- Issued:
- 2019-03-13
- Updated:
- 2019-03-13
RHBA-2019:0403 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 3.9 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 3.9.71 is now available with
updates to packages and images that fix several bugs and add enhancements.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.9.71. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2019:0402
This update fixes the following bugs:
- A `nil pointer dereference` was causing several `oc` commands to fail. A zero value check was added, and `oc observe` is now working correctly. (BZ#1377940)
- An exit code was not populated correctly from `oc plugin` commands. As a result, the terminal would not return a bash prompt. Now, error codes are properly propagated from plug-ins and the error code matches the result. (BZ#1501756)
- Incorrect codec values were used when patching resources. Users were not able to set volumes on `DaemonSets`. Now, the proper codec is applied when patching resources. `oc set volumes` works as expected with `DaemonSets`. (BZ#1518325)
- Empty templates were causing panics in `oc status`. Now, templates
react appropriately when a template has a zero value. `oc status` works as expected. (BZ#1532289)
- Connections were not closing properly and `oc exec` was hanging as a result. Now, the proper closing method is implemented and `oc exec -i` does not hang. (BZ#1552670)
- The `openshift_management_project` variable was not observed correctly with the CFME application. Now, the CFME namespace is using the `openshift_management_project` variable. (BZ#1591966)
This update includes the following enhancements:
- A new flag is added to the `oc adm cordon` command to allow selecting nodes by label. There was a need to be able to mark multiple nodes as `unschedulable` without having to perform the operation on each individual node. `oc adm cordon` now supports a `--selector` flag, which results in all nodes matching a given label being marked as `unschedulable`. (BZ#1466382)
- Disabling of `MERG_JSON_LOG` via the `ansible inventory` variable is now available. This variable exists in deployment configurations. Adding an inventory variable keeps users from needing to re-apply the setting when they perform an upgrade or re-installation. The `logging-fluentd` daemon set has the `MERG_JSON_LOG` variable value set to reflect what is specified in the ansible inventory. (BZ#1668338)
All OpenShift Container Platform 3.9 users are advised to upgrade to these
updated packages.
Solution
Before applying this update, ensure all previously released errata
relevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.9.71, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.9 x86_64
Fixes
- BZ - 1377940 - oc observe with --resync-period should prompt --names required rather than cause panic
- BZ - 1466382 - [RFE] add selector option to oadm cordon
- BZ - 1501756 - [Trello o6UiTkxv] Exit code from oc plugin does not return to bash terminal
- BZ - 1518325 - oc set volumes not working for DaemonSets
- BZ - 1532289 - oc client crashing on status
- BZ - 1552670 - oc exec -i process hangs waiting for stdin
- BZ - 1591966 - Can't add container provider from add_container_provider.yml
- BZ - 1613130 - [3.9]hawkular metrics pod failed at liveness check, pod can not be started up
- BZ - 1668338 - fluentd ElasticsearchError error="400 - Rejected by Elasticsearch
- BZ - 1672244 - require variable to configure ignore-volume-az in inventory file.
- BZ - 1676617 - openshift-ansible fails on openstack without floating IPs
- BZ - 1676672 - Placeholder for OCP 3.9 image refresh
- BZ - 1676906 - [3.9] More consistent modification of journald.conf.
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.9
SRPM | |
---|---|
atomic-openshift-3.9.71-1.git.0.dba24d1.el7.src.rpm | SHA-256: da4ecaaef9ddaabfa373edd2aeb633264a788065f6665b633d6bb5fe828edf5f |
atomic-openshift-web-console-3.9.71-1.git.1.f8c4656.el7.src.rpm | SHA-256: 54bdcfea9d064e656d898b13643396381a327c243446fa5713cd78413258fa09 |
cri-o-1.9.15-1.git4b8e3df.el7.src.rpm | SHA-256: fea0fe47e43343ac62e985763bfa181506643b30d8256a3cf17bdeae10910913 |
golang-github-prometheus-node_exporter-3.9.71-1.git.2.a8a4129.el7.src.rpm | SHA-256: 655881793b62b5353f382f296a96a5c1a9015d08258951bb97acf01b0e8d90ca |
haproxy-1.8.17-3.el7.src.rpm | SHA-256: d5db0f7ff3bbe7909181c126e8ba18a19a57e39cf9dfd772772c9ab9bcb93e5b |
openshift-ansible-3.9.71-1.git.0.abb258d.el7.src.rpm | SHA-256: 4c10db2f039cff3b2fd2fe6fcae10f51b74dca298cdb2641afbc8a802da18638 |
x86_64 | |
atomic-openshift-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 68a0073bf51e1575db449e09ad2cd20ab161b7451e2d44603f4f88db29508e93 |
atomic-openshift-clients-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 34d0c2ee1d0126e93b6af573e5ba788ab7fac2ff8f7571182e33b0dd2e792bb5 |
atomic-openshift-clients-redistributable-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 58d3775fd3896529037ea12c0a00293f6d25309df9617696f7910a2c2eeb6353 |
atomic-openshift-cluster-capacity-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 89cfa0ec8a4a3245f92e8f872cb09d10f4265f10f68ee06aef81a88ad3a08474 |
atomic-openshift-docker-excluder-3.9.71-1.git.0.dba24d1.el7.noarch.rpm | SHA-256: 2c885f67fbc70ec2897e0bf6b339ce8effcfac1d1759b30326e1a4808aa0d988 |
atomic-openshift-dockerregistry-3.9.71-1.git.1.c07a262.el7.x86_64.rpm | SHA-256: c8c30923bd8729ef56a34ee2d30ae9c2797a60874d13438d8680781344f2ec9e |
atomic-openshift-excluder-3.9.71-1.git.0.dba24d1.el7.noarch.rpm | SHA-256: 47695e0d464616307ae10dfcd4ebdfbf70a870f3434eafca16ddda2add1ad72d |
atomic-openshift-federation-services-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 217dd5f64bd6b31a656afc2e1b59ed4be201ebd1083a847419a6b5c190e1fd67 |
atomic-openshift-master-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: cef0899cd298b02f7689098edfae8752d0e338fc4e3cc98101b80a7dba0330c8 |
atomic-openshift-node-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 1ea4beca7b262a8d91fe0e546f298888b719f1ae21bf542cd97d99c79bcae7ed |
atomic-openshift-pod-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 43fc5633809c44c9cc188b763d9649b5920d490089c8956b054bcd51a4143d8e |
atomic-openshift-sdn-ovs-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 92f2734ee5f2345791c0ef9192d59f46f48a2746ca2612a3e21b15e5b04865dd |
atomic-openshift-service-catalog-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: ada3c5559e81970a5f9c6b2da01d9b383a86d9fbc65022f8568f048e18701f36 |
atomic-openshift-template-service-broker-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: 2fd754c6f4f8d4a499092df10edac9bc3c516ea522d2132351e9021c77f465c3 |
atomic-openshift-tests-3.9.71-1.git.0.dba24d1.el7.x86_64.rpm | SHA-256: b57ff3e27d7207080c396b8bf03837de4d8dd009529c1030741b4fbf5a7421af |
atomic-openshift-utils-3.9.71-1.git.0.abb258d.el7.noarch.rpm | SHA-256: 17e149b1b7d8f73388ede9b2b826f6c77b3c3d4b2dc8fc198d91423e3b886a6b |
atomic-openshift-web-console-3.9.71-1.git.1.f8c4656.el7.x86_64.rpm | SHA-256: b1bc045a57bd6e196c58965e85f560baabf47d9d6084c8b1a93df67535b6e4f9 |
cri-o-1.9.15-1.git4b8e3df.el7.x86_64.rpm | SHA-256: b55ff0196f7d60b2d6e3fd631b84b82332b63de6e1e782e1ce5be8c280f27792 |
cri-o-debuginfo-1.9.15-1.git4b8e3df.el7.x86_64.rpm | SHA-256: ede71b9cd51c3a11819dc4e4a3b3ef8ef87af533b0bf0bec4edbcf0c01c0e993 |
haproxy-debuginfo-1.8.17-3.el7.x86_64.rpm | SHA-256: e4998d70cd67de0cae78af165fdeb07a8997b41bbd2e350893eb4d4fc37835ae |
haproxy18-1.8.17-3.el7.x86_64.rpm | SHA-256: 4d1ace63e0766d06d07e9b469d8e1fd2f6bd074e3d1ababe225e22940c605303 |
openshift-ansible-3.9.71-1.git.0.abb258d.el7.noarch.rpm | SHA-256: 82031cb59556402cc971b9a4b2dd296571e2956fc5b9e60af177e4369d6ced14 |
openshift-ansible-docs-3.9.71-1.git.0.abb258d.el7.noarch.rpm | SHA-256: b6dfbcd4238a48e1f51f54a54d922b3a88911fd67de83ada57cc488ca85c1d4d |
openshift-ansible-playbooks-3.9.71-1.git.0.abb258d.el7.noarch.rpm | SHA-256: 24fa4bb83d7e096d59a543b47db3446743a97bcddd6885e55bd4a3dc41e52e0e |
openshift-ansible-roles-3.9.71-1.git.0.abb258d.el7.noarch.rpm | SHA-256: ffd555743236a2469bb36fe9346a2581956ef5e6fc8b1bff0a1bb95aaf425f6d |
prometheus-node-exporter-3.9.71-1.git.2.a8a4129.el7.x86_64.rpm | SHA-256: 965eb8de9797bba9c6cbe759f895bc8b9e73e8f02a5c7d6c619fbce0b4432aee |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.