- Issued:
- 2016-02-29
- Updated:
- 2016-02-29
RHBA-2016:0313 - Red Hat Ceph Storage 1.3.2 bug fix and enhancement update
Synopsis
Red Hat Ceph Storage 1.3.2 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
Red Hat Ceph Storage 1.3.2 that fixes multiple bugs and adds various enhancements is now available.
Description
Red Hat Ceph Storage is a massively scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Bug Fixes:
-
The Ceph init script no longer calls the "ceph-disk" command on monitor nodes where the command is not present. As a result, an error is no longer displayed. (BZ#1225183)
-
The librbd library did not resize format 1 image headers correctly in certain scenarios. Consequently, after resizing a RADOS block device (RBD) image, librbd operations returned the "librbd: image snap context is invalid!" error. With this update, librbd resizes the image headers correctly. (BZ#1275398)
-
With this update, librbd has been updated to validate pools for RBD compatibility and automatically place new pools into self-managed snapshot mode. Now, when librbd is not able to force self-managed snapshot mode on a pool, an error is returned. (BZ#1276092)
-
The Ceph monitor did not remove obsolete epochs after a compaction operation, causing the monitor store to grow to a large size on a disk, which could impact performance. Now, the monitor compacts the full epochs, thus improving performance. (BZ#1287947)
-
Due to "last_epoch_started" mismatches, the OSD daemon could terminate unexpectedly with an assert when a placement group (PG) got stuck incomplete. Now, OSD skips the assert when the user sets the "osd_find_best_info_ignore_history_les" Boolean to "true". (BZ#1289313)
-
With this update, librbd now properly reads diff files greater than 2 GB. (BZ#1289390)
-
The rados(8) manual page now includes a description of the listwatchers command. (BZ#1293555)
Enhancements:
-
With this update, a new "ceph osd crush tree" command has been added to Red Hat Ceph Storage. The command prints CRUSH buckets and items in a tree view. To learn more, see the Release Notes for Red Hat Ceph Storage 1.3.2. (BZ#1196613)
-
The Ceph Object Gateway has been updated to support the "encoding-type" parameter when listing keys in a bucket. This change improves portability between the Amazon S3 public cloud object storage and the Ceph S3-compatible private cloud storage. (BZ#1220880)
-
Due to a bug in previous version of the Ceph Object Gateway, S3 deletion operations left orphaned _shadow objects that used extra space. With this update, the "radosgw-admin" command has a new "orphans" subcommand, which finds and fixes the orphaned _shadow objects. (BZ#1254398)
-
The Ceph Object Gateway has been updated to add a default quota configuration that is applied when no specific quota is enabled. As a result, users can now configure per-buckets and per-user defaults. The defaults are enabled if either max count or max size is enabled. (BZ#1259485)
-
The Ceph monitor process now verifies that the monitor store is writable before participating in an election to avoid the possibility of losing cluster information during disk errors. (BZ#1262982)
-
This update adds the ceph-monstore-tool utility that artificially inflates the monitor store leveldb database by using the "inflate-pgmap" command. This utility is useful for testing purposes, for example when the user needs to replicate scenarios in which the store significantly grows. (BZ#1263608)
-
Support for modifying the size of the TCMalloc thread cache has been added. Increasing the thread cache size significantly improves Ceph cluster performance. To learn more, see the Release Notes for Red Hat Ceph Storage 1.3.2. (BZ#1297502)
Users of Red Hat Ceph Storage are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Scientific Computing | 7 | x86_64 |
| Red Hat Enterprise Linux Workstation | 7 | x86_64 |
| Red Hat Enterprise Linux Server | 7 | x86_64 |
| Red Hat Enterprise Linux Desktop | 7 | x86_64 |
| Red Hat Ceph Storage | 1.3 | x86_64 |
| Red Hat Ceph Storage OSD | 1.3 | x86_64 |
| Red Hat Ceph Storage MON | 1.3 | x86_64 |
| Red Hat Ceph Storage Calamari | 1.3 | x86_64 |
Updated Packages
- calamari-server-1.3.3-1.el7cp.src.rpm
- ice_setup-0.4.5-1.el7cp.src.rpm
- ceph-common-0.94.5-9.el7cp.x86_64.rpm
- ceph-0.94.5-9.el7cp.x86_64.rpm
- ceph-mon-0.94.5-9.el7cp.x86_64.rpm
- librados2-0.94.5-9.el7cp.x86_64.rpm
- ceph-radosgw-0.94.5-9.el7cp.x86_64.rpm
- ceph-test-0.94.5-9.el7cp.x86_64.rpm
- calamari-server-1.3.3-1.el7cp.x86_64.rpm
- ice_setup-0.4.5-1.el7cp.noarch.rpm
- ceph-deploy-1.5.27.4-3.el7cp.noarch.rpm
- ceph-deploy-1.5.27.4-3.el7cp.src.rpm
- ceph-0.94.5-9.el7cp.src.rpm
- ceph-debuginfo-0.94.5-9.el7cp.x86_64.rpm
- ceph-osd-0.94.5-9.el7cp.x86_64.rpm
- librbd1-0.94.5-9.el7cp.x86_64.rpm
- python-rados-0.94.5-9.el7cp.x86_64.rpm
- ceph-selinux-0.94.5-9.el7cp.x86_64.rpm
- librados2-devel-0.94.5-9.el7cp.x86_64.rpm
- python-rbd-0.94.5-9.el7cp.x86_64.rpm
- librbd1-devel-0.94.5-9.el7cp.x86_64.rpm
Fixes
- This content is not included.BZ - 1159756
- This content is not included.BZ - 1190201
- This content is not included.BZ - 1193228
- This content is not included.BZ - 1197045
- This content is not included.BZ - 1205927
- This content is not included.BZ - 1223731
- This content is not included.BZ - 1224921
- This content is not included.BZ - 1225183
- This content is not included.BZ - 1228845
- This content is not included.BZ - 1244158
- This content is not included.BZ - 1245333
- This content is not included.BZ - 1246223
- This content is not included.BZ - 1250042
- This content is not included.BZ - 1251328
- This content is not included.BZ - 1252851
- This content is not included.BZ - 1254398
- This content is not included.BZ - 1255882
- This content is not included.BZ - 1261441
- This content is not included.BZ - 1262982
- This content is not included.BZ - 1268971
- This content is not included.BZ - 1282484
- This content is not included.BZ - 1288166
- This content is not included.BZ - 1289313
- This content is not included.BZ - 1293555
- This content is not included.BZ - 1297502
- This content is not included.BZ - 1298536
- This content is not included.BZ - 1300829
- This content is not included.BZ - 1301422
- This content is not included.BZ - 1302139
- This content is not included.BZ - 1302466
- This content is not included.BZ - 1302675
- This content is not included.BZ - 1303241
- This content is not included.BZ - 1303799
- This content is not included.BZ - 1304032
- This content is not included.BZ - 1304341
- This content is not included.BZ - 1304454
- This content is not included.BZ - 1304455
- This content is not included.BZ - 1305981
CVEs
(none)
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.