- Issued:
- 2020-08-27
- Updated:
- 2020-08-27
RHBA-2020:3542 - Bug Fix Advisory
Synopsis
Red Hat OpenStack Platform 16.1 director bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated director installer packages that resolve various issues are now
available for Red Hat OpenStack Platform 16.1 (Train) for Red Hat
Enterprise Linux (RHEL) 8.2.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
For additional information about the items in this advisory, refer to the Technical Notes chapter of the Release Notes, https://access.redhat.com/documentation/en-us/red-hat-openstack-platform/
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 16.1 runs on RHEL 8.2.
The Red Hat OpenStack Platform 16.1 Release Notes contain the following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat OpenStack Platform 16.1, including
which channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en-us/red-hat-openstack-platform/
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack for IBM Power 16.1 ppc64le
- Red Hat OpenStack 16.1 x86_64
- Red Hat OpenStack Director Deployment Tools 16.1 x86_64
- Red Hat OpenStack Director Deployment Tools for IBM Power LE 16.1 ppc64le
- Cinderlib 16.1 x86_64
- Cinderlib for IBM Power LE 16.1 ppc64le
Fixes
- BZ - 1827024 - OSP16 | STF | Currently mesh configuration can not be deployed because of nonfunctional external endpoint of QDR
- BZ - 1845726 - [OSP13 ->OSP16.1 hackfest][upgrade] we should automate installation of Leapp on all overcloud nodes before we have customer run Leapp command
- BZ - 1848417 - Local attach with ceph fails on RHEL 8.2
- BZ - 1848610 - Removal of ceph-common from undercloud compute breaks local attach
- BZ - 1849235 - [OSP13 ->OSP16.1] Unset UpgradeLevelNovaCompute or live migrations fail
- BZ - 1850555 - ceph-ansible-installed needs to use sudo level access when checking the repository name
- BZ - 1850991 - upgrade fails when checking for haproxy backends status
- BZ - 1851914 - 13 -> 16.1 upgrade: system_upgrade on bootstrap node fails
- BZ - 1852620 - unable to setup TLS-everywhere with public TLS certs
- BZ - 1852868 - [RHOSP 16.1 Upgrades] openstack overcloud external-upgrade run --stack STACK NAME --tags ceph_systemd -e ceph_ansible_limit=overcloud-controller-0 fails with validation error for task "Get OSD stat percentage"
- BZ - 1853268 - TLS Everywhere: Compute node upgrade from 13 -> 16 fails with [qemu-nbd-client-cert]: Could not evaluate: Could not get certificate
- BZ - 1853275 - When doing FFU with Ceph, we need to set noout,norebalance flags on the cluster before LEAPP reboots the node
- BZ - 1853433 - [OSP16]FFU] To allow system_upgrade step, we need to unmount NFS / iSCSI filesystems in the overcloud nodes (and clear fstab)
- BZ - 1853465 - FFU with Ganesha fails on "overcloud upgrade run" step with Error: unable to set attribute ceph-nfs-role
- BZ - 1854069 - Update fails with "Could not find the requested service tripleo_octavia_api_tls_proxy"
- BZ - 1857298 - Usage of DeploymentServerBlacklist causes all nova-computes to be removed from an overcloud during node removal
- BZ - 1857365 - scale down of nodes is failing if all nodes are unreachable
- BZ - 1858673 - [RHOSP 13 to 16.1 Upgrades] 'openvswitch' and 'ovs-vswitchd' failed to start after performing leapp upgrade
- BZ - 1858745 - 2 minutes of traffic loss during openvswitch package update
- BZ - 1863024 - osp16.0-16.1 update fails: ovn-controller is unable to connect to OVS because of OpenFlow protocol version
- BZ - 1863036 - [OSP13->OSP16.1] Keep ceph-ansible 3 in the Undercloud during the whole FFU procedure.
- BZ - 1866372 - [RHOSP 13 to 16.1 Upgrades][SRIOV] Baremetal node hangs on reboot during leapp upgrade
CVEs
(none)
Red Hat OpenStack for IBM Power 16.1
SRPM | |
---|---|
openstack-tripleo-common-11.3.3-0.20200611110657.f7715be.el8ost.src.rpm | SHA-256: a6e8a48e3a6099ec0a63de16b371bd7cb6d88a64af6400849834f21f472b603a |
openstack-tripleo-heat-templates-11.3.2-0.20200616081539.396affd.el8ost.src.rpm | SHA-256: 828124c282d164795295582962c602fa027ae2e608d937d858b4e7d3b0426d6c |
openstack-tripleo-validations-11.3.2-0.20200611115253.08f469d.el8ost.src.rpm | SHA-256: 31069ee8b920991509bfe3f66d044a01a19789938238d47bee5fd7dbdb04f807 |
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.src.rpm | SHA-256: a963b398e44ba602763fde1328369b9cfe7ddbfa17bb75e1b9fdce8d1c397ee8 |
python-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.src.rpm | SHA-256: efd1c86440a4d878233266c32ce97f50f521c2ffb31f6fec9097177b4a43b4cf |
tripleo-ansible-0.5.1-0.20200611113659.34b8fcc.el8ost.src.rpm | SHA-256: 4f2a78219bdf5ac0c56fa0bb1c07e23dd1c58e4821422ce0eb6ebbdfcd6be09c |
ppc64le | |
openstack-tripleo-common-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 9b704b0f24f8c74192a782cfef0ec6357e266170be5b0ada80a1144944571450 |
openstack-tripleo-common-container-base-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 158bfe5aa408e53c2c9a7fbf01c9c37a1fe6fc6eb828898b418e73252a530ee9 |
openstack-tripleo-common-containers-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 42eeb8fa652036c88695e91d0dc405aa79e273940771f2a84fbffc7ba2ed5a71 |
openstack-tripleo-common-devtools-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 03cf10ef94239e86e1ced4c3425e44becdf237feb05fa105b4586054ad78b417 |
openstack-tripleo-heat-templates-11.3.2-0.20200616081539.396affd.el8ost.noarch.rpm | SHA-256: b7c6f46e39ad198e6d4921b8daf4dee373080ae04c58f7af1c38ed47f3e5dc9f |
openstack-tripleo-validations-11.3.2-0.20200611115253.08f469d.el8ost.noarch.rpm | SHA-256: dfe98fd92e849658186abc87d376b036a40ebb06f9d4899950268297aacc69aa |
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.noarch.rpm | SHA-256: 9cdf249f7c315c3aa4cba180bd70668b718a5cae80cd0df217f78e74a4594b8c |
python3-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.noarch.rpm | SHA-256: 59877a407c3b5c8c1f2ffb1ab2d02e9692fbcad4358d438f4618aa0f02ce4b4f |
python3-tripleo-common-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 6d993c607a09226a1c2720d28538aebb40931563694b760384279e42ad661e35 |
tripleo-ansible-0.5.1-0.20200611113659.34b8fcc.el8ost.noarch.rpm | SHA-256: 17730f1301cab050929685b73e9576132c913f70975b547f7657c34def72ba34 |
Red Hat OpenStack 16.1
SRPM | |
---|---|
openstack-tripleo-common-11.3.3-0.20200611110657.f7715be.el8ost.src.rpm | SHA-256: a6e8a48e3a6099ec0a63de16b371bd7cb6d88a64af6400849834f21f472b603a |
openstack-tripleo-heat-templates-11.3.2-0.20200616081539.396affd.el8ost.src.rpm | SHA-256: 828124c282d164795295582962c602fa027ae2e608d937d858b4e7d3b0426d6c |
openstack-tripleo-validations-11.3.2-0.20200611115253.08f469d.el8ost.src.rpm | SHA-256: 31069ee8b920991509bfe3f66d044a01a19789938238d47bee5fd7dbdb04f807 |
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.src.rpm | SHA-256: a963b398e44ba602763fde1328369b9cfe7ddbfa17bb75e1b9fdce8d1c397ee8 |
python-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.src.rpm | SHA-256: efd1c86440a4d878233266c32ce97f50f521c2ffb31f6fec9097177b4a43b4cf |
tripleo-ansible-0.5.1-0.20200611113659.34b8fcc.el8ost.src.rpm | SHA-256: 4f2a78219bdf5ac0c56fa0bb1c07e23dd1c58e4821422ce0eb6ebbdfcd6be09c |
x86_64 | |
openstack-tripleo-common-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 9b704b0f24f8c74192a782cfef0ec6357e266170be5b0ada80a1144944571450 |
openstack-tripleo-common-container-base-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 158bfe5aa408e53c2c9a7fbf01c9c37a1fe6fc6eb828898b418e73252a530ee9 |
openstack-tripleo-common-containers-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 42eeb8fa652036c88695e91d0dc405aa79e273940771f2a84fbffc7ba2ed5a71 |
openstack-tripleo-common-devtools-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 03cf10ef94239e86e1ced4c3425e44becdf237feb05fa105b4586054ad78b417 |
openstack-tripleo-heat-templates-11.3.2-0.20200616081539.396affd.el8ost.noarch.rpm | SHA-256: b7c6f46e39ad198e6d4921b8daf4dee373080ae04c58f7af1c38ed47f3e5dc9f |
openstack-tripleo-validations-11.3.2-0.20200611115253.08f469d.el8ost.noarch.rpm | SHA-256: dfe98fd92e849658186abc87d376b036a40ebb06f9d4899950268297aacc69aa |
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.noarch.rpm | SHA-256: 9cdf249f7c315c3aa4cba180bd70668b718a5cae80cd0df217f78e74a4594b8c |
python3-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.noarch.rpm | SHA-256: 59877a407c3b5c8c1f2ffb1ab2d02e9692fbcad4358d438f4618aa0f02ce4b4f |
python3-tripleo-common-11.3.3-0.20200611110657.f7715be.el8ost.noarch.rpm | SHA-256: 6d993c607a09226a1c2720d28538aebb40931563694b760384279e42ad661e35 |
tripleo-ansible-0.5.1-0.20200611113659.34b8fcc.el8ost.noarch.rpm | SHA-256: 17730f1301cab050929685b73e9576132c913f70975b547f7657c34def72ba34 |
Red Hat OpenStack Director Deployment Tools 16.1
SRPM | |
---|---|
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.src.rpm | SHA-256: a963b398e44ba602763fde1328369b9cfe7ddbfa17bb75e1b9fdce8d1c397ee8 |
x86_64 | |
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.noarch.rpm | SHA-256: 9cdf249f7c315c3aa4cba180bd70668b718a5cae80cd0df217f78e74a4594b8c |
Red Hat OpenStack Director Deployment Tools for IBM Power LE 16.1
SRPM | |
---|---|
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.src.rpm | SHA-256: a963b398e44ba602763fde1328369b9cfe7ddbfa17bb75e1b9fdce8d1c397ee8 |
ppc64le | |
puppet-tripleo-11.5.0-0.20200616033428.8ff1c6a.el8ost.noarch.rpm | SHA-256: 9cdf249f7c315c3aa4cba180bd70668b718a5cae80cd0df217f78e74a4594b8c |
Cinderlib 16.1
SRPM | |
---|---|
python-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.src.rpm | SHA-256: efd1c86440a4d878233266c32ce97f50f521c2ffb31f6fec9097177b4a43b4cf |
x86_64 | |
python3-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.noarch.rpm | SHA-256: 59877a407c3b5c8c1f2ffb1ab2d02e9692fbcad4358d438f4618aa0f02ce4b4f |
Cinderlib for IBM Power LE 16.1
SRPM | |
---|---|
python-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.src.rpm | SHA-256: efd1c86440a4d878233266c32ce97f50f521c2ffb31f6fec9097177b4a43b4cf |
ppc64le | |
python3-os-brick-2.10.3-0.20200605063443.55fc998.el8ost.noarch.rpm | SHA-256: 59877a407c3b5c8c1f2ffb1ab2d02e9692fbcad4358d438f4618aa0f02ce4b4f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.