- Issued:
- 2019-10-03
- Updated:
- 2019-10-03
RHBA-2019:2557 - gluster-ansible bug fix and enhancement update
Synopsis
gluster-ansible bug fix and enhancement update
Type/Severity
Bug Fix Advisory None
Topic
Updated gluster-ansible packages that fix several bugs and add one enhancement are now available.
Description
The gluster-ansible packages provide a number of ansible roles for deploying and managing GlusterFS clusters.
This update provides the following bug fixes:
-
During cleanup of a failed deployment, not all files were removed. This meant that when users tried to redeploy, they saw an option to use an existing deployment configuration even though any existing configuration should have been removed. All files are now correctly removed during cleanup, and the 'Use existing deployment' option is no longer visible after cleanup. (BZ#1654124)
-
During deployment, host names were previously verified using the dig command. This command did not validate host names specified in the /etc/hosts file, so deployment failed. Host names are now validated using the getent command, which is able to validate host names set in the /etc/hosts file. (BZ#1692662)
-
Previously, the sysfs pseudo file system was used to verify the logical block size of a disk being used as a brick. However, this failed when partitions of a disk were used instead of an entire disk, because the /sys/block/
/queue/logical_block_size file being checked relates only to whole disks. The output of the blockdev command is now used to verify logical block size instead, and deployment succeeds when either whole disks or partitions are used to create bricks. (BZ#1713816) -
Previously the gluster_peer module did not detach peers correctly during cleanup, so peers remained connected and the cleanup playbook failed as a result. The shell module is now used to collect the list of peers and detach them correctly so that cleanup succeeds. (BZ#1692786)
It also includes the following enhancement:
- Thinly provisioned bricks are now supported on top of Virtual Disk Optimization (VDO) devices. (BZ#1690606)
All users of Red Hat Gluster Storage are advised to upgrade to this upgraded version of gluster-ansible.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Virtualization Host | 4 | x86_64 |
| Red Hat Virtualization Host - Extended Update Support | 4.2 | x86_64 |
| Red Hat Gluster Storage Server for On-premise | 3 | x86_64 |
Updated Packages
- gluster-ansible-repositories-1.0.1-1.el7rhgs.noarch.rpm
- gluster-ansible-roles-1.0.5-4.el7rhgs.src.rpm
- gluster-ansible-roles-1.0.5-4.el7rhgs.noarch.rpm
- gluster-ansible-features-1.0.5-3.el7rhgs.src.rpm
- gluster-ansible-repositories-1.0.1-1.el7rhgs.src.rpm
- gluster-ansible-infra-1.0.4-3.el7rhgs.src.rpm
- gluster-ansible-features-1.0.5-3.el7rhgs.noarch.rpm
- gluster-ansible-infra-1.0.4-3.el7rhgs.noarch.rpm
Fixes
- This content is not included.BZ - 1654124
- This content is not included.BZ - 1674600
- This content is not included.BZ - 1686359
- This content is not included.BZ - 1690606
- This content is not included.BZ - 1692654
- This content is not included.BZ - 1692662
- This content is not included.BZ - 1692786
- This content is not included.BZ - 1693540
- This content is not included.BZ - 1712798
- This content is not included.BZ - 1713816
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.