- Issued:
- 2014-09-30
- Updated:
- 2014-09-30
RHBA-2014:1349 - Bug Fix Advisory
Synopsis
openstack-packstack and openstack-puppet-modules bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openstack-packstack and openstack-puppet-modules packages for Packstack
which resolve various issues are now available for Red Hat Enterprise Linux
OpenStack Platform 5.0 (Icehouse) for RHEL 6.
Description
Red Hat Enterprise Linux OpenStack Platform provides the facilities for
building a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware. This advisory includes
packages for:
- PackStack installation utility
PackStack is a command-line utility for deploying OpenStack on existing
servers over an SSH connection. Deployment options are provided either
interactively, using the command line, or non-interactively by means of a
text file containing a set of preconfigured values for OpenStack
parameters. PackStack is suitable for deploying proof-of-concept installations.
This update includes the following enhancements:
- The PackStack utility now installs the sos, sos-plugins-openstack, and
rhos-collector packages on each host. These packages enable the log
collector tool to include RHEL OpenStack Platform information
immediately after deployment. (BZ#1131621)
- A new PackStack parameter called "CONFIG_UNSUPPORTED" has been
introduced. Setting this parameter to "y" activates other parameters
which are not supported in the current release. Currently there is only
one unsupported parameter which will be activated, "CONFIG_STORAGE_HOST",
which enables the installation of OpenStack Image (glance) and OpenStack
Block Storage (cinder) to a separate host. (BZ#1131866)
Solution
Before applying this update, ensure all previously released errata
relevant to your system have been applied.
Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 6 runs on Red Hat
Enterprise Linux 6.5.
The Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 6 Release Notes
contain the following:
- An explanation of the way in which the provided components interact to form a
working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat Enterprise Linux OpenStack Platform 5 for
RHEL 6, including which channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html
This update is available through the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat OpenStack 5.0 for RHEL 6 x86_64
Fixes
- BZ - 1131621 - RFE: packstack and foreman should install the rhos sos plugins on all nodes
- BZ - 1131866 - Allow packstack to define different host for some services
- BZ - 1138819 - work around iproute2 dynamic interface issue
CVEs
(none)
Red Hat OpenStack 5.0 for RHEL 6
SRPM | |
---|---|
openstack-packstack-2014.1.1-0.41.dev1251.el6ost.src.rpm | SHA-256: 222545a97429bda8daeff42f624bf0e0a9caed0731e282342897d10f73f37a59 |
openstack-puppet-modules-2014.1-21.8.el6ost.src.rpm | SHA-256: 081ffe7be4fbdabddcef4e0561364276746fdc9cc3bf0340728831e09ee4e3ba |
x86_64 | |
openstack-packstack-2014.1.1-0.41.dev1251.el6ost.noarch.rpm | SHA-256: d8a6e7f1a381986f0eabd337efd894575962a0ad4e8a9a27263734d4d880969b |
openstack-packstack-doc-2014.1.1-0.41.dev1251.el6ost.noarch.rpm | SHA-256: ccbeaf4f8ff2b730654cb05b385ecede191e4b61acf460d32017c8bee849b1fb |
openstack-packstack-puppet-2014.1.1-0.41.dev1251.el6ost.noarch.rpm | SHA-256: 064b7a214d3b04bc62426f63dd9622d862411d521cff20a998b007dfe0fec607 |
openstack-puppet-modules-2014.1-21.8.el6ost.noarch.rpm | SHA-256: f99d1d98db7c29d0420b99fef1fa6094957ff35b02a8aade089e542d91a393dc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.