- Issued:
- 2018-01-30
- Updated:
- 2018-01-30
RHBA-2018:0234 - Bug Fix Advisory
Synopsis
cns-deploy-tool bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cns-deploy-tool package that fixes bugs is now available for Container-Native Storage 3.6 and Container Ready Storage deployments.
Description
The cns-deploy utility provides a tool to deploy Container-Native Storage
on the Openshift environment.
This update includes the following bug fixes:
- This version of cns-deploy has updated template files which reference the rhgs-server-container image that includes memory leak fixes for glusterd process. (BZ#1533806)
- Earlier, in environments with many logical volumes, the rhgs-server-container image did not start within the "failureThreshold" and "periodSeconds" value as configured in the templates. With this fix, the "failureThreshold" value is increased from 15 to 50 in the templates to resolve the issue. (BZ#1539406)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1533806 - Rebuild cns-deploy to get new rhgs-server-container image built with glusterd memory-leak fixes
- BZ - 1539406 - the readiness timeout for rhgs-server-container should take into account higher number of bricks
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
cns-deploy-5.0.0-59.el7rhgs.src.rpm | SHA-256: 2b7fe26de222fa86ba5794e2f030876641f339baa7b80516372e7a299c7b4c84 |
x86_64 | |
cns-deploy-5.0.0-59.el7rhgs.x86_64.rpm | SHA-256: 9639854a4be973d2b8b01c712bdd6ddcdda1800c5d2d6f62eb0181f4aa3e958e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.