- Issued:
- 2020-12-17
- Updated:
- 2020-12-17
RHBA-2020:5602 - Bug Fix Advisory
Synopsis
OpenShift Container Storage 3.11.z bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenShift Container Storage packages that fix several bugs are now available for Red Hat OpenShift Container Storage 3.11 Update 6.
Description
The OpenShift Container Storage solution provides persistent storage service for OpenShift Containers and OpenShift Infrastructure services.
This advisory fixes the following bugs:
- iSCSI login negotiation sometimes failed because a race condition in file locks created a credential mismatch. This meant that not all paths were added for multipath devices. This race condition has been corrected and this issue no longer occurs. (BZ#1597320)
- Log rotation is now supported for gluster-block and tcmu-runner relevant logs. (BZ#1790788)
- Heketi administrators can now evict a brick from an existing volume using the brick's Heketi ID. This operation is supported at the command line and using the API. Upon eviction, the brick is automatically replaced by a suitable new brick. If no new brick is available, eviction fails. (BZ#1630172)
- Devices can now be segregated into groups or tiers based on particular characteristics, such as storage speed. (BZ#1699027)
- Heketi now supports block volume expansion. (BZ#1680019)
- Heketi device removal is now more reliable, and better tracks underlying changes such as brick eviction in order to provide more detailed debug information and assist with troubleshooting in the event of errors. (BZ#1812122)
Users of OpenShift Container Storage 3.11 are advised to upgrade to these
updated packages, which fixes these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1597320 - [Tracking RHEL7.8] 'iSCSI Login negotiation failed' messages in logs while draining pods from one node to another
- BZ - 1680019 - [RFE] [heketi] Expand feature for Block PVs
- BZ - 1699027 - [RFE] OCS / CRS / CNS multi-tier-brick clusters for >1 storage class per cluster
- BZ - 1725009 - Cleaning up of IQN is not happening properly from the nodes.
- BZ - 1737685 - tcmu-runner: Log timed out commands
- BZ - 1761042 - tcmu-runner: fix possible crash when loging to file and the rsyslog buffer
- BZ - 1800699 - [GSS] log rotation config causes tcmu-runner to terminate
- BZ - 1812122 - Improve the reliability of device remove
- BZ - 1813491 - tcmu-runner: Fix possible cdb printing overflow
- BZ - 1822068 - [gluster-block] need minor adjustments in resizing
- BZ - 1858937 - brickEvict/deviceRemove is not working when node is unreachable
- BZ - 1882701 - Heketi cli (client) fails to process long error messages returned by the server
- BZ - 1888760 - Panic seen during brick evict op when volume does not exist in gluster but does in heketi db
- BZ - 1904907 - heketi dev build of OCS 3.11.6 can misinterpret pending entries in db created by older heketi versions
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
heketi-9.0.0-14.el7rhgs.src.rpm | SHA-256: e455e2857860005e3a033724c30e90f9ca96fefe85097d6cb3c9c4c6e5479c04 |
x86_64 | |
heketi-client-9.0.0-14.el7rhgs.x86_64.rpm | SHA-256: 221f42b3b050018e3656011f1180f30063eaf2927cf9f19ef2cca8b29acd1e89 |
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
gluster-block-0.2.1-39.el7rhgs.src.rpm | SHA-256: d115449ae617f161be1c4839bb8037b6c32b3fa8132498ebb427234e58931f24 |
heketi-9.0.0-14.el7rhgs.src.rpm | SHA-256: e455e2857860005e3a033724c30e90f9ca96fefe85097d6cb3c9c4c6e5479c04 |
tcmu-runner-1.2.0-35.el7rhgs.src.rpm | SHA-256: fc6f57864621bc8606279d58e5bacef88b731cb50a2246ac871125f6a1ef4a42 |
x86_64 | |
gluster-block-0.2.1-39.el7rhgs.x86_64.rpm | SHA-256: 1e51b9ec8c9442ba0a5e3d229d9e6b1018018f16aedd4d0b010fb7ce713975ad |
gluster-block-debuginfo-0.2.1-39.el7rhgs.x86_64.rpm | SHA-256: 0e469f4e7c7408358810d5ac53248019f456e3391a10561e7e6ab431a014d0b5 |
heketi-9.0.0-14.el7rhgs.x86_64.rpm | SHA-256: 4d110ed5888f805ee0d8678b3e8b101edd84879f09edacf08a090e3381782a6f |
heketi-client-9.0.0-14.el7rhgs.x86_64.rpm | SHA-256: 221f42b3b050018e3656011f1180f30063eaf2927cf9f19ef2cca8b29acd1e89 |
libtcmu-1.2.0-35.el7rhgs.x86_64.rpm | SHA-256: e73bcb0a9e8dfa42e1bfe31e57f0ca9ed6acf84975f617eb474246ab5e975bd5 |
libtcmu-devel-1.2.0-35.el7rhgs.x86_64.rpm | SHA-256: 6e9eb18ee62fcf174955f4e1df73a5b7bce01b9aeed93cff7cb6523bdc08c03e |
python-heketi-9.0.0-14.el7rhgs.x86_64.rpm | SHA-256: 52fda80519e152eaf700229d6cfa00992b3f6f52079898e52e80d503074f6160 |
tcmu-runner-1.2.0-35.el7rhgs.x86_64.rpm | SHA-256: fd124dcc8eb78bcee29079ec84804f7b128d153a0c2c2c070cc37422afd0de2f |
tcmu-runner-debuginfo-1.2.0-35.el7rhgs.x86_64.rpm | SHA-256: e56240be97b3039541433a1ea8fe3f8647a437b07e1f8ac9fbf6065be214dac5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.