Bug 1557551
Summary: | quota crawler fails w/ TLS enabled | |||
---|---|---|---|---|
Product: | [Red Hat Storage] Red Hat Gluster Storage | Reporter: | John Strunk <jstrunk> | |
Component: | quota | Assignee: | Sanoj Unnikrishnan <sunnikri> | |
Status: | CLOSED ERRATA | QA Contact: | Vinayak Papnoi <vpapnoi> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | unspecified | |||
Version: | rhgs-3.3 | CC: | rhs-bugs, sheggodu, srmukher, storage-qa-internal, sunnikri, vpapnoi | |
Target Milestone: | --- | |||
Target Release: | RHGS 3.4.0 | |||
Hardware: | Unspecified | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | glusterfs-3.12.2-9 | Doc Type: | Bug Fix | |
Doc Text: |
Previously, while quota was enabled on a volume, the quota used values were not updated to the list command until a lookup was done from the client mount point. Due to this, there was inaccuracy while reporting the file size even after performing the crawl operation. With this fix, it is ensured that the crawl operation looks up all files and reports the accurate quota used.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1575858 (view as bug list) | Environment: | ||
Last Closed: | 2018-09-04 06:44:14 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 1575858 | |||
Bug Blocks: | 1503137 |
Description
John Strunk
2018-03-16 20:55:08 UTC
Quota uses a per brick volfile to do per brick crawl (earlier this used to be a volume level volfile.), The function used for this is glusterd_generate_client_per_brick_volfile. In this function the volfile generated does not have "option transport.socket.ssl-enabled on" The fix is to correct the volfile generation Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2018:2607 The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days |