Skip to main content

We've Moved!

Product Documentation has moved to docs.hitachivantara.com
Hitachi Vantara Knowledge

Hitachi NAS Platform 14.2.7117.03 Release Notes

About this document

This document (RN-92HNAS052-00, February 2022) provides late-breaking information about NAS Platform 14.2. It includes information that was not available at the time the technical documentation for this product was published, as well as a list of known problems and solutions.

Intended audience

This document is intended for customers and Hitachi Vantara partners who license and use NAS Platform.

Accessing product documentation

Product user documentation is available on the Hitachi Vantara Support Website: https://knowledge.hitachivantara.com/Documents. Check this site for the most current documentation, including important updates that may have been made after the release of the product.

Accessing product downloads

Product software, drivers, and firmware downloads are available on the Hitachi Vantara Support Website: https://support.hitachivantara.com/.

Log in and select Product Downloads to access the most current downloads, including important updates that may have been made after the release of the product.

About this release

This release is a major release that adds features and resolves multiple known problems.

The specific build is server update (SU) 14.2.7117.03, and system management unit (SMU) 14.2.7117.03.

NAS operating system, which includes server update 14.2.7117.03 and SMU 14.2.7117.03, supports the following models:

·         Hitachi NAS Platform 5200, 5300

·         Hitachi NAS Platform 4040, 4060, 4080, 4100

This release introduces support for VSP E1090 and VSP E1090H as attached storage on the 5200/5300 platforms.

The topics in this document could also be relevant to VSP F/G Series (running SVOS 7.4.0), and VSP N Series (running SVOS 7.4.1), by taking note of the NAS module version.

 

Note: When upgrading to 14.2, it is advisable to refer to the corresponding release notes of each intervening version to be aware of any new features, special notes and considerations.

Document history

Revision

Description

92HNAS052-00

Initial release of SU version 14.2.7117.03

   
 

New features

This section describes the key features in version 14.2, and other recently released features. Please refer to the NAS user guides for details on using these features.

For features introduced after the initial 14.2 release, which may not be covered in the published guides, documentation amendments can be found on the Additional Notes page. This page is linked to from the main NAS Platform documentation page (https://knowledge.hitachivantara.com/Documents/Storage/NAS_Platform).

Support of HCP CloudScale

First available in 13.9.7021.04

HNAS has been compatibility tested with HCP-CS as a DM2C target; performance results will vary similarly as it does with HCP.

SMU support for CentOS Stream 8

First available in 13.9.6918.05

A virtual SMU can be deployed on a later version of the operating system, CentOS Stream 8. Use version 3.0 of the Hyper-V or VMware template in order to create a virtual SMU based on CentOS Stream 8.

A standard upgrade of an earlier virtual SMU to version 13.9.6918.05 or later will not upgrade the operating system version. If you want to upgrade an existing CentOS 6 SMU to run on CentOS Stream 8, while preserving the existing network address, it is necessary to deploy a new virtual SMU and migrate the settings from the existing SMU to the new one by performing a backup and restore.

More details can be found in the Virtual SMU Administration Guide MK-92HNAS074.

 

Note: Both CentOS 6.2 and CentOS Stream 8 are supported in this version.

 

Note: CentOS Stream 8 is not currently supported when using HDRS.

Automatic barring of SMB clients repeatedly using incorrect passwords

First available in 13.9.6918.02

Provides a facility that maintains a list (per security context) of client IP addresses that are barred from SMB/SMB2.x/SMB3 access to the server.  Clients that cause SMB NTLM authentication failures by providing an incorrect password are automatically added to the list if the rate of failure is sufficient. Automatic barring of clients is enabled by default, and a (paced) event is generated when a client is barred.

 

No initial configuration of the feature is required, however the barred clients list can be managed if necessary using the following Bali commands:

smb-barred-client-add

smb-barred-client-remove

smb-barred-clients-list

smb-barred-clients-clear

Clients are barred based on their IP address so each IPv4 and IPv6 (if configured) address will need to be considered a separate entry. Once a client is barred, it is not possible for that client to connect over SMB regardless of the credentials being used – manual removal from the ‘barred’ list would be required. Up to 512 client IP addresses per security context can be barred.

Native REST API

First available in 13.9.6815.02

A new native REST API mode has been introduced, and will be used for future API improvements and features, replacing the previous legacy REST API versions.

The maximum supported API version remains at version 7, and the new native API implements all the existing version 7 API calls. The native API introduces read-only access via API key and USER level management users, and some small detail changes, including bug fixes. The new rest-server-mode command allows switching between the legacy API and new native API.

More details can be found in the API document MK-92HNAS088-04.

Micro-pruning

First available in 13.9.6815.02

Micro-pruning is supported over SMB.

No additional configuration is required to use this feature. The feature allows existing files to be made sparse, i.e. to delete data and free space within them.

Operations to mark a file as sparse (FSCTL_SET_SPARSE), to prune a file (FSCTL_SET_ZERO_DATA) and to query allocated ranges of a file (FSCTL_QUERY_ALLOCATED_RANGES) are supported over SMB version 2 and above.

 

Hitachi NAS add-ons

There are several add-ins available for use with Hitachi NAS, as noted here.

The downloads can all be found by following section "Accessing product downloads" and navigating to "Hardware Download", "NAS Platform", and then selecting "Add-ons".

The documentation can be found on the "Solutions and Best Practices" page, which is linked from the main NAS Platform documentation page (https://knowledge.hitachivantara.com/Documents/Storage/NAS_Platform).

HNAS CSI Driver for Kubernetes

Version 1.1.1 (September 2021) - works with NAS 13.3 or later

The Hitachi NAS Container Storage Interface (CSI) Driver is a software component that contains libraries, settings, and commands that you can use to create persistent storage for your containers. It enables the stateful applications to persist and maintain data after the life cycle of the container has ended. The Hitachi NAS CSI Driver provides persistent volumes on Hitachi NAS server platforms (Hitachi NAS platform and NAS module) and is able to clone those volumes and take snapshots of them.

As the driver relies on the ability for containers/pods to access HNAS NFS exports, it can only be used on Linux based systems.  This driver requires Kubernetes 1.20 or higher.

Version 1.00 (August 2020) still works, and can work with older Kubernetes versions, but contains less functionality.

Hitachi NAS Modules for Red Hat® Ansible®

Version 1.1.0 (September 2021) - works with NAS 13.5 or later

Hitachi NAS Modules for Red Hat® Ansible® allow IT and data center administrators to automate and manage some of the configuration of Hitachi NAS systems.  An administrator can create playbooks together with logic and other Ansible modules to automate complex tasks.  Administrators can filter, sort and group the information by piping the output from one module to another.  Tasks are executed by running simple playbooks written in yaml syntax.

These modules require Ansible 2.9 or higher.

HNAS docker volume plugin

Version 1.00 (December 2019) - works with NAS 13.2 or later

The NAS server platform (Hitachi NAS platform and NAS module) can be used to provide remote storage for container images running within Docker.

As the plugin relies on the ability for containers to mount HNAS NFS exports, it can only be used on Linux based systems.

The plugin is supported on Docker version 18 and newer, and currently only on stand-alone systems, rather than clusters/docker swarm.

ELK integration for HNAS

Version 1.00 (September 2019)

The NAS server platform (Hitachi NAS platform and NAS module) can be integrated with Elasticsearch. Alert and audit logs can be collected, and then analyzed using Kibana, which helps to visualize data.

Elasticsearch is commonly referred to as the ELK stack or Elastic stack, which refers to Elasticsearch and associated components, which lets you reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.

Splunk add-on for HNAS

Version 1.00 (November 2018)

The NAS server platform (Hitachi NAS platform and NAS module) can be integrated with Splunk®. Splunk can be configured to collect alert log and audit log events, in addition to the ability to gather statistics about the NAS server system performance.

 

Special notes on current NAS releases

Configuring external migration targets

Not specific to this release, but reiterating the need for adequate backup planning.

 

Caution: Care should be taken when configuring systems with a single migration destination for both replication source and target (known as a triangular arrangement). Such arrangements should not be considered a valid solution in any disaster recovery (DR) or backup scenario, as there is only a single copy of the user data pointed to by XVLs at each end of the replication policy.

Deduplication support for Object Replication Targets

Deduplication is supported on Object Replication target file systems, from release 13.6.

 

Note: If, before 13.6.6016.05, a filesystem was created to support dedupe and it was later used as a replication target, there will be implications when upgrading to 13.6.6016.05 or later. In this case, deduplication of the replication target will start automatically without any additional action on the user's part.

In order to avoid this happening, deduplication should be disabled, per filesystem, before upgrading.

NFS over UDP

If NFS over UDP is enabled, frequent warning messages are displayed on the console and in the dblog. As a workaround, disable UDP. Note that the messages will persist until the clients are remounted.

 

Note: Using NFS over UDP has inherent risks and is, therefore, not recommended.

Group Augmentation changes

A change in 13.5.5527.02 changed the format of the output that create-group-table-from-active-directory.rb presented to any customized massage-commands-for-managed-servers script.

If a customized massage-commands-for-managed-servers script is used to check the output against a whitelist, then it's likely that groups will be incorrectly excluded, and their old definitions will continue to be used by HNAS indefinitely. In this instance it is best to transform the whitelist to suit the output after the upgrade.

HDRS versions

A change in 13.8 necessitates that any instances of HDRS in use should be upgraded to at least v4.1.

Please do not upgrade the SMU software to 13.9.6628 or later on the VSP F/G/Nx00 platforms, or install a net new GEfN solution, until HDRS v4.2 or later is installed.

HDRS v5.1 supports a 4 node GEfN cluster on HNAS 5200/5300 in version 13.9.6918.09 or later, although it is preferred that 13.9.7021.01 or later is used. Do not attempt to install HDRS v5.1 on VSP-F/G/Nx00 GEfN deployments.

HNAS 5200/5300 clustering

There was a restriction for HNAS 5200/5300 in version 13.9.6420, to limit the cluster size to 2 nodes.

Version 13.9.6628.07 introduces support for 4 node clusters on HNAS 5200/5300.

 

Note: Please note that the use of clustering in a production environment is required for data availability.

Script output on HNAS 5200/5300

Due to a change in operating system behaviour, on Debian 10 (Buster) based systems such as HNAS 5200/5300, some scripts' output on invocation might not be displayed on the current console. The output can still be found by reviewing the syslog or using the journalctl command.

DSA host keys for SSH access

Since 13.9.6918.02 the HNAS 3000 and 4000 series and the VSP-F/G platforms no longer allow the ssh-dss host key algorithm (i.e., use of the DSA host key).

 

Notes on installing, upgrading, and downgrading

Notes on this release include:

·         NAS platform models 4040 / 4060 have cluster support for up to two nodes.

·         NAS platform model 4080 has cluster support for up to four nodes.

·         NAS platform model 4100 has cluster support for up to eight nodes.

·         NAS platform models 5200 / 5300 have cluster support for up to four nodes.

·         The NAS Manager for the SMU uses cookies and sessions to remember user selections on various pages. Therefore, you should open only one web browser window, or tab, to the SMU from any given workstation.

 

Note: When upgrading, remember to remove any avoidances already implemented for any of the defects that have been fixed in intermediate releases.

Performing a rolling upgrade from older versions of HNAS

If you are upgrading from earlier versions of HNAS, note that there are critical steps which must be followed in a precise sequence to correctly upgrade to version 14.2. Refer to the corresponding release notes of each earlier version for details on rolling upgrades. Additionally, consult with your Hitachi Vantara representative for assistance in upgrading from earlier versions of HNAS.

 

Note: For Rolling Upgrades, the latest version of any major code release will be able to roll to any version in the following major code release.  As an example, a Rolling Upgrade can be performed from the latest 13.x code release to any version in the 14.x major code release without any intermediate code steps.

 

Caution: If upgrading from versions earlier than version 13.3, an additional step to version 13.6.6016.05 must be performed first, before upgrading to version 13.7.6233.01 or later. This is no longer necessary when upgrading to version 13.9.6815.02 or later.

Please refer to FE-92HNAS050 if you are planning a hardware rolling upgrade from HNAS 30x0 / 4xx0 to HNAS 5200 / 5300.

 

Note: If you are using Hitachi Operations Center, the HNAS 5000 series cannot be on-boarded into Analyzer. This is not an HNAS product issue - HOC Analyzer will fully support the HNAS 5000 series in a future release. In the interim, please contact product support for any potential work around until HNAS 5000 series is fully supported in HOC Analyzer.

 

 

File-based replication between different HNAS software levels

The ability to replicate between systems is determined by the version of the software that is running on those systems. The model number of the server is not a factor for interoperability for replication purposes. If both the destination and target servers are running the same major software version (for example, 12.x), replication as ‘managed servers’ is fully supported. If the destination and target servers are running different major software versions (for example, 12.x to 13.x), one of the servers is configured as an ‘unmanaged’ server. Replication continues to be fully supported within the constraints of replication between managed and unmanaged servers.

Object-based replication between different HNAS software levels

Object replication was first introduced in HNAS software v8.0 and has been enhanced with each release. For example, version 10.1 was enhanced so that objects maintained their sparseness during incremental replication. Version 11.1 has the ability to preserve file clone states during replication. To ensure interoperability, feature flags are negotiated when object replication occurs between servers running at different version levels.

Object replication between servers is supported up to one major version away. For example, object replication between version 12.x and 13.x is supported.

 

Note: Object replication between servers that are more than one major release apart may work (for example, between version 11.x and v13.x) – but this is not supported.

 

Note: When set to transfer XVLs as links, both source and target systems involved in the replication relationship must be running HNAS release v13.4 or later.

 

Important considerations to read before installation

Please read the following sections before installing and using 14.2.

Special consideration should be taken when upgrading to the stated versions (or later) from an earlier version, or when planning a downgrade from the stated versions (or later) to an earlier version.

Changes in 13.0

·         Support for WFS-1 is now completely removed. Before upgrading the customer MUST migrate any WFS-1 filesystems to new WFS-2 filesystems, as WFS-1 filesystems cannot be mounted.

·         NAS Storage Pools (spans) are now limited to 32 filesystems.

·         12.7.4221.07 is the lowest version of code that the system can safely downgrade to.

Changes in 13.2

·         Support added for increasing the number of filesystems in a cluster. This must be considered when planning a downgrade to an earlier version, if more than the previous default of 128 filesystems exist.

·         Support for REST API v4 added, while still supporting v3.

·         13.2.4527.04 introduced a new command, krb5-nfs-principal-format. If the setting is changed to (the non-default value of) "only-primary", for any EVS, this must be considered when planning a downgrade to an earlier version.

Changes in 13.5

·         Support for REST API v7 added, while still supporting v4, and deprecating v3.

The number of filesystems per span limit

By default, the number of filesystems that can be created in any span is limited to 32.

If an existing span has more than 32 filesystems, the span and filesystems are fully supported after upgrading to 13.0 or later. However, it is not possible to create any additional filesystems on the span, until enough filesystems have been deleted to bring the total number below 32.

It is possible to increase this default value using the filesystem-create CLI command with the --exceed-safe-count option. This option must not be used when creating up to 32 filesystems. It must only be used when creating filesystems beyond the 32nd one.

 

Note: This option is only available on the CLI. The NAS Manager does not permit you to create more than 32 filesystems.

For further information, see the File Services Administration Guide.

NFSv3 access during upgrade to 13.2 or later

When a cluster namespace (CNS) is in use on an NFSv3 filesystem, a rolling upgrade to version 13.2 can cause longer transient delays for NFSv3 accesses than normal. Customers using ordinary filesystem exports or other protocols (including NFSv4) do not experience these additional delays.

 

Note: This issue only affects the upgrade from a pre-13.2 release to a 13.2-or-later release. Future upgrades will not experience any additional transient delays from this issue.

The technical issue

Normally, during a rolling upgrade, access to filesystems through NFSv3 and CNS is available while EVSs are migrated between cluster nodes so that each node can be upgraded in turn. Clients can connect to an EVS on a node running older software and access filesystems belonging to an EVS on a node running newer software (or the other way around) because the NAS server uses a stable message format when forwarding the requests.

Software version 13.2 supports an increased number of filesystems and in order to provide this feature, modifies the message formats used to support CNS in a way that is incompatible with earlier releases.

During this rolling upgrade, clients cannot access filesystems that are hosted on a node running a different version of software to the currently connected node. As soon as the EVSs are migrated onto nodes running the same version of software, the clients can regain access to those filesystems.

Workaround

For 2-node clusters (including NAS Modules), follow the usual upgrade procedure. After the first node has been upgraded, and while EVSs are being migrated between the nodes, there is a longer interruption to client access than usual. The interruption ends as soon as all EVSs are migrated to the upgraded node. When the second node has been upgraded, the only disruption is from normal EVS migrations.

For clusters with three or more nodes, there could be a longer period when EVSs are hosted on nodes running different software versions. For these cases, use manual migrations to move all EVSs to nodes running the same software version. This minimizes the period during which the clients cannot access all filesystems.

For details of the manual migration process, or for upgrade procedures, please contact Customer Support.

 

SMU, server, and cluster compatibility

These release notes highlight SMU release version 14.2.7117.03.

The version of SMU should always be equal to, or newer than, the version of the server / cluster being managed. In the rare situation where such an SMU build is not released, the closest available one should be used.

Since SMU 13.9.6918.05, the following hypervisor images are supported for a virtual SMU

·         Hyper-V : Virtual SMU OS 2.2 or 3.0

·         VMware : Virtual SMU OS OVA 2.1, 2.2 or 3.0

·         Use the 3.0 version to deploy a virtual SMU on CentOS Stream 8 instead of on CentOS 6.

 

Note: In addition to VMware player, the virtual SMU (vSMU) is also compatible with the free version of ESXi.

From SMU 12.7, a virtual SMU can support up to 10 servers / clusters. To manage more than 2 entities from a virtual SMU, the VM’s resources must be increased. One (1) GB memory and one virtual CPU is required per entity. An entity is defined as a single node or a cluster of nodes.

Licensing

New license keys are typically firmware-version specific. Upon upgrading firmware to this release, all previous licenses present on the system will remain in force.

Licensing as it pertains to node replacements

Clustered Node Replacement: Once the NAS cluster has been built, the Cluster MAC-ID will not change regardless which node in the cluster needs to be replaced, so there will not be any reason to request new license keys when replacing a node in a cluster.

Single Node Replacement: In a situation where a single node must be replaced, the original license keys will not be valid on the new node.  Please contact TBkeys to transfer the license keys to the replacement node and issue a new permanent license. You will need to supply TBKeys with the MAC-ID of the Original Node and the MAC-ID of the Replacement node.

To request upgrade keys

When ordering license keys for new, licensed features, note that:

·         New features with a sale price will be purchased by the customer per normal Hitachi Vantara channel policies and procedures.

·         Non-sale feature requests will be routed based on server branding until such time as the relicensing process has been fully integrated.

·         Hitachi Vantara Server Request Routing

o   The emailed request shall include the following information:

-        Customer Name

-        MAC-ID of the HNAS Unit (the MAC-ID format is XX-XX-XX-XX-XX-XX), the serial # is not needed or acceptable to issue new keys.

-        If you have not followed normal upgrade procedures, please indicate details of your current situation and indicate if a new full set of keys are required. Also, if your server is part of a cluster, please indicate if the MAC-ID is a "Primary" server of the cluster and how many units are in the cluster.

o   All permanent upgrade key requests will be handled by way of email sent to TBKeys@hitachivantara.com. Turnaround time on all requests is targeted within 24 hours. Standard working hours for this distribution list (dlist) are 8am to 5pm Pacific Standard Time. See below for emergency situations.

o   Should your need for upgrade keys be an emergency, please contact the Hitachi Vantara Support Centers, where Temporary Keys for these features can be provided.

o   An email to TBKeys@hitachivantara.com should also be sent to receive your permanent keys.

Fixes and enhancements in version 14.2

 

Note: When upgrading, remember to remove any avoidances already implemented for any of the defects that have been fixed in intermediate releases.

Version 14.2.7117.03

Issue ID

Severity

Description

D129865

C

Fixed a stability issue that could occur under very rare circumstances when deleting an undiverged file clone

D138604

C

An instability introduced when unused RPCGSSContextCache entries are evicted has been corrected.

D142032

C

Prevent false negative tape allocation errors in clusters by using drive serial number instead of WWNN:LUN as a unique id for the drive.

D142441

C

An unlikely stability issue with the SNMP configuration commands has been corrected.

D149708

C

The fixfs utility's treatment of recently deleted files when repopulating the indirection object from the freespace bitmap has been corrected.

D149760

C

Native REST API version 7 increased from 7.2.0 to 7.2.1. This introduces a few minor changes to the API

D149856

C

Addressed a Fibre Channel link instability problem with newer storage directly connected to HNAS 4000 series servers.

D128072

D

Larger models now set the enable-inverted-local-group-cache optimization by default, trading memory space for time during group membership reassessment operations.

D143017

D

The SMU has been updated to guard against potential Cross-site Request Forgery (CSRF) attacks.

D145362

D

Added support for Hitachi VSP E1090 and VSP E1090H storage arrays on HNAS 5000 series and above.

D148396

D

The HNAS SSH server now makes ECDSA and Ed25519 host keys available to SSH clients.

D148452

D

The "WFS_LOG received (from processor, for remote node)" statistic (in a PIR and on the CLI) is now fixed - previously it was a very large (negative) number

D148750

D

Apache Tomcat vulnerabilities to CVE-2021-42340 have been addressed for the SMU, external and embedded.

D148911

D

Improvement to REST API by adding space consumed on each tier of a multi-tiered filesystem

D148920

D

Improvement to REST API to provide a way to specify multiple stats queries in a single request

D149198

D

The scsi-racks command now behaves correctly when supplied with the --tapes option.

D149216

D

Fixes for the following vulnerabilities have been applied to the SMU running on CentOS Stream 8:

httpd:2.4 (CESA-2021:1809) - CVE-2018-17199, CVE-2020-11984, CVE-2020-11993

kernel (CESA-2021:1578, CESA-2021:3548, CESA-2021:3057) - CVE-2019-18811, CVE-2019-19523, CVE-2019-19528, CVE-2020-0431, CVE-2020-11608, CVE-2020-12114, CVE-2020-12362, CVE-2020-12464, CVE-2020-14314, CVE-2020-14356, CVE-2020-15437, CVE-2020-24394, CVE-2020-25212, CVE-2020-25284, CVE-2020-25285, CVE-2020-25643, CVE-2020-25704, CVE-2020-27786, CVE-2020-27835, CVE-2020-28974, CVE-2020-35508, CVE-2020-36322, CVE-2021-0342, CVE-2021-3653, CVE-2021-22543, CVE-2021-22555, CVE-2021-3609

rpm (CESA-2021:2574) - CVE-2021-20271

curl (CESA-2021:3582) - CVE-2021-22922, CVE-2021-22923, CVE-2021-22924

D149217

D

Java on the SMU, external and embedded, has been updated to 8u312 to cover:

CVE-2021-3522, CVE-2021-3517, CVE-2021-35550, CVE-2021-35556, CVE-2021-35559, CVE-2021-35560, CVE-2021-35561, CVE-2021-35564, CVE-2021-35565, CVE-2021-35567, CVE-2021-35578, CVE-2021-35586, CVE-2021-35588, CVE-2021-35603

D149230

D

Fixed SMU so that "TCP/IP Statistics (per port) - Physical Ports" and "Ethernet Statistics (per port) - Physical Ports" can be viewed.

D149328

D

Improvement to REST API to provide a way to page large responses

D149564

D

Security patches have been applied for the HNAS 5000 series to cover:

bind9 (CVE-2021-25219)

D149596

D

The SMU is now notified of the full range of an NVDIMM's module heath issues, for an HNAS 5000 series server.

D149645

D

Fix the possibility of seeing the spurious "Warning: The MMB memory size (xxxxxx MB) is invalid" on some VSP-F/G and VSP-N platforms

D149764

D

TLSv1.3 can now be used to secure the SOAP management API connection between SMU and HNAS.

D149802

D

The following vulnerabilities have been patched on the CentOS Stream 8 SMU:

kernel CESA-2021:4356 - CVE-2019-14615, CVE-2020-0427, CVE-2020-24502, CVE-2020-24503, CVE-2020-24504, CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26139, CVE-2020-26140, CVE-2020-26141, CVE-2020-26143, CVE-2020-26144, CVE-2020-26145, CVE-2020-26146, CVE-2020-26147, CVE-2020-27777, CVE-2020-29368, CVE-2020-29660, CVE-2020-36158, CVE-2020-36312, CVE-2020-36386, CVE-2021-0129, CVE-2021-20194, CVE-2021-20239, CVE-2021-23133, CVE-2021-28950, CVE-2021-28971, CVE-2021-29155, CVE-2021-29646, CVE-2021-29650, CVE-2021-31440, CVE-2021-31829, CVE-2021-31916, CVE-2021-33033, CVE-2021-33200, CVE-2021-3348, CVE-2021-3489, CVE-2021-3564, CVE-2021-3573, CVE-2021-3600, CVE-2021-3635, CVE-2021-3659, CVE-2021-3679, CVE-2021-3732

file CESA-2021:4374 - CVE-2019-18218

glibc CESA-2021:4358 - CVE-2021-27645, CVE-2021-33574, CVE-2021-35942

gnutls and nettle CESA-2021:4451 - CVE-2021-20231, CVE-2021-20232, CVE-2021-3580

kexec-tools CESA-2021:4404 - CVE-2021-20269

libX11 CESA-2021:4326 - CVE-2021-31535

python27:2.7 CESA-2021:4151 - CVE-2020-27619, CVE-2020-28493, CVE-2021-20095, CVE-2021-20270, CVE-2021-23336, CVE-2021-27291, CVE-2021-28957, CVE-2021-42771

json-c CESA-2021:4382 - CVE-2020-12762

sqlite CESA-2021:4396 - CVE-2019-13750, CVE-2019-13751, CVE-2019-19603, CVE-2019-5827, CVE-2020-13435

vim CESA-2021:4517 - CVE-2021-3778, CVE-2021-3796

ncurses CESA-2021:4426 - CVE-2019-17594, CVE-2019-17595

curl CESA-2021:4511 - CVE-2021-22876, CVE-2021-22898, CVE-2021-22925

glib2 CESA-2021:4385 - CVE-2021-28153, CVE-2021-3800

libgcrypt CESA-2021:4409 - CVE-2021-33560

lua CESA-2021:4510 - CVE-2020-24370

pcre CESA-2021:4373 - CVE-2019-20838, CVE-2020-14155

cips CESA-2021:4393 - CVE-2020-10001

gcc CESA-2021:4386 - CVE-2018-20673

openssh CESA-2021:4368 - CVE-2020-14145

rpm CESA-2021:4489 - CVE-2021-20266

python -pip CESA-2021:4455 - CVE-2021-3572

NetworkManager CESA-2021:4361 - CVE-2020-13529

python3 CESA-2021:4399 - CVE-2021-3426

libsepol CESA-2021:4513 - CVE-2021-36085, CVE-2021-36086, CVE-2021-36087

D76481

E

A harmless, but concerning, warning "Unable to locate tools.jar" is no longer produced.

D147469

E

Ensured that Linux user group memberships and login shells are consistent following a reinstallation.

D149054

E

SMU "Server Status" page now includes the status of the NVDIMM device.

D149107

E

Security patches have been applied for the HNAS 5000 series to cover:

icu (CVE-2020-21913)

nss (CVE-2021-43527)

openssl (CVE-2021-3711, CVE-2021-3712)

tiff (CVE-2020-19143

D149147

E

Following the pattern of sudoers.d/ and cron.d/ properties can now be added to the SMU by creating a file in /var/opt/smu/conf/mgr/axalon.properties.d/.

This allows users to specify properties without risking affecting the other properties which already exist.

And properties can be added/removed in an idempotent way.

D149213

E

Upgraded SMU 3rd party libraries to avoid known vulnerabilities.

D149371

E

Fixes a very minor inefficiency in DCERPC handling.

D149608

E

The oldest version of HNAS server the SMU will communicate with has been altered to v12.6.

Any HNAS server older than that can only be upgraded via the SMU, and will need to be upgraded before being added as a managed server.

D149666

E

Include throughput statistics for network interfaces tg5 and tg6 in PIR on HM800 and HNAS 5x00.

D149976

E

Resetting server to factory defaults (USB reinstall) should preserve existing SSH keys and generate additional keys if required.

New, modified, and deleted CLI commands

See the NAS man pages for details on the new commands.

New commands

None

Modified commands

None

Deleted commands

None

 

Copyrights and licenses

© 2022 Hitachi Vantara LLC. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara LLC (collectively "Hitachi"). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video and documents.

Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication.

Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara LLC at https://support.hitachivantara.com/e...ontact-us.html.

Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara LLC.

By using this software, you agree that you are responsible for:

1)    Acquiring the relevant consents as may be required under local privacy laws or otherwise from authorized employees and other individuals; and

2)    Verifying that your data continues to be held, retrieved, deleted, or otherwise processed in accordance with relevant laws.

Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries. Reader agrees to comply strictly with all such regulations and acknowledges that Reader has the responsibility to obtain licenses to export, re-export, or import the Document and any Compliant Products.

Hitachi and Lumada are trademarks or registered trademarks of Hitachi, Ltd., in the United States and other countries.

AIX, AS/400e, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, eServer, FICON, FlashCopy, GDPS, HyperSwap, IBM, Lotus, MVS, OS/390, PowerHA, PowerPC, RS/6000, S/390, System z9, System z10, Tivoli, z/OS, z9, z10, z13, z14, z/VM, and z/VSE are registered trademarks or trademarks of International Business Machines Corporation.

Active Directory, ActiveX, Bing, Edge, Excel, Hyper-V, Internet Explorer, the Internet Explorer logo, Microsoft, the Microsoft corporate logo, the Microsoft Edge logo, MS-DOS, Outlook, PowerPoint, SharePoint, Silverlight, SmartScreen, SQL Server, Visual Basic, Visual C++, Visual Studio, Windows, the Windows logo, Windows Azure, Windows PowerShell, Windows Server, the Windows start button, and Windows Vista are registered trademarks or trademarks of Microsoft Corporation. Microsoft product screen shots are reprinted with permission from Microsoft Corporation.

All other trademarks, service marks, and company names in this document or website are properties of their respective owners.

Copyright and license information for third-party and open source software used in Hitachi Vantara products can be found at https://www.hitachivantara.com/en-us...any/legal.html.

 

  • Was this article helpful?