- Issued:
- 2020-12-17
- Updated:
- 2020-12-17
RHBA-2020:5603 - Bug Fix Advisory
Synopsis
glusterfs bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs packages that fix several bugs and add various enhancements are now available for Red Hat Enterprise Linux 8.
Description
Red Hat Gluster Storage is a software only scale-out storage solution
that provides flexible and affordable unstructured data storage.
It unifies data storage and infrastructure, increases performance,
and improves availability and manageability to meet enterprise-level
storage challenges.
This advisory fixes the following bugs:
- Previously, if the bit-rot feature was disabled and enabled on the same volume it would mark some files as corrupted. Now, the files are signed unconditionally when the bit-rot daemon comes up instead of skipping the files with bit-rot extended attributes. (BZ#1851424)
- Guest access gluster volumes shared using SMB is no longer enabled
by default. (BZ#1775637)
- When file healing failed, gluster retried healing multiple times,
which consumed CPU resources significantly. Continuous healing is now
detected more reliably, and CPU usage is reduced when healing does not
immediately succeed. (BZ#1852736)
- Previously, when IPv6 addresses were used during brick creation, the geo-replication would fail to start causing faulty geo-replication sessions. With this update, geo-replication can parse full brick and hostname from volfile. (BZ#1855966)
- Detecting disconnected hyperconverged hosts took too long and caused
timeouts that resulted in sanlock killing virtual machines when leases
could not be refreshed. Tuning has improved disconnect detection so that
the timeout no longer occurs. (BZ#1845064)
- When the glusterd service crashes, systemd now restarts it automatically
up to 6 times per hour. (BZ#1663557)
- The '--type' option has been added to glusterfind so that either
files (f) or directories (d) or both (both) are shown. Use this option
with the `--full` option to show only the specified file type(s).
(BZ#1383723)
- The 'gluster volume heal $volname info' command no longer takes
blocking locks in order to avoid a possible hang that occurred when a
lock was acquired by a client writing to the same file. (BZ#1721355)
- The replication module now uses eager-lock functionality for fsync
operations, improving performance on write-heavy hyperconverged and
virtualization workloads. (BZ#1838479)
- Split-brain resolution using the command line is now available for
replica 3 volumes. (BZ#1759875)
- Previously, spurious entry heal was triggered even when only the
source bricks were available, which resulted in I/O errors on the
mount when the AFR extended attributes were unintentionally reset.
Entry heals are now triggered only when all the 3 bricks are available,
avoiding GFID split-brain in this situation. (BZ#1804164)
- SELinux policies specific to Red Hat Gluster Storage are now shipped
in Red Hat Gluster Storage packages. (BZ#1460657)
All users of Red Hat Gluster Storage are advised to upgrade to these
updated packages, which resolve these issues and add these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 8 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
Fixes
- BZ - 1234220 - [Backup]: Glusterfind CLI commands need to verify the accepted names for session/volume, before failing with error(s)
- BZ - 1286171 - Rebalance : Status lists failures on stopping rebalance while it is in progress
- BZ - 1383723 - [GSS][RFE] provide option in glusterfind to display only files as well
- BZ - 1412545 - healing must not change the ctime of the file
- BZ - 1460657 - [RFE] Remove Glusterfs SELinux module from RHEL Distribution selinux-policy, and ship Glusterfs SELinux module as part of glusterfs package
- BZ - 1487177 - change the error message for heal statistics to reflect its supportability for disperse volume
- BZ - 1524457 - check for same hostnames(bricks from same host/node) while adding bricks in erasure (ec) ie disperse volumes and error out accordingly(use force to over-ride)
- BZ - 1529249 - Brick Multiplexing: glusterfsd (brick) process leaks memory on an idle brick multiplex setup
- BZ - 1640573 - [geo-rep]: Transport endpoint not connected with arbiter volumes
- BZ - 1658132 - [Ganesha] Ganesha failed on one node while exporting volumes in loop
- BZ - 1663557 - RFE: systemd should restart glusterd on crash
- BZ - 1667954 - [man page] Gluster(8) - Missing disperse-data parameter Gluster Console Manager man page
- BZ - 1683602 - [Brick-mux] Observing multiple brick processes on node reboot with volume start
- BZ - 1686897 - [CodeChange][Coverity] RETURN_LOCAL in __nlc_inode_ctx_get()
- BZ - 1721355 - Heal Info is hung when I/O is in progress on a gluster block volume
- BZ - 1748865 - [GSS][Duplicate entries in 'ls' output after a volume expansion]
- BZ - 1750211 - [GSS] glustershd logs are filling up with error client-rpc-fops.c:1513:client3_3_inodelk_cbk: remote operation failed [Invalid argument]
- BZ - 1754391 - man page update needed for gluster volume top command
- BZ - 1759875 - afr: support split-brain CLI for replica 3
- BZ - 1761531 - heal not actually healing metadata of a regular file when only time stamps are changed(data heal not required)
- BZ - 1761932 - ctime value is different from atime/mtime on a create of file
- BZ - 1763030 - Set volume option when one of the node is powered off, After powering the node brick processes are offline (with brick-mux enabled)
- BZ - 1763124 - clearly state that replica 2 is deprecated in cli warning when user tries to create replica 2 volume
- BZ - 1763129 - either don't allow or else throw a warning if a user tries to create a volume with replica count greater than 3
- BZ - 1764091 - Setting cluster.heal-timeout requires volume restart
- BZ - 1775637 - Remove guest access by default for GlusterFS volume SMB shares added by hook scripts
- BZ - 1776901 - [GSS] Volume creation and deletion fails in OCS (OCS 3.11.2) (brickmux)
- BZ - 1781550 - glusterfs process memory leak in ior test
- BZ - 1781649 - READDIRP incorrectly updates posix-acl inode ctx
- BZ - 1781710 - default option is disappeared in volume info after volume reset
- BZ - 1783232 - gluster-smb:glusto-test access gluster by cifs test write report Device or resource busy
- BZ - 1784211 - [GSS] - 'gluster volume set <VOLUME> disable.nfs' accidentally killed unexpected process, and forced a data brick offline.
- BZ - 1784415 - Deprecated log rotate command still present
- BZ - 1785577 - gluster processes are having memory leak after enabling SSL
- BZ - 1786516 - on a brickmux setup glusterd consumes very high memory with SSL enabled when compared without SSL enablement (dup of bug 1785577 )
- BZ - 1786681 - quota_fsck script KeyError: 'contri_size'
- BZ - 1787294 - Improve logging in EC, client and lock xlator
- BZ - 1787305 - lots of "Matching lock not found for unlock xxx" when using disperse (ec) xlator
- BZ - 1787310 - [CodeChange] Fix issues reported by Coverity static analysis tool
- BZ - 1787994 - [geo-rep] Help for positional argument SLAVE in schedule_georep.py.in isn't clear.
- BZ - 1790336 - brick crashed when creating and deleting volumes over time (with brick mux enabled only)
- BZ - 1794663 - [brickmux]: glustershd crashed when rebooting 1/3 nodes at regular intervals
- BZ - 1796814 - config ssh-port can accept negative and outside allowed port range value
- BZ - 1804164 - Spurious healing results in heal pending on the volume
- BZ - 1810924 - [SSL]: Memory leak by glusterfsd (issue heal info indefinitely to reproduce) when SSL enabled for Management layer
- BZ - 1812789 - [RHEL-8.1] On distributed-disperse volume, Remove-brick status showing failed on one of the node after few hours of the operation.
- BZ - 1812835 - [RHEL-7]-DH ciphers disabled info flooding glusterd log messages on a SSL enabled setup
- BZ - 1815434 - [samba-disperse] unable to create files in samba share with non-root user for distribute disperse volume
- BZ - 1824790 - Create glusterfs-selinux dist-git repo
- BZ - 1825736 - [GSS] glustershd process crashes intermittently with " uuid_is_null"
- BZ - 1831403 - [RHEL-8.2] On distributed-disperse volume, Remove-brick status showing failed on one of the node after few hours
- BZ - 1836099 - [RHEL 8.2] Rebalance takes long time to migrate the files with holes
- BZ - 1837926 - Snapshot clone fails with wrong error message.
- BZ - 1839137 - FUSE protocol status indication suppressed
- BZ - 1844359 - Place-holder bug for backporting .t fixes from Upstream
- BZ - 1847081 - add-brick functionality is completely broken
- BZ - 1851424 - Bitrot - File is not signed after doing bitrot disable/enable
- BZ - 1851989 - [RHGS 3.5.3]: Regression in IO performance seen in performance test for small file.
- BZ - 1852736 - High CPU usage on EC volume after inservice upgrade of one node in 3 node cluster
- BZ - 1853189 - [RHGS 3.5][NFS-Ganesha][USS].snaps/ directory not readable when accessed over NFS
- BZ - 1854165 - gluster does not release posix lock when multiple glusterfs clients do flock -xo on the same file in parallel
- BZ - 1855966 - [IPV6] Geo-replication session fails to start sync with IPV6 hostnames
- BZ - 1875643 - RHGS3.5.2 for RHEL8 installation media doesn't contain sos package
- BZ - 1875723 - RHGS3.5.2 on RHEL8 installation media doesn't contain dependency packages for pcs package.
- BZ - 1880256 - Geo-rep status going into `Faulty` after the session is started successfully
- BZ - 1881823 - add-brick: Getting an error message while adding a brick from different node to the volume.
- BZ - 1886259 - [Test Day] Command to groupinstall the RH-Gluster-Samba-Server fails
- BZ - 1895301 - [Ganesha][RHEL-8.3] HA cluster status shows "FAILOVER" even all services are running and VIP's are assigned to nodes
- BZ - 1901831 - Rebase redhat-release to RHEL-8.3 for RHGS
- BZ - 1901949 - Product certificates need to be updated in redhat-storage-server for RHEL 8.3
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 8
SRPM | |
---|---|
glusterfs-6.0-49.el8rhgs.src.rpm | SHA-256: c1c569d71600aa07bbbf9fd7bbe8315024a2de6867e56f07e77d4471e82bdc27 |
glusterfs-selinux-1.0-2.el8rhgs.src.rpm | SHA-256: 5972046ba790a46b4c8be00ac3d254b8357e8c6c1ffc9e06948d7eee06e5d674 |
redhat-release-8.3-9.0.el8rhgs.src.rpm | SHA-256: 84f8ed7970f53c49fc77ec04d74a775698cbaec4c29bbced935af71da70b6903 |
redhat-storage-server-3.5.0.0-7.el8rhgs.src.rpm | SHA-256: 599633c59a49ec0165ee7bd6afa0007f58da86515d2cc64f0f162bc3add34deb |
x86_64 | |
glusterfs-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 7579f5993e09599507e641e845e4f1c5513f709f1fa680122463e842824e2f2b |
glusterfs-api-6.0-49.el8rhgs.x86_64.rpm | SHA-256: c4f215657c707ba5d52e2cb418e25e05cc09f5ee7f4190cdaa71e8c17e2f8538 |
glusterfs-api-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 4a83c9d401c7e1f1edcfde2a839c71230b6949a4ead8280df212a63bc760a02a |
glusterfs-api-devel-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 0594e6a1507c9766a0b51cde2d8d2c81fdc27d4d6f5b3eca7aef85a3638238b9 |
glusterfs-cli-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 25746e26f7f8192ca061020e812f118ae6bbd1fb218c80d5b4fb96e7a53fea5b |
glusterfs-cli-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 0e5784c51211c69a72dbbc6c59035b1f12f798bec034531b56419b377ed383b7 |
glusterfs-client-xlators-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 3164d2bd1d729952df8a8cdfde91c34996f411324709d83cc43d3f56ab45e7a2 |
glusterfs-client-xlators-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: c05a32334a0fbb76e2d1e76a1fd094e0111f3fb9eba7f872368fbd4ebfb8f4ba |
glusterfs-cloudsync-plugins-6.0-49.el8rhgs.x86_64.rpm | SHA-256: a101410adc61da18e1e90f39b9cb2df9850a067e8acdef4c97d7e00b0b63be83 |
glusterfs-cloudsync-plugins-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 48789b807688a83940695bf6bea782d640dc486c13a88b4bd7718783e9691406 |
glusterfs-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: e9939cba2dd46a913b41894c5f169fcf0cfead7f4831a790f2c915c714e14652 |
glusterfs-debugsource-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 5dddae9403249fbefdd5dc132ee019ba4f16911c2c780f1973bffda8f5efcd64 |
glusterfs-devel-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 0131b7f39c04150b0d0dc19a32b4e53d80ee32f2c89bcaf0be080a985bc36aee |
glusterfs-events-6.0-49.el8rhgs.x86_64.rpm | SHA-256: bb7992dba11e7ea92d11689f292e1546b66dc4bf95a0e872e616312fd9ee32f7 |
glusterfs-fuse-6.0-49.el8rhgs.x86_64.rpm | SHA-256: de646b11accae02abda71e93315fb5d335f34d845dbf0245504f8c24ac6a456e |
glusterfs-fuse-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 912248e6a6ffec802175aebcea89154b5bcb6a040591a7017dbc5aa6b9a7851e |
glusterfs-ganesha-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 6b57aa9bc0ed6ed8517f9402c72c2d8852776720ca959e9b231ec8f974418d52 |
glusterfs-geo-replication-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 17c5a587fb3bffa356200750e757ff4fe8379f6d1374e5b35e230c7dc849f5c9 |
glusterfs-geo-replication-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 313fad815a2c27583517457207bf213ab2d1f577d89fa7407a2548746164156d |
glusterfs-libs-6.0-49.el8rhgs.x86_64.rpm | SHA-256: e24f0d16426ad0efe71c90b65ba4f117b90d303fd3488b9442035cd71d68a927 |
glusterfs-libs-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 6daaf84e260eca609a8944f35b0b5bf3cbf7a7ea22d2372a42627ef00035632a |
glusterfs-rdma-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 017e5963ee84b9d11735133c78913a97afbcb11538ac90d77c5740727caeb69b |
glusterfs-rdma-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: b40e55c1f747519bae53ed46ff568b0185ca404ad14c0a3d1ebcc4005d53f576 |
glusterfs-selinux-1.0-2.el8rhgs.noarch.rpm | SHA-256: 6f8dc1163f21ce37dfdfb98213dc4a5073135ea2dc83094581897b48d1d49404 |
glusterfs-server-6.0-49.el8rhgs.x86_64.rpm | SHA-256: f6e26865ba87fb66224d9f641c6158634f14cdfde6c4a9ebf3baa8f127ad9a4b |
glusterfs-server-debuginfo-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 13bc478c8c7cbcc63d112286f6ad0203cb8cab29bc3346f959a304036deac451 |
python3-gluster-6.0-49.el8rhgs.x86_64.rpm | SHA-256: 41dc7fd50db3e592efbf6ea3e4fbae58397efbff445541a697ba9183ec0b5354 |
redhat-release-8.3-9.0.el8rhgs.x86_64.rpm | SHA-256: 03f18694102a79b1448b5786339fe63f1bfe6bb8757483f179c29499681abb98 |
redhat-release-eula-8.3-9.0.el8rhgs.x86_64.rpm | SHA-256: 1c51dad51fdd8fc87c598bf9413d3fda85b58d2f63b9cb32f5cb1609efd47798 |
redhat-storage-server-3.5.0.0-7.el8rhgs.noarch.rpm | SHA-256: bf6f9018a2e74f198e6972feee086b6f3025450204a9b6a4ea25090469dc60ca |
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
glusterfs-6.0-49.el8.src.rpm | SHA-256: 94ff4472df3d865eef3e93368a6531a29ac07a74f3f242131a3ba422801c9345 |
x86_64 | |
glusterfs-6.0-49.el8.x86_64.rpm | SHA-256: 18522a3cbbf0a0bebb97340f02be9789d1d6ab042982ccb6c407c17078500303 |
glusterfs-api-6.0-49.el8.x86_64.rpm | SHA-256: 9470b193525fb696544056baa98f5d4a9616b495799201baf4847fcb31674faa |
glusterfs-api-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: 315a922c3b3c1cd146a17eb31b384d2908551ead8473a5dab47de4f211ce2a72 |
glusterfs-api-devel-6.0-49.el8.x86_64.rpm | SHA-256: b3c518f353268a31541c18c798d72023421461347e8d5d5b2f644783da87e0aa |
glusterfs-cli-6.0-49.el8.x86_64.rpm | SHA-256: dfb2fc2a37a800a4bf98be303cf8130de953086f60ffdd732920c242f5417a1d |
glusterfs-cli-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: 6e6bba810bfe75b3d79028c690dc24c19d20a66d821c51554eb6245fe99313b6 |
glusterfs-client-xlators-6.0-49.el8.x86_64.rpm | SHA-256: d85f6d7e9dcafb1254d98f3a6e2f213b6577ab1ff967394f379df8f57ae1267c |
glusterfs-client-xlators-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: adcd43211e6ff0c633f075febf2dcbabbee73b372d075e686b3db95231b3eaba |
glusterfs-cloudsync-plugins-6.0-49.el8.x86_64.rpm | SHA-256: 258d05fed8be9990bb64a8c6ece7e40e4971a8ca9e340fe3e947c2c963fed568 |
glusterfs-cloudsync-plugins-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: 1fa80a3a2f75368abd044bf358540ccdc35202658d13ad19d0d3d3a7381d1db7 |
glusterfs-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: 20e5993ba8704d295b67cd6724bd72760cccad63ea7e0243e2aa65389d1d9515 |
glusterfs-debugsource-6.0-49.el8.x86_64.rpm | SHA-256: d4cce6a3f544f8df55e34ec135f9f00ee0c0e226b91bbcfba49ae9e12fd7620a |
glusterfs-devel-6.0-49.el8.x86_64.rpm | SHA-256: af932d8f8ace46276b36324cd87abb1f790e909d5c23d4eae902a01c6259f4d3 |
glusterfs-fuse-6.0-49.el8.x86_64.rpm | SHA-256: 94ee93e36980efe5c91848fc719e280da3f3236491591eedb0fe0c4d074767bb |
glusterfs-fuse-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: 190557456f060787b5120a2ccffa63de2aec1681ee75e5b5d98cdac2965433d0 |
glusterfs-libs-6.0-49.el8.x86_64.rpm | SHA-256: e712392ea98f9d1a181b55b8cedc4a94e5b37e24cdeb4654fcf6bdc704aee3a5 |
glusterfs-libs-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: d45bf9d9ca3e587efc8f1587a9157e0e947c5c054e29cf983d03cc2361ae8f85 |
glusterfs-rdma-6.0-49.el8.x86_64.rpm | SHA-256: bfa3ccd50660c069e58078f30c9d7d0e52e1028a3f3bb47b2fa249d350e2154a |
glusterfs-rdma-debuginfo-6.0-49.el8.x86_64.rpm | SHA-256: b8a1d7848f551eebe8aa7b15e3adf153ad6ee6450a0dad7fe48bfc3605a2ae24 |
python3-gluster-6.0-49.el8.x86_64.rpm | SHA-256: 34d11559b1b3073a8affe59681e2acbe8b9e178127f14b1855e29c60b4e7c772 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.