- Issued:
- 2018-12-12
- Updated:
- 2018-12-12
RHBA-2018:3743 - OpenShift Container Platform 3.11 bug fix and enhancement update
Synopsis
OpenShift Container Platform 3.11 bug fix and enhancement update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform releases 3.11.51 is now available with updates to packages and images that fix several bugs and add enhancements.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.51. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2018:3745
This update fixes the following bugs:
-
The SDN daemonset did not run on all nodes. The upgrade process failed, as some nodes did not have an internal network set up. With this bug fix, the SDN daemonset tolerates all taints and runs on all nodes, and the upgrade succeeds. (BZ#1635804)
-
OpenShift Ansible's version check was using alphanumeric order instead of semantic versioning order. Therefore, version 2.5.10 was considered to not meet a requirement for a version newer than 2.5.6. With this bug fix, a semantic versioning check is completed and version 2.5.10 is recognized as newer than version 2.5.6. (BZ#1642361)
-
Node ConfigMaps are all created by running
createtasks on the first master. If the first master hasopenshift_use_crio=True, all ConfigMaps are created with CRI-O settings because thenode-configtemplate has CRI-O settings as part of the template based on that host variable. The CRI-O settings are now removed from thenode-configtemplate so that CRI-O settings will only be added if they are part of theopenshift_node_groupedits. Additionally, thebootstrap-node-configis updated directly if the hostopenshift_use_crio=True. Node ConfigMaps are now generated correctly based onopenshift_node_groupedits, allowing nodes to be properly configured with CRI-O settings. (BZ#1647516) -
Running
oc logs $fluentd_podsuggests you runoc exec <pod_name> /opt/app-root/src/utils/logs, which includes the non-existing utility logs path. Thereforeoc exec <pod_name> /opt/app-root/src/utils/logsfails with "no such file or directory". The suggested command line is fixed to beoc exec <pod_name> -- logssince the utility "logs" is now in the PATH and there is no need to specify the full path. Now,oc logs $fluentd_podsuggests the correct command line to show the fluentd logs. (BZ#1649997)
This update includes the following enhancements:
-
Liveness and readiness probes are added for the Service Catalog API Server and Controller Manager. If these pods stop responding, OpenShift will restart the pods. Previously, there were no probes to monitor the health of Service Catalog. (BZ#1630324)
-
Builds that do not explicitly indicate the docker image they consume (by providing an inline dockerfile or defining the docker strategy's
Fromfield) and do not explicitly indicate a pull secret to use, will now use the build's service account's docker secret by default. Examples of such builds would be a build that includes a dockerfile in a Git repository. Previously, these builds would use no secret and potentially fail if the base image was not public. Those builds will now succeed without the need to either explicitly specify a pull secret, or explicitly specify the base image in the buildconfig. (BZ#1649062)
All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.11.51, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 3.11 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 3.11 | ppc64le |
Updated Packages
- atomic-openshift-descheduler-3.11.51-1.git.300.89070e8.el7.src.rpm
- atomic-openshift-tests-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- atomic-openshift-web-console-3.11.51-1.git.324.0ae64ed.el7.x86_64.rpm
- atomic-openshift-node-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- atomic-openshift-template-service-broker-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- cri-o-1.11.10-1.rhaos3.11.git42c86f0.el7.src.rpm
- atomic-openshift-master-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- openshift-enterprise-autoheal-3.11.51-1.git.219.8ea4275.el7.x86_64.rpm
- openshift-enterprise-cluster-capacity-3.11.51-1.git.380.ffa21af.el7.ppc64le.rpm
- openshift-monitor-sample-app-3.11.51-1.git.5.f6d0188.el7.src.rpm
- prometheus-3.11.51-1.git.5023.0ad933c.el7.x86_64.rpm
- golang-github-prometheus-alertmanager-3.11.51-1.git.0.50a0687.el7.src.rpm
- prometheus-node-exporter-3.11.51-1.git.1063.12dd8be.el7.ppc64le.rpm
- kibana-debuginfo-5.6.13-1.el7.ppc64le.rpm
- atomic-openshift-descheduler-3.11.51-1.git.300.89070e8.el7.x86_64.rpm
- prometheus-alertmanager-3.11.51-1.git.0.50a0687.el7.x86_64.rpm
- atomic-openshift-dockerregistry-3.11.51-1.git.446.d29ce0e.el7.src.rpm
- openshift-enterprise-cluster-capacity-3.11.51-1.git.380.ffa21af.el7.src.rpm
- prometheus-node-exporter-3.11.51-1.git.1063.12dd8be.el7.x86_64.rpm
- atomic-openshift-node-problem-detector-3.11.51-1.git.254.22189b0.el7.x86_64.rpm
- atomic-openshift-service-idler-3.11.51-1.git.14.813574a.el7.x86_64.rpm
- atomic-openshift-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- atomic-openshift-hypershift-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- atomic-openshift-web-console-3.11.51-1.git.324.0ae64ed.el7.src.rpm
- kibana-5.6.13-1.el7.x86_64.rpm
- atomic-openshift-service-idler-3.11.51-1.git.14.813574a.el7.src.rpm
- jenkins-2.138.2.1542054911-1.el7.noarch.rpm
- kibana-5.6.13-1.el7.ppc64le.rpm
- prometheus-alertmanager-3.11.51-1.git.0.50a0687.el7.ppc64le.rpm
- atomic-openshift-node-problem-detector-3.11.51-1.git.254.22189b0.el7.src.rpm
- golang-github-prometheus-node_exporter-3.11.51-1.git.1063.12dd8be.el7.src.rpm
- atomic-enterprise-service-catalog-svcat-3.11.51-1.git.1671.2d16650.el7.ppc64le.rpm
- atomic-openshift-hyperkube-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- cri-o-debuginfo-1.11.10-1.rhaos3.11.git42c86f0.el7.x86_64.rpm
- atomic-openshift-descheduler-3.11.51-1.git.300.89070e8.el7.ppc64le.rpm
- golang-github-openshift-oauth-proxy-3.11.51-1.git.419.1af74df.el7.src.rpm
- kibana-5.6.13-1.el7.src.rpm
- openshift-enterprise-autoheal-3.11.51-1.git.219.8ea4275.el7.src.rpm
- openshift-monitor-sample-app-3.11.51-1.git.5.f6d0188.el7.ppc64le.rpm
- atomic-openshift-dockerregistry-3.11.51-1.git.446.d29ce0e.el7.x86_64.rpm
- atomic-openshift-hyperkube-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- prometheus-3.11.51-1.git.5023.0ad933c.el7.ppc64le.rpm
- jenkins-2-plugins-3.11.1542061886-1.el7.src.rpm
- openshift-monitor-project-lifecycle-3.11.51-1.git.59.7b59e29.el7.x86_64.rpm
- openshift-monitor-sample-app-3.11.51-1.git.5.f6d0188.el7.x86_64.rpm
- atomic-openshift-pod-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.51-1.git.52.03e3a91.el7.src.rpm
- atomic-openshift-sdn-ovs-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- atomic-openshift-template-service-broker-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- openshift-ansible-playbooks-3.11.51-2.git.0.51c90a3.el7.noarch.rpm
- atomic-enterprise-service-catalog-svcat-3.11.51-1.git.1671.2d16650.el7.x86_64.rpm
- cri-o-debuginfo-1.11.10-1.rhaos3.11.git42c86f0.el7.ppc64le.rpm
- atomic-openshift-dockerregistry-3.11.51-1.git.446.d29ce0e.el7.ppc64le.rpm
- atomic-openshift-clients-redistributable-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- atomic-openshift-metrics-server-3.11.51-1.git.52.03e3a91.el7.ppc64le.rpm
- jenkins-2-plugins-3.11.1542061886-1.el7.noarch.rpm
- openshift-ansible-roles-3.11.51-2.git.0.51c90a3.el7.noarch.rpm
- atomic-openshift-clients-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- atomic-openshift-node-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- atomic-openshift-service-idler-3.11.51-1.git.14.813574a.el7.ppc64le.rpm
- openshift-ansible-3.11.51-2.git.0.51c90a3.el7.src.rpm
- openshift-enterprise-cluster-capacity-3.11.51-1.git.380.ffa21af.el7.x86_64.rpm
- openshift-monitor-project-lifecycle-3.11.51-1.git.59.7b59e29.el7.ppc64le.rpm
- atomic-openshift-pod-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- openshift-monitor-project-lifecycle-3.11.51-1.git.59.7b59e29.el7.src.rpm
- cri-o-1.11.10-1.rhaos3.11.git42c86f0.el7.x86_64.rpm
- kibana-debuginfo-5.6.13-1.el7.x86_64.rpm
- atomic-openshift-3.11.51-1.git.0.1560686.el7.src.rpm
- atomic-enterprise-service-catalog-3.11.51-1.git.1671.2d16650.el7.ppc64le.rpm
- atomic-openshift-docker-excluder-3.11.51-1.git.0.1560686.el7.noarch.rpm
- atomic-openshift-web-console-3.11.51-1.git.324.0ae64ed.el7.ppc64le.rpm
- golang-github-openshift-oauth-proxy-3.11.51-1.git.419.1af74df.el7.ppc64le.rpm
- atomic-openshift-excluder-3.11.51-1.git.0.1560686.el7.noarch.rpm
- atomic-openshift-hypershift-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- atomic-openshift-node-problem-detector-3.11.51-1.git.254.22189b0.el7.ppc64le.rpm
- atomic-openshift-sdn-ovs-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- cri-o-1.11.10-1.rhaos3.11.git42c86f0.el7.ppc64le.rpm
- atomic-openshift-cluster-autoscaler-3.11.51-1.git.0.0aa9fc2.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.51-1.git.52.03e3a91.el7.x86_64.rpm
- atomic-openshift-cluster-autoscaler-3.11.51-1.git.0.0aa9fc2.el7.x86_64.rpm
- atomic-openshift-cluster-autoscaler-3.11.51-1.git.0.0aa9fc2.el7.src.rpm
- atomic-openshift-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- atomic-enterprise-service-catalog-3.11.51-1.git.1671.2d16650.el7.src.rpm
- atomic-openshift-tests-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- golang-github-openshift-oauth-proxy-3.11.51-1.git.419.1af74df.el7.x86_64.rpm
- atomic-openshift-master-3.11.51-1.git.0.1560686.el7.ppc64le.rpm
- golang-github-prometheus-prometheus-3.11.51-1.git.5023.0ad933c.el7.src.rpm
- atomic-enterprise-service-catalog-3.11.51-1.git.1671.2d16650.el7.x86_64.rpm
- openshift-ansible-3.11.51-2.git.0.51c90a3.el7.noarch.rpm
- openshift-ansible-docs-3.11.51-2.git.0.51c90a3.el7.noarch.rpm
- jenkins-2.138.2.1542054911-1.el7.src.rpm
- openshift-ansible-test-3.11.51-2.git.0.51c90a3.el7.noarch.rpm
- atomic-openshift-clients-3.11.51-1.git.0.1560686.el7.x86_64.rpm
- openshift-enterprise-autoheal-3.11.51-1.git.219.8ea4275.el7.ppc64le.rpm
Fixes
- This content is not included.BZ - 1614155
- This content is not included.BZ - 1630324
- This content is not included.BZ - 1635804
- This content is not included.BZ - 1639655
- This content is not included.BZ - 1640078
- This content is not included.BZ - 1640497
- This content is not included.BZ - 1640746
- This content is not included.BZ - 1642361
- This content is not included.BZ - 1645258
- This content is not included.BZ - 1647516
- This content is not included.BZ - 1649062
- This content is not included.BZ - 1649997
- This content is not included.BZ - 1650129
CVEs
- CVE-2018-17246
- CVE-2018-1000406
- CVE-2018-1000407
- CVE-2018-1000408
- CVE-2018-1000409
- CVE-2018-1000410
- CVE-2018-1000997
- CVE-2018-1999043
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.