Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2019:0328 - Bug Fix Advisory
Issued:
2019-02-20
Updated:
2019-02-20

RHBA-2019:0328 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

OpenShift Container Platform 3.10 bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Container Platform release 3.10.111 is now available with updates to packages and images that fix several bugs.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.10.111. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2019:0329

This update includes the following bugs:

  • The default firewall settings blocked the router stats/metrics port. This prevented `Prometheus` from collecting the metrics from the OpenShift router. Now, the firewall will allow connections to the router stats port and `Prometheus` can collect metrics from the router. (BZ#1552235)
  • All Docker related packages were not removed during the uninstallation process. Therefore, `docker` would not be reinstalled properly during the installation process, causing the `docker` CLI tasks to fail. Now, all related `docker` packages are removed successfully during the uninstallation, and a reinstall succeeds with the `Ansible` uninstall playbook. (BZ#1655684)
  • The 'oa' code used the wrong data when checking SAN certificates using the `pyOpenSSL` library. As a result, `oa` would not find the SAN certificates. This would cause updates from 3.9 to 3.10 to fail. Now, the correct data type, `oa` finds the certificates for the SAN devices. 3.9 to 3.10 upgrades complete successfully. (BZ#1656526)
  • The tasks that verify relevant API services have returned to service used the default `kubeconfig`, which may have been updated by the admin to use a user which does not have requisite permissions to verify those APIs. The tasks have been updated to use the admin `kubeconfig` in all situations, avoiding this issue. (BZ#1656645)
  • The OpenShift SDN/OVS DaemonSets were upgraded during control plane upgrades with an `updateStrategy` of `RollingUpdate`; an upgrade of the pods in the entire cluster was performed. This caused unexpected network and application outages on nodes. This bug changed the `updateStrategy` for SDN/OVS pods to `OnDelete` in the template, affecting only new installations. Control plane upgrade tasks were added to modify SDN/OVS daemonsets to use `OnDelete` `updateStrategy`. Node upgrade tasks were added to delete all SDN/OVS pods while nodes are drained. Network outages for nodes should only occur during the node upgrade when nodes are drained. (BZ#1660880)
  • Previously, `etcd` certificates were owned by root, as `etcd` was expected to run as root in a static pod co-located on master nodes. Environments running standalone `etcd` clusters that had upgraded from previous minor releases were experiencing permission denials when `etcd` tried to access, upgrade, or redeploy certificates. Now, upgrading standalone `etcd` clusters is possible by changing the owner of `etcd` if existing certificates have `etcd` as the owner. If `etcd` is running in a standalone cluster, certificates have owner and group owner listed as `etcd` and `etcd`, these certificates can be accessed, allowing upgrade or redeployment. (BZ#1664889)
  • The `sysconfig` files located in `/etc/sysconfig` contained a broken link

to documentation. Those links are now updated. (BZ#1668221)

  • The cluster role `system:image-pruner` was required for all DELETE

requests to the registry. As a result, the regular client could not cancel
its uploads, and the `S3 multipart` uploads were accumulating. Now, the
cluster role `system:image-pruner` will accept DELETE requests for uploads
from clients who are allowed to write into them. (BZ#1668411)

https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html

All OpenShift Container Platform 3.10 users are advised to upgrade to these updated packages and images.

Solution

Before applying this update, ensure all previously released errata relevant to your system have been applied.

See the following documentation, which will be updated shortly for release 3.10.111, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.

Affected Products

  • Red Hat OpenShift Container Platform 3.10 x86_64
  • Red Hat OpenShift Container Platform for Power 3.10 ppc64le

Fixes

  • BZ - 1552235 - Prometheus is unable to scrape hosted router components due to iptables rules from openshift-ansible
  • BZ - 1593209 - The openshift exclude packages need update
  • BZ - 1608279 - uninstall playbook fails after unfinished provision
  • BZ - 1655684 - [3.10] uninstall will remove the all the docker related files and reinstall on the same cluster fails
  • BZ - 1656526 - 3.9 to 3.10 upgrade results in /etc/etcd/peer.crt: permission denied when certs get redeployed.
  • BZ - 1656645 - Upgrade fails on Check for apiservices/v1beta1.metrics.k8s.io registration
  • BZ - 1659204 - Conntrack rule for UDP traffic is not removed when using NodePort
  • BZ - 1660880 - 3.10.14 to v3.10.72 upgrade - control plane upgrade upgrades the ovs and sdn pods on all node network causing downtime on the nodes
  • BZ - 1661841 - Redeployment of metrics fail for OCP v3.10
  • BZ - 1664799 - Service Catalog readiness probe should be split from liveness probe
  • BZ - 1664889 - Redeploy certificates playbook fails due to etcd related permissions issues
  • BZ - 1667803 - Block PVC not getting Bound on OCP 3.10.101 and OCS 3.11.1
  • BZ - 1668221 - Link to "Proxy configuration" in file /etc/origin/master/master.env show 404.
  • BZ - 1668411 - [3.10] When using the oc new-app to create a new build, the builds are creating incomplete multipart uploads to S3 and incomplete uploads are not cleaned automatically
  • BZ - 1669919 - [3.10] HostAlreadyClaimed route issue on path based route
  • BZ - 1670390 - Openshift node problem detector ignores internal registries
  • BZ - 1672454 - [3.10] oc_adm_router doesn't create router-metrics-tls secret

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Container Platform 3.10

SRPM
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.src.rpm SHA-256: b9f681c5239f22d1198e9b584ac557c1d662543069284c3d472e40d3597ec369
atomic-openshift-3.10.111-1.git.0.84b439a.el7.src.rpm SHA-256: 283277f981d1e4fc67eb746db6e1c45df97b48be6555fbf20f8144ee207b99ca
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.src.rpm SHA-256: f9ff95188f1d9fbe663fea54542a69e5f38dfe6bc9f0304ba2c12f89779d169f
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.src.rpm SHA-256: 4886c5b4f8fadbd5c649a326f6f69a50822c97a8966215e18ba8d1c459a5f08e
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.src.rpm SHA-256: e2120b293b9471e6d812e7784cdcdf202dcb18e675398d0946072b7159ca2d3d
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.src.rpm SHA-256: 7bf0943b4b51a80c1ea49c83b3170a8ff6f87cfb3b8ae77eba3e5a4900ce199c
golang-github-prometheus-node_exporter-3.10.111-1.git.2.74c9bae.el7.src.rpm SHA-256: bdbd5667370c60100d3fd9deed112ba0afa503de0f8bf41cd437d18bc1ce2686
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.src.rpm SHA-256: c7ece1e5f52158211d8812f0021ea7317d767f922e307d471d3859a2b1082908
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.src.rpm SHA-256: 44195f54f842f3d52129c35566f56a81863263586e59e3b0efc0424750e224fb
x86_64
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.x86_64.rpm SHA-256: 45eb4bf0e28f36e6c887b5a9f4adb7ae29358add047bcbd93767acbee7ea52e2
atomic-enterprise-service-catalog-svcat-3.10.111-1.git.2.37cd116.el7.x86_64.rpm SHA-256: 7b2f84832bbcfa34b1a6c1bb1a13f15f505bb6aa71e11f9e241a554703392c1c
atomic-openshift-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 515a99ddc888add3f7f5a48db415a39c873fd63c5de107a8b3e7f7107b731ede
atomic-openshift-clients-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 55d340a16e5ac1e590441282f0b8170ee9669191a863068ec6ee1109412f4dc4
atomic-openshift-clients-redistributable-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 4799d80a107658ae724e61bce4f8b2ecedcd2ef17e0df54c6b15e294fc49ea35
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.x86_64.rpm SHA-256: a9044245894245ac675e5ca3236a5874a0eb457f597658242b81a5722a4352bb
atomic-openshift-docker-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm SHA-256: 51e98c72bbb1b330d0d542dabe1881fc284ab90e7e0cc73c319a480b585eb788
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.x86_64.rpm SHA-256: dd7b96dfeefb908183e03d3ba37dbb89965e87d9504725c2645cda89fd95d6e2
atomic-openshift-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm SHA-256: 5897573c23d49641d174afc1bab9bf53cbffd97fc10a59faaee156ef7a906587
atomic-openshift-hyperkube-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 298f0cf5714972ca07e4cdeec5b4fb2fcdc9feef02de08c8da8913c90518bee7
atomic-openshift-hypershift-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 4afdef27b5bc159695bd117678138e808318c519efb0f1e7da693016344d2d23
atomic-openshift-master-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 24720cf9b7833a7953c57196fd43c1afa8a5f8dbb2769d051cfb50c83425233a
atomic-openshift-node-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 9035ed8d73b0f2c591114e789bfab8bb61381b581000d49a0f23eb6ddd0cddf8
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.x86_64.rpm SHA-256: 13c36a14be11131a9152ccf5bc324fa728e5d9db3cd9468b64b0d24b046de502
atomic-openshift-pod-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 17e438ec44e83e3e720c1de6e6f459c4360885b1df1fb4e75557d603efce4368
atomic-openshift-sdn-ovs-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 6eff1fc315e5cc0a3c57f4d1488d3431035ac53595dc36b7fbc73edb057e6bd2
atomic-openshift-template-service-broker-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: a81232c3f4a7f6e423033906659abbe8eecaf737d1dc733a25629aa260427c50
atomic-openshift-tests-3.10.111-1.git.0.84b439a.el7.x86_64.rpm SHA-256: 72839b583ac49e6980d5a76d8a2bd42eb309de7e169406f0fbbb8eaf1286091f
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.x86_64.rpm SHA-256: e02c5ba8f7de016cf3e77a5c3696bd8486c39d2a9c37220f2b0702bc534b7edd
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: af063c4c0a000cb4ef6bc88327143ca11e446d69bb688cbd80c5470a204f290d
openshift-ansible-docs-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: 2e17bd55846fb75fab5180f7e448a0261f62c00603ebac581ea64f05dcc54142
openshift-ansible-playbooks-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: df435ea09e1f0225c716c8cf36a450ae6023617a96e7257d28584a73a8fce3c9
openshift-ansible-roles-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: 53399731811e3acf6ddea3111261b5bd92cea91a0de90420ae033d6ce182b7d6
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.x86_64.rpm SHA-256: 083536db56af1950edb943561c5b0b707e805a536c12038ee043bf603954931e
prometheus-node-exporter-3.10.111-1.git.2.74c9bae.el7.x86_64.rpm SHA-256: a61c927bf55f97a342965b7949e33273e7ee7ff40ae6357d5239f738027c9e6c

Red Hat OpenShift Container Platform for Power 3.10

SRPM
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.src.rpm SHA-256: b9f681c5239f22d1198e9b584ac557c1d662543069284c3d472e40d3597ec369
atomic-openshift-3.10.111-1.git.0.84b439a.el7.src.rpm SHA-256: 283277f981d1e4fc67eb746db6e1c45df97b48be6555fbf20f8144ee207b99ca
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.src.rpm SHA-256: f9ff95188f1d9fbe663fea54542a69e5f38dfe6bc9f0304ba2c12f89779d169f
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.src.rpm SHA-256: 4886c5b4f8fadbd5c649a326f6f69a50822c97a8966215e18ba8d1c459a5f08e
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.src.rpm SHA-256: e2120b293b9471e6d812e7784cdcdf202dcb18e675398d0946072b7159ca2d3d
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.src.rpm SHA-256: 7bf0943b4b51a80c1ea49c83b3170a8ff6f87cfb3b8ae77eba3e5a4900ce199c
golang-github-prometheus-node_exporter-3.10.111-1.git.2.74c9bae.el7.src.rpm SHA-256: bdbd5667370c60100d3fd9deed112ba0afa503de0f8bf41cd437d18bc1ce2686
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.src.rpm SHA-256: c7ece1e5f52158211d8812f0021ea7317d767f922e307d471d3859a2b1082908
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.src.rpm SHA-256: 44195f54f842f3d52129c35566f56a81863263586e59e3b0efc0424750e224fb
ppc64le
atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.ppc64le.rpm SHA-256: 0905b3019604a9430fadb7609c5ee43da52e643d6ab171ab738b282643f70d6d
atomic-enterprise-service-catalog-svcat-3.10.111-1.git.2.37cd116.el7.ppc64le.rpm SHA-256: 471acf3533e3092ebb14f15640c7a8b14a431132b353d9dc81d2185426538530
atomic-openshift-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 68058a17fdc1594bb321b084d856ed1716e0c8d9447239e933b823a1bdb90537
atomic-openshift-clients-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: e8e61d0decc58ff974cbbeb9acad5e6c9b014f8daca99428e85d05420e2dcd94
atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.ppc64le.rpm SHA-256: 4d6c1a14345d4fa82207b6bf6a6fa19ae6cc8825875793fbc2e2d317a9b9c9de
atomic-openshift-docker-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm SHA-256: 51e98c72bbb1b330d0d542dabe1881fc284ab90e7e0cc73c319a480b585eb788
atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.ppc64le.rpm SHA-256: 956c5bcbb845cd1560f9b0d26ffff31803cf5c4b4cd141c80e5efe8b58ac4248
atomic-openshift-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm SHA-256: 5897573c23d49641d174afc1bab9bf53cbffd97fc10a59faaee156ef7a906587
atomic-openshift-hyperkube-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 2bc2d2abd306d3935fbef039901d83e4be78e131d222924e970a6308f1816c91
atomic-openshift-hypershift-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: b05d69d122659a077b9377a4f96bd6711312d4f353142e656eb0ced01f1de74b
atomic-openshift-master-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 5bc4b46fc933310770b5818b32f81b169a28fd3b5b69b1da83f5ebacf11bf2bd
atomic-openshift-node-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 27a418ea4e30b051bac5405642b852194d901f47c647acf901d0d2abd43b3f86
atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.ppc64le.rpm SHA-256: fde673c88bb900e0961e2d99949e203e6f4502e36b50c522280a68159de61db7
atomic-openshift-pod-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: d1b65b604ee31fbd633384d711a7fd7172d72a10a66f987a0fbb0deff2167f73
atomic-openshift-sdn-ovs-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 8bf1a8fda023fcaa4f91245c4957bcf8668a3b02b4211d8ed657d6d0c2df77c9
atomic-openshift-template-service-broker-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 2628c16df3f4e692f1d05e4a71b43f1b1aca64aa85508b4302635760162318d7
atomic-openshift-tests-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm SHA-256: 3b751583b42e5a243a500e6f4c88dc8ee9897734bac7cceade91dbe24f60129b
atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.ppc64le.rpm SHA-256: cf0a54872fb3b1a900d33b318248e49beec3d3f35bce0678028dc9c70e1120ec
openshift-ansible-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: af063c4c0a000cb4ef6bc88327143ca11e446d69bb688cbd80c5470a204f290d
openshift-ansible-docs-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: 2e17bd55846fb75fab5180f7e448a0261f62c00603ebac581ea64f05dcc54142
openshift-ansible-playbooks-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: df435ea09e1f0225c716c8cf36a450ae6023617a96e7257d28584a73a8fce3c9
openshift-ansible-roles-3.10.111-1.git.0.84b2b69.el7.noarch.rpm SHA-256: 53399731811e3acf6ddea3111261b5bd92cea91a0de90420ae033d6ce182b7d6
openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.ppc64le.rpm SHA-256: ff5f1dbbcf3b1ae1557cfb4f23ed26c17113b9cf732d7aad5cdf0ce09b7d986c
prometheus-node-exporter-3.10.111-1.git.2.74c9bae.el7.ppc64le.rpm SHA-256: c00708b44ebde5d4a234af5108074bac4f8017efe17cb05b061ff5a6759614a3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility