- Issued:
- 2016-08-23
- Updated:
- 2016-08-23
RHBA-2016:1651 - Bug Fix Advisory
Synopsis
Red Hat Gluster Storage 3.1 vdsm Update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs are now available for Red Hat Gluster Storage 3.1.
Description
Red Hat Gluster Storage is a software only scale-out storage solution
that provides flexible and affordable unstructured data storage.
It unifies data storage and infrastructure, increases performance,
and improves availability and manageability to meet enterprise-level
storage challenges.
These updated packages fix the following bugs:
- The version of vdsm previously available in Red Hat Gluster Storage 3.1
only supported cluster compatibility versions up to 3.5. This meant it
could not be managed by Red Hat Enterprise Virtualization Manager 4.0,
which requires a compatibility version of 3.6 or higher. These updated
packages enable a cluster compatibility level of 3.6, allowing
Red Hat Gluster Storage 3.1 to be managed by Red Hat Enterprise
Virtualization Manager 4.0. (BZ#1359604)
- On Red Hat Enterprise Linux 7 installations, the vdsmd service was
enabled by default. This meant that vdsmd started on boot even when
vdsm was not configured, which resulted in errors being logged at boot.
In fresh installations, the vdsmd service is now disabled by default so
that these errors no longer occur, and the vdsmd service is started by
Red Hat Gluster Storage Console or Red Hat Enterprise Virtualization
Manager when the node is added to a cluster. This change affects only
new installations; vdsmd will not be disabled on existing installations.
(BZ#1305201)
All users of Red Hat Gluster Storage are advised to apply this update.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1359604 - RHGS 3.1 nodes cannot be managed using RHEV-M 4.0
- BZ - 1365832 - Remove vdsm-reg dependency from redhat-storage-server on RHEL7
CVEs
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
ioprocess-0.15.0-5.el7ev.src.rpm | SHA-256: 0b3d182282ae91cf7741f9677a6e93713d645b894ac287568ec06dddc7687d56 |
mom-0.5.5-1.el7ev.src.rpm | SHA-256: 12cefe93109ebe1ffb79fa0329337809780615e367b4ce08b2141dc236ee5dca |
redhat-storage-server-3.1.3.0-4.el7rhgs.src.rpm | SHA-256: d78d6b084c7f19ed9695bb450aa02ffeb73a8abc8eca5026fa5d38de79d11197 |
vdsm-4.17.33-1.el7rhgs.src.rpm | SHA-256: 495cc0201654a5740f4c5903e656a7efba94e57592e2b7f9d9d5d204ee7861a0 |
x86_64 | |
ioprocess-0.15.0-5.el7ev.x86_64.rpm | SHA-256: 86ebd1fdfd83d7c1f5938177864757befd0ffd4c3b412d87a3d45997ba2c4676 |
ioprocess-debuginfo-0.15.0-5.el7ev.x86_64.rpm | SHA-256: 25395e9babc785228133076305b65eeb00d680e2c037f231542a75e220bc6c0c |
mom-0.5.5-1.el7ev.noarch.rpm | SHA-256: 51964c661e70227b6476d2578d559f4711a0884e9a1481c39306ffdcda2fc588 |
python-ioprocess-0.15.0-5.el7ev.noarch.rpm | SHA-256: 87423c428f8cb8f7bfd4ffda7b9b400f763493410ab91ea9e0f2cc372e9ade7c |
redhat-storage-server-3.1.3.0-4.el7rhgs.noarch.rpm | SHA-256: 175860d7d93c637a9e45457dea3b31c36515b7074f4811adf79d525d35d1a4c9 |
vdsm-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 13e61693d50d9ce8390acdf4af1ecc7fe3931412dccfcfcda5a8e0e6659b15e4 |
vdsm-cli-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 5e6c2156af5291306b911c12047ecd0f35e6f3565854443e48f281d2b0293c7f |
vdsm-debug-plugin-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 50a5b970c7d3619e8673560f08a39bdad545350e12eeff16f30bc87196265db7 |
vdsm-gluster-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 4bcb3695e6d687340bc0dd9676ad83353be2846db7a62c98caea8c89233a4921 |
vdsm-hook-ethtool-options-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: e8ef1d8b1c718be6c20ca0a6d09b21f6c8035f225fa889912bd616d149ea5a59 |
vdsm-hook-faqemu-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 1246a4fc07eeab54315bbeaf187656f1487337a6194421242d3ec4932e0fe60c |
vdsm-hook-openstacknet-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: a1324723017f78b4036b0c88f7a2d22304327e111899ae265c2cf8919e1fcc1d |
vdsm-hook-qemucmdline-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: c55e4a8be3e74441b5d0d1197985a7cbc0600bcae285a510caf8fec2ae46abe7 |
vdsm-infra-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: d34468cc419ec90c5668d6133eb7768817b296106330b97f46626ae94762ca13 |
vdsm-jsonrpc-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 1907e08b8a47166f6829d7a15caba0e53aaaf92ecdfbdb0975ef98b9903970e5 |
vdsm-python-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 1748b78b32e9eabdbcb324e97b3ba8dff0bc0d987669122b873adc7c3c5f2250 |
vdsm-tests-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 3d1723b9e3b5f594f5039d3660cda032bd09c7be95ae482b67c8a5c895be107b |
vdsm-xmlrpc-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: 7d79438a6aedaaa68bd9a72ff50bd36633713f17d4d6e6134de398c9f1b618c1 |
vdsm-yajsonrpc-4.17.33-1.el7rhgs.noarch.rpm | SHA-256: a7249816e8d1c274f02ad64d8162cbc459f79561b710711cd7838aecfbc75959 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.