- Issued:
- 2018-09-05
- Updated:
- 2018-09-05
RHBA-2018:2651 - Red Hat Ceph Storage 2.5 bug fix and enhancement update
Synopsis
Red Hat Ceph Storage 2.5 bug fix and enhancement update
Type/Severity
Bug Fix Advisory None
Topic
An update is now available for Red Hat Ceph Storage 2.5.
Description
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Bug Fix(es):
-
Previously, the Ceph Object Gateway's Swift ACL processing logic was deficient in several respects. With this update, Swift ACL parsing has been enhanced, and as a result, RGW's Swift ACL conformance has been improved. In particular, public container ACLs can now be set. (BZ#1516099)
-
Previously, the the result body for the Ceph Object Gateway's S3 "CompleteMultipartUpload" requests incorrectly omitted to return a "Location" member, but AWS S3 returns a value for "Location". With this update, the correct "Location" data is now returned from RGW when "CompleteMultipartUpload" completes successfully, and client workflows behave consistently for RGW and AWS S3. (BZ#1529727)
-
"ceph-defaults" now contains all Ceph default variables, making "var_files" obsolete. Additionally, having "roles/ceph-defaults/defaults/main.yml" and "group_vars/all.yml" will create a collision and override necessary variables. (BZ#1555305)
-
A bug in the "dir suggest" code caused inconsistent bucket and object stats when writing objects and listing objects concurrently on the bucket. With this update, the "dir suggest" code had been fixed to handle those cases, and now there are consistent bucket and objects stats.
-
Ceph now supports the setting of Swift account and container quotas. BZ#15902400
-
Placement groups (PGs) could become stuck in the "recovery_unfound" state when a copy of the data was available after an OSD was marked down and then up. To fix this issue, OSDs reset peering when they are marked down and then up, and PGs no longer get stuck in the "recovery_unfound" state. (BZ#1595283)
-
The "radosgw-admin bucket check --fix" and bucket resharding could not fix mismatching stats resulting from inconsistent object stats. With this update, there is a new command "radosgw-admin bucket recalc-stats" that fixes the inconsistent object stats.
Note: This command has to be run when the bucket is offline. If there is multisite sync you need to stop all the zone radosgw daemons before running the command. (BZ#1609787)
-
Previously, in Ceph Object Gateway multisite scenarios, an http request to another gateway would not complete and multisite sync would not make further progress. A timeout to the "libcurl" request has been added, and http requests that do not complete will time out and be retried, allowing multisite sync to continue.
-
Previously, incorrect header-processing logic in the Ceph Object Gateway's S3 interface caused multi-part copy-part requests lacking the "x-amz-copy-source-range" header to be processed as whole-object copy requests. This caused requests of this type to fail when performed with AWSv4 request signing. With this update, the header processing logic has been corrected and S3 multi-part copy-part requests can be executed as expected by S3 clients. (BZ1614565)
Enhancement(s):
-
A "trim delay" option has been added to the "radosgw-admin sync error trim" command in Ceph Object Gateway multisite. Previously, many OMAP keys could have been deleted by the full operation, leading to potential for impact on client workload. With the new option, trimming can be requested with low client workload impact.
-
Increased detail has been added to the "radosgw-admin" sync status command, and a new "radosgw-admin bucket sync status" command has been added. The new commands provide more detailed reporting on the state of Ceph Object Gateway multi-site sync processes. Administrators can more easily confirm that multi-site sync is working correctly, and more easily debug sync issues.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Scientific Computing | 7 | x86_64 |
| Red Hat Enterprise Linux Workstation | 7 | x86_64 |
| Red Hat Enterprise Linux Server | 7 | x86_64 |
| Red Hat Enterprise Linux Desktop | 7 | x86_64 |
| Red Hat Ceph Storage OSD | 2 | x86_64 |
| Red Hat Ceph Storage MON | 2 | x86_64 |
Updated Packages
- python-rbd-10.2.10-40.el7cp.x86_64.rpm
- rbd-mirror-10.2.10-40.el7cp.x86_64.rpm
- ceph-ansible-3.0.45-1.el7cp.src.rpm
- ceph-common-10.2.10-40.el7cp.x86_64.rpm
- ceph-fuse-10.2.10-40.el7cp.x86_64.rpm
- ceph-base-10.2.10-40.el7cp.x86_64.rpm
- librbd1-devel-10.2.10-40.el7cp.x86_64.rpm
- ceph-radosgw-10.2.10-40.el7cp.x86_64.rpm
- librados2-10.2.10-40.el7cp.x86_64.rpm
- librgw2-devel-10.2.10-40.el7cp.x86_64.rpm
- ceph-mon-10.2.10-40.el7cp.x86_64.rpm
- librbd1-10.2.10-40.el7cp.x86_64.rpm
- ceph-mds-10.2.10-40.el7cp.x86_64.rpm
- ceph-ansible-3.0.45-1.el7cp.noarch.rpm
- ceph-osd-10.2.10-40.el7cp.x86_64.rpm
- ceph-test-10.2.10-40.el7cp.x86_64.rpm
- librados2-devel-10.2.10-40.el7cp.x86_64.rpm
- python-cephfs-10.2.10-40.el7cp.x86_64.rpm
- libcephfs1-devel-10.2.10-40.el7cp.x86_64.rpm
- ceph-debuginfo-10.2.10-40.el7cp.x86_64.rpm
- libcephfs1-10.2.10-40.el7cp.x86_64.rpm
- ceph-10.2.10-40.el7cp.src.rpm
- ceph-selinux-10.2.10-40.el7cp.x86_64.rpm
- librgw2-10.2.10-40.el7cp.x86_64.rpm
- python-rados-10.2.10-40.el7cp.x86_64.rpm
Fixes
- This content is not included.BZ - 1516099
- This content is not included.BZ - 1555305
- This content is not included.BZ - 1585700
- This content is not included.BZ - 1595283
- This content is not included.BZ - 1599842
- This content is not included.BZ - 1601612
- This content is not included.BZ - 1613035
- This content is not included.BZ - 1614565
- This content is not included.BZ - 1614926
- This content is not included.BZ - 1619193
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.