- Issued:
- 2019-06-06
- Updated:
- 2019-06-06
RHBA-2019:0794 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 3.11 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 3.11.104 is now available with
updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.104. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2019:0795
This update fixes the following bugs:
- Director-deployed pods would stop in the `CrashLoopBackOff` state after a
rolling reboot of a node. This was because the `READY` sequence would
display a node before it had started. Now, the `READY` indicator allows
components to come online before displaying as a ready state. (BZ#1654044)
- Ansible playbook `health.yml` assumed `curator` was a `deploymentconfig` instead of a `cronjob`. Now, the `health.yml` playbook checks for `curator` as a `cronjob`. This change properly evaluates the `curator` status. (BZ#1676720)
- The `NetworkPolicy` plugin did not clean up rules from deleted namespaces. Now, all `OpenVSwitch` flows associated with a namespace are deleted properly when a namespace is deleted. (BZ#1686025)
- During `Satellite` registry-based installations of OpenShift Container Platform 3.11, the example template URLs were installed at the wrong file path. This would cause example resources to be configured incorrectly. Now, a condition has been added to replace the image URL with the `Satellite` location. As a result, the example resources are configured with valid image URLs. (BZ#1689848)
- Previously, cluster logging did not store secret names in service accounts. When secrets were required to be whitelisted, the logging service accounts were unable to access their required secrets. Now, secret names are added appropriately to their service accounts. (BZ#1690605)
- `oc cp` commands were not checking links from tar files used to copy
files between pods and user's workstations. The `oc cp` command could cause
a directory traversal and replace or delete files on a user's workstation.
Now, escaping links are not permitted. As a result, the `oc cp` command
verifies files copied between pods and workstations without allowing escape
from directories. (BZ#1693315)
- During previous upgrades, the `tuned` package and profiles could have
been removed. The `tuned` role was not being applied during an upgrade, but
only during a fresh install. Now, the `tuned` role is applied during
upgrades to ensure `tuned` profiles are applied appropriately. (BZ#1694131)
- `NetworkPolicy` rules were not updated reliably after service restarts. A bug in the re-initialization process of the plugin state after a restart of the SDN service would ignore changes in a namespace. Now, updates to `NetworkPolicies` are now correctly tracked at all times. (BZ#1694704)
- Monitoring certificates were not updated after certificate redeployment. As a result, `prometheus`, `grafana`, and `alertmanager` user interfaces were inoperable. Now the TLS secrets and pods are removed during certificate redeployment and the user interfaces work correctly after certificate redeployment. (BZ#1696198)
All OpenShift Container Platform 3.11 users are advised to upgrade to these
updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system are applied.
See the following documentation, which will be updated shortly for release 3.11.104, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.11 x86_64
- Red Hat OpenShift Container Platform for Power 3.11 ppc64le
Fixes
- BZ - 1427274 - Kibana header "container-brand" image should be properly branded for the deployment
- BZ - 1633892 - OCP 3.11: CRI-O cluster install with openshift-ansible fails on large AWS instances m5.12xlarge and m4.16xlarge due to Master node openshift-sdn pod in CrashLoopBackOff state
- BZ - 1634151 - [3.11.z] CRI-O cluster install with openshift-ansible fails on large AWS instances m5.12xlarge and m4.16xlarge due to Master node openshift-sdn pod in CrashLoopBackOff state
- BZ - 1651393 - rotate-server-certificates gets set to false when set separately
- BZ - 1654044 - OCP 3.11: pods end up in CrashLoopBackOff state after a rolling reboot of the node
- BZ - 1670418 - inventory variable which points out to IP address of NFS server is not being expanded, so that the installer creates the PVC with wrongs data.
- BZ - 1680063 - python2-certifi points to the wrong location
- BZ - 1686025 - [3.11] Network Policy Plugin does not clean up flows from deleted namespaces
- BZ - 1689000 - Custom managed nic causing install to fail
- BZ - 1689848 - example template image url does not work on Satellite
- BZ - 1690605 - Aggregated Logging installation does not add secret to serviceaccount [3.11.z]
- BZ - 1690900 - etcd rpm is installed when etcd is co-located on a master
- BZ - 1690951 - [3.11.z] KubeletTooManyPods statically compares against 100 instead of --max-pods (-10)
- BZ - 1691893 - KubeCPUOvercommit factors in Completed and Failed pods
- BZ - 1693035 - Fluentd doesn't output it's logs to STDOUT when LOGGING_FILE_PATH=console
- BZ - 1694106 - [crio-tool] Installing or upgrading OCP 3.11 when using crio, keeps changing the crictl.yaml file with the incorrect pathvim
- BZ - 1694131 - Tuned profiles are not applied to OpenShift clusters that get upgraded from 3.6
- BZ - 1694704 - [3.11] NetworkPolicy rules don't update reliably after a service restart
- BZ - 1694899 - The kibana was authorized as CN=system.logging.kibana by mistake
- BZ - 1695271 - [3.11] Wildcard routes get 503 intermittently
- BZ - 1695856 - Task failure restart docker while running redeploy-certificates
- BZ - 1696198 - after running redeploy-certificates.yml playbook grafana, prometheus and alertmanager routes are not accessible anymore
- BZ - 1697169 - Addition of custom ca bundle in Grafana throws error
- BZ - 1697295 - Prometheus shows different monitoring history with Grafana dashboard refresh
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.11
SRPM | |
---|---|
atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.src.rpm | SHA-256: a4b40fcb729daac3fc116534c26d16eda2d54cbd72e15521b08009479c70cd78 |
atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.src.rpm | SHA-256: 583b78a708753ae40894209fdd0ad16ab1bcb0d8512968f09b2ff0dfb3a95cc5 |
atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.src.rpm | SHA-256: 7fe690b1f746085281e922b968c66779f42e352067ce1967efd0c12d08c85de7 |
atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.src.rpm | SHA-256: 329422e896f696e6aabc4d51ac4dfc2595ca733664743e9921c003fcfc321f3a |
atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.src.rpm | SHA-256: cd5ba325fa67a16516b62da85fe2267c03e72d679a818f46fd059aa38a270e4f |
atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.src.rpm | SHA-256: 0784859b9e254c8803dd8fc8464e2b4680a0bec08227d5dcfcd3a7e00633e183 |
cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.src.rpm | SHA-256: 36943354dc2b2b0b5275d818fbb73be72b8e2d96cd355753acb332e50ddeb062 |
golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.src.rpm | SHA-256: ee6876eda859a85cb88afad28e15a1fbb6550cd8d23d616bb9a8bee3e463d2c4 |
golang-github-prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.src.rpm | SHA-256: 16568cbdc5ab302bbd46108a02afe7e0eafbe2b881147ad653d215cd1ade451f |
golang-github-prometheus-node_exporter-3.11.104-1.git.1.fb6869d.el7.src.rpm | SHA-256: 9924d09efca803eed681cb9b29b5da820429a240c7a1763f218e719d8a6120a8 |
golang-github-prometheus-prometheus-3.11.104-1.git.1.66a69b4.el7.src.rpm | SHA-256: 1c915570117b4056b71428f7a5c8c9fe7ca0b5deb83d033bf60c2ab8ce06ab4d |
openshift-ansible-3.11.104-1.git.0.379a011.el7.src.rpm | SHA-256: 24b0a5f2290f0cb89411efa7c92b41b2aed33e1c605104f4e4a16bb827999964 |
openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.src.rpm | SHA-256: f132e39e8606f837e625955d2fc7d62b6abe158d46ebf061f75df92e28461fc4 |
openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.src.rpm | SHA-256: 0efb2420f1425c76a239c96378502d57b0911b931193f1d18cbb33ab53ec41bb |
x86_64 | |
atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.x86_64.rpm | SHA-256: 1ae995226ddb19b3fba5e609aa8fcd7c70d3fd57040e3f877dc494d6ad95b59f |
atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.x86_64.rpm | SHA-256: 4ab56ce51bd271c2e76431bef678c0793bac6ec8fded4d885cce4d2e6a7df959 |
atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.x86_64.rpm | SHA-256: e2b44ded0116cef7283dd4997906a97215d8224170420130b1b8721d0613dc4e |
atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.x86_64.rpm | SHA-256: 925c3af74acc6502f2b940bbafcbaf46bd520ce197b0ced6f76ffd67a29d79ca |
atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.x86_64.rpm | SHA-256: e08950f287903992c08d25d2d9e6dc65882732833656c9b8517749357ea2edc2 |
atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.x86_64.rpm | SHA-256: 29af71eb281a267e72951a8fa2c59fb11423bb6f433da25d997ebcb4c294d3b1 |
atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.x86_64.rpm | SHA-256: 1301eefb2627047fed633cbabba323ef8a8b542f7d25a8aa4d52aec20bce0a50 |
atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.x86_64.rpm | SHA-256: 46e87d579b1e9770c9f57658c50785ac08c450d38d11032534a8701ba3286908 |
cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.x86_64.rpm | SHA-256: 0579af681cb825b65dac2c8e671d412b95b28f52ffa17de999bbc35d74a22f64 |
cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.x86_64.rpm | SHA-256: 5e2ff81b591d1d94bc4bc1443633983e61603729269d622e661743fec3f18ab3 |
golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.x86_64.rpm | SHA-256: 944f510d56363a04cb49d7c04052ae747a79402ab995c62d22180e85f8c096c8 |
openshift-ansible-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: ad947d3ad0613ef1707d2a78e0d3168ca3244dec159eeb5c5cf27fb14737b56b |
openshift-ansible-docs-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: b3fa7cf4b2281bc88169aa156b383eebe65e16c44041569783cf5fe8c9c25069 |
openshift-ansible-playbooks-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: c841ddf9583b75ac1d4492b33fe5148f36cd2801ee231d111b303e9728705d16 |
openshift-ansible-roles-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: a268b65bf520765301d561c61b0802214fb40cd43b3860d64f47035aa9f3f45f |
openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.x86_64.rpm | SHA-256: 06395c6a87404d6e999f434f40a450e269eb3a16824d97ff012a75fa341f6649 |
openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.x86_64.rpm | SHA-256: 59ce4266af3a050c16b2f6d2d27b205e501dc45ec1f0facc0dade410bdc0fc98 |
prometheus-3.11.104-1.git.1.66a69b4.el7.x86_64.rpm | SHA-256: 531fec95791fbc020a7f4afcd1eb2af5c1ac3cb7e910aa33437d9730a6006449 |
prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.x86_64.rpm | SHA-256: 475d44fdca5aa314bdf0574700a50d8e46e06e650e5469f2ba91a35ede82fd91 |
prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.x86_64.rpm | SHA-256: a90b23680b7b8c8f7e72ebe9d8032fc1465e1e1975d4f8d61e6f304737d2f499 |
Red Hat OpenShift Container Platform for Power 3.11
SRPM | |
---|---|
atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.src.rpm | SHA-256: a4b40fcb729daac3fc116534c26d16eda2d54cbd72e15521b08009479c70cd78 |
atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.src.rpm | SHA-256: 583b78a708753ae40894209fdd0ad16ab1bcb0d8512968f09b2ff0dfb3a95cc5 |
atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.src.rpm | SHA-256: 7fe690b1f746085281e922b968c66779f42e352067ce1967efd0c12d08c85de7 |
atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.src.rpm | SHA-256: 0cc14f27bfc8fd75832bbce4e63f0877dc525b49028c0410f8e16aa92bc30fde |
atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.src.rpm | SHA-256: 329422e896f696e6aabc4d51ac4dfc2595ca733664743e9921c003fcfc321f3a |
atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.src.rpm | SHA-256: cd5ba325fa67a16516b62da85fe2267c03e72d679a818f46fd059aa38a270e4f |
atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.src.rpm | SHA-256: 0784859b9e254c8803dd8fc8464e2b4680a0bec08227d5dcfcd3a7e00633e183 |
cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.src.rpm | SHA-256: 36943354dc2b2b0b5275d818fbb73be72b8e2d96cd355753acb332e50ddeb062 |
golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.src.rpm | SHA-256: ee6876eda859a85cb88afad28e15a1fbb6550cd8d23d616bb9a8bee3e463d2c4 |
golang-github-prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.src.rpm | SHA-256: 16568cbdc5ab302bbd46108a02afe7e0eafbe2b881147ad653d215cd1ade451f |
golang-github-prometheus-node_exporter-3.11.104-1.git.1.fb6869d.el7.src.rpm | SHA-256: 9924d09efca803eed681cb9b29b5da820429a240c7a1763f218e719d8a6120a8 |
golang-github-prometheus-prometheus-3.11.104-1.git.1.66a69b4.el7.src.rpm | SHA-256: 1c915570117b4056b71428f7a5c8c9fe7ca0b5deb83d033bf60c2ab8ce06ab4d |
openshift-ansible-3.11.104-1.git.0.379a011.el7.src.rpm | SHA-256: 24b0a5f2290f0cb89411efa7c92b41b2aed33e1c605104f4e4a16bb827999964 |
openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.src.rpm | SHA-256: f132e39e8606f837e625955d2fc7d62b6abe158d46ebf061f75df92e28461fc4 |
openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.src.rpm | SHA-256: 0efb2420f1425c76a239c96378502d57b0911b931193f1d18cbb33ab53ec41bb |
ppc64le | |
atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm | SHA-256: d6f7e61936db371b48f4560ecdc89de43adada9c02795a05b03096eff8bf4d67 |
atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm | SHA-256: d6f7e61936db371b48f4560ecdc89de43adada9c02795a05b03096eff8bf4d67 |
atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm | SHA-256: 452d5b873ebb7efea0a849c3a249371f424ac7eb5a44665562876ad059dd091b |
atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm | SHA-256: 452d5b873ebb7efea0a849c3a249371f424ac7eb5a44665562876ad059dd091b |
atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.ppc64le.rpm | SHA-256: 4b061ea9ec85fb273f672fc2e34e3fc0989a0513a415f410e91c9ba0445860d7 |
atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.ppc64le.rpm | SHA-256: 4b061ea9ec85fb273f672fc2e34e3fc0989a0513a415f410e91c9ba0445860d7 |
atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.ppc64le.rpm | SHA-256: 95e4d73bf18ffdaa4aab00a18138331a9d9ad885f01740915a1ddc44526aa179 |
atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.ppc64le.rpm | SHA-256: 95e4d73bf18ffdaa4aab00a18138331a9d9ad885f01740915a1ddc44526aa179 |
atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.ppc64le.rpm | SHA-256: 06884c6c9a232d3de8963cb09bcf090811bc87b2449e5b7058e2367df0ef39fa |
atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.ppc64le.rpm | SHA-256: 06884c6c9a232d3de8963cb09bcf090811bc87b2449e5b7058e2367df0ef39fa |
atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.ppc64le.rpm | SHA-256: 90e3bd364472851817e1e92d7eb3ec85271b34cfb791a346488f3830dd7232b6 |
atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.ppc64le.rpm | SHA-256: 90e3bd364472851817e1e92d7eb3ec85271b34cfb791a346488f3830dd7232b6 |
atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.ppc64le.rpm | SHA-256: e2e5cf32855e6a5b9fd8254c930bde447fd083fb6c6cd3f219d8ffd48d5683ca |
atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.ppc64le.rpm | SHA-256: e2e5cf32855e6a5b9fd8254c930bde447fd083fb6c6cd3f219d8ffd48d5683ca |
atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.ppc64le.rpm | SHA-256: 0a6740009235daf78d129a9fed3ad98230271ea061bf80a6e5bcef4fdc0a0b8b |
atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.ppc64le.rpm | SHA-256: 0a6740009235daf78d129a9fed3ad98230271ea061bf80a6e5bcef4fdc0a0b8b |
cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm | SHA-256: 4d05f78b58e4a8670c3e4c7f6d838384b4c1d7d1e098284afa62e68eddb50b74 |
cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm | SHA-256: 4d05f78b58e4a8670c3e4c7f6d838384b4c1d7d1e098284afa62e68eddb50b74 |
cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm | SHA-256: 23cc16d352e9e65725f90f7d55a655095e5f8fa3e338ed534ccfb0646fb76cd8 |
cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm | SHA-256: 23cc16d352e9e65725f90f7d55a655095e5f8fa3e338ed534ccfb0646fb76cd8 |
golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.ppc64le.rpm | SHA-256: 36bd90dba7b9bc4742e2c4a83c71a218e43bd5c8a83f87470812ca3e4fc86acc |
golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.ppc64le.rpm | SHA-256: 36bd90dba7b9bc4742e2c4a83c71a218e43bd5c8a83f87470812ca3e4fc86acc |
openshift-ansible-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: ad947d3ad0613ef1707d2a78e0d3168ca3244dec159eeb5c5cf27fb14737b56b |
openshift-ansible-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: ad947d3ad0613ef1707d2a78e0d3168ca3244dec159eeb5c5cf27fb14737b56b |
openshift-ansible-docs-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: b3fa7cf4b2281bc88169aa156b383eebe65e16c44041569783cf5fe8c9c25069 |
openshift-ansible-docs-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: b3fa7cf4b2281bc88169aa156b383eebe65e16c44041569783cf5fe8c9c25069 |
openshift-ansible-playbooks-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: c841ddf9583b75ac1d4492b33fe5148f36cd2801ee231d111b303e9728705d16 |
openshift-ansible-playbooks-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: c841ddf9583b75ac1d4492b33fe5148f36cd2801ee231d111b303e9728705d16 |
openshift-ansible-roles-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: a268b65bf520765301d561c61b0802214fb40cd43b3860d64f47035aa9f3f45f |
openshift-ansible-roles-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: a268b65bf520765301d561c61b0802214fb40cd43b3860d64f47035aa9f3f45f |
openshift-ansible-test-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: 7e63f55cdea12f668cd8de0fd34f6861f5ec965bad54108d6f717a42cf1c0928 |
openshift-ansible-test-3.11.104-1.git.0.379a011.el7.noarch.rpm | SHA-256: 7e63f55cdea12f668cd8de0fd34f6861f5ec965bad54108d6f717a42cf1c0928 |
openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.ppc64le.rpm | SHA-256: dd7e52ddd97b7681e18becc345fa44e19295d768918e670d38ee2033653d0ac3 |
openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.ppc64le.rpm | SHA-256: dd7e52ddd97b7681e18becc345fa44e19295d768918e670d38ee2033653d0ac3 |
openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.ppc64le.rpm | SHA-256: 00d802b4f03fa1887df111cd0766257754385d083b0d9dd3d1ab8cdcfa6b072d |
openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.ppc64le.rpm | SHA-256: 00d802b4f03fa1887df111cd0766257754385d083b0d9dd3d1ab8cdcfa6b072d |
prometheus-3.11.104-1.git.1.66a69b4.el7.ppc64le.rpm | SHA-256: 808a5a2ab72174016a520948d6922f181eab64606ff6e771d6392ffa9d279fed |
prometheus-3.11.104-1.git.1.66a69b4.el7.ppc64le.rpm | SHA-256: 808a5a2ab72174016a520948d6922f181eab64606ff6e771d6392ffa9d279fed |
prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.ppc64le.rpm | SHA-256: 0dee48cbe5ecbceb9d4ed09098e614524eae1d9aa9988dcd5415afd6b19d6816 |
prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.ppc64le.rpm | SHA-256: 0dee48cbe5ecbceb9d4ed09098e614524eae1d9aa9988dcd5415afd6b19d6816 |
prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.ppc64le.rpm | SHA-256: eacf8bd116fe53f155a6ecb562bee76474cf71856b428eb690be55c1d1feb947 |
prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.ppc64le.rpm | SHA-256: eacf8bd116fe53f155a6ecb562bee76474cf71856b428eb690be55c1d1feb947 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.