6f459c4360885b1df1fb4e75557d603efce4368 |
atomic-openshift-sdn-ovs-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 6eff1fc315e5cc0a3c57f4d1488d3431035ac53595dc36b7fbc73edb057e6bd2 |
atomic-openshift-template-service-broker-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: a81232c3f4a7f6e423033906659abbe8eecaf737d1dc733a25629aa260427c50 |
atomic-openshift-tests-3.10.111-1.git.0.84b439a.el7.x86_64.rpm | SHA-256: 72839b583ac49e6980d5a76d8a2bd42eb309de7e169406f0fbbb8eaf1286091f |
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.x86_64.rpm | SHA-256: e02c5ba8f7de016cf3e77a5c3696bd8486c39d2a9c37220f2b0702bc534b7edd |
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: af063c4c0a000cb4ef6bc88327143ca11e446d69bb688cbd80c5470a204f290d |
openshift-ansible-docs-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: 2e17bd55846fb75fab5180f7e448a0261f62c00603ebac581ea64f05dcc54142 |
openshift-ansible-playbooks-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: df435ea09e1f0225c716c8cf36a450ae6023617a96e7257d28584a73a8fce3c9 |
openshift-ansible-roles-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: 53399731811e3acf6ddea3111261b5bd92cea91a0de90420ae033d6ce182b7d6 |
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.x86_64.rpm | SHA-256: 083536db56af1950edb943561c5b0b707e805a536c12038ee043bf603954931e |
prometheus-node-exporter-3.10.111-1.git.2.74c9bae.el7.x86_64.rpm | SHA-256: a61c927bf55f97a342965b7949e33273e7ee7ff40ae6357d5239f738027c9e6c |
Red Hat OpenShift Container Platform for Power 3.10
SRPM | |
---|---|
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.src.rpm | SHA-256: b9f681c5239f22d1198e9b584ac557c1d662543069284c3d472e40d3597ec369 |
atomic-openshift-3.10.111-1.git.0.84b439a.el7.src.rpm | SHA-256: 283277f981d1e4fc67eb746db6e1c45df97b48be6555fbf20f8144ee207b99ca |
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.src.rpm | SHA-256: f9ff95188f1d9fbe663fea54542a69e5f38dfe6bc9f0304ba2c12f89779d169f |
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.src.rpm | SHA-256: 4886c5b4f8fadbd5c649a326f6f69a50822c97a8966215e18ba8d1c459a5f08e |
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.src.rpm | SHA-256: e2120b293b9471e6d812e7784cdcdf202dcb18e675398d0946072b7159ca2d3d |
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.src.rpm | SHA-256: 7bf0943b4b51a80c1ea49c83b3170a8ff6f87cfb3b8ae77eba3e5a4900ce199c |
golang-github-prometheus-node_exporter-3.10.111-1.git.2.74c9bae.el7.src.rpm | SHA-256: bdbd5667370c60100d3fd9deed112ba0afa503de0f8bf41cd437d18bc1ce2686 |
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.src.rpm | SHA-256: c7ece1e5f52158211d8812f0021ea7317d767f922e307d471d3859a2b1082908 |
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.src.rpm | SHA-256: 44195f54f842f3d52129c35566f56a81863263586e59e3b0efc0424750e224fb |
ppc64le | |
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.ppc64le.rpm | SHA-256: 0905b3019604a9430fadb7609c5ee43da52e643d6ab171ab738b282643f70d6d |
atomic-enterprise-service-catalog-svcat-3.10.111-1.git.2.37cd116.el7.ppc64le.rpm | SHA-256: 471acf3533e3092ebb14f15640c7a8b14a431132b353d9dc81d2185426538530 |
atomic-openshift-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 68058a17fdc1594bb321b084d856ed1716e0c8d9447239e933b823a1bdb90537 |
atomic-openshift-clients-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: e8e61d0decc58ff974cbbeb9acad5e6c9b014f8daca99428e85d05420e2dcd94 |
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.ppc64le.rpm | SHA-256: 4d6c1a14345d4fa82207b6bf6a6fa19ae6cc8825875793fbc2e2d317a9b9c9de |
atomic-openshift-docker-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm | SHA-256: 51e98c72bbb1b330d0d542dabe1881fc284ab90e7e0cc73c319a480b585eb788 |
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.ppc64le.rpm | SHA-256: 956c5bcbb845cd1560f9b0d26ffff31803cf5c4b4cd141c80e5efe8b58ac4248 |
atomic-openshift-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm | SHA-256: 5897573c23d49641d174afc1bab9bf53cbffd97fc10a59faaee156ef7a906587 |
atomic-openshift-hyperkube-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 2bc2d2abd306d3935fbef039901d83e4be78e131d222924e970a6308f1816c91 |
atomic-openshift-hypershift-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: b05d69d122659a077b9377a4f96bd6711312d4f353142e656eb0ced01f1de74b |
atomic-openshift-master-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 5bc4b46fc933310770b5818b32f81b169a28fd3b5b69b1da83f5ebacf11bf2bd |
atomic-openshift-node-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 27a418ea4e30b051bac5405642b852194d901f47c647acf901d0d2abd43b3f86 |
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.ppc64le.rpm | SHA-256: fde673c88bb900e0961e2d99949e203e6f4502e36b50c522280a68159de61db7 |
atomic-openshift-pod-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: d1b65b604ee31fbd633384d711a7fd7172d72a10a66f987a0fbb0deff2167f73 |
atomic-openshift-sdn-ovs-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 8bf1a8fda023fcaa4f91245c4957bcf8668a3b02b4211d8ed657d6d0c2df77c9 |
atomic-openshift-template-service-broker-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 2628c16df3f4e692f1d05e4a71b43f1b1aca64aa85508b4302635760162318d7 |
atomic-openshift-tests-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm | SHA-256: 3b751583b42e5a243a500e6f4c88dc8ee9897734bac7cceade91dbe24f60129b |
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.ppc64le.rpm | SHA-256: cf0a54872fb3b1a900d33b318248e49beec3d3f35bce0678028dc9c70e1120ec |
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: af063c4c0a000cb4ef6bc88327143ca11e446d69bb688cbd80c5470a204f290d |
openshift-ansible-docs-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: 2e17bd55846fb75fab5180f7e448a0261f62c00603ebac581ea64f05dcc54142 |
openshift-ansible-playbooks-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: df435ea09e1f0225c716c8cf36a450ae6023617a96e7257d28584a73a8fce3c9 |
openshift-ansible-roles-3.10.111-1.git.0.84b2b69.el7.noarch.rpm | SHA-256: 53399731811e3acf6ddea3111261b5bd92cea91a0de90420ae033d6ce182b7d6 |
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.ppc64le.rpm | SHA-256: ff5f1dbbcf3b1ae1557cfb4f23ed26c17113b9cf732d7aad5cdf0ce09b7d986c |
prometheus-node-exporter-3.10.111-1.git.2.74c9bae.el7.ppc64le.rpm | SHA-256: c00708b44ebde5d4a234af5108074bac4f8017efe17cb05b061ff5a6759614a3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.