- Issued:
- 2019-02-20
- Updated:
- 2019-02-20
RHBA-2019:0328 - OpenShift Container Platform 3.10 bug fix update
Synopsis
OpenShift Container Platform 3.10 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 3.10.111 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.10.111. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2019:0329
This update includes the following bugs:
-
The default firewall settings blocked the router stats/metrics port. This prevented
Prometheusfrom collecting the metrics from the OpenShift router. Now, the firewall will allow connections to the router stats port andPrometheuscan collect metrics from the router. (BZ#1552235) -
All Docker related packages were not removed during the uninstallation process. Therefore,
dockerwould not be reinstalled properly during the installation process, causing thedockerCLI tasks to fail. Now, all relateddockerpackages are removed successfully during the uninstallation, and a reinstall succeeds with theAnsibleuninstall playbook. (BZ#1655684) -
The 'oa' code used the wrong data when checking SAN certificates using the
pyOpenSSLlibrary. As a result,oawould not find the SAN certificates. This would cause updates from 3.9 to 3.10 to fail. Now, the correct data type,oafinds the certificates for the SAN devices. 3.9 to 3.10 upgrades complete successfully. (BZ#1656526) -
The tasks that verify relevant API services have returned to service used the default
kubeconfig, which may have been updated by the admin to use a user which does not have requisite permissions to verify those APIs. The tasks have been updated to use the adminkubeconfigin all situations, avoiding this issue. (BZ#1656645) -
The OpenShift SDN/OVS DaemonSets were upgraded during control plane upgrades with an
updateStrategyofRollingUpdate; an upgrade of the pods in the entire cluster was performed. This caused unexpected network and application outages on nodes. This bug changed theupdateStrategyfor SDN/OVS pods toOnDeletein the template, affecting only new installations. Control plane upgrade tasks were added to modify SDN/OVS daemonsets to useOnDeleteupdateStrategy. Node upgrade tasks were added to delete all SDN/OVS pods while nodes are drained. Network outages for nodes should only occur during the node upgrade when nodes are drained. (BZ#1660880) -
Previously,
etcdcertificates were owned by root, asetcdwas expected to run as root in a static pod co-located on master nodes. Environments running standaloneetcdclusters that had upgraded from previous minor releases were experiencing permission denials whenetcdtried to access, upgrade, or redeploy certificates. Now, upgrading standaloneetcdclusters is possible by changing the owner ofetcdif existing certificates haveetcdas the owner. Ifetcdis running in a standalone cluster, certificates have owner and group owner listed asetcdandetcd, these certificates can be accessed, allowing upgrade or redeployment. (BZ#1664889) -
The
sysconfigfiles located in/etc/sysconfigcontained a broken link to documentation. Those links are now updated. (BZ#1668221) -
The cluster role
system:image-prunerwas required for all DELETE requests to the registry. As a result, the regular client could not cancel its uploads, and theS3 multipartuploads were accumulating. Now, the cluster rolesystem:image-prunerwill accept DELETE requests for uploads from clients who are allowed to write into them. (BZ#1668411)
All OpenShift Container Platform 3.10 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.10.111, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 3.10 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 3.10 | ppc64le |
Updated Packages
- atomic-openshift-pod-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-pod-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-sdn-ovs-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-template-service-broker-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- prometheus-node-exporter-3.10.111-1.git.2.74c9bae.el7.x86_64.rpm
- atomic-openshift-node-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-tests-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-master-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-clients-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.x86_64.rpm
- openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.x86_64.rpm
- openshift-ansible-docs-3.10.111-1.git.0.84b2b69.el7.noarch.rpm
- openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.ppc64le.rpm
- atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.ppc64le.rpm
- atomic-openshift-docker-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm
- atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.src.rpm
- atomic-openshift-clients-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.src.rpm
- atomic-openshift-node-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.x86_64.rpm
- atomic-openshift-clients-redistributable-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-hyperkube-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.ppc64le.rpm
- atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.ppc64le.rpm
- atomic-openshift-3.10.111-1.git.0.84b439a.el7.src.rpm
- atomic-openshift-hyperkube-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-hypershift-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-template-service-broker-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-web-console-3.10.111-1.git.1.d757094.el7.src.rpm
- atomic-enterprise-service-catalog-3.10.111-1.git.2.37cd116.el7.src.rpm
- atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.ppc64le.rpm
- atomic-openshift-dockerregistry-3.10.111-1.git.1.be95ef2.el7.x86_64.rpm
- atomic-openshift-hypershift-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-enterprise-service-catalog-svcat-3.10.111-1.git.2.37cd116.el7.ppc64le.rpm
- openshift-ansible-3.10.111-1.git.0.84b2b69.el7.noarch.rpm
- atomic-openshift-sdn-ovs-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- openshift-ansible-3.10.111-1.git.0.84b2b69.el7.src.rpm
- atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.x86_64.rpm
- atomic-openshift-tests-3.10.111-1.git.0.84b439a.el7.x86_64.rpm
- atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.ppc64le.rpm
- atomic-openshift-excluder-3.10.111-1.git.0.84b439a.el7.noarch.rpm
- golang-github-prometheus-node_exporter-3.10.111-1.git.2.74c9bae.el7.src.rpm
- openshift-ansible-playbooks-3.10.111-1.git.0.84b2b69.el7.noarch.rpm
- openshift-ansible-roles-3.10.111-1.git.0.84b2b69.el7.noarch.rpm
- atomic-enterprise-service-catalog-svcat-3.10.111-1.git.2.37cd116.el7.x86_64.rpm
- atomic-openshift-master-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- openshift-enterprise-cluster-capacity-3.10.111-1.git.2.8b53bfc.el7.src.rpm
- prometheus-node-exporter-3.10.111-1.git.2.74c9bae.el7.ppc64le.rpm
- atomic-openshift-3.10.111-1.git.0.84b439a.el7.ppc64le.rpm
- atomic-openshift-descheduler-3.10.111-1.git.2.fe07950.el7.x86_64.rpm
- atomic-openshift-node-problem-detector-3.10.111-1.git.2.1edba69.el7.src.rpm
Fixes
- This content is not included.BZ - 1552235
- This content is not included.BZ - 1593209
- This content is not included.BZ - 1608279
- This content is not included.BZ - 1655684
- This content is not included.BZ - 1656526
- This content is not included.BZ - 1656645
- This content is not included.BZ - 1659204
- This content is not included.BZ - 1660880
- This content is not included.BZ - 1661841
- This content is not included.BZ - 1664799
- This content is not included.BZ - 1664889
- This content is not included.BZ - 1667803
- This content is not included.BZ - 1668221
- This content is not included.BZ - 1668411
- This content is not included.BZ - 1669919
- This content is not included.BZ - 1670390
- This content is not included.BZ - 1672454
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.