Summary: | Could not mount efs volume on openshift worker server | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Chao Yang <chaoyang> |
Component: | Storage | Assignee: | Bradley Childs <bchilds> |
Status: | CLOSED ERRATA | QA Contact: | Chao Yang <chaoyang> |
Severity: | urgent | Docs Contact: | |
Priority: | urgent | ||
Version: | 4.1.0 | CC: | aos-bugs, aos-storage-staff, bchilds, chaoyang, xtian |
Target Milestone: | --- | ||
Target Release: | 4.1.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-04 10:42:19 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: |
Description
Chao Yang
2019-01-28 10:16:06 UTC
What if NFS (2049) inbound access is added to the EFS security group? please check if 2049 is open as shown here https://docs.aws.amazon.com/efs/latest/ug/accessing-fs-create-security-groups.html After I add the 2049 port into the security group, EFS volume can be mount 80 tcp 0.0.0.0/0 ✔ 30000-32767 tcp sg-02b3f6605a435d19f, sg-0af3df3a0948c9ef0 ✔ 0 icmp 0.0.0.0/0 ✔ All All sg-0bd95f490853b5972 ✔ 22 tcp 0.0.0.0/0 ✔ 10255 tcp sg-02b3f6605a435d19f, sg-0cadd781d9319a54a ✔ 10250 tcp sg-02b3f6605a435d19f, sg-0cadd781d9319a54a ✔ 4789 udp sg-02b3f6605a435d19f, sg-07d987ba7a62adf53, sg-0cadd781d9319a54a ✔ 4194 tcp sg-02b3f6605a435d19f, sg-0cadd781d9319a54a ✔ 443 tcp 0.0.0.0/0 ✔ 9100 tcp sg-02b3f6605a435d19f, sg-0cadd781d9319a54a ✔ 2049 tcp sg-02b3f6605a435d19f ✔ mount -t nfs4 -o nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2 10.0.141.46:/ efs [root@ip-10-0-130-175 efs]# mount | grep efs rpc_pipefs on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw,relatime) 10.0.141.46:/ on /var/roothome/efs type nfs4 (rw,relatime,vers=4.1,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,clientaddr=10.0.130.175,local_lock=none,addr=10.0.141.46) Marked as verified due to https://bugzilla.redhat.com/show_bug.cgi?id=1669993#c7 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:0758 |