- Issued:
- 2019-10-03
- Updated:
- 2019-10-03
RHBA-2019:2557 - Bug Fix Advisory
Synopsis
gluster-ansible bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gluster-ansible packages that fix several bugs and add one enhancement are now available.
Description
The gluster-ansible packages provide a number of ansible roles for
deploying and managing GlusterFS clusters.
This update provides the following bug fixes:
- During cleanup of a failed deployment, not all files were removed.
This meant that when users tried to redeploy, they saw an option to
use an existing deployment configuration even though any existing
configuration should have been removed. All files are now correctly
removed during cleanup, and the 'Use existing deployment' option is
no longer visible after cleanup. (BZ#1654124)
- During deployment, host names were previously verified using the
dig command. This command did not validate host names specified in
the /etc/hosts file, so deployment failed. Host names are now
validated using the getent command, which is able to validate host
names set in the /etc/hosts file. (BZ#1692662)
- Previously, the sysfs pseudo file system was used to verify the
logical block size of a disk being used as a brick. However, this
failed when partitions of a disk were used instead of an entire
disk, because the /sys/block/<diskname>/queue/logical_block_size
file being checked relates only to whole disks. The output of the
blockdev command is now used to verify logical block size instead,
and deployment succeeds when either whole disks or partitions are
used to create bricks. (BZ#1713816)
- Previously the gluster_peer module did not detach peers
correctly during cleanup, so peers remained connected and the
cleanup playbook failed as a result. The shell module is now
used to collect the list of peers and detach them correctly so
that cleanup succeeds. (BZ#1692786)
It also includes the following enhancement:
- Thinly provisioned bricks are now supported on top of
Virtual Disk Optimization (VDO) devices. (BZ#1690606)
All users of Red Hat Gluster Storage are advised to upgrade to this
upgraded version of gluster-ansible.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
- Red Hat Virtualization Host 4 for RHEL 7 x86_64
- Red Hat Virtualization Host - Extended Update Support 4.2 for RHEL 7.6 x86_64
Fixes
- BZ - 1654124 - [gluster-ansible] Include ansibleStatus file removal with the gluster configuration cleanup
- BZ - 1674600 - Remove the validation for storage disks has acceptable latency of 10s during gluster deployment
- BZ - 1686359 - [gluster-ansible] Fail at the very beginning, when pre-requisites for RHHI-V deployment is not met
- BZ - 1690606 - Update the VDO systemd service file to support thinp bricks
- BZ - 1692654 - Playbooks to create gluster bricks are missing
- BZ - 1692662 - RHHI Gluster deployment fails for static hostnames
- BZ - 1692786 - Peers are not disconnecting after gluster cleanup using playbook.
- BZ - 1693540 - Mount the bricks with XFS UUID instead of device names
- BZ - 1712798 - Improvements on Gluster Deployment in RHHI
- BZ - 1713816 - Ansible prerequisites.yml prevents bricks from being created on partitions. Only whole disks are allowed
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
gluster-ansible-features-1.0.5-3.el7rhgs.src.rpm | SHA-256: 8efbb1caca79a9d9a10aa11dfb89212f90cecebbba51aca9ef619f730a67d5d3 |
gluster-ansible-infra-1.0.4-3.el7rhgs.src.rpm | SHA-256: af131a57df3f25babd839192c0c56f82685eefe3c8df587f0844afd786c28abc |
gluster-ansible-repositories-1.0.1-1.el7rhgs.src.rpm | SHA-256: 652aeb7a7a457ec30b0e3f0744ce3323598ffd7c8e039c8e046863ca05a7949e |
gluster-ansible-roles-1.0.5-4.el7rhgs.src.rpm | SHA-256: f223233b3a1d0581436aa5d134986cae52a2213e92c50d74fc345e3b8996651c |
x86_64 | |
gluster-ansible-features-1.0.5-3.el7rhgs.noarch.rpm | SHA-256: 43e8920808619ba576d2dbd6bac9ce613f745e1679952cc1ac26b6f8a75c038a |
gluster-ansible-infra-1.0.4-3.el7rhgs.noarch.rpm | SHA-256: 3aab6447f305d2950de8921a4cfa5fb31f670b80c4dc35d12dbfd7181d2381e9 |
gluster-ansible-repositories-1.0.1-1.el7rhgs.noarch.rpm | SHA-256: e9c6701a6e6458b2741df61e33a9314081af88f3f042e937f859cbcf51dd5a16 |
gluster-ansible-roles-1.0.5-4.el7rhgs.noarch.rpm | SHA-256: b13f40ef572dd860441b6a20a1f45772d9da034199d2ef4821536bd14489bc5f |
Red Hat Virtualization Host 4 for RHEL 7
SRPM | |
---|---|
gluster-ansible-features-1.0.5-3.el7rhgs.src.rpm | SHA-256: 8efbb1caca79a9d9a10aa11dfb89212f90cecebbba51aca9ef619f730a67d5d3 |
gluster-ansible-infra-1.0.4-3.el7rhgs.src.rpm | SHA-256: af131a57df3f25babd839192c0c56f82685eefe3c8df587f0844afd786c28abc |
gluster-ansible-repositories-1.0.1-1.el7rhgs.src.rpm | SHA-256: 652aeb7a7a457ec30b0e3f0744ce3323598ffd7c8e039c8e046863ca05a7949e |
gluster-ansible-roles-1.0.5-4.el7rhgs.src.rpm | SHA-256: f223233b3a1d0581436aa5d134986cae52a2213e92c50d74fc345e3b8996651c |
x86_64 | |
gluster-ansible-features-1.0.5-3.el7rhgs.noarch.rpm | SHA-256: 43e8920808619ba576d2dbd6bac9ce613f745e1679952cc1ac26b6f8a75c038a |
gluster-ansible-infra-1.0.4-3.el7rhgs.noarch.rpm | SHA-256: 3aab6447f305d2950de8921a4cfa5fb31f670b80c4dc35d12dbfd7181d2381e9 |
gluster-ansible-repositories-1.0.1-1.el7rhgs.noarch.rpm | SHA-256: e9c6701a6e6458b2741df61e33a9314081af88f3f042e937f859cbcf51dd5a16 |
gluster-ansible-roles-1.0.5-4.el7rhgs.noarch.rpm | SHA-256: b13f40ef572dd860441b6a20a1f45772d9da034199d2ef4821536bd14489bc5f |
Red Hat Virtualization Host - Extended Update Support 4.2 for RHEL 7.6
SRPM | |
---|---|
gluster-ansible-features-1.0.5-3.el7rhgs.src.rpm | SHA-256: 8efbb1caca79a9d9a10aa11dfb89212f90cecebbba51aca9ef619f730a67d5d3 |
gluster-ansible-infra-1.0.4-3.el7rhgs.src.rpm | SHA-256: af131a57df3f25babd839192c0c56f82685eefe3c8df587f0844afd786c28abc |
gluster-ansible-repositories-1.0.1-1.el7rhgs.src.rpm | SHA-256: 652aeb7a7a457ec30b0e3f0744ce3323598ffd7c8e039c8e046863ca05a7949e |
gluster-ansible-roles-1.0.5-4.el7rhgs.src.rpm | SHA-256: f223233b3a1d0581436aa5d134986cae52a2213e92c50d74fc345e3b8996651c |
x86_64 | |
gluster-ansible-features-1.0.5-3.el7rhgs.noarch.rpm | SHA-256: 43e8920808619ba576d2dbd6bac9ce613f745e1679952cc1ac26b6f8a75c038a |
gluster-ansible-infra-1.0.4-3.el7rhgs.noarch.rpm | SHA-256: 3aab6447f305d2950de8921a4cfa5fb31f670b80c4dc35d12dbfd7181d2381e9 |
gluster-ansible-repositories-1.0.1-1.el7rhgs.noarch.rpm | SHA-256: e9c6701a6e6458b2741df61e33a9314081af88f3f042e937f859cbcf51dd5a16 |
gluster-ansible-roles-1.0.5-4.el7rhgs.noarch.rpm | SHA-256: b13f40ef572dd860441b6a20a1f45772d9da034199d2ef4821536bd14489bc5f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.