Issued:
2020-05-13
Updated:
2020-05-13

RHBA-2020:2023 - OpenShift Container Platform 4.2.33 bug fix update


Synopsis

OpenShift Container Platform 4.2.33 bug fix update

Type/Severity

Bug Fix Advisory None

Topic

Red Hat OpenShift Container Platform release 4.2.33 is now available with updates to packages and images that fix several bugs.

Description

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.2.33. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHBA-2020:2022

This update fixes the following bugs:

  • The data in the journald for facility values was not sanitized. As a result, fluentd would emit error messages at the wrong level, causing confusion to users. Now, fluentd logs at the proper debug level. (BZ#1756072)

  • The NodeCA daemon did not tolerate NoSchedule, and could not be deployed on tainted nodes. Now, NodeCA tolerates NoSchedule and the daemon can manage certificates on nodes with NoSchedule options. (BZ#1808433)

  • The NodeCA daemon did not tolerate the NoExecute taint, and could not manage certificates properly on tainted nodes. Now, all taints are tolerated and are synced to all nodes with any taints. (BZ#1820243)

  • The OpenStack IPI installer created Security groups using remote_group_id to allow traffic origins. Using remote_group_id in the security rules causes a lot of computation by the OVS agent to generate the flows and possibly exceeding the time allocated for flow generation. In such cases, especially in environments already under stress, masters nodes were unable to communicate with worker nodes, leading the deployment to fail. Now, IP prefixes are used for whitelisting traffic origins intsead of remote_group_id. (BZ#1827795)

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html

You may download the oc tool and use it to inspect release image metadata as follows:

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.33

The image digest is sha256:52e780ccc7e3af73b11dcb4afe275e2e743b59ccea6f228089ac93337de244d7

All OpenShift Container Platform 4.2 users are advised to upgrade to these updated packages and images.

Solution

For OpenShift Container Platform 4.2 see the following documentation, which will be updated shortly for release 4.2.33, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html

Details on how to access this content are available at This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/4.2/updating/updating-cluster-cli.html.

Affected Products

ProductVersionArch
Red Hat OpenShift Container Platform4.2x86_64
Red Hat OpenShift Container Platform4.2x86_64
Red Hat OpenShift Container Platform for IBM Z and LinuxONE4.2s390x
Red Hat OpenShift Container Platform for IBM Z and LinuxONE4.2s390x

Fixes

CVEs

References

(none)


Additional information