- Issued:
- 2019-02-04
- Updated:
- 2019-02-04
RHBA-2019:0264 - Bug Fix Advisory
Synopsis
glusterfs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs packages that fix several bugs are now available for Red Hat Gluster Storage 3.4 Batch Update 3 on Red Hat Enterprise Linux 6.
Description
Red Hat Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
This advisory fixes the following bugs:
- Earlier, a race condition between `pcs cluster setup ...` and `systemctl enable pacemaker` sometimes left Pacemaker disabled. As a result, Pacemaker failed to start on one or more nodes after reboot. With this release, the customer can add the '--enable' option to the `pcs cluster setup ...` command to enable and start Pacemaker automatically after reboot. (BZ#1637564)
- Previously, during a lookup failure, the stat structure returned was NULL, dereferencing which lead to the crash. With this fix, there is no defer in the stat structure when lookup failed. (BZ#1664529)
- This update introduces a feature, reader-thread-count, for multi-threaded FUSE reader threads, which imports parallel requests on a FUSE mount and handles them through multiple threads, proffering better I/O performance. (BZ#1651040)
- With this release, while setting up geo-replication, the slave volumes are made read-only by default. The intention is to write to the master and have the slave volumes synced to it. Considering write should not happen from the slave, it is competent to make the slave volumes read-only. (BZ#1643370)
- Earlier, the glusterd service did not regenerate volfiles during initialization when there was a change in the maximum operating version supported. This resulted in bricks running with an older volfile in Red Hat OpenShift Container Storage. With this fix, glusterd will regenerate the volfiles whenever there is a variation in the maximum (max-op-version) supported operating version. (BZ#1651460)
- Earlier, enabling group 'virt' failed on non-replicate volumes due to the existing replicate-specific options in the group. As a result, the options that could optimize the volume for virtual machine storage was not set on distributed volumes. This release introduces a new group 'distributed-virt' to optimize the deployment of distributed volumes in the virtual machine storage. (BZ#1653613)
- With this release, the 'gfid2path' option is enabled by default. This provides the path for the file when the GFID is known thus helping administrators to know which file has split-brain. (BZ#1644318)
- In replica 3 volume, renaming a file while the brick with the 'good copy'of the file is down, results in the removal of the file during self-heal leading to data loss. With this release, lookup of a file fails if there is no good copy (as determined by AFR xattrs) found, dismissing the rename option and limiting the data loss. (BZ#1362129)
- Earlier, Samba hook scripts removed the share section from the smb.conf after restarting a volume. Any additional share specific parameters set within the configuration file was lost. In this update a new parameter, available = no, is added to sections making them unavailable to clients. Any share section with this parameter is not accessible when a volume is stopped. Restarting the volume will remove the parameter, making it accessible again. (BZ#1164778)
- This release introduces a new group option for configuring volume options for Samba-CTDB setup which validates the requirement of volume options ideal for the setup. (BZ#1655385)
- With this release, the Samba hook script has been improved for adding volume share section in the smb.conf file. To export gluster volume as SMB share via Samba, one of the following volume options, user.cifs or user.smb is required. The existing glusterfs volume share sections in smb.conf remains unchanged. (BZ#1541568)
Users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which fixes these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 6 x86_64
Fixes
- BZ - 1660789 - [RHEL6] RHGS 3.4 Batch Update #3
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
glusterfs-3.12.2-40.el6.src.rpm | SHA-256: 309ea2241f46b4ba97e0fbdc03686b07ce8d88e02691e7f9483ef3ffbd4da056 |
x86_64 | |
glusterfs-3.12.2-40.el6.x86_64.rpm | SHA-256: 82048c66f1557be61ca6eeba77b397ab921b883fbebaefb4eaa8549a34878e11 |
glusterfs-api-3.12.2-40.el6.x86_64.rpm | SHA-256: 6bc01bcc62245e00329c4f0d55ccdb7d9987d5edf1e272dc8b82c377225b363d |
glusterfs-api-devel-3.12.2-40.el6.x86_64.rpm | SHA-256: 5619262e82a3a39f971696c282b1e7cb2011da2743662fa4c73d8b49be71c345 |
glusterfs-cli-3.12.2-40.el6.x86_64.rpm | SHA-256: de935ab0f07be769a7b9a857e2bf569efce061cd82b6747eb9f6b9afad314ab3 |
glusterfs-client-xlators-3.12.2-40.el6.x86_64.rpm | SHA-256: e94f7d9da310e7fa1cdb688e54d707e01e2243ad7123e7771172579d9ccfbbfe |
glusterfs-debuginfo-3.12.2-40.el6.x86_64.rpm | SHA-256: 1b03b20f8be9c375aae4dfaa008784a4504d674648ec9fa3a5e0b10e5908c2ce |
glusterfs-devel-3.12.2-40.el6.x86_64.rpm | SHA-256: 002619f588129e33a5af25e87c3f7f955be21e6e8626ab8f47f1999c6ed65f0d |
glusterfs-fuse-3.12.2-40.el6.x86_64.rpm | SHA-256: 7a02f88c13ebcf47b6021b56651191315ff3c45aa00ac488c0a47b7e00ec4e8a |
glusterfs-libs-3.12.2-40.el6.x86_64.rpm | SHA-256: 83ea12a9dd71674b07a5b3c291d4596b8059d8f0229abcbd7db64a2be4a28972 |
glusterfs-rdma-3.12.2-40.el6.x86_64.rpm | SHA-256: f3959ba31a96117f3b34ddcc65003c46aa57058fc2ab81387e5db2d557be308a |
python2-gluster-3.12.2-40.el6.x86_64.rpm | SHA-256: 5f40dcea023b3b593f105a1ffe18c2a040f24b91f29438d61d6d5f369610a48b |
Red Hat Gluster Storage Server for On-premise 3 for RHEL 6
SRPM | |
---|---|
glusterfs-3.12.2-40.el6rhs.src.rpm | SHA-256: 167d37bfa144ed606d8dc1a524a3a6acd35a7d5de08f4b91cd6e00e11751c3a5 |
x86_64 | |
glusterfs-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 3b01579893752decb24f246fdda8c907a1db06e669bbb674389f498ee173de57 |
glusterfs-api-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 3c88888a35aa19deeaf9021b055b93fe9f4395f48cfa211994e995c960c08005 |
glusterfs-api-devel-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: ba4eb5a76250cd7a03f1a5de90aa04259df7fc034d6267f3579ef823b9e73e51 |
glusterfs-cli-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 01559eb79e4140063a9e9ae2cf58baa4fa9e9ce3248fbf9b7ca43b64bc0fa162 |
glusterfs-client-xlators-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 86829f5c88a903dd03444309f82e8d7e46a11194251549f00dd8086f73115574 |
glusterfs-debuginfo-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 5ee707a819aed808a70bf4a7d69952bff69afcc03aaf76fa5ac6b49fe7e23a7c |
glusterfs-devel-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 6996a8143f705ef10cea938e63dfc6018ebc4b6c45df7a4eaa97423d816c4aa7 |
glusterfs-events-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 74d871443d6e3f97361aa32afdde521c02fd5325966926ec5e4ad1ee467f65f8 |
glusterfs-fuse-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: fbf84f23e7add2a5216d32db1bf975bcf3e22cff9737e466fc353a69d312c37f |
glusterfs-ganesha-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 02be021c220d40f88990db0dc39f721eda147d70d9da1377665f59cebd775c3c |
glusterfs-geo-replication-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: c057a083fcd0b15026e3b806e67ca08723dd86bffae1594665dfcb60fda50d40 |
glusterfs-libs-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: d59ff85f2cec68043ff578b9acfc24edae7fead21c7d4eb870bd2b6322c21f23 |
glusterfs-rdma-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 200081130aa3cd6d8219751ef2509fe6aae1b8c230369595a5b43dbdb03e5b85 |
glusterfs-server-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: d6639bd335752fe78e914d83114873b173850b08c29622f71dbd2f459028e174 |
python2-gluster-3.12.2-40.el6rhs.x86_64.rpm | SHA-256: 2dcec9989a6710bb1eaa135cf7dca8520b351c8c1e8da4ad850917340dd7b06f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.