Bug 1371911
Summary: | Cinder create volume from snapshot chmod permission error | ||
---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Ondrej <ochalups> |
Component: | openstack-tripleo-heat-templates | Assignee: | Alan Bishop <abishop> |
Status: | CLOSED ERRATA | QA Contact: | Amit Ugol <augol> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.0 (Kilo) | CC: | abishop, ccollett, dbecker, egafford, eharney, geguileo, jjoyce, lbopf, mburns, molasaga, morazi, ochalups, pgrist, rcernin, rhel-osp-director-maint, srevivo, tshefi, vaggarwa, yrabl |
Target Milestone: | z3 | Keywords: | TestOnly, Triaged, ZStream |
Target Release: | 11.0 (Ocata) | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | openstack-tripleo-heat-templates-6.1.0-1.el7ost, puppet-tripleo-6.5.0-1.el7ost, puppet-cinder-10.3.1-1.el7ost | Doc Type: | Bug Fix |
Doc Text: |
Previously, some cinder volume operations would fail when using the NFS backend. This was because cinder's NFS backend driver implements enhanced NAS security features that are enabled by default. These features require non-standard configuration changes in nova's libvirt, and without these changes, some cinder volume operations would fail.
This update introduces TripleO settings to control the NFS driver's NAS secure features, and disables the features by default. As a result, cinder volume operations no longer fail when using the NFS backend.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-10-31 17:37:35 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Ondrej
2016-08-31 12:20:01 UTC
Fix has been merged into stable/ocata. Whoops, sorry, wrong bug. The most straightforward way of resolving this for OSP-11 is to enhance the OSP deployment documentation. Section 3 of the NetApp Block Storage Back End Guide [1] describes how to deploy a NetApp back end using a user-customized copy of the cinder-netapp-config.yaml environment file. The guide can be enhanced to direct the user to add the following additional lines to the file: ControllerExtraConfig: cinder::config::cinder_config: tripleo_netapp/nas_secure_file_operations: value: false The lines should be appended at the bottom, under the existing parameter_defaults stanza. Leading whitespace is critical. This will trigger the director to add a "nas_secure_file_operations=False" setting under in the appropriate section of the /etc/cinder/cinder.conf file on each controller. Note: The "tripleo_netapp" substring needs to match the CinderNetappBackendName specified by the user ("tripleo_netapp" is the default name). See the first entry in Table 1. of the guide [1]. [1] https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/10/html/netapp_block_storage_back_end_guide/ Assigning back to myself ON_DEV. The Director's heat templates are being updated to support the controlling the NAS secure settings without resorting to the workaround described in comment #16. This is targeted for an early OSP-11z release, and so there's no need to document the workaround. To be clear, the resolution will be an updated heat template that supports disabling the NAS secure feature. Customers that require the NAS secure feature be enabled should track bug #1393924, but that work won't be ready any time soon. Hi Alan, This bug is still against the 'documentation' component. Can we move it back to 'rhosp-director' (or something else) now that there's no docs requirement? Thanks, Lucy, I meant to do that. According to our records, this should be resolved by openstack-tripleo-heat-templates-6.1.0-2.el7ost. This build is available now. According to our records, this should be resolved by puppet-tripleo-6.5.0-5.el7ost. This build is available now. According to our records, this should be resolved by puppet-cinder-10.3.1-1.el7ost. This build is available now. I don't have access to a netapp system to actually test this. Gave fake details, cinder conf netapp section [tripleo_netapp] volume_backend_name=tripleo_netapp volume_driver=cinder.volume.drivers.netapp.common.NetAppDriver netapp_login=admin netapp_password=admin netapp_server_hostname=10.35.160.11 netapp_server_port=80 netapp_size_multiplier=1.2 netapp_storage_family=ontap_cluster netapp_storage_protocol=nfs netapp_transport_type=http netapp_vfiler= netapp_vserver= netapp_partner_backend_name= expiry_thres_minutes=720 thres_avl_size_perc_start=20 thres_avl_size_perc_stop=60 nfs_shares_config=/etc/cinder/shares.conf netapp_copyoffload_tool_path= netapp_controller_ips= netapp_sa_password= netapp_pool_name_search_pattern=() netapp_webservice_path=/devmgr/v2 nas_secure_file_operations=False -> these two were added. nas_secure_file_permissions=False Let me know if sufficient to verify, if not all I can do it OtherQA it and ignore. Verified based on #23, Noticed two below were added as default values, when I used Cinder netapp yaml template. nas_secure_file_operations=False nas_secure_file_permissions=False As I don't have access to netapp, can't reproduce actual steps. This is best I can do to verify. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:3098 |