- Issued:
- 2019-06-11
- Updated:
- 2019-06-11
RHBA-2019:0786 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 3.10 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 3.10.139 is now available with
updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.10.139. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2019:0787
This update fixes the following bugs:
- The `node-config.yaml` file was not being back up and was overwritten when upgrading from OpenShift Container Platform 3.9 to 3.10, and downgrading was not possible. Now, the `node-config.yaml` file and `atomic-openshift` systemd files are backed up correctly and downgrading from OpenShift Container Platform 3.10 to 3.9 is now possible. (BZ#1609191)
- During the upgrade process, sanity checks were using inefficient code to validate variables. Sanity check time took several minutes on a large set of hosts. Now, `hostvars` are stored in the class, so they are not being copied on every check. As a result, the sanity checks take less time to complete and upgrades complete faster. (BZ#1685583)
- When a node was tainted, the `sync` daemonset would not run a pod on it. This lead to installation failures. Now, the `sync` DS pods tolerate all taints and tainted nodes are able to be upgraded. (BZ#1685952)
- The node system container did not properly mount `/var/lib/iscsi` as
read/write. Now, the `iscsi` mounts correctly with read/write permissions. (BZ#1686336)
- Upgrading from OpenShift Container Platform 3.9 to 3.10 would fail if variables were not used correctly or if custom API ports were used. Now, `api_port` and other API server-related variables are read during the upgrade process and complete successfully. (BZ#1689243)
- `oc cp` commands were not checking links from tar files used to copy
files between pods and user's workstations. The `oc cp` command could cause
a directory traversal and replace or delete files on a user's workstation.
Now, escaping links are not permitted. As a result, the `oc cp` command
verifies files copied between pods and workstations without allowing escape
from directories. (BZ#1693318)
- During previous upgrades, the `tuned` package and profiles could have been removed. The `tuned` role was not being applied during an upgrade, but only during a fresh install. Now, the `tuned` role is applied during upgrades to ensure `tuned` profiles are applied appropriately. (BZ#1694130)
- Director-deployed pods would stop in the `CrashLoopBackOff` state after a rolling reboot of a node. This was because the `READY` sequence would display a node before it had started. Now, the `READY` indicator allows components to come online before displaying as a ready state. (BZ#1698626)
All OpenShift Container Platform 3.10 users are advised to upgrade to these
updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system are applied.
See the following documentation, which will be updated shortly for release 3.10.139, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.10 x86_64
- Red Hat OpenShift Container Platform for Power 3.10 ppc64le
Fixes
- BZ - 1422393 - oc got hard-to-read message when the server is not available
- BZ - 1609191 - Need to backup node-config file during upgrade which is a must for downgrade
- BZ - 1620556 - [3.10.14] ovs Pods OOMKilled on baremetal nodes
- BZ - 1624475 - Calico requires a role be added that runs stand-alone kube-proxy and DNS
- BZ - 1685583 - [3.10] Slow Initialization During Upgrades
- BZ - 1685952 - sync daemonset should tolerate taints (3.10)
- BZ - 1686336 - [3.10] Failed to mount iscsi on atomic host
- BZ - 1689243 - Upgrade from 3.9 to 3.10 fails on openshift_control_plane: verify API server. Using wrong API port.
- BZ - 1690184 - [3.10] Pre-allocated PV not utilized on OSP
- BZ - 1690603 - Aggregated Logging installation does not add secret to serviceaccount [3.10.z]
- BZ - 1692418 - openshift-ansible fails with AnsibleUndefinedVariable: 'dict object' has no attribute 'annotations'"
- BZ - 1693043 - Fluentd doesn't output it's logs to STDOUT when LOGGING_FILE_PATH=console
- BZ - 1694130 - Tuned profiles are not applied to OpenShift clusters that get upgraded from 3.6
- BZ - 1695272 - [3.10] Wildcard routes get 503 intermittently
- BZ - 1696413 - Task failure restart docker while running redeploy-certificates
- BZ - 1697679 - [3.10][crio-tool] Installing or upgrading OCP 3.10 when using crio, keeps changing the crictl.yaml file with the incorrect pathvim
- BZ - 1698626 - OCP 3.10: pods end up in CrashLoopBackOff state after a rolling reboot of the node
- BZ - 1698820 - [3.10] HostAlreadyClaimed route issue on path based route
- BZ - 1699467 - Running redeploy CA and openshift redeploy certificates , causes all nodes to become notready.
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.10
SRPM | |
---|---|
atomic-enterprise-service-catalog-3.10.139-1.git.1.ae2bce0.el7.src.rpm | SHA-256: 38cee1d0c37b599bfc79549ede9d3b727278715172f0d911b75c5fcb65bbd437 |
atomic-openshift-3.10.139-1.git.0.aa29c47.el7.src.rpm | SHA-256: a0f124634cea855ff0566a89de76b7fb24a73fc63b663efcde843abe6d0538fe |
atomic-openshift-descheduler-3.10.139-1.git.1.4b3edb1.el7.src.rpm | SHA-256: 2d3265650ad98e749ffa7bf68704c4bcacf1fe17b57b24c579f8f571c9ea9036 |
atomic-openshift-dockerregistry-3.10.139-1.git.1.d548783.el7.src.rpm | SHA-256: 4e9328a0154296d189d0fd166431546f6eae77a31a46c26c138eb930faa6653f |
atomic-openshift-node-problem-detector-3.10.139-1.git.1.ec81bb7.el7.src.rpm | SHA-256: 7a2491235f1fc6d4deb2c5ad43d69497b162de3a8b73934854222475f3601287 |
atomic-openshift-web-console-3.10.139-1.git.1.328d00d.el7.src.rpm | SHA-256: 228faf5c8298fc9196510e76ebe9ff47ab68f4e8634630b0b7a8dbdeebef0a66 |
golang-github-prometheus-node_exporter-3.10.139-1.git.1.b1b6e2a.el7.src.rpm | SHA-256: d1dfabd593c299975a0c64c87d13a466ee49a6c0076a045c93453bf23c89705c |
openshift-ansible-3.10.139-1.git.0.02bc5db.el7.src.rpm | SHA-256: 5508ec4c377eef1f38e7a7b1391d13b3bceebb59016b60ef00692fa14cc19d0e |
openshift-enterprise-cluster-capacity-3.10.139-1.git.1.929a137.el7.src.rpm | SHA-256: 15d6846cd1f42dbfd0bb0c84476c588ec772db24dcfa7109fa4cc4e17ee45c1a |
python-docker-2.4.2-2.el7.src.rpm | SHA-256: 0d3459e4e5a1334376609e3d70043375362cab82d3bce0e49bb80ec140edfa0c |
x86_64 | |
atomic-enterprise-service-catalog-3.10.139-1.git.1.ae2bce0.el7.x86_64.rpm | SHA-256: e319e8c8891d755ab5c8853778a06f604c5c55cfa1cf5b3d2617f1217e0a8c70 |
atomic-enterprise-service-catalog-svcat-3.10.139-1.git.1.ae2bce0.el7.x86_64.rpm | SHA-256: 98c7c457fba4a9dc6b57d79e76df2b6942f92921f46d0047e8834c201fcbaf69 |
atomic-openshift-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: ac5e7915d7b0cf0ba478e20ca116164d57391edca443d5266581ac329537c23b |
atomic-openshift-clients-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 138e8ae428418ee29a0488b2e88fb93f03acbd39ab58048f8e955c2001e8fcb7 |
atomic-openshift-clients-redistributable-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 70d0a29d088a447d7565cc765974750d0888453aca3237fdebe417c62570ab07 |
atomic-openshift-descheduler-3.10.139-1.git.1.4b3edb1.el7.x86_64.rpm | SHA-256: 7bf2ff8dfc3b8ae0da2bc65c012ed0c0ba00cc285122638fca5ae9d5940ca207 |
atomic-openshift-docker-excluder-3.10.139-1.git.0.aa29c47.el7.noarch.rpm | SHA-256: 4a17a26344c5c65a0be9421b06c1d94e604c99294ce115c81ee23cfb931f662e |
atomic-openshift-dockerregistry-3.10.139-1.git.1.d548783.el7.x86_64.rpm | SHA-256: efdae81dc4addde7fbebce1d68a30fba0b619a4590200e921d0e128c73a6020d |
atomic-openshift-excluder-3.10.139-1.git.0.aa29c47.el7.noarch.rpm | SHA-256: b1bcdf03412475d992e0ad5c08514343cec947df85452e0f447ab857f4620692 |
atomic-openshift-hyperkube-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 4e4781c576560dba07f97ca426e288fc45acbb47929ec24b6e9c0bce94204694 |
atomic-openshift-hypershift-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: ddcb63b7b7c05ad6cfab39b2d0381285209dc6e9a0f58c4f95582b014a2f94b9 |
atomic-openshift-master-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 91604bb3c31b804748c8b32da6f6e587d7476647a3bf6f368c1a287dfc41d3df |
atomic-openshift-node-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 008e6cbe4d545021d4a2a33f312b0bb83f7f055f816a189f0aad6d66c3b04632 |
atomic-openshift-node-problem-detector-3.10.139-1.git.1.ec81bb7.el7.x86_64.rpm | SHA-256: fa07fc310cea033332d955fe86390abc86fd1ac416257469833443a6eb6d3f96 |
atomic-openshift-pod-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 4aa846ee38c4e5a4715a1243a9fa621e096789e6fde0f8c9c379676c32d5c6bf |
atomic-openshift-sdn-ovs-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: d894768997cca98299fb467c9e42de9f21603a91544b566698641caf49a06a4e |
atomic-openshift-template-service-broker-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 7b033b5f722a1ac414c0ce8a42f961721cc7938c921da40c689a7844d53fb5f6 |
atomic-openshift-tests-3.10.139-1.git.0.aa29c47.el7.x86_64.rpm | SHA-256: 836d37b7e62ff2459dd703ace630c1304a663e95a816d1563db7f090bb1aac59 |
atomic-openshift-web-console-3.10.139-1.git.1.328d00d.el7.x86_64.rpm | SHA-256: b4fab4f9a9989337ca2086ff3d64f7dbf136bd7f46905e8bd0a4fb8e2538d8f3 |
openshift-ansible-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 7d5b1115cd1f8a907cceb24d7a91d07d1830a0ec33824602756981e53915cb1e |
openshift-ansible-docs-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 4130c18e7f13c23b032fe3dd295313fed430e2585e9a7b5deeadb23aed5ae5e4 |
openshift-ansible-playbooks-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 48ea5ce6f42345cf7616990cc4db63fa4a17fb8eeabe75da38e837d28d54e59a |
openshift-ansible-roles-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 381b2c953d7ae18df8b1ab9db89a83eb37ebae9c220844855493247d08980c6b |
openshift-enterprise-cluster-capacity-3.10.139-1.git.1.929a137.el7.x86_64.rpm | SHA-256: 6cd555abbf70475090913da56ddea63767e51fa9ba2011fff1875b27c28ed76d |
prometheus-node-exporter-3.10.139-1.git.1.b1b6e2a.el7.x86_64.rpm | SHA-256: 82b4fbc46237856546a55855594085222a930ca30ad823cc1c29c128ede892ab |
python-docker-2.4.2-2.el7.noarch.rpm | SHA-256: 3dbd87166c14ab6183a4ffafe47d7e4d6e94adb6b5930b1a0e3478436d5f6049 |
Red Hat OpenShift Container Platform for Power 3.10
SRPM | |
---|---|
atomic-enterprise-service-catalog-3.10.139-1.git.1.ae2bce0.el7.src.rpm | SHA-256: 38cee1d0c37b599bfc79549ede9d3b727278715172f0d911b75c5fcb65bbd437 |
atomic-openshift-3.10.139-1.git.0.aa29c47.el7.src.rpm | SHA-256: a0f124634cea855ff0566a89de76b7fb24a73fc63b663efcde843abe6d0538fe |
atomic-openshift-descheduler-3.10.139-1.git.1.4b3edb1.el7.src.rpm | SHA-256: 2d3265650ad98e749ffa7bf68704c4bcacf1fe17b57b24c579f8f571c9ea9036 |
atomic-openshift-dockerregistry-3.10.139-1.git.1.d548783.el7.src.rpm | SHA-256: 4e9328a0154296d189d0fd166431546f6eae77a31a46c26c138eb930faa6653f |
atomic-openshift-node-problem-detector-3.10.139-1.git.1.ec81bb7.el7.src.rpm | SHA-256: 7a2491235f1fc6d4deb2c5ad43d69497b162de3a8b73934854222475f3601287 |
atomic-openshift-web-console-3.10.139-1.git.1.328d00d.el7.src.rpm | SHA-256: 228faf5c8298fc9196510e76ebe9ff47ab68f4e8634630b0b7a8dbdeebef0a66 |
golang-github-prometheus-node_exporter-3.10.139-1.git.1.b1b6e2a.el7.src.rpm | SHA-256: d1dfabd593c299975a0c64c87d13a466ee49a6c0076a045c93453bf23c89705c |
openshift-ansible-3.10.139-1.git.0.02bc5db.el7.src.rpm | SHA-256: 5508ec4c377eef1f38e7a7b1391d13b3bceebb59016b60ef00692fa14cc19d0e |
openshift-enterprise-cluster-capacity-3.10.139-1.git.1.929a137.el7.src.rpm | SHA-256: 15d6846cd1f42dbfd0bb0c84476c588ec772db24dcfa7109fa4cc4e17ee45c1a |
python-docker-2.4.2-2.el7.src.rpm | SHA-256: 0d3459e4e5a1334376609e3d70043375362cab82d3bce0e49bb80ec140edfa0c |
ppc64le | |
atomic-enterprise-service-catalog-3.10.139-1.git.1.ae2bce0.el7.ppc64le.rpm | SHA-256: 6f0b864609925bc65245769025365166c1f74e993cda65c44c100a1eb183d570 |
atomic-enterprise-service-catalog-svcat-3.10.139-1.git.1.ae2bce0.el7.ppc64le.rpm | SHA-256: 377fd29ce90c70948aab3fe3d27e96326c22cc3f17f66ce2ef83545c7d5be7cd |
atomic-openshift-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 5b71d899c457b840b8c3775a8ebb817806f156074ab020404fdcd6a3e5c0e02c |
atomic-openshift-clients-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 0d62c37467217916fda5a556cd038381166b25f1723bc030c2b70e0b28b6a04c |
atomic-openshift-descheduler-3.10.139-1.git.1.4b3edb1.el7.ppc64le.rpm | SHA-256: 9b20ae096d960978614438d5110900e6ce565759f362fbc4507ed34889481e96 |
atomic-openshift-docker-excluder-3.10.139-1.git.0.aa29c47.el7.noarch.rpm | SHA-256: 4a17a26344c5c65a0be9421b06c1d94e604c99294ce115c81ee23cfb931f662e |
atomic-openshift-dockerregistry-3.10.139-1.git.1.d548783.el7.ppc64le.rpm | SHA-256: 5b7e560cdd29d7c3d316b475d2c193df8ef20fc930a303acbe87faa54ef806b1 |
atomic-openshift-excluder-3.10.139-1.git.0.aa29c47.el7.noarch.rpm | SHA-256: b1bcdf03412475d992e0ad5c08514343cec947df85452e0f447ab857f4620692 |
atomic-openshift-hyperkube-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 70d65ceea62442cc586c90c792f33c615e6afcaec5edf8ed0dcfb1c78a49a8a5 |
atomic-openshift-hypershift-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 656aeace0717ef56c87041f30e0be7628b8eb63f0ead3157c104d1dcc34c26d2 |
atomic-openshift-master-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: dcc4434947bb0898a40bbd023153fd8706d2508b3e11e27a0f060602404a0f43 |
atomic-openshift-node-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: d77137ee573802ad6ac3f1e714face184a93314ead7a68ff5e1059772d640400 |
atomic-openshift-node-problem-detector-3.10.139-1.git.1.ec81bb7.el7.ppc64le.rpm | SHA-256: 92d07fc436aafe3d70a35eccb9618244598c72396a5f7df32847564bd4f0f085 |
atomic-openshift-pod-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 1d479a03c8532a5d1ec4074dd3b42e301fc2fb5b82fa3048c50b3e7a3dd67e7b |
atomic-openshift-sdn-ovs-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 62e01c98ba1c4416df47afdda54777984694b14036253e260fce69dea84ae284 |
atomic-openshift-template-service-broker-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: adcf269f2d554057c49fe7b14d74751f6db16cca817fbe2d4b01712354087c60 |
atomic-openshift-tests-3.10.139-1.git.0.aa29c47.el7.ppc64le.rpm | SHA-256: 1697b1c3547cae9dddfbcf2cf52d5a2c6d06baf0d0e25b1ba70f9fcf3c6be225 |
atomic-openshift-web-console-3.10.139-1.git.1.328d00d.el7.ppc64le.rpm | SHA-256: c70df58ffc92e681991d10fe58320adf5c422d36d8c7f498c5240478e87642e3 |
openshift-ansible-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 7d5b1115cd1f8a907cceb24d7a91d07d1830a0ec33824602756981e53915cb1e |
openshift-ansible-docs-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 4130c18e7f13c23b032fe3dd295313fed430e2585e9a7b5deeadb23aed5ae5e4 |
openshift-ansible-playbooks-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 48ea5ce6f42345cf7616990cc4db63fa4a17fb8eeabe75da38e837d28d54e59a |
openshift-ansible-roles-3.10.139-1.git.0.02bc5db.el7.noarch.rpm | SHA-256: 381b2c953d7ae18df8b1ab9db89a83eb37ebae9c220844855493247d08980c6b |
openshift-enterprise-cluster-capacity-3.10.139-1.git.1.929a137.el7.ppc64le.rpm | SHA-256: 3ffa7523dadbbb0af84955b525ca6bca82d390d149fb685d119bdd3bfccd9ead |
prometheus-node-exporter-3.10.139-1.git.1.b1b6e2a.el7.ppc64le.rpm | SHA-256: 33772a3201ad47810cbc30a7df99ac032d6ee30dad03f26fca68ae5b73e6aacd |
python-docker-2.4.2-2.el7.noarch.rpm | SHA-256: 3dbd87166c14ab6183a4ffafe47d7e4d6e94adb6b5930b1a0e3478436d5f6049 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.