- Issued:
- 2021-06-30
- Updated:
- 2021-06-30
RHBA-2021:2632 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Container Storage 4.7.2 bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated images that fix several bugs are now available for Red Hat OpenShift Container Storage 4.7.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry.
Description
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
Bug Fix(es):
- Currently, the ClusterObjectStoreState alert message is not generated if the RADOS Object Gateway (RGW) is not available or is unhealthy. In this update, a fix implemented in the OpenShift Container Storage operator, and users can now see the ClusterObjectStoreState alert when RADOS Object Gateway (RGW) is not available or is unhealthy. (BZ#1962161)
- Previously, Multicloud Object Gateway (MCG) db pod crashed as the Postgres failed to run on kubernetes when hugepages were enabled. With the current update, the hugepages for the MCG Postgres pods are disabled, and hence the MCG db pods do not crash. (BZ#1968438)
- Currently, only HashiCorp Key/Value (KV) Secret Engine API, version 1 is supported for cluster-wide encryption with Key Management System (KMS). With this update, support for HashiCorp KV Secret Engine API, version 2 is added. (BZ#1970583)
- Previously, certificate validation failed as the directory that stores the certificates was not c_rehash by openssl when curl was called with --capath. The full chain of certificates had only one self-signed certificate and no client certificate or the private key was provided. With this update, curl is called with --cacert, and hence the certificates are validated correctly and the encryption key can be retrieved. (BZ#1974399)
All users of Red Hat OpenShift Container Storage are advised to pull these updated images from the Red Hat Container Registry.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat OpenShift Data Foundation 4 for RHEL 8 x86_64
- Red Hat OpenShift Data Foundation for IBM Power, little endian 4 for RHEL 8 ppc64le
- Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4 for RHEL 8 s390x
Fixes
- BZ - 1962161 - Alert 'ClusterObjectStoreState' is not triggered when RGW interface is unavailable
- BZ - 1970583 - [GSS][rook] hashicorp vault v2 not supported in current release
- BZ - 1972800 - Update to RHCS 4.2z2 Ceph container image at OCS 4.7.2
- BZ - 1974399 - [4.7 clone][GSS][rook] external kms CA cert secret not functional with curl's -capath as implemented today
- BZ - 1974477 - OCS CI deployment failing because of Ceph health warning for insecure global_id reclaims
- BZ - 1974748 - [4.7 clone] Proper logs are not available for encryption-kms-get-kek container in the OSD pods
- BZ - 1974816 - [4.7 clone] Error for PV encryption using encryptionKMSType "vault"
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.