Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2020:0621 - Bug Fix Advisory
Issued:
2020-02-26
Updated:
2020-02-26

RHBA-2020:0621 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

OCS 3.11.z packages Bug Fix Update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated OpenShift Container Storage packages that fix several bugs are now available for Red Hat OpenShift Container Storage 3.11 Update 5.

Description

Red Hat OpenShift Container Storage (OCS) is a provider of agnostic persistent storage for OpenShift Container Platform either in-house or in a
hybrid cloud. As a Red Hat storage solution, OCS is completely integrated
with OpenShift Container Platform for deployment, management, and
monitoring.

This advisory fixes the following bugs:

  • When the block volumes are deleted, file or files are left under `/<brick-dir>/.glusterfs/unlink/' of the brick, wasting space. For every volume deleted, one file of 64MB is kept on every brick. Assuming there are 100 Block volumes created on a given BHV and deleted, the 64MB x 100 = 6.4GB space will be wasted on every brick. With this update, tcmu-runner is restarted and the open fd's in tcmu-runner daemon is closed and the files under ‘/brick/.glusterfs/unlink/' are removed, freeing the occupied space. The block volume creations are done successfully. (BZ#1668762)
  • Previously, new installations using Heketi had tuned the self-provisioned heketidbstorage gluster volumes for db workloads but did nothing to volumes created by older installs. Now, when a container hosting Heketi is first started and a built-in tool attempts to automatically tune the settings of an existing heketidbstorage volume. (BZ#1756861)
  • With this update, a new environment variable HEKETI_LVM_WRAPPER has been added. This environment variable enables Heketi to call a wrapper script inside the RHGS-Server containers to execute LVM commands. This improves stability of LVM initialization and handling of any LVM events during runtime. Race conditions between the LVM stack on the host and inside the container do not occur. Now, the LVM commands are executed through a wrapper script that runs LVM commands on the host instead of inside the container. (BZ#1772612)
  • Previously, a condition existed within Heketi where an error running a command on a node failed and was being cleaned up for a volume expand operation that would lead to incorrect used/free space on the devices related to that volume. With this release, this issue has been corrected and Heketi now correctly updates the free space even when the `expand` operation fails. (BZ#1653567)
  • Previously, Heketi was not consistent about how the status of devices was reported through the Heketi-cli tool. Now, Heketi always reports `removed` rather than `failed` when reporting that state. (BZ#1710685)
  • Previously, Heketi could crash if an attempt was made to delete a brick from a node that was not running and the option to `debug unmount` failures was enabled. Heketi no longer crashes when this condition occurs. (BZ#1796059)

Users of OpenShift Container Storage 3.11 are advised to upgrade to these updated packages, which fix these bugs.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64

Fixes

  • BZ - 1653567 - Incorrect used and free space shown in heketi topology info
  • BZ - 1710685 - After a device is removed from heketi, status of the device is different in device info and node info
  • BZ - 1718982 - Heketi spec contains old reference to image tag
  • BZ - 1756861 - Automatically tune heketidbstorage for safer workloads (on container start)
  • BZ - 1772612 - heketi should call the wrapper LVM scripts instead of the lvm binaries in the gluster container
  • BZ - 1789029 - Gluster pod going into "0/1" state after some tests execution
  • BZ - 1790560 - [OCS-3.11.z][TRACKING TICKET] gluster-block-target.service not starting after a reboot with a genconfig failure
  • BZ - 1796059 - Heketi crashes if the pod is not running on the node during brick remove

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
heketi-9.0.0-9.el7rhgs.src.rpm SHA-256: df7ce5429ed6ac6e72d94dbeea1813310863e4deff125f4442aee103adc93745
x86_64
heketi-client-9.0.0-9.el7rhgs.x86_64.rpm SHA-256: ee5b9b3a46744af31c74760e218221010af673dbd2a23df5bc911b63d682ad02

Red Hat Gluster Storage Server for On-premise 3 for RHEL 7

SRPM
gluster-block-0.2.1-35.el7rhgs.src.rpm SHA-256: a96c56b22e0e426b4ce7f120a7085b4148d2018a0aa16ff4682787ebf005f125
heketi-9.0.0-9.el7rhgs.src.rpm SHA-256: df7ce5429ed6ac6e72d94dbeea1813310863e4deff125f4442aee103adc93745
tcmu-runner-1.2.0-32.el7rhgs.src.rpm SHA-256: 76f27b58892195a0a00088a6cade26467047284a8b567236f96db2ffcfa62c41
x86_64
gluster-block-0.2.1-35.el7rhgs.x86_64.rpm SHA-256: b9162cbc57c44802f9a500a5c402d7a4b51631d80384353c36ae1e8d74ad4dd0
gluster-block-debuginfo-0.2.1-35.el7rhgs.x86_64.rpm SHA-256: b9a54e03fdbf4038bb858d6ea2605b4b2455d5a0a8c570367230084d75a3f76c
heketi-9.0.0-9.el7rhgs.x86_64.rpm SHA-256: 936eff703f3a81c61364f1e16488bee4437a5f583d1833f35af22025035db615
heketi-client-9.0.0-9.el7rhgs.x86_64.rpm SHA-256: ee5b9b3a46744af31c74760e218221010af673dbd2a23df5bc911b63d682ad02
libtcmu-1.2.0-32.el7rhgs.x86_64.rpm SHA-256: 2db96d210f089d32eb593d2b35819b92835cec42e0f5441411558926d6d1008b
libtcmu-devel-1.2.0-32.el7rhgs.x86_64.rpm SHA-256: e558cc5fe7c69ba36ac016ce6ffd585276bba09c713286c39537da9339b5a634
python-heketi-9.0.0-9.el7rhgs.x86_64.rpm SHA-256: 8368bf0f12a9b9b820a09c5eaa3e5bdd478426a02390d07a2fcfd9a124f897d9
tcmu-runner-1.2.0-32.el7rhgs.x86_64.rpm SHA-256: 9ebcb711f3306fcacaad85d0c3c6943d8f312d7df698bed0caa6156541a1e76a
tcmu-runner-debuginfo-1.2.0-32.el7rhgs.x86_64.rpm SHA-256: 66793df2f377b00b08b83521027996794800f08a8750db4fa6ff2ecb97d93622

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter