- Issued:
- 2020-02-26
- Updated:
- 2020-02-26
RHBA-2020:0621 - Bug Fix Advisory
Synopsis
OCS 3.11.z packages Bug Fix Update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenShift Container Storage packages that fix several bugs are now available for Red Hat OpenShift Container Storage 3.11 Update 5.
Description
Red Hat OpenShift Container Storage (OCS) is a provider of agnostic persistent storage for OpenShift Container Platform either in-house or in a
hybrid cloud. As a Red Hat storage solution, OCS is completely integrated
with OpenShift Container Platform for deployment, management, and
monitoring.
This advisory fixes the following bugs:
- When the block volumes are deleted, file or files are left under `/<brick-dir>/.glusterfs/unlink/' of the brick, wasting space. For every volume deleted, one file of 64MB is kept on every brick. Assuming there are 100 Block volumes created on a given BHV and deleted, the 64MB x 100 = 6.4GB space will be wasted on every brick. With this update, tcmu-runner is restarted and the open fd's in tcmu-runner daemon is closed and the files under ‘/brick/.glusterfs/unlink/' are removed, freeing the occupied space. The block volume creations are done successfully. (BZ#1668762)
- Previously, new installations using Heketi had tuned the self-provisioned heketidbstorage gluster volumes for db workloads but did nothing to volumes created by older installs. Now, when a container hosting Heketi is first started and a built-in tool attempts to automatically tune the settings of an existing heketidbstorage volume. (BZ#1756861)
- With this update, a new environment variable HEKETI_LVM_WRAPPER has been added. This environment variable enables Heketi to call a wrapper script inside the RHGS-Server containers to execute LVM commands. This improves stability of LVM initialization and handling of any LVM events during runtime. Race conditions between the LVM stack on the host and inside the container do not occur. Now, the LVM commands are executed through a wrapper script that runs LVM commands on the host instead of inside the container. (BZ#1772612)
- Previously, a condition existed within Heketi where an error running a command on a node failed and was being cleaned up for a volume expand operation that would lead to incorrect used/free space on the devices related to that volume. With this release, this issue has been corrected and Heketi now correctly updates the free space even when the `expand` operation fails. (BZ#1653567)
- Previously, Heketi was not consistent about how the status of devices was reported through the Heketi-cli tool. Now, Heketi always reports `removed` rather than `failed` when reporting that state. (BZ#1710685)
- Previously, Heketi could crash if an attempt was made to delete a brick from a node that was not running and the option to `debug unmount` failures was enabled. Heketi no longer crashes when this condition occurs. (BZ#1796059)
Users of OpenShift Container Storage 3.11 are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1653567 - Incorrect used and free space shown in heketi topology info
- BZ - 1710685 - After a device is removed from heketi, status of the device is different in device info and node info
- BZ - 1718982 - Heketi spec contains old reference to image tag
- BZ - 1756861 - Automatically tune heketidbstorage for safer workloads (on container start)
- BZ - 1772612 - heketi should call the wrapper LVM scripts instead of the lvm binaries in the gluster container
- BZ - 1789029 - Gluster pod going into "0/1" state after some tests execution
- BZ - 1790560 - [OCS-3.11.z][TRACKING TICKET] gluster-block-target.service not starting after a reboot with a genconfig failure
- BZ - 1796059 - Heketi crashes if the pod is not running on the node during brick remove
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 7
| SRPM | |
|---|---|
| heketi-9.0.0-9.el7rhgs.src.rpm | SHA-256: df7ce5429ed6ac6e72d94dbeea1813310863e4deff125f4442aee103adc93745 |
| x86_64 | |
| heketi-client-9.0.0-9.el7rhgs.x86_64.rpm | SHA-256: ee5b9b3a46744af31c74760e218221010af673dbd2a23df5bc911b63d682ad02 |
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
| SRPM | |
|---|---|
| gluster-block-0.2.1-35.el7rhgs.src.rpm | SHA-256: a96c56b22e0e426b4ce7f120a7085b4148d2018a0aa16ff4682787ebf005f125 |
| heketi-9.0.0-9.el7rhgs.src.rpm | SHA-256: df7ce5429ed6ac6e72d94dbeea1813310863e4deff125f4442aee103adc93745 |
| tcmu-runner-1.2.0-32.el7rhgs.src.rpm | SHA-256: 76f27b58892195a0a00088a6cade26467047284a8b567236f96db2ffcfa62c41 |
| x86_64 | |
| gluster-block-0.2.1-35.el7rhgs.x86_64.rpm | SHA-256: b9162cbc57c44802f9a500a5c402d7a4b51631d80384353c36ae1e8d74ad4dd0 |
| gluster-block-debuginfo-0.2.1-35.el7rhgs.x86_64.rpm | SHA-256: b9a54e03fdbf4038bb858d6ea2605b4b2455d5a0a8c570367230084d75a3f76c |
| heketi-9.0.0-9.el7rhgs.x86_64.rpm | SHA-256: 936eff703f3a81c61364f1e16488bee4437a5f583d1833f35af22025035db615 |
| heketi-client-9.0.0-9.el7rhgs.x86_64.rpm | SHA-256: ee5b9b3a46744af31c74760e218221010af673dbd2a23df5bc911b63d682ad02 |
| libtcmu-1.2.0-32.el7rhgs.x86_64.rpm | SHA-256: 2db96d210f089d32eb593d2b35819b92835cec42e0f5441411558926d6d1008b |
| libtcmu-devel-1.2.0-32.el7rhgs.x86_64.rpm | SHA-256: e558cc5fe7c69ba36ac016ce6ffd585276bba09c713286c39537da9339b5a634 |
| python-heketi-9.0.0-9.el7rhgs.x86_64.rpm | SHA-256: 8368bf0f12a9b9b820a09c5eaa3e5bdd478426a02390d07a2fcfd9a124f897d9 |
| tcmu-runner-1.2.0-32.el7rhgs.x86_64.rpm | SHA-256: 9ebcb711f3306fcacaad85d0c3c6943d8f312d7df698bed0caa6156541a1e76a |
| tcmu-runner-debuginfo-1.2.0-32.el7rhgs.x86_64.rpm | SHA-256: 66793df2f377b00b08b83521027996794800f08a8750db4fa6ff2ecb97d93622 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.