- Issued:
- 2013-06-11
- Updated:
- 2013-06-11
RHBA-2013:0936 - Bug Fix Advisory
Synopsis
openstack-nova bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openstack-nova package that adds various enhancements and fixes
several bugs is now available for Red Hat OpenStack 3.0 (Grizzly) Preview.
Description
OpenStack Compute (Nova) is open source software designed to
provision and manage large networks of virtual machines, creating a
redundant and scalable cloud computing platform. It provides the
software, control panels, and APIs required to orchestrate a cloud,
including running virtual machine instances, managing networks, and controlling
access through users and projects.
These updated packages include these enhancements:
- The default drivers for compute instance devices are now virtio-net-pci, and
virtio-disk. Changes to these defaults can be made on a per image basis by
updating the image metadata using arguments such as "--property
hw_vif_model=e1000" and "--property hw_cdrom_bus=ide" to the glance image-update
command. (BZ#865345)
- The compute service now supports the generic virtual interface plugging
driver, GenericVifDriver. The GenericVifDriver is intended to work automatically
with all currently supported Nova and OpenStack networking drivers. The
vif_driver configuration key remains available to handle any situations which
arise where the automation does not work correctly. (BZ#894913)
- The compute service has been updated and is now able to use Cinder volumes
backed by both NFS and GlusterFS mounts that have custom mount options
associated with them. (BZ#969058)
These updated packages fix these bugs:
- Support for the OpenStack networking metadata proxy has been added to the
compute service. This resolves a previous issue with the use of the metadata
service in combination with having overlapping IP ranges defined in OpenStack
networking. (BZ#894845)
- Previously the code responsible for adding and modifying SNAT rules did not
fully support the use of multiple dynamic networks. As a result instances were
presented with invalid routing tables when attached to networks that were
created in multi_host mode. Updates have now been made to ensure that the SNAT
rules for each network are configured correctly on the relevant network node.
(BZ#947685)
- The keystone_authtoken configuration parameters were previously placed in the
distribution specific compute service configuration file. As a result scripts to
update these defaults in the standard user editable configuration file failed to
correctly update the configuration. Additionally the defaults, descriptions, and
correct location were not made apparent to end users who manually edited the
standard configuration file. The template for the standard configuration file
has been updated to include references to the keystone_authtoken configuration
keys and their purpose. (BZ#967795)
All users of Red Hat OpenStack 3.0 (Grizzly) Preview are advised to install
these updated packages.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Documentation for both stable and preview releases of Red Hat OpenStack is
available at:
https://access.redhat.com/site/documentation/en-US/Red_Hat_OpenStack/
In particular it is highly recommended that all users read the Release Notes
document for the relevant Red Hat OpenStack release prior to installation.
Affected Products
- Red Hat OpenStack grizzly x86_64
Fixes
- BZ - 894845 - Resolve issues with the metadata service not working with overlapping IP ranges in Quantum
- BZ - 967795 - openstack-nova: Add [keystone_authtoken] params from /usr/share/nova/nova-dist.conf to nova.conf
CVEs
(none)
Red Hat OpenStack grizzly
SRPM | |
---|---|
openstack-nova-2013.1.1-4.el6ost.src.rpm | SHA-256: 0bf0454a3417e24ca6e2febd39e6ee82348cedd661046ad16d59307493de0de1 |
x86_64 | |
openstack-nova-2013.1.1-4.el6ost.noarch.rpm | SHA-256: a74b2ac271f248972b7bb27c6bbc1f24cc991aee91c7d01b73ab0902a3c51614 |
openstack-nova-api-2013.1.1-4.el6ost.noarch.rpm | SHA-256: 2550c233d2389eee58025c9b85455d6f8fc7f187babe17c2d79c1f04cffbf08d |
openstack-nova-cells-2013.1.1-4.el6ost.noarch.rpm | SHA-256: 5b47d59ba2a86a6a9beac046f8a2930970746319792b74200338054c958fa12c |
openstack-nova-cert-2013.1.1-4.el6ost.noarch.rpm | SHA-256: 06028401e48f6beb7cdcd9cf78702dce4d11a051eb8ee3af82892d0d241233dc |
openstack-nova-common-2013.1.1-4.el6ost.noarch.rpm | SHA-256: fca746aa2df5049cf9ed09c8d4d7cf86ddca1b2f545032304bfee385fec7bbec |
openstack-nova-compute-2013.1.1-4.el6ost.noarch.rpm | SHA-256: 1170d16290add779fa00144f672417c362d96cdff514f9fa512ef399b2a9e4bd |
openstack-nova-conductor-2013.1.1-4.el6ost.noarch.rpm | SHA-256: c14c2541a488c9ddbad52ec8f60e4106200a305acc51aae2904de2e6fa34a969 |
openstack-nova-console-2013.1.1-4.el6ost.noarch.rpm | SHA-256: 9817ff33cca4b482a0347b581b725146d4693a5f87b5f7fec70f3ac80c9b9208 |
openstack-nova-doc-2013.1.1-4.el6ost.noarch.rpm | SHA-256: d4f6b5ae39b6116bcc97ee1626966419e02bfab57343e761ef1622d6c2a73ba1 |
openstack-nova-network-2013.1.1-4.el6ost.noarch.rpm | SHA-256: c21a6761c4f03705470a7300e0f22e52af2298f5086723243c1da133607b13c0 |
openstack-nova-objectstore-2013.1.1-4.el6ost.noarch.rpm | SHA-256: a6412eecaebb8669f60411dfec0284a99e9e65bbea0e539490fd57ad2007efe4 |
openstack-nova-scheduler-2013.1.1-4.el6ost.noarch.rpm | SHA-256: acb61a4c2fb68cfcb2040a131b3558a3bffa85ee212af6546fb7bbdf4e8a7b1e |
python-nova-2013.1.1-4.el6ost.noarch.rpm | SHA-256: 41675261f9060bf41d3516ddfa30a675a5bc9d8b87af4466b87bd4fdf314a999 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.