Issued:
2019-06-06
Updated:
2019-06-06

RHBA-2019:0794 - OpenShift Container Platform 3.11 bug fix update


Synopsis

OpenShift Container Platform 3.11 bug fix update

Type/Severity

Bug Fix Advisory None

Topic

Red Hat OpenShift Container Platform release 3.11.104 is now available with updates to packages and images that fix several bugs.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.104. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2019:0795

This update fixes the following bugs:

  • Director-deployed pods would stop in the CrashLoopBackOff state after a rolling reboot of a node. This was because the READY sequence would display a node before it had started. Now, the READY indicator allows components to come online before displaying as a ready state. (BZ#1654044)

  • Ansible playbook health.yml assumed curator was a deploymentconfig instead of a cronjob. Now, the health.yml playbook checks for curator as a cronjob. This change properly evaluates the curator status. (BZ#1676720)

  • The NetworkPolicy plugin did not clean up rules from deleted namespaces. Now, all OpenVSwitch flows associated with a namespace are deleted properly when a namespace is deleted. (BZ#1686025)

  • During Satellite registry-based installations of OpenShift Container Platform 3.11, the example template URLs were installed at the wrong file path. This would cause example resources to be configured incorrectly. Now, a condition has been added to replace the image URL with the Satellite location. As a result, the example resources are configured with valid image URLs. (BZ#1689848)

  • Previously, cluster logging did not store secret names in service accounts. When secrets were required to be whitelisted, the logging service accounts were unable to access their required secrets. Now, secret names are added appropriately to their service accounts. (BZ#1690605)

  • oc cp commands were not checking links from tar files used to copy files between pods and user's workstations. The oc cp command could cause a directory traversal and replace or delete files on a user's workstation. Now, escaping links are not permitted. As a result, the oc cp command verifies files copied between pods and workstations without allowing escape from directories. (BZ#1693315)

  • During previous upgrades, the tuned package and profiles could have been removed. The tuned role was not being applied during an upgrade, but only during a fresh install. Now, the tuned role is applied during upgrades to ensure tuned profiles are applied appropriately. (BZ#1694131)

  • NetworkPolicy rules were not updated reliably after service restarts. A bug in the re-initialization process of the plugin state after a restart of the SDN service would ignore changes in a namespace. Now, updates to NetworkPolicies are now correctly tracked at all times. (BZ#1694704)

  • Monitoring certificates were not updated after certificate redeployment. As a result, prometheus, grafana, and alertmanager user interfaces were inoperable. Now the TLS secrets and pods are removed during certificate redeployment and the user interfaces work correctly after certificate redeployment. (BZ#1696198)

All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images.

Solution

Before applying this update, ensure all previously released errata relevant to your system are applied.

See the following documentation, which will be updated shortly for release 3.11.104, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/articles/11258.

Affected Products

ProductVersionArch
Red Hat OpenShift Container Platform3.11x86_64
Red Hat OpenShift Container Platform for Power3.11ppc64le

Updated Packages

  • atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.x86_64.rpm
  • cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm
  • golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.src.rpm
  • openshift-ansible-docs-3.11.104-1.git.0.379a011.el7.noarch.rpm
  • cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.x86_64.rpm
  • atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.src.rpm
  • atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm
  • golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.ppc64le.rpm
  • atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.x86_64.rpm
  • openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.ppc64le.rpm
  • openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.x86_64.rpm
  • atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.src.rpm
  • atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.src.rpm
  • openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.x86_64.rpm
  • atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.ppc64le.rpm
  • openshift-ansible-3.11.104-1.git.0.379a011.el7.noarch.rpm
  • atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.x86_64.rpm
  • atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.ppc64le.rpm
  • atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.x86_64.rpm
  • atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.ppc64le.rpm
  • openshift-ansible-roles-3.11.104-1.git.0.379a011.el7.noarch.rpm
  • cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.x86_64.rpm
  • cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm
  • atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.x86_64.rpm
  • atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.src.rpm
  • atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.x86_64.rpm
  • openshift-ansible-playbooks-3.11.104-1.git.0.379a011.el7.noarch.rpm
  • atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.x86_64.rpm
  • openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.ppc64le.rpm
  • openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.src.rpm
  • openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.src.rpm
  • prometheus-3.11.104-1.git.1.66a69b4.el7.x86_64.rpm
  • cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.src.rpm
  • openshift-ansible-test-3.11.104-1.git.0.379a011.el7.noarch.rpm
  • golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.x86_64.rpm
  • prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.x86_64.rpm
  • atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.ppc64le.rpm
  • openshift-ansible-3.11.104-1.git.0.379a011.el7.src.rpm
  • prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.ppc64le.rpm
  • prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.ppc64le.rpm
  • atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.src.rpm
  • atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.src.rpm
  • golang-github-prometheus-node_exporter-3.11.104-1.git.1.fb6869d.el7.src.rpm
  • golang-github-prometheus-prometheus-3.11.104-1.git.1.66a69b4.el7.src.rpm
  • prometheus-3.11.104-1.git.1.66a69b4.el7.ppc64le.rpm
  • prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.x86_64.rpm
  • atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.src.rpm
  • atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.ppc64le.rpm
  • golang-github-prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.src.rpm
  • atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm
  • atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.x86_64.rpm
  • atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.ppc64le.rpm

Fixes

CVEs

(none)

References

(none)


Additional information