- Issued:
- 2021-04-29
- Updated:
- 2021-04-29
RHBA-2021:1462 - Bug Fix Advisory
Synopsis
glusterfs bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs packages that fix several bugs and adds various enhancements are now available for Red Hat Gluster Storage 3.5 on Red Hat Enterprise Linux 8.
Description
Red Hat Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
- Previously, during entry heal of a directory rename, a directory in a new location could be created before deleting it from the old location. This leads to two directories with the same gfid and few entries in pending heal state. With this update, a new volume option called 'cluster.use-anonymous-inode' is introduced which is ON by default on the newly created volumes with the op-version being GD_OP_VERSIONS_9_0 or higher. In this setting as part of heal, if the old location heals first and is not present in the source brick, it is best to rename it into a hidden directory inside the sink brick so that when heal is triggered in the new location, the self heal daemon renames it from this hidden directory to the new location. If a new location heal is triggered first and it detects that the directory already exists in the brick, then it should skip healing the directory until it appears in the hidden directory. This volume option is OFF for older volumes created with op-version lesser than GD_OP_VERSION_9_0.(BZ#1640148)
- Previously, bitrot showed healthy files as corrupted files as the `checksums` were not recalculated after disabling and enabling the bitrot. With this update, `checksum` and `xattr` are updated after enabling bitrot even if `xattrs` already exists. Healthy files are now displayed correctly after disabling and enabling bitrot.((BZ#1660476)
- Previously, log file objects did not update the file handle after `logrotate` as the log file kept growing indefinitely. With this update, a different class is used to create the log file object which modifies the file handle after `logrotate` and the logs are written into the new file after logrotate operation.
NOTE: The SELinux policies state that the default port requires elevated permissions. Therefore the default port used for the `eventsd` service is now 55555 which is in the ephemeral range. Users upgrading to the latest version must change to port number 55555 or any other port that is within the ephemeral range.(BZ#1814744)
- Previously, in a dual network environment shared storage volume did not auto-mount on a node reboot. To work around this issue, manually mounting with the command `mount -a` ensures that shared storage is mounted safely in a dual network environment. (BZ#1856574)
- Previously, nfs-ganesha did not compile because of a race condition that existed in libgfapi. With this update, a new API glfs_h_creat_open() is added. Later versions of nfs-ganesha have been modified to use the new function. To rebase nfs-ganesha to its current release, libgfapi requires the new function to compile, and it is also added in upstream glusterfs 6.6. See BZ1753569.(BZ#1910119)
- Previously, the replicate volume option `cluster.granular-entry-heal` was disabled by default. With this update, the replicate volume option is turned ON automatically for newly created volumes. (BZ#1890506)
- An issue has been identified when expanding or shrinking a volume with sharding enabled in (RHHI for Virtualization or Red Hat Virtualization), which may cause data corruption. To work around this issue, disable the `lookup-optimize` option when sharding is enabled. (BZ#1939372)
- With this update, write-behind xlator for samba group is disabled. Now, there is no data corruption when two clients rely on samba to provide data consistency and are operating on the same file. (BZ#1948547)
- With this update, new Red Hat-storage-logos are available that resolve the package conflicts for RHGS deployment on RHEL-8.4.(BZ#1944061)
Users of glusterfs with Red Hat Gluster Storage are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 8 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
Fixes
- BZ - 1224906 - [geo-rep]: Note section in document is required for ignore_deletes true config option where it might delete a file
- BZ - 1412494 - [geo-rep]: Worker crashes with OSError: [Errno 5] Input/output error
- BZ - 1578089 - [Ganesha] Volume exported via ganesha got failed on one of the node while trying to export volumes in loop
- BZ - 1600459 - Error handling in /usr/sbin/gluster-eventsapi produces IndexError: tuple index out of range
- BZ - 1612973 - [GSS] TLS/SSL access of GlusterFS mounts is 50% slower than with no TLS/SSL enabled.
- BZ - 1640148 - Healing is not completed on Distributed-Replicated
- BZ - 1660476 - [GSS] re-enabling bitrot after disabling it for longer period making too many files corrupted
- BZ - 1663821 - Changing permissions on root directory(directory on which volume is mounted) on client node, when a brick is down, causes inconsistent behavior in root directory permissions on client node after the brick is up again.
- BZ - 1691320 - glusterfs: write operations fail when the size is equal or greater than 1 GB
- BZ - 1726673 - Failures in remove-brick due to [Input/output error] errors
- BZ - 1746324 - [Ganesha] Ganesha crashed on two of the node while exporting the volume
- BZ - 1749304 - [GSS] When we add server.manage-gids as volume option performance drops
- BZ - 1752739 - fuse mount crash observed with sharding + truncate
- BZ - 1757801 - [GSS] errors reading a chunk in gluster volume ErrNo.2.(No such file or directory)-Open failed
- BZ - 1785531 - gluster_shared_storage not getting mounted automatically
- BZ - 1813866 - [Cli] Remove old syntax from attach-tier and detach-tier from "# gluster volume tier help "
- BZ - 1814744 - glustereventsd log file isn't reopened after rotation
- BZ - 1821599 - [RHEL 8.2] Failures in rebalance due to [Input/output error]
- BZ - 1832306 - [RHEL 8.2] Rebalance status is not shown correctly after node reboot
- BZ - 1842449 - [RHEL7.8] Corefiles seen in few server nodes.
- BZ - 1856574 - shared storage volume fails to mount in IPV6 environment
- BZ - 1878077 - `/var/lib` is being truncated to `/ar/lib` on mounting shared_storage
- BZ - 1890506 - Enable granular-entry-heal by default for new AFR volumes.
- BZ - 1896425 - Message in the log file needs to be in English for easy debugging
- BZ - 1898776 - Attach a posix_spawn_disk_thread with glusterfs_ctx
- BZ - 1898777 - Need to configure optimum inode table hash_size for shd
- BZ - 1898778 - io-stats:Configure ios_sample_buf_size based on sample_interval value
- BZ - 1898781 - trash: Create inode_table only while feature is enabled
- BZ - 1898784 - Optimize friend handshake code to avoid call_bail in brick_mux environment
- BZ - 1903468 - A brick process is getting crashed
- BZ - 1910119 - libgfapi: [rhel8] glfs_h_creat_open() need for nfs-ganesha 3.x rebase
- BZ - 1924044 - [Input/output error] IO failure while performing shrink operation when IO in progress
- BZ - 1937300 - Backport fix for BZ#1779052
- BZ - 1939372 - [GSS][RHHI 1.8: Disable the setting lookup-optimize in the virt group]
- BZ - 1944061 - Package conflict while upgrading from RHEL 8.3 to RHEL 8.4
- BZ - 1946638 - Fixing RPM verification failure
- BZ - 1948547 - "gluster volume set <volname> group samba" needs to include write-behind=off
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 8
SRPM | |
---|---|
glusterfs-6.0-56.el8rhgs.src.rpm | SHA-256: 18d96555d2198d8465a404838795d5b471d52ae4c1460bb740c617c8c01a0668 |
glusterfs-selinux-1.0-4.el8rhgs.src.rpm | SHA-256: 1974ee2dd992f739179853497d28d9d087a2d15928c36a0f225d3cf242c8e533 |
redhat-storage-logos-84.4-1.el8rhgs.src.rpm | SHA-256: 9ff416e3c7cb426dfbc840d580ebdded74adeb7f0e58a8ee0aa95287a1701a37 |
x86_64 | |
glusterfs-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 3d5addeeefd4e6210904d8b5a7a7426dfff45794cae2a5c9251647609aefe897 |
glusterfs-api-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 291f830911cd2326c1c855bebe1f6af62bb5a25891cefa12f3ce91a62988e625 |
glusterfs-api-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: ecd358ba78fd376600fa773fc919e8f6ba3beacd9e3f9fe0a14f78da73925ecc |
glusterfs-api-devel-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 9fd82d92caeec5627e5f68d41084d59417d2ab2885a1df128407940b6a0cdac9 |
glusterfs-cli-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 495a73ffb91b491b1c13d11f815e59cbfd731ef15ff5999ed077b44d2633aadc |
glusterfs-cli-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: dc3dcb69da3b6772d4969e4c8b80dd666024da7e06a9c7308990fe5885ac2f62 |
glusterfs-client-xlators-6.0-56.el8rhgs.x86_64.rpm | SHA-256: e1fbd1a4d5c4b52fccae9c49dc45c29e2e2d3fb4a963dd6737477e368ab1d1f1 |
glusterfs-client-xlators-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 29ddd3d302fe018add1cc8b265765f844e9dca4b6c8e5784a2423837fda70250 |
glusterfs-cloudsync-plugins-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 70f33cc928334b1c62a6db75ae81ad726186774bf9da39fe476e125f3fa0382e |
glusterfs-cloudsync-plugins-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 3f24cc2b1b1fed5bb42adf419a512f00c56e2cafdc8e07e9af1223f926b3ca65 |
glusterfs-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 7b2cefcd4b3ee51b2c3c7b3cb5669ca6ad5121bafb4f9aec02e7b232f755c0d2 |
glusterfs-debugsource-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 21470b81fcb281b4aeaa02cd58102d8bc10e19f19839be4c69636f8dff9e089c |
glusterfs-devel-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 5a4bedcef9290578844ac859498852b29a83774094d03448516214450a950bc0 |
glusterfs-events-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 8e82797ee9c74c2e96e884e5518c3c85039c4c2a053af1c28c8db7025cd7e990 |
glusterfs-fuse-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 3fa75512ab90d524d6e91c47febafc347ee89a596263082df27bdd9c7e3671c8 |
glusterfs-fuse-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: cbffa2644d13d96afd512baa4d264c597b26f6a57d2023646ce558060a053a84 |
glusterfs-ganesha-6.0-56.el8rhgs.x86_64.rpm | SHA-256: f0cd55ef9bc3eb5ffdcac38a8926d5df365c2105bcb43b0f27c7149af77accb6 |
glusterfs-geo-replication-6.0-56.el8rhgs.x86_64.rpm | SHA-256: c0edc81b0d9a0c80162b6760f4dc4ff7c181f78bc82f503e29a85acb14ac0f20 |
glusterfs-geo-replication-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: b8d04efae2f11107eaf67620c83b2e7b3a53bce26880f47497ab56ff280ccd18 |
glusterfs-libs-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 8abdd6a12341ab3a339077454eee1ad1e873b5b765605569390ac24be42363d1 |
glusterfs-libs-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: a0a9ddd5c9442fcf266053fd3531e5bddc84cc695a19c8f26f2246426ac2f4e8 |
glusterfs-rdma-6.0-56.el8rhgs.x86_64.rpm | SHA-256: b2b71095404e78a3d8f8bcf16921cb3122a149c7baf5582f20976bc11d716f15 |
glusterfs-rdma-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 2423951122752de28c808cb77fc5c1d70b86c892b318e4bdbb45582f4b191344 |
glusterfs-selinux-1.0-4.el8rhgs.noarch.rpm | SHA-256: 2b4785eeee3cbc67a52a13bf42c635148654e30d5a6d8274d36db384b5e0238f |
glusterfs-server-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 7198840ea675bfe198986e2c95b53275d2e8f37fe1f6aba9bf1a140811b10748 |
glusterfs-server-debuginfo-6.0-56.el8rhgs.x86_64.rpm | SHA-256: 5dc000a5a4325ae347a48cf497cca5bf942f84312d3bf73b871f69b1ecf68673 |
python3-gluster-6.0-56.el8rhgs.x86_64.rpm | SHA-256: d71f88165889e3779cd06edf48f11cff4d1f97c500c15d5178fb5fd7c56af9a3 |
redhat-backgrounds-84.4-1.el8rhgs.noarch.rpm | SHA-256: 05a0aab6644c7c5ad8768e510a40b1d621ff66018dbf23ba6d5bbfe4956af748 |
redhat-storage-logos-84.4-1.el8rhgs.x86_64.rpm | SHA-256: 5ef0c9683a4b22e7dbee72eab2e92bcbd8a5d2ecc129b8d51f84b079ef14fd6d |
redhat-storage-logos-httpd-84.4-1.el8rhgs.noarch.rpm | SHA-256: a8516e64bb9ab9b6ab061ff8aba2ac53fb4ef336c8a24ee12efbe560849e0eb3 |
redhat-storage-logos-ipa-84.4-1.el8rhgs.noarch.rpm | SHA-256: f475ff4b641adee6ce0b612058a7f48edeb1bc76b66a331569ce04e313fe222c |
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
glusterfs-6.0-56.el8.src.rpm | SHA-256: 9e16f3f128a5fff271a21a915624d530529f2bf6123821a0a9cc26b0253d66fa |
x86_64 | |
glusterfs-6.0-56.el8.x86_64.rpm | SHA-256: c7afcae021dea2cf88beeeb0a8d2745ede9ccc5a90ba8ac627dad4b787127266 |
glusterfs-api-6.0-56.el8.x86_64.rpm | SHA-256: 038e2d432e0164d6140ce0f510af218330145d38394bfe1102c7f4c809d5a453 |
glusterfs-api-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: cf89960c77facba440e6d1f07b30ed7665d226362b5da0c25cd5794b00658e8c |
glusterfs-api-devel-6.0-56.el8.x86_64.rpm | SHA-256: f41f37a3131191232b29afa08be385a79a7381ec7efe92b5c3d0cabea6b66492 |
glusterfs-cli-6.0-56.el8.x86_64.rpm | SHA-256: e5dfc408ff2ee2bc4c2dfdb71b278bbadce88e111a590a068088aea074c67cf5 |
glusterfs-cli-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: 08d6049e13f0ceb22d2d2069bdc549f52c9353d0400e52c3128d8ec5008963ce |
glusterfs-client-xlators-6.0-56.el8.x86_64.rpm | SHA-256: ddc214c0fd5184eec670f087f0218fef41020f9dd257df23a6b3e0f849e6039c |
glusterfs-client-xlators-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: bb052aff28532f55e47d3f118c44994ff6893ce366751459955fb8c3c41a0688 |
glusterfs-cloudsync-plugins-6.0-56.el8.x86_64.rpm | SHA-256: b39c3f85cd87b70485c53a62b8e09ef4b968d703d60ba36a7c7568bb0de5bd64 |
glusterfs-cloudsync-plugins-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: 86dadcef3a7f558d8cf1096ed3802178e74029bc9a23afeb676f8f9ef1d4323a |
glusterfs-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: 5b332fbaf14f33fd3a31329d4ff92d9058069978ab90f6b3f5bf79b6cb44cd8a |
glusterfs-debugsource-6.0-56.el8.x86_64.rpm | SHA-256: e8372c7db6fa23f5c8dd408a58b725e704fa898eee17790ddc9baf5d7f2929d3 |
glusterfs-devel-6.0-56.el8.x86_64.rpm | SHA-256: 03f52dcea299b8d8ba28f774fad0d39bc0c9ad120f81a78f7d39bfea51f2e1b4 |
glusterfs-fuse-6.0-56.el8.x86_64.rpm | SHA-256: 302b6076dda77a82bd4a4996d4ce97aa94999b9ebd426d24696dd7df1b90bc0e |
glusterfs-fuse-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: 5202b441f7b58ba02648f37256205a86a7394d0920c8ea70dc1052d90840574e |
glusterfs-libs-6.0-56.el8.x86_64.rpm | SHA-256: 533be248674ce6ce5d92564de113d0ed894db9da705483faa3a7e3cb480bac51 |
glusterfs-libs-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: 99e40071b011df9b2de94db95dddd161461d81452c6f11cc0e9350e663bddd32 |
glusterfs-rdma-6.0-56.el8.x86_64.rpm | SHA-256: 213ed9b31c542565cd190eecfc9271d26d3885956b9f4fad8457ffe11bdb17ee |
glusterfs-rdma-debuginfo-6.0-56.el8.x86_64.rpm | SHA-256: 4b72c512f18c589ec10dc705f1f30de4d6e2513f67ecb9ecd065f482f390d3aa |
python3-gluster-6.0-56.el8.x86_64.rpm | SHA-256: 6048082b66c39f5965a2398f2e431cc8b70cee6b6616a0709fa04cb627c0e432 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.