Red Hat Gluster Storage 3.1 Update 2, which fixes several bugs,and adds various enhancements, is now available for Red HatEnterprise Linux 7.
Red Hat Gluster Storage is a software only scale-out storage solution thatprovides flexible and affordable unstructured data storage.
It unifies datastorage and infrastructure, increases performance, and improvesavailability and manageability to meet enterprise-level storage challenges.This update also fixes numerous bugs and adds various enhancements.
Spaceprecludes documenting all of these changes in this advisory. Users aredirected to the Red Hat Gluster Storage 3.1 Technical Notes, linked to inthe References section, for information on the most significant of thesechanges.This advisory introduces the following new features and enhancements:* TieringRed Hat Gluster Storage now provides the ability to automatically classify andmigrate files based on how frequently those files are accessed.

This allowsfrequently accessed files to be migrated to higher performing disks (the hottier), and rarely accessed files to be stored on disks with lower performance(the cold tier).

This enables faster response times, reduced latency, greaterstorage efficiency, and reduced deployment and operating costs.

For moreinformation about tiering, see the Red Hat Gluster Storage 3.1 AdministrationGuide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/* Writable SnapshotsRed Hat Gluster Storage snapshots can now be cloned and made writable bycreating a new volume based on an existing snapshot.

Clones are space efficient,as the cloned volume and original snapshot share the same logical volume backend, only consuming additional space as the clone diverges from the snapshot.For more information, see the Red Hat Gluster Storage 3.1 Administration Guide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/.* RESTful Volume Management with Heketi [Technology Preview]Heketi provides a RESTful management interface for managing Red Hat GlusterStorage volume lifecycles.

This interface allows cloud services like OpenStackManila, Kubernetes, and OpenShift to dynamically provision Red Hat GlusterStorage volumes.

For details about this technology preview, see the Red HatGluster Storage 3.1 Administration Guide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/*Red Hat Gluster Storage for ContainersWith the Red Hat Gluster Storage 3.1 update 2 release a Red Hat Gluster Storageenvironment can be set up in a container.

Containers use shared operatingsystems and are much more efficient than hypervisors in system resource terms.Containers rest on top of a single Linux instance and allows applications to usethe same Linux kernel as the system that they’re running on.

This improves theoverall efficiency and reduces the space consumption considerably.

For moreinformation, see the Red Hat Gluster Storage 3.1 Administration Guide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/.* BitRot scrubber statusThe BitRot scrubber command (gluster volume bitrot VOLNAME scrub status) can nowdisplay scrub progress and list identified corrupted files, allowingadministrators to locate and repair corrupted files more easily.
See the Red HatGluster Storage 3.1 Administration Guide for details:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/.* Samba Asynchronous I/OWith this release, asynchronous I/O from Samba to Red Hat Gluster Storage issupported.

The aio read size option is now enabled and set to 4096 by default.This increases the throughput when the client is multithreaded or there aremultiple programs accessing the same share.
If you have Linux clients using SMB2.0 or higher, Red Hat recommends disabling asynchronous I/O (setting aio readsize to 0).All users of Red Hat Gluster Storage are advised to apply this update.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Gluster Storage Server 3.1 on RHEL-7

SRPMS:
gluster-nagios-common-0.2.3-1.el7rhgs.src.rpm
    MD5: 2af397711ae094a6a50ff61083c597fcSHA-256: e84dcfed532ecbd2adadfe24d03438981d8c094641437a934fd610cddd8e05f9
glusterfs-3.7.5-19.el7rhgs.src.rpm
    MD5: 5c8b1d819673aeb73d8d089047f11988SHA-256: 62f114e134d8d5bf6db2264bbfbcb3d7a0929f30d86d1e179a4b49e93bf0081a
heketi-1.0.2-1.el7rhgs.src.rpm
    MD5: 5a27592f83d6d90f58dd830c67e716d5SHA-256: da0029f6f59ec84b896c2dde111d2636233441df88fcca2bfb6eed2c3cb5452c
nagios-server-addons-0.2.3-1.el7rhgs.src.rpm
    MD5: fed2e385569e73d5200b488a9e4635a6SHA-256: c9908d0d14ab6a5598f338d7517a0b511b3e1323b5799b45a3d3a33283af7820
nfs-ganesha-2.2.0-12.el7rhgs.src.rpm
    MD5: 22be0e110cff4c49bf3ead45964afc18SHA-256: 9a23d3cb27e257e2160ae62be55e1f471aa6b069aee484ecdbb71a95c4d696ba
nrpe-2.15-4.2.el7rhgs.src.rpm
    MD5: 8ac2c39922ae49543c4cc99c841e40ccSHA-256: f801f1c1e7f6205fab415d6976e82354d55e7d785eb220b5233c60f25c04f52e
redhat-release-server-7.2-9.el7rhgs.src.rpm
    MD5: 62d93d1321764f0f41fdf7cf2ea57095SHA-256: dce9d0213df46d443c0ce1d09957b6fa98a944f9c7abff46ae648ff5be04996c
redhat-storage-server-3.1.2.0-1.el7rhgs.src.rpm
    MD5: 32cb32d7111c394cd07bcaa1dd910c3fSHA-256: 4b8b3315f4c7af7e2465c0d5d55bda6d3dcd0c6c50e5fc325d80e68340f25cce
vdsm-4.16.30-1.3.el7rhgs.src.rpm
    MD5: 5cdef303e81558031332d68176a77ff5SHA-256: d62d80aa90aae5c89af96d7a4007c07a51e458aca4b7bd99267bdbadd135da30
 
x86_64:
gluster-nagios-common-0.2.3-1.el7rhgs.noarch.rpm
    MD5: 9a1b539740f3e480302ef141fb72196bSHA-256: 701bcfe6bd063c27c1db9c76643ed30a6e8d9e9158bdda047df3bddb031d3c34
glusterfs-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 95adf60a94c65c37655f2d99063e40b2SHA-256: 2b79de58d220b220fb77d9ceaf2f95af815ec7beb8081d1f8a999246860800de
glusterfs-api-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: f00d902b6791225ed93e046065055376SHA-256: fa93429a39d43b843954f90fdf928ce3fc219b309e435a93cc8103e96b152e82
glusterfs-api-devel-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: a4143e3e787472d000a01b4ba443643cSHA-256: 1533801f31f586c26fe237b18bd52de48e178aa4cee729b1348870ead97c38f3
glusterfs-cli-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: bf203066fccef2cf7cf541fa0fc2ee4fSHA-256: 8e4b1c5af1526f9694fc7650ade665f15676788e2d92449f9d4be04e85bc9745
glusterfs-client-xlators-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 1c91ecfd359ae8dbfdc9779f260bf0f1SHA-256: 4e3c976f5d2a50aaeb0a5a88c7be70c33475f0621a096bf2fc2aaf390c9f1569
glusterfs-devel-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: d03a613fa4197e27f529dd853a00068bSHA-256: 7f1e3f36760804604eeb017df0d5f15200c92096cbc886b6f1c6303c9298ceb9
glusterfs-fuse-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 566d78403fcaebde13d1b56b7aaab0f5SHA-256: b6500ff40d06ae81b8f3876d8ef6f193acb7f5a8c30b22eb94d8f705d5e13ccd
glusterfs-ganesha-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 8193570b5ea69cfa2207407e5bdb4e4fSHA-256: ca18588236b66cf04d3f77119296e1a22ecadea58ad2808677782a544cdf0ab6
glusterfs-geo-replication-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: a28b9210d76916202451ee0da2499dc3SHA-256: a3c2b9e83e46352bdb9c14ca4360ff9172cc9b2f5d2a0aaa57183040628f344d
glusterfs-libs-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 11cdb7dd16d8c31d343133525e2a52ebSHA-256: 377d18698f3d81f11a25628bec41ddfeca531f5faf34c69f4aef473a8eaba85e
glusterfs-rdma-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 696429babd83256df5e015f8c95af544SHA-256: 7f302e6f4c3f9cb145f42817b75c46a9bc23742aae5902a38015b9f270d9649d
glusterfs-server-3.7.5-19.el7rhgs.x86_64.rpm
    MD5: 2fd36425ce59b87a871e3dfd65a29145SHA-256: 131c1801f08658e3aa6dc3024b3a161755a878ad942ca754439c8cda01be4a37
heketi-1.0.2-1.el7rhgs.x86_64.rpm
    MD5: 7e683b3ab47e1a4a4aa8eea09e681e5eSHA-256: 50feb507f111d1a226188511f6aac53eaed2fb8fc96c02737f149ae95d15675c
heketi-devel-1.0.2-1.el7rhgs.noarch.rpm
    MD5: b834d8a67d3663b3f596fc9437b1c9adSHA-256: 7314eceb61b9274826f6b8caaa2128a5d2dff2f1658084b6ea53e4c64e507018
heketi-unit-test-devel-1.0.2-1.el7rhgs.x86_64.rpm
    MD5: 85d9b725aa19f81243c95248cbf8266fSHA-256: e1645e14626ca46aaed373d4688f9ec81f906f9ed61da53b6f04d738808e5f97
nagios-plugins-nrpe-2.15-4.2.el7rhgs.x86_64.rpm
    MD5: b1e6cf8eed83c6503678f11382dff469SHA-256: fc479979498440d2acdadbe6a96398f610a9b44bc9ae456014af2a1aaea9004d
nagios-server-addons-0.2.3-1.el7rhgs.x86_64.rpm
    MD5: 8609ecb4a169bd1fbd15fa7661a21a23SHA-256: 0ccba191aece3206edcd7c065274d8ea2ebb4e2094915cf029fc3efc19643486
nfs-ganesha-2.2.0-12.el7rhgs.x86_64.rpm
    MD5: 1919a3ec1829a381d797f1a7239c8265SHA-256: 9438e4125792ed90fb7f8e45e28ac167c31d5d6176f63d43ab9124fd38ceb67b
nfs-ganesha-gluster-2.2.0-12.el7rhgs.x86_64.rpm
    MD5: dbf2ea5af028afe7efbaa7736d009b2dSHA-256: a0d5560e7eb2aa87c11e4df9e3171f12586b7aea2042175662e942a94ab7b8e5
nrpe-2.15-4.2.el7rhgs.x86_64.rpm
    MD5: 9f1adff7c0a03a28a3cff48fdc7fe22eSHA-256: b620a655cfa6a37b5f054773c9f06d194f7643cc59bc7c765cc31759674f821c
python-gluster-3.7.5-19.el7rhgs.noarch.rpm
    MD5: 3a5e461a0dc8ecabbcecb54f25e5400cSHA-256: 24062e98300db0bc2a1fa0dc8b735c3adc8c8ffba345c2465fc2362b4bb8d382
redhat-release-server-7.2-9.el7rhgs.x86_64.rpm
    MD5: 804c7be917be297de71fc6121236455aSHA-256: 23ce68572e2a9f361d8aba78cbd7f6d1f82391ed9c7407f6e7296f51a3178f37
redhat-storage-server-3.1.2.0-1.el7rhgs.noarch.rpm
    MD5: ba73f1f215a094cb0146dadec9f55c97SHA-256: 4063631a1956d1f1018b06e244d36afc47455e32b95fb5629770b2a7fedb541f
vdsm-4.16.30-1.3.el7rhgs.x86_64.rpm
    MD5: 2dd585da0780c7fd7a359a6b67b5da21SHA-256: 88119958112348ce6138d99eafb5540ceb93cd3806ff719d824c921cc50de3ff
vdsm-cli-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 8bed4769739b8569e2f93b8f46472da3SHA-256: 6b23362fccae8b9ae638d9659167dbdff1f9d45798dee1877fce09f6b0541e31
vdsm-debug-plugin-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: c44021833ef08dae39a9c514fe93cd13SHA-256: f4b58d483d85d929bcbd66a754f58058fe84b25fbe1a4d4d46eaabc06860a568
vdsm-gluster-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 209fc484eb34e33b164a4bd4986a28cdSHA-256: 9faa77e54e452b7a80fdd23b08c09ed74ec175fad3fae8412928d8c47c2dbec8
vdsm-hook-ethtool-options-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 336d00eb982a105ced2c6104e60ce3c3SHA-256: ecc3db31957466725a2598b38829b27fc86101a1297a7d3b73e0b7f84b7c76f5
vdsm-hook-faqemu-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: b41f038cfe91b9546f4f975f234f8551SHA-256: c910b46a071d3ac81b9900e69ad1e6883249e5aad1016c0417fe7c4a6b128a8d
vdsm-hook-openstacknet-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: f54375672928b0e4ce6a9aded7c6cc23SHA-256: ab5318888f94a19cb72a3b1811389cfeb68bae90ac620eaf0f142a42b18e815f
vdsm-hook-qemucmdline-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: aa8660d06be7ccb76fd2567f1f5c1ee9SHA-256: 086ea4551418651c2ee5fc82b781a60f3e9a11cd199269f1f5ea005f496e3597
vdsm-jsonrpc-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 3969871426a6e3c86860e73139fe34f9SHA-256: 9988fcd1278550f7ce333a09f8256557a553f9a08bee51e8b3bb2d9776388bc2
vdsm-python-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 617960341204628002e15dc96aa4dde7SHA-256: 742596521004d285f8c86a1b4c41aad7117057e27b9990fa76e2df5bc4626fba
vdsm-python-zombiereaper-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 4356a52dd698e2b137ee39ffea5ecdaeSHA-256: 0b5c1ff2a1cc5600c6f4ca5c8a47d66a5d315cc68eb6f56c64994bd8b0a9640f
vdsm-reg-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 029ee41d68160a3b5c0ccb60575325d0SHA-256: b538fdb7900b9227f167b7ce0473ea6682722eed6fad14857b66a9a55f4e282b
vdsm-tests-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 19580d462450e784a16633055731f848SHA-256: 09599a359a44f4bf14e18bed5eefd0c910559356f4d0cfb4e0e212829fce2cb0
vdsm-xmlrpc-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 5c5343bb15f2408f25e91e0a74772829SHA-256: c786cabec5d2dccd125e20bfa62cd210a7dadd472965fb3798fc8e305c5f8f66
vdsm-yajsonrpc-4.16.30-1.3.el7rhgs.noarch.rpm
    MD5: 34d5faa4315369b2acbae60497e79fb7SHA-256: b4ccb730ff937d0d82baa83b096adad1dd90f925848d4c0da257707e0c8d1fba
 
(The unlinked packages above are only available from the Red Hat Network)

1262627 – RHEL7/systemd : can’t have server in debug mode anymore1266824 – ntpd service does not start automatically on RHEL71292751 – (RHEL7) hook script for CTDB should not change Samba config1292762 – (RHEL7) S30Samba scripts do not work on systemd systems

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: