- Issued:
- 2018-05-15
- Updated:
- 2018-05-15
RHBA-2018:1563 - Red Hat Ceph Storage 3.0 Bug Fix update
Synopsis
Red Hat Ceph Storage 3.0 Bug Fix update
Type/Severity
Bug Fix Advisory None
Topic
An update is now available for Red Hat Ceph Storage 3.0.
Description
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Bug Fixes:
-
Previously, after assigning Logical Unit Numbers (LUNs) and hosts to a hostgroup by using the Ceph iSCSI
gwcliutiliy, and then rebooting the Ceph iSCSI gateway node, this would cause the LUN mappings to not restore properly for the hosts. In this release, hosts are no longer prevented access to the LUNs. (BZ#1508695) -
Previously, when using the Ceph Object Gateway (RGW), doing manual and dynamic resharding would hang on a bucket that has versioning enabled. (BZ#1535474)
-
Previously,
tcmu-runnerwould wait to notify the kernel once all outstanding commands had completed. This caused higher latency for commands that were at the beginning of the queue. With this release,tcmu-runnerwill notify the kernel once the first command completes. Batching multiple commands completions together to notify the kernel will still occur, if multiple commands complete around the same time. (BZ#1549698) -
Previously, resharding would cause an infinite loop in the bucket index, resulting in the resharding operation not completing. The bucket list index was fixed, allowing the resharding operation to complete successfully. (BZ#1554221)
-
Previously, when sending large amounts of metadata to another MDS would cause the client mounts to fail. Resulting in the failure of heartbeat beacons sent to the Ceph Monitors. The exporting MDS would be marked by the Ceph Monitors as laggy/unavailable and then be removed, allowing the standby MDS to take over. In this release, the MDS limits the time it spends exporting metadata, allowing mounts to be processed promptly. (BZ#1554593)
-
When the
tcmu-runnerdoes a failover, a new thread is created. This new thread takes the device's lock. Thetcmu-runnerwas not cleaning up the thread after the failover operation was finished. This resulted in a memory leak and failovers would fail, because the subsequent new threads could not be created. In this release, the new thread is created in a detached state, allowing successful cleanup automatically once the failover process has completed. (BZ#1557830) -
Previously, reducing the number of active Metadata Server (MDS) daemons on a Ceph File System (CephFS) would cause kernel client's I/O to hang. When this happens, kernel clients were unable to connect to MDS ranks greater than or equal to
max_mds. This issue has been fixed in this release. (BZ#1559749) -
A
ceph-fuseroutine used to check directory permissions was not fully implemented, which was allowing change directory checks to always pass. Thefuse_ll_accesscall was implemented inceph-fuse, and now when changing directories a permissions check is done as expected. (BZ#1560575) -
Previously, attempting to add a Ceph iSCSI gateway using the
gwcliutility returns the following error:
package validation checks - OS version is unsupported
This package validation check has been fixed in this release. (BZ#1561415)
- Previously, the
shrink-osdAnsible playbook did not support shrinking OSDs backed by an NVMe drive. NVMe drive support has been added in this release. (BZ#1561456)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux Server | 7 | x86_64 |
| Red Hat Ceph Storage OSD | 3 | x86_64 |
| Red Hat Ceph Storage MON | 3 | x86_64 |
Updated Packages
- ceph-iscsi-config-2.3-13.el7cp.noarch.rpm
- ceph-test-12.2.4-10.el7cp.x86_64.rpm
- nfs-ganesha-debuginfo-2.5.5-5.el7cp.x86_64.rpm
- python-rgw-12.2.4-10.el7cp.x86_64.rpm
- ceph-osd-12.2.4-10.el7cp.x86_64.rpm
- nfs-ganesha-rgw-2.5.5-5.el7cp.x86_64.rpm
- librbd-devel-12.2.4-10.el7cp.x86_64.rpm
- tcmu-runner-1.3.0-0.4.2.el7cp.x86_64.rpm
- tcmu-runner-1.3.0-0.4.2.el7cp.src.rpm
- nfs-ganesha-2.5.5-5.el7cp.x86_64.rpm
- ceph-ansible-3.0.33-1.el7cp.src.rpm
- tcmu-runner-debuginfo-1.3.0-0.4.2.el7cp.x86_64.rpm
- ceph-iscsi-config-2.3-13.el7cp.src.rpm
- ceph-mgr-12.2.4-10.el7cp.x86_64.rpm
- python-rados-12.2.4-10.el7cp.x86_64.rpm
- ceph-iscsi-cli-2.5-10.el7cp.src.rpm
- ceph-common-12.2.4-10.el7cp.x86_64.rpm
- librgw2-12.2.4-10.el7cp.x86_64.rpm
- libradosstriper1-12.2.4-10.el7cp.x86_64.rpm
- rbd-mirror-12.2.4-10.el7cp.x86_64.rpm
- ceph-mon-12.2.4-10.el7cp.x86_64.rpm
- python-cephfs-12.2.4-10.el7cp.x86_64.rpm
- libcephfs2-12.2.4-10.el7cp.x86_64.rpm
- ceph-base-12.2.4-10.el7cp.x86_64.rpm
- ceph-selinux-12.2.4-10.el7cp.x86_64.rpm
- ceph-ansible-3.0.33-1.el7cp.noarch.rpm
- librados2-12.2.4-10.el7cp.x86_64.rpm
- python-rtslib-2.1.fb64-3.el7cp.noarch.rpm
- ceph-12.2.4-10.el7cp.src.rpm
- nfs-ganesha-ceph-2.5.5-5.el7cp.x86_64.rpm
- ceph-fuse-12.2.4-10.el7cp.x86_64.rpm
- ceph-debuginfo-12.2.4-10.el7cp.x86_64.rpm
- ceph-iscsi-cli-2.5-10.el7cp.noarch.rpm
- librados-devel-12.2.4-10.el7cp.x86_64.rpm
- libtcmu-1.3.0-0.4.2.el7cp.x86_64.rpm
- ceph-mds-12.2.4-10.el7cp.x86_64.rpm
- libcephfs-devel-12.2.4-10.el7cp.x86_64.rpm
- librbd1-12.2.4-10.el7cp.x86_64.rpm
- python-rtslib-2.1.fb64-3.el7cp.src.rpm
- librgw-devel-12.2.4-10.el7cp.x86_64.rpm
- python-rbd-12.2.4-10.el7cp.x86_64.rpm
- nfs-ganesha-2.5.5-5.el7cp.src.rpm
- ceph-radosgw-12.2.4-10.el7cp.x86_64.rpm
Fixes
- This content is not included.BZ - 1499324
- This content is not included.BZ - 1508695
- This content is not included.BZ - 1520637
- This content is not included.BZ - 1531679
- This content is not included.BZ - 1535474
- This content is not included.BZ - 1547849
- This content is not included.BZ - 1549698
- This content is not included.BZ - 1554593
- This content is not included.BZ - 1557445
- This content is not included.BZ - 1557830
- This content is not included.BZ - 1559749
- This content is not included.BZ - 1560575
- This content is not included.BZ - 1561415
- This content is not included.BZ - 1561456
- This content is not included.BZ - 1562459
- This content is not included.BZ - 1565850
- This content is not included.BZ - 1566467
- This content is not included.BZ - 1570878
- This content is not included.BZ - 1574458
- This content is not included.BZ - 1575859
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.