- Issued:
- 2020-06-16
- Updated:
- 2020-06-16
RHEA-2020:2575 - Product Enhancement Advisory
Synopsis
gluster-ansible bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gluster-ansible packages that fix several bugs and add various enhancements are now available for Red Hat Gluster Storage 3.5 on Red Hat Enterprise Linux 8.
Description
Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
- Previously, a corrupted Gluster peer node was manually reconfigured and was added back to the Gluster cluster. In this release, replacing a Gluster peer node in a Gluster cluster helps reconfigure Gluster and adds the reconfigured node back to the cluster on Red Hat Hyperconverged Infrastructure for Virtualization deployments. (BZ#1641431)
- VDO volume creation fails with ‘readcache’ and ‘readcache Size’ options. With this fix, ‘readcache’ and ‘readcache Size’ options are removed from VDO option as VDO ‘readcache’ is no longer supported in Red Hat Enterprise Linux-8. Now, VDO volume creation is now successful. (BZ#1808152)
- Previously, after RHHI deployment, Gluster network was created manually through RHV-M User Interface. With this release, Ansible playbook creates a Gluster logical network so you don't need to create it manually. (BZ#1835574)
- Previously, host root disk was encrypted using clevis, during the reboot of host the user was required to manually enter the passphrase to unlock root disk. In this release, the tang server is configured to automate the reboot process without manual entry of passphrase.This feature supports root disk encryption with auto-unlock and also Gluster disks encryption with automatic mount after reboot, on Red Hat Hyperconverged Infrastructure for Virtualization deployments. (BZ#1781187)
- Previously, Ansible roles were not supported to blacklist or whitelist multipath devices. In this release, Ansible roles are added to support the user to blacklist or whitelist multipath devices for Red Hat Hyperconverged Infrastructure for Virtualization deployments. (BZ#1807814)
- Previously, host root disk was encrypted using clevis, during the reboot of the host the user was required to manually enter passphrase to unlock root disk. In this release, the tang server is configured to automate the reboot process without manual entry of passphrase, on Red Hat Hyperconverged Infrastructure for Virtualization deployments. (BZ#1821251)
- VDO volume creation fails when you set a maxDicardSize parameter, as the VDO Ansible module does not have a maxDiscardSize parameter implemented. With this fix, maxDiscardSize parameter value is set in all VDO volumes. VDO volumes are now created successfully. (BZ#1821764)
- Previously, a lot of steps are required to replace the RHHI node. With this release, you can run Integrated Ansible playbook which includes node preparation and replacement to replace an RHHI node. (BZ#1832658)
All users of gluster-ansible are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 8 x86_64
Fixes
- BZ - 1641431 - [RFE] Provide roles for node replacement
- BZ - 1731147 - gluster_infra_mount_devices listed twice in gluster_inventory.yml
- BZ - 1769382 - RHHI-V deployment failed using the ansible playbook execution from command line
- BZ - 1781187 - [RFE]Support LUKS + Clevis/Tang configuration from gluster-ansible roles
- BZ - 1807814 - [RFE]Provide option to control blacklist or whitelist multipath devices from gluster-ansible roles
- BZ - 1808152 - [ RHHI-V 1.8 ] Failed to create VDO
- BZ - 1811989 - [vdo] VDO systemd unit file shouldn't be edited for modifying VDO max_discard_size
- BZ - 1812072 - while attempting for NBDE, blacklist the devices based on requirements
- BZ - 1812299 - Fail NBDE procedure, if the disk partition containing the root filesystem is not encrypted
- BZ - 1812301 - Generate keyfile instead of passphrase for additional disks
- BZ - 1812322 - root disk passphrase can be deleted post successful clevis-luks-bind
- BZ - 1812327 - LUKS device UUID should be added to entry in /etc/crypttab
- BZ - 1812351 - Regenerate initramfs in the right way
- BZ - 1815546 - RHHI-V gluster deployment fails at thinpool creation with size greater than few TBs
- BZ - 1816074 - gluster-ansible-roles-1.0.5-7.el8rhgs.noarch is having unresolved dependencies
- BZ - 1817342 - Blacklisting the disks fails as /etc/multipath.conf file is not generated
- BZ - 1817835 - rhhi-v Deployment fails as duplicate entries are present while blacklisting
- BZ - 1821118 - vdsm configured with force option, even when multipath.conf file existing
- BZ - 1821154 - blacklisting function should ignore md and luks devices
- BZ - 1821212 - RHHI-V cleanup is removing blacklist.conf file, leading to disrupting the existing blacklist configuration
- BZ - 1821228 - Automatic unlock of root filesystem doesn't happen, with tang server configured with FQDN
- BZ - 1821251 - Support network bound disk encryption with static IP configuration with RHHI-V
- BZ - 1821764 - VDO volume creation fails with 'maxDiscardSize' option
- BZ - 1824416 - NBDE cleanup playbook when run prematurely removes the keyslot on root disk
- BZ - 1830910 - RHHI-V deployment fails when deployment attempted post reboot of RHVH node
- BZ - 1832658 - Include the inventory file for node preparation with gluster-ansible-roles
- BZ - 1835176 - Generate multipath configuration file with vdsm-tool specifically
- BZ - 1835574 - Automate creation of gluster logical network
- BZ - 1840003 - Replace host fails with gluster-maintenance ansible role
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 8
SRPM | |
---|---|
gluster-ansible-cluster-1.0-1.el8rhgs.src.rpm | SHA-256: 0f2cc52b8051c40b3a0cd33570a17e40902cc1a4d17a0ace84aeb73188e4904b |
gluster-ansible-features-1.0.5-6.el8rhgs.src.rpm | SHA-256: 93cf1ba28cbc7aba081d4310191f6a18f85a4a05aa4977a1fce1571b66c6516c |
gluster-ansible-infra-1.0.4-10.el8rhgs.src.rpm | SHA-256: dc776df03a04c810cf3251e6264ec2a817ac3e9e3e0e52dcc4e85f487aa284de |
gluster-ansible-maintenance-1.0.1-4.el8rhgs.src.rpm | SHA-256: d30447b0d60c9fe3c315393ab213bc2401a7dceabdaece852b1cf8b7fea999b0 |
gluster-ansible-repositories-1.0.1-2.el8rhgs.src.rpm | SHA-256: f1394cbb07f4f7bbc50fc53be7e48f35c7110df85f0d2b35e71069deb14c5e67 |
gluster-ansible-roles-1.0.5-12.el8rhgs.src.rpm | SHA-256: 78c6746f8670256f29c87157eadeef62c6693803051151083f5a14b3a21f5239 |
x86_64 | |
gluster-ansible-cluster-1.0-1.el8rhgs.noarch.rpm | SHA-256: 18918007923c247d51efd4d3170600b106139d2d9bc3b6f1dac37337e8d7e216 |
gluster-ansible-features-1.0.5-6.el8rhgs.noarch.rpm | SHA-256: 14e93ae654a0f9e108b572eb3fbadf84397f994de87d92af157c54a105c79308 |
gluster-ansible-infra-1.0.4-10.el8rhgs.noarch.rpm | SHA-256: 94e23f62a4f5fbb844a8a9226cd85b7bda305f669c2dd2555657a6aebd9cb8f4 |
gluster-ansible-maintenance-1.0.1-4.el8rhgs.noarch.rpm | SHA-256: 329733331ee9e3c93a09cdba9aeb86f4642bf8260521b72f9991324d349f27bd |
gluster-ansible-repositories-1.0.1-2.el8rhgs.noarch.rpm | SHA-256: a06971fb8855a04cdb57492e8b4723e49e7751e0134d07ce4c78edf50183a1e6 |
gluster-ansible-roles-1.0.5-12.el8rhgs.noarch.rpm | SHA-256: f66326222892afad33b13553494248cc9a17853e629a191f050fcdd4ec4970fa |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.