- Issued:
- 2020-02-19
- Updated:
- 2020-02-19
RHBA-2020:0402 - OpenShift Container Platform 3.11 bug fix update
Synopsis
OpenShift Container Platform 3.11 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 3.11.170 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.170. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2020:0403
This release fixes the following bugs:
-
The Cluster Monitoring Operator playbook would reset the CMO ConfigMap every time it was executed, and manual changes to the ConfigMap were lost. Now, etcd monitoring can be configured with Ansible and changes made to the ConfigMap are now persistent when the playbook is executed. (BZ#1703032)
-
Prometheeus metrics for ElasticSearch were unavailable to users because the authentication class was instantiated multiple times and without the correct configuration. Now, SAR configuration has been added to the authentication_backend and the multi-tenant plugin executes SARs and allows access to metrics. (BZ#1728856)
-
The installer was picking the incorrect version of etcd, reverting to an older package version. Now, the install has been updated to use etcd v3.2.26. (BZ#1744900)
-
Redirection for ConfigMap was incorrect, leading to the console page instead of the ConfigMap details page. Now, the navigateResourceURL filter has been supplied with the namespace in the ConfigMap list page. Redirects will apply to the details page of the selected ConfigMap. (BZ#1782695)
-
Unexpected iptables rules were saved on the first master host. This was due to the cockpit role operations performed after openshift_sdn roles. Now, the cockpit role runs before the openshift_sdn role and unnecessary sdn rules are not saved during installation. (BZ#1783764)
-
Due to an incorrect statement in the heketi-template.yml.j2 template,the HEKETI_LVMWRAPPER environment variable was only included in deployments where Gluster runs on an external cluster, and not in the case where Gluster wass deployed on OpenShift in containers. The environment variable wass needed to specify a wrapper for LVM commands so that the commands can be run on the container node, outside the container. The missing variable results in less stability of the LVM configuration. Now, the statement in the heketi-template.yml.j2 template has been corrected and the HEKETI_LVMWRAPPER environment variable is now configured in the DeploymentConfig for the Heketi container. (BZ#1791667)
All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system is applied.
See the following documentation, which will be updated shortly for release 3.11.170, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/articles/11258.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 3.11 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 3.11 | ppc64le |
Updated Packages
- cri-o-1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7.src.rpm
- atomic-openshift-service-idler-3.11.170-1.git.1.8328979.el7.src.rpm
- golang-github-openshift-oauth-proxy-3.11.170-1.git.1.b49be83.el7.x86_64.rpm
- openshift-ansible-roles-3.11.170-2.git.5.8802564.el7.noarch.rpm
- atomic-openshift-tests-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.170-1.git.1.357f177.el7.ppc64le.rpm
- jenkins-2-plugins-3.11.1579107288-1.el7.src.rpm
- atomic-openshift-tests-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- openshift-ansible-test-3.11.170-2.git.5.8802564.el7.noarch.rpm
- prometheus-node-exporter-3.11.170-1.git.1.51473b7.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.170-1.git.1.357f177.el7.x86_64.rpm
- atomic-enterprise-service-catalog-svcat-3.11.170-1.git.1.91db82e.el7.ppc64le.rpm
- golang-github-openshift-oauth-proxy-3.11.170-1.git.1.b49be83.el7.ppc64le.rpm
- openshift-kuryr-cni-3.11.170-1.git.1.7265da1.el7.noarch.rpm
- openshift-enterprise-autoheal-3.11.170-1.git.1.dfe6c52.el7.x86_64.rpm
- atomic-openshift-sdn-ovs-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- openshift-enterprise-cluster-capacity-3.11.170-1.git.1.661684b.el7.src.rpm
- atomic-openshift-cluster-autoscaler-3.11.170-1.git.1.0a0df6a.el7.ppc64le.rpm
- prometheus-alertmanager-3.11.170-1.git.1.61d7960.el7.x86_64.rpm
- atomic-openshift-descheduler-3.11.170-1.git.1.9ad83f2.el7.x86_64.rpm
- openshift-kuryr-controller-3.11.170-1.git.1.7265da1.el7.noarch.rpm
- atomic-openshift-master-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-openshift-docker-excluder-3.11.170-1.git.0.00cac56.el7.noarch.rpm
- atomic-openshift-service-idler-3.11.170-1.git.1.8328979.el7.x86_64.rpm
- openshift-enterprise-autoheal-3.11.170-1.git.1.dfe6c52.el7.ppc64le.rpm
- python2-kuryr-kubernetes-3.11.170-1.git.1.7265da1.el7.noarch.rpm
- atomic-openshift-node-problem-detector-3.11.170-1.git.1.b1f90a6.el7.x86_64.rpm
- atomic-enterprise-service-catalog-3.11.170-1.git.1.91db82e.el7.x86_64.rpm
- atomic-openshift-sdn-ovs-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-openshift-excluder-3.11.170-1.git.0.00cac56.el7.noarch.rpm
- atomic-openshift-hyperkube-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- atomic-openshift-master-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- openshift-kuryr-common-3.11.170-1.git.1.7265da1.el7.noarch.rpm
- prometheus-alertmanager-3.11.170-1.git.1.61d7960.el7.ppc64le.rpm
- prometheus-node-exporter-3.11.170-1.git.1.51473b7.el7.x86_64.rpm
- atomic-openshift-template-service-broker-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- atomic-openshift-node-problem-detector-3.11.170-1.git.1.b1f90a6.el7.ppc64le.rpm
- atomic-openshift-cluster-autoscaler-3.11.170-1.git.1.0a0df6a.el7.src.rpm
- atomic-openshift-pod-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- atomic-openshift-cluster-autoscaler-3.11.170-1.git.1.0a0df6a.el7.x86_64.rpm
- openshift-kuryr-3.11.170-1.git.1.7265da1.el7.src.rpm
- atomic-openshift-dockerregistry-3.11.170-1.git.1.55fab05.el7.x86_64.rpm
- atomic-openshift-3.11.170-1.git.0.00cac56.el7.src.rpm
- cri-o-debuginfo-1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7.x86_64.rpm
- openshift-enterprise-cluster-capacity-3.11.170-1.git.1.661684b.el7.x86_64.rpm
- openshift-enterprise-cluster-capacity-3.11.170-1.git.1.661684b.el7.ppc64le.rpm
- atomic-openshift-pod-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-openshift-node-problem-detector-3.11.170-1.git.1.b1f90a6.el7.src.rpm
- openshift-enterprise-autoheal-3.11.170-1.git.1.dfe6c52.el7.src.rpm
- atomic-openshift-clients-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-enterprise-service-catalog-3.11.170-1.git.1.91db82e.el7.ppc64le.rpm
- openshift-ansible-3.11.170-2.git.5.8802564.el7.src.rpm
- atomic-openshift-hypershift-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- golang-github-prometheus-alertmanager-3.11.170-1.git.1.61d7960.el7.src.rpm
- openshift-ansible-docs-3.11.170-2.git.5.8802564.el7.noarch.rpm
- prometheus-3.11.170-1.git.1.227bc98.el7.ppc64le.rpm
- openshift-ansible-3.11.170-2.git.5.8802564.el7.noarch.rpm
- jenkins-2.204.2.1580891656-1.el7.noarch.rpm
- atomic-openshift-web-console-3.11.170-1.git.1.3d64e8b.el7.ppc64le.rpm
- atomic-openshift-web-console-3.11.170-1.git.1.3d64e8b.el7.x86_64.rpm
- atomic-openshift-clients-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- jenkins-2-plugins-3.11.1579107288-1.el7.noarch.rpm
- golang-github-prometheus-prometheus-3.11.170-1.git.1.227bc98.el7.src.rpm
- golang-github-openshift-oauth-proxy-3.11.170-1.git.1.b49be83.el7.src.rpm
- atomic-openshift-hyperkube-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-enterprise-service-catalog-svcat-3.11.170-1.git.1.91db82e.el7.x86_64.rpm
- atomic-openshift-dockerregistry-3.11.170-1.git.1.55fab05.el7.src.rpm
- atomic-openshift-descheduler-3.11.170-1.git.1.9ad83f2.el7.src.rpm
- cri-o-1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7.ppc64le.rpm
- openshift-ansible-playbooks-3.11.170-2.git.5.8802564.el7.noarch.rpm
- atomic-openshift-node-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- atomic-openshift-node-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-openshift-hypershift-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-openshift-service-idler-3.11.170-1.git.1.8328979.el7.ppc64le.rpm
- atomic-openshift-3.11.170-1.git.0.00cac56.el7.ppc64le.rpm
- prometheus-3.11.170-1.git.1.227bc98.el7.x86_64.rpm
- cri-o-debuginfo-1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7.ppc64le.rpm
- cri-o-1.11.16-0.5.dev.rhaos3.11.git3f89eba.el7.x86_64.rpm
- jenkins-2.204.2.1580891656-1.el7.src.rpm
- atomic-openshift-clients-redistributable-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- golang-github-prometheus-node_exporter-3.11.170-1.git.1.51473b7.el7.src.rpm
- atomic-enterprise-service-catalog-3.11.170-1.git.1.91db82e.el7.src.rpm
- atomic-openshift-descheduler-3.11.170-1.git.1.9ad83f2.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.170-1.git.1.357f177.el7.src.rpm
- atomic-openshift-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
- atomic-openshift-web-console-3.11.170-1.git.1.3d64e8b.el7.src.rpm
- atomic-openshift-template-service-broker-3.11.170-1.git.0.00cac56.el7.x86_64.rpm
Fixes
- This content is not included.BZ - 1670380
- This content is not included.BZ - 1670587
- This content is not included.BZ - 1728856
- This content is not included.BZ - 1744900
- This content is not included.BZ - 1749765
- This content is not included.BZ - 1757314
- This content is not included.BZ - 1757938
- This content is not included.BZ - 1782695
- This content is not included.BZ - 1783764
- This content is not included.BZ - 1791667
- This content is not included.BZ - 1793628
- This content is not included.BZ - 1795930
- This content is not included.BZ - 1798365
CVEs
- CVE-2019-11358
- CVE-2020-2099
- CVE-2020-2100
- CVE-2020-2101
- CVE-2020-2102
- CVE-2020-2103
- CVE-2020-2104
- CVE-2020-2105
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.