- Issued:
- 2020-11-12
- Updated:
- 2020-11-12
RHBA-2020:4430 - OpenShift Container Platform 3.11.317 bug fix and enhancement update
Synopsis
OpenShift Container Platform 3.11.317 bug fix and enhancement update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 3.11.317 is now available with updates to packages and images that fix several bugs and add enhancements.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.317. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2020:4429
This release fixes the following bugs among others:
-
Previously, certificate redeployments were failing for etcd when the CA was missing, which caused the etcd services to crash. This happened because during certificate redeployment, the etcd CA is required to create new certificates. A check has been added to ensure the etcd CA files are present before performing the certificate redeployment and to notify the user to redeploy the etcd CA before continuing. Now the certificate redeployment succeeds. (BZ#1757081)
-
Previously, the API health checks only checked the load balancer. This caused health checks to return successful, although the local host was failing after restart. This bug fix adds an API health check for the local host, ensuring local API health checks are successful. (BZ#1812431)
-
Due to changes between Ansible 2.7 and 2.9, persistent volume templates processed keys inconsistently, causing issues. The order of keys when templating is now an alphabetized list, fixing the issue. (BZ#1836157)
-
Previously, the bootstrap-autoapprover configuration was not part of the cluster upgrade process. This caused the bootstrap-autoapprover image to not update during upgrades. The
enable_bootstrapplaybook has been added to the cluster upgrade process, allowing the bootstrap-autoapprover image to update during upgrades. (BZ#1879356) -
Previously, Ansible handlers were called at the end of a playbook phase such as
Tasks. Task files were called in thecontainer_runtimerole twice, which resulted in the handler conditions to be reset. This resulted in the Ansible handler not running as expected; therefore, it did not restart the container runtime. The two role task imports have been combined into one task to prevent handler conditionals from being reset. Now the Ansible handler runs as expected and restarts the container runtime. (BZ#1882572) -
Previously, during the
Wait for node to be readytask, not all values were set for validating task execution conditionals. This cause the task to fail with undefined values. This has been fixed by explicitly checking each step in the value tree to ensure everything is defined. Task conditionals are now validated as expected even when not all values are defined. (BZ#1892159)
All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system is applied.
See the following documentation, which will be updated shortly for release 3.11.317, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/articles/11258.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 3.11 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 3.11 | ppc64le |
Updated Packages
- atomic-openshift-clients-redistributable-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- openshift-kuryr-controller-3.11.317-1.git.1.415c4c3.el7.noarch.rpm
- atomic-openshift-node-problem-detector-3.11.317-1.git.1.2a00641.el7.ppc64le.rpm
- golang-github-prometheus-node_exporter-3.11.317-1.git.1.9fb385a.el7.src.rpm
- atomic-openshift-service-idler-3.11.317-1.git.1.4a21ae2.el7.src.rpm
- openshift-enterprise-cluster-capacity-3.11.317-1.git.1.eacfbe4.el7.ppc64le.rpm
- golang-github-prometheus-alertmanager-3.11.317-1.git.1.6be9eca.el7.src.rpm
- openshift-ansible-roles-3.11.317-1.git.0.de92996.el7.noarch.rpm
- prometheus-alertmanager-3.11.317-1.git.1.6be9eca.el7.ppc64le.rpm
- atomic-openshift-dockerregistry-3.11.317-1.git.1.bff0b7b.el7.src.rpm
- openshift-ansible-3.11.317-1.git.0.de92996.el7.noarch.rpm
- haproxy-debuginfo-1.8.26-1.el7.ppc64le.rpm
- atomic-openshift-descheduler-3.11.317-1.git.1.9c95b0f.el7.src.rpm
- atomic-enterprise-service-catalog-svcat-3.11.317-1.git.1.020c5c8.el7.ppc64le.rpm
- atomic-openshift-web-console-3.11.317-1.git.1.50023bf.el7.ppc64le.rpm
- atomic-openshift-cluster-autoscaler-3.11.317-1.git.1.7dfe9c4.el7.ppc64le.rpm
- atomic-openshift-hypershift-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- atomic-openshift-hypershift-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- atomic-openshift-hyperkube-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- atomic-openshift-descheduler-3.11.317-1.git.1.9c95b0f.el7.ppc64le.rpm
- atomic-openshift-node-problem-detector-3.11.317-1.git.1.2a00641.el7.src.rpm
- atomic-openshift-pod-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- jenkins-2-plugins-3.11.1603460090-1.el7.src.rpm
- openshift-ansible-3.11.317-1.git.0.de92996.el7.src.rpm
- openshift-enterprise-cluster-capacity-3.11.317-1.git.1.eacfbe4.el7.src.rpm
- atomic-openshift-tests-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- atomic-openshift-metrics-server-3.11.317-1.git.1.ea01e9c.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.317-1.git.1.ea01e9c.el7.x86_64.rpm
- atomic-openshift-template-service-broker-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- openshift-kuryr-3.11.317-1.git.1.415c4c3.el7.src.rpm
- atomic-openshift-web-console-3.11.317-1.git.1.50023bf.el7.x86_64.rpm
- atomic-openshift-excluder-3.11.317-1.git.0.5d5a266.el7.noarch.rpm
- openshift-kuryr-common-3.11.317-1.git.1.415c4c3.el7.noarch.rpm
- atomic-openshift-pod-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- atomic-openshift-metrics-server-3.11.317-1.git.1.ea01e9c.el7.src.rpm
- atomic-openshift-sdn-ovs-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- atomic-openshift-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- atomic-openshift-hyperkube-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- golang-github-openshift-oauth-proxy-3.11.317-1.git.1.5df179b.el7.x86_64.rpm
- atomic-enterprise-service-catalog-3.11.317-1.git.1.020c5c8.el7.ppc64le.rpm
- atomic-openshift-sdn-ovs-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- prometheus-3.11.317-1.git.1.9626f3d.el7.ppc64le.rpm
- openshift-ansible-docs-3.11.317-1.git.0.de92996.el7.noarch.rpm
- atomic-enterprise-service-catalog-3.11.317-1.git.1.020c5c8.el7.src.rpm
- openshift-enterprise-autoheal-3.11.317-1.git.1.8f9472e.el7.ppc64le.rpm
- atomic-openshift-node-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- prometheus-alertmanager-3.11.317-1.git.1.6be9eca.el7.x86_64.rpm
- atomic-openshift-master-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- atomic-enterprise-service-catalog-svcat-3.11.317-1.git.1.020c5c8.el7.x86_64.rpm
- haproxy-debuginfo-1.8.26-1.el7.x86_64.rpm
- openshift-ansible-test-3.11.317-1.git.0.de92996.el7.noarch.rpm
- atomic-openshift-master-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- prometheus-3.11.317-1.git.1.9626f3d.el7.x86_64.rpm
- atomic-openshift-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- atomic-openshift-tests-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- golang-github-openshift-oauth-proxy-3.11.317-1.git.1.5df179b.el7.ppc64le.rpm
- prometheus-node-exporter-3.11.317-1.git.1.9fb385a.el7.ppc64le.rpm
- atomic-openshift-service-idler-3.11.317-1.git.1.4a21ae2.el7.x86_64.rpm
- haproxy18-1.8.26-1.el7.ppc64le.rpm
- atomic-openshift-template-service-broker-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- golang-github-openshift-oauth-proxy-3.11.317-1.git.1.5df179b.el7.src.rpm
- openshift-kuryr-cni-3.11.317-1.git.1.415c4c3.el7.noarch.rpm
- haproxy-1.8.26-1.el7.src.rpm
- haproxy18-1.8.26-1.el7.x86_64.rpm
- prometheus-node-exporter-3.11.317-1.git.1.9fb385a.el7.x86_64.rpm
- atomic-openshift-node-problem-detector-3.11.317-1.git.1.2a00641.el7.x86_64.rpm
- atomic-openshift-dockerregistry-3.11.317-1.git.1.bff0b7b.el7.x86_64.rpm
- atomic-openshift-clients-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- atomic-openshift-3.11.317-1.git.0.5d5a266.el7.src.rpm
- python2-kuryr-kubernetes-3.11.317-1.git.1.415c4c3.el7.noarch.rpm
- atomic-openshift-service-idler-3.11.317-1.git.1.4a21ae2.el7.ppc64le.rpm
- atomic-openshift-web-console-3.11.317-1.git.1.50023bf.el7.src.rpm
- openshift-enterprise-autoheal-3.11.317-1.git.1.8f9472e.el7.src.rpm
- atomic-openshift-docker-excluder-3.11.317-1.git.0.5d5a266.el7.noarch.rpm
- atomic-openshift-node-3.11.317-1.git.0.5d5a266.el7.ppc64le.rpm
- jenkins-2-plugins-3.11.1603460090-1.el7.noarch.rpm
- atomic-enterprise-service-catalog-3.11.317-1.git.1.020c5c8.el7.x86_64.rpm
- atomic-openshift-cluster-autoscaler-3.11.317-1.git.1.7dfe9c4.el7.x86_64.rpm
- openshift-ansible-playbooks-3.11.317-1.git.0.de92996.el7.noarch.rpm
- openshift-enterprise-autoheal-3.11.317-1.git.1.8f9472e.el7.x86_64.rpm
- atomic-openshift-cluster-autoscaler-3.11.317-1.git.1.7dfe9c4.el7.src.rpm
- atomic-openshift-descheduler-3.11.317-1.git.1.9c95b0f.el7.x86_64.rpm
- golang-github-prometheus-prometheus-3.11.317-1.git.1.9626f3d.el7.src.rpm
- atomic-openshift-clients-3.11.317-1.git.0.5d5a266.el7.x86_64.rpm
- openshift-enterprise-cluster-capacity-3.11.317-1.git.1.eacfbe4.el7.x86_64.rpm
Fixes
- This content is not included.BZ - 1757081
- This content is not included.BZ - 1761936
- This content is not included.BZ - 1812431
- This content is not included.BZ - 1836157
- This content is not included.BZ - 1879356
- This content is not included.BZ - 1881133
- This content is not included.BZ - 1882572
- This content is not included.BZ - 1889385
- This content is not included.BZ - 1889868
- This content is not included.BZ - 1892159
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.