- Issued:
- 2015-03-05
- Updated:
- 2015-03-05
RHBA-2015:0638 - Bug Fix Advisory
Synopsis
openstack-nova bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenStack Compute packages that resolve various issues are now
available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno)
for RHEL 7.
Description
Red Hat Enterprise Linux OpenStack Platform provides the facilities
for building a private or public infrastructure-as-a-service (IaaS)
cloud running on commonly available physical hardware. This advisory
includes packages for:
- OpenStack Compute service
OpenStack Compute (nova) launches and schedules large networks of virtual
machines, creating a redundant and scalable cloud computing platform.
Compute provides the software, control panels, and APIs required to
orchestrate a cloud, including running virtual machine instances and
controlling access through users and projects.
This update addresses the following issues:
- The previous setting of 'iscsi_use_multipath=true' in nova.conf meant
that detaching a multipath iSCSI volume killed all iSCSI volumes visible
from the Compute service's compute node.
There are two types of iSCSI multipath devices. One which shares the same
IQN between multiple portals, and the other which use different IQNs on
different portals. With this update, connect_volume() now identifies the
type by checking iscsiadm (the output is the IQN is used by multiple
portals), and then connecting to the correct targets using
connect_to_iscsi_portal().(BZ#1158413)
- The previous implementation did not take into account guest node
placement. The back-end memory defined in the libvirt XML referred to
the NUMA-node IDs of the host but should have referred to NUMA-node IDs
of the guest. The algorithm responsible for handling definitions of NUMA
nodes for the guest back-end memory according guest nodes IDs has been
updated. The Libvirt XML generated now provides good definitions for
back-end memory.(BZ#1175607)
- Previously, a bad argument was passed to the method that read NUMA
properties from an image. As a result, it was not possible to set the
NUMA properties on the image, only with the flavor. With this update,
the argument has been updated for the method responsible to read NUMA
properties and unit tests updated to ensure no regression. Users can now
set NUMA properties from an image as well by using a flavor.(BZ#1176544)
- The Compute service has been rebased to 2014.2.2, which contains
numerous bug fixes. Important fixes include:
- iSCSI sessions for multipath volumes did not work
properly. Attaching a multipath iSCSI volume would create
unnecessary sessions, which resulted in all targets being
deleted when a volume was disconnected. With this fix,
when a multipath volume is now connected, the type is
correctly identified, and a connection to the right
target is now correctly established.
- Tempest previously failed with the boto 2.35 release
because the Compute service expected the obsolete header
'Signature', which is now part of the 'Authorization'.
With this update, the Compute service now supports the v4
signature format by extracting the signature and access
key using whatever method is needed for the version of
the request.
- Previously, adding a fixed address to a running instance
in Compute networking failed because no virtual interface
was created before the IP was added. With this update, the
virtual interface is now added before the fixed IP is added
to a running instance.
- Previously, you could not live migrate an instance from
an Icehouse node to a Juno node. nova live-migrate would
fail at the call when comparing different RPC versions.
With this update, different RPC versions raise
an exception; otherwise, the migration now succeeds.(BZ#1188388)
Solution
Before applying this update, ensure all previously released errata
relevant to your system have been applied.
Red Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat
Enterprise Linux 7.1.
This update is available through 'yum update' on systems registered
through Red Hat Subscription manager. For more information about
Red Hat Subscription manager, refer to:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Red Hat Enterprise Linux OpenStack Platform 6 documentation is available
at:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform
The Release Notes include:
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat Enterprise Linux OpenStack
Platform 6, including which channels need to be enabled and disabled.
Affected Products
- Red Hat OpenStack 6.0 x86_64
Fixes
- BZ - 1175607 - When using huge pages Nova will not set the guest nodes correctly in libvirt XML
- BZ - 1176544 - NUMA topology from image meta data is bugged
CVEs
(none)
References
(none)
Red Hat OpenStack 6.0
SRPM | |
---|---|
x86_64 | |
openstack-nova-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 333f1fc7eae789e5cdf6c53f7a36c56b193537de9ae0c78a71a4a2452c317e5d |
openstack-nova-api-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 591d8bda7229a3f449f9d3c6486abf3c2ce39af4b8b0d0dbfeb5d29a62506ba3 |
openstack-nova-cells-2014.2.2-2.el7ost.noarch.rpm | SHA-256: e3dddce90f6b8fb64f3d3d21d80be6438bdc65d8af4e34a1ef9ea11a395e76a2 |
openstack-nova-cert-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 3c692edc04ac4f41b72c7068364fdd259e34013e8688113c0000baa05a6c91d5 |
openstack-nova-common-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 1343ad4705dddbec6a9eb9c119086d09f0d006598341431c7a2a30948744e281 |
openstack-nova-compute-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 9bd5176034a0a65e983a9e63c3a444edadee7b7fe2f09aa318c5d4e0b242e536 |
openstack-nova-conductor-2014.2.2-2.el7ost.noarch.rpm | SHA-256: ee81ac9a7db6be18b727dad7088052c67e3d9deee2838240b63b62242a4f18f6 |
openstack-nova-console-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 33fead43688a397258502c316f97efa6bfa5972455be177f769f09f551010d9e |
openstack-nova-doc-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 2783a30622dbeb76703bb91000ad8f202908f977af472a71109ba446ee63092f |
openstack-nova-network-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 1acaa9ee7b646f750b17bc817230beb9994b12d5dfa7938168fbc3570722a9fd |
openstack-nova-novncproxy-2014.2.2-2.el7ost.noarch.rpm | SHA-256: ecaf8b824ed57cb21219743044c5e3ebc5eb326b152bff67f8e905d1b5a05dc0 |
openstack-nova-objectstore-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 83063370a95734ca5578de60097684a0d7a13a8f7bb1ffe3693174f815906ee5 |
openstack-nova-scheduler-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 5f822a586de5473a27d0b6de28f16c93307e0a39edf68c679a0aca63d763f79c |
openstack-nova-serialproxy-2014.2.2-2.el7ost.noarch.rpm | SHA-256: 578b2c2ce6e9fd922ed2308ab4d9d39299dcecb9e387a7ffbae4626a5eed885c |
python-nova-2014.2.2-2.el7ost.noarch.rpm | SHA-256: fd239c2bbf6f5b413954d6000995335802977396be8d7f02828e34f84af0cab0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.