- Issued:
- 2017-01-19
- Updated:
- 2017-01-19
RHBA-2017:0159 - Bug Fix Advisory
Synopsis
openstack-neutron bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenStack Networking packages that resolve various issues are now
available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for
RHEL 7.
Description
Red Hat Enterprise Linux OpenStack Platform provides the facilities for
building a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware. This advisory includes
packages for:
- OpenStack Networking service
OpenStack Networking (neutron) is a virtual network service for OpenStack.
Just as OpenStack Compute (nova) provides an API to dynamically request and
configure virtual servers, OpenStack Networking provides an API to
dynamically request and configure virtual networks. These networks connect
'interfaces' from other OpenStack services (e.g. virtual NICs from Compute
VMs). The OpenStack Networking API supports extensions to provide advanced
network capabilities (e.g. QoS, ACLs, network monitoring, etc.)
This update addressed the following issues:
- If neutron ports are created while neutron-openvswitch-agent is down, they enter status "DOWN, binding:vif_type=binding_failed", which is expected behavior. However, prior to this update, there was no way to recover those ports, even if neutron-openvswitch-agent was back online.
With this update, the function "_bind_port_if_needed" binds at least once when the port's binding status is already in "binding_failed". As a result, ports can now recover from a failed binding status by repeated binding attempts triggered when neutron-openvswitch-agent comes back online. (BZ#1240446)
- In IPv4, the broadcast address (the last address of the CIDR) cannot be used as an IP address and is rejected as invalid when setting a gateway. In IPv6 there is no broadcast address, yet the same logic was applied to gateway address validation. Consequently, the gateway address could not be set to the last address in IPv6 range. With this update, the broadcast address check is valid only for IPv4, and not for IPv6. As a result, the last address in an IPv6 range can be set as a gateway address. (BZ#1378888)
- The ip_gre kernel module introduced two new interfaces to every network namespace. With Red Hat Enterprise Linux 7.3, the ip_gre kernel module is a dependency of vport_gre module used by the Open vSwitch module.
Consequently, these two devices could not be removed from the namespace, as neutron-netns-cleanup removes the namespace only if it does not contain any network interfaces. With those devices present, all removal of namespaces was skipped.
With this update, the two new interfaces added by ip_gre will be ignored too (similar to how the loopback interface does not block removal).
As a result, the namespace is considered empty if it contains loopback and gre interfaces and will be cleaned up even if includes these interfaces. (BZ#1382723)
- Prior to this update, with wsgi_default_pool_size(=100) concurrent requests, the state change server would create a heavy CPU load on the l3 agent. With this update, a new option `ha_keepalived_state_change_server_threads` has been added to configure the number of concurrent threads spawned for keepalived server connection requests. Higher values increase the CPU load on the agent nodes. The default value is half of the number of CPUs present on the node. This allows operators to tune the number of threads to suit their environment. With more threads, simultaneous requests for multiple HA routers state change can be handled faster.
As a result, ha_keepalived_state_change_server_threads can be configured to avoid high load on l3 agents. (BZ#1315114)
- Previously, the DHCP agent only restarted its process when DHCP-enabled subnets were changed. Consequently, when a subnet with DHCP disabled was added or updated, it broke the association between the opts file tags and the process arg tags, which led to a state where dnsmasq sent its IP address as a default gateway.
With this update, the process is restarted when a subnet with DHCP disabled is added or removed. As a result, dnsmasq is now correctly spawned with a matching opts file and tag args. (BZ#1393175)
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat Enterprise Linux OpenStack Platform 7 runs on Red Hat Enterprise
Linux 7.3.
The Red Hat Enterprise Linux OpenStack Platform 7 Release Notes contain the
following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat Enterprise Linux OpenStack Platform 7,
including which channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en/red-hat-enterprise-linux-openstack-platform/7/paged/release-notes/
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack 7 x86_64
Fixes
- BZ - 1315114 - UnixDomainWSGIServer keepalived state change listener in L3 agent has an uncapped number of threads, overloading node
- BZ - 1378888 - IPv6 Neutron network cannot use the last IP in subnet
- BZ - 1382414 - agent traces about bridge-nf-call sysctl values missing in RHEL 7.3
- BZ - 1393175 - Do not assign network address to instance
CVEs
(none)
References
(none)
Red Hat OpenStack 7
SRPM | |
---|---|
openstack-neutron-2015.1.4-11.el7ost.src.rpm | SHA-256: e6f32840bd281e9d40c0e672e9d820c4004f4a1def731124e9a61569cabaafed |
x86_64 | |
openstack-neutron-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 95b6ebe21a4946da716a0d7e4ffeaa6143b9e14ee016168c8c52b2d393507bfe |
openstack-neutron-bigswitch-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 87867d89c19552df453171ce67a412adf5ed06b7e412de7ecf69e6dce22f180c |
openstack-neutron-brocade-2015.1.4-11.el7ost.noarch.rpm | SHA-256: fa8c5778e3c19188fcd90c0f2f54dbfdae3e3c5f11271c58e0b14a902e07a66f |
openstack-neutron-cisco-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 1393c16c3906a6f456c132452a42ef65be9cc5bbc623d4c6ea7fc8bcaffa1f47 |
openstack-neutron-common-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 41725b79200ac18a8778dc512745fed9dc620dcf1ceecc53bc490d758859a42f |
openstack-neutron-embrane-2015.1.4-11.el7ost.noarch.rpm | SHA-256: b949975adc5e195bfed9e79071c1e052e84408801ac0c7a61ccfe2d9fb33a51a |
openstack-neutron-ibm-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 7b945bc2e62ac0f172b487f149401d28f1795efb1b337a6242c894bc2fd643f8 |
openstack-neutron-linuxbridge-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 511f7477a0aaa00f3477ce452c5a5a4ce446b72200c846c113697a0cd3ca04c1 |
openstack-neutron-mellanox-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 5d94c2cf14971aa7cbbea8ceb0a1a7cd88e2e0e0bdd027d028d94fa10461e8c3 |
openstack-neutron-metaplugin-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 28c6f18d35f572a8d045293de353e6eb6f1058741c60a9b13ca1dfa372c65f64 |
openstack-neutron-metering-agent-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 96b935ffc3f2a2920ceac39db220ac6f74caff83a0d03882c271f899da5013c3 |
openstack-neutron-midonet-2015.1.4-11.el7ost.noarch.rpm | SHA-256: c67429b56a3cb10e35eae0a4d5905c24016f36e2aecaea789d3e6e83f4f32ee0 |
openstack-neutron-ml2-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 81dd2963b7dfc2bce2f9ff8de62ce7238a450d36ef2a9853144ef6cf91a9f295 |
openstack-neutron-nec-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 4a48b666c96c2d9959ef1172a4c1ef6efe76d8aa22ba06e4dc99be812a47cc78 |
openstack-neutron-nuage-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 4f233b3e3b10929ee265caa86bb0935dedf9eee929fe73e3b1d34a46fac43955 |
openstack-neutron-ofagent-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 37c9e6fa4cf264e29a47f3cc3ce041c5baccded9ce23b7b4df4a3754a087ba05 |
openstack-neutron-oneconvergence-nvsd-2015.1.4-11.el7ost.noarch.rpm | SHA-256: bf9144398fdd7e146b79127cbee0421fed7ec5d4ab9ae4b9de28d1a7f1035845 |
openstack-neutron-opencontrail-2015.1.4-11.el7ost.noarch.rpm | SHA-256: b586aa871f192d0b4a95a042649aabf79df20f8b94fbf672d16c0afb007e658e |
openstack-neutron-openvswitch-2015.1.4-11.el7ost.noarch.rpm | SHA-256: b1329be4ca8fce875f930c93a83f8999a4b7481fd831d403bf9daf232dcdcf29 |
openstack-neutron-ovsvapp-2015.1.4-11.el7ost.noarch.rpm | SHA-256: b17d265c9c3ec463b4c257f01f5b7f667a98694a7db28bb84439ba9b6617bf62 |
openstack-neutron-plumgrid-2015.1.4-11.el7ost.noarch.rpm | SHA-256: cc6232c96109ee51977df52773890cd365187e6ee9d5cc516031eb23a5f6b70a |
openstack-neutron-sriov-nic-agent-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 4c61df57c6e4888928b2bdc78e2e6bb5fb5a3e9ccaf631ab8c3def6197cdebf2 |
openstack-neutron-vmware-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 7441fc1f15bf394f96eb1fca98710da2b0a72cc5c3e0df0a3fe90708557dd1ee |
python-neutron-2015.1.4-11.el7ost.noarch.rpm | SHA-256: bc9a910e7c8eb0783296d6abbd577c631a941b9e69604ca1073e927a4bb76d5e |
python-neutron-tests-2015.1.4-11.el7ost.noarch.rpm | SHA-256: 9054bb2247bd58fa3f39a250874902d10433dcd9e0a025a41368263a892e3dd3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.