- Issued:
- 2020-12-17
- Updated:
- 2020-12-17
RHBA-2020:5602 - OpenShift Container Storage 3.11.z bug fix update
Synopsis
OpenShift Container Storage 3.11.z bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Updated OpenShift Container Storage packages that fix several bugs are now available for Red Hat OpenShift Container Storage 3.11 Update 6.
Description
The OpenShift Container Storage solution provides persistent storage service for OpenShift Containers and OpenShift Infrastructure services.
This advisory fixes the following bugs:
-
iSCSI login negotiation sometimes failed because a race condition in file locks created a credential mismatch. This meant that not all paths were added for multipath devices. This race condition has been corrected and this issue no longer occurs. (BZ#1597320)
-
Log rotation is now supported for gluster-block and tcmu-runner relevant logs. (BZ#1790788)
-
Heketi administrators can now evict a brick from an existing volume using the brick's Heketi ID. This operation is supported at the command line and using the API. Upon eviction, the brick is automatically replaced by a suitable new brick. If no new brick is available, eviction fails. (BZ#1630172)
-
Devices can now be segregated into groups or tiers based on particular characteristics, such as storage speed. (BZ#1699027)
-
Heketi now supports block volume expansion. (BZ#1680019)
-
Heketi device removal is now more reliable, and better tracks underlying changes such as brick eviction in order to provide more detailed debug information and assist with troubleshooting in the event of errors. (BZ#1812122)
Users of OpenShift Container Storage 3.11 are advised to upgrade to these updated packages, which fixes these bugs.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Gluster Storage Server for On-premise | 3 | x86_64 |
| Red Hat Enterprise Linux Server | 7 | x86_64 |
Updated Packages
- tcmu-runner-1.2.0-35.el7rhgs.x86_64.rpm
- heketi-9.0.0-14.el7rhgs.x86_64.rpm
- tcmu-runner-debuginfo-1.2.0-35.el7rhgs.x86_64.rpm
- python-heketi-9.0.0-14.el7rhgs.x86_64.rpm
- libtcmu-1.2.0-35.el7rhgs.x86_64.rpm
- gluster-block-0.2.1-39.el7rhgs.x86_64.rpm
- heketi-9.0.0-14.el7rhgs.src.rpm
- gluster-block-debuginfo-0.2.1-39.el7rhgs.x86_64.rpm
- heketi-client-9.0.0-14.el7rhgs.x86_64.rpm
- libtcmu-devel-1.2.0-35.el7rhgs.x86_64.rpm
- tcmu-runner-1.2.0-35.el7rhgs.src.rpm
- gluster-block-0.2.1-39.el7rhgs.src.rpm
Fixes
- This content is not included.BZ - 1597320
- This content is not included.BZ - 1680019
- This content is not included.BZ - 1699027
- This content is not included.BZ - 1725009
- This content is not included.BZ - 1737685
- This content is not included.BZ - 1761042
- This content is not included.BZ - 1800699
- This content is not included.BZ - 1812122
- This content is not included.BZ - 1813491
- This content is not included.BZ - 1822068
- This content is not included.BZ - 1858937
- This content is not included.BZ - 1882701
- This content is not included.BZ - 1888760
- This content is not included.BZ - 1904907
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.