Bug 1720461

Summary: gfapi: provide an option for changing statedump path in glfs-api.
Product: [Red Hat Storage] Red Hat Gluster Storage Reporter: Amar Tumballi <atumball>
Component: coreAssignee: Mohit Agrawal <moagrawa>
Status: CLOSED ERRATA QA Contact: Kshithij Iyer <kiyer>
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aliang, amukherj, areis, berrange, chayang, coli, ddepaula, jen, juzhang, kiyer, knoel, lolyu, moagrawa, mrezanin, ndevos, pasik, rcyriac, rhel8-maint, rhinduja, rhs-bugs, sasundar, storage-qa-internal, virt-maint
Target Milestone: ---Keywords: FutureFeature
Target Release: RHGS 3.5.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: glusterfs-6.0-6 Doc Type: Enhancement
Doc Text:
A new API, glfs_set_statedump_path, lets users configure the a directory to store statedump output. For example, the following call sets the /tmp directory as the statedump path: glfs_set_statedump_path(fs2, "/tmp");
Story Points: ---
Clone Of: 1689097 Environment:
Last Closed: 2019-10-30 12:21:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1689097, 1720557    
Bug Blocks: 1447694, 1586201, 1696809    

Description Amar Tumballi 2019-06-14 05:30:27 UTC
+++ This bug was initially created as a clone of Bug #1689097 +++

+++ This bug was initially created as a clone of Bug #1586201 +++

TL;DR: We need the ability to control the gluster logging from libvirt/QEMU when using the gluster driver.


+++ This bug was initially created as a clone of Bug #1447694 +++

QEMU is unable to store Gluster specific debugging logs under /var/run/gluster/... This is because QEMU runs as user "qemu" and does not have write permissions there. This debugging (called 'statedump') can be triggered from the Gluster CLI which sends an event to QEMU (when libgfapi is used).

When the glusterfs packages make sure that a group "gluster" has write permissions to /var/run/gluster/, could the qemu(-kvm-rhev) package be adjusted to have the "qemu" user in the "gluster" group? This would allow more debugging options that help with potential issues when QEMU runs with disk-images over libgfapi.so.

--- Additional comment from Worker Ant on 2019-03-15 07:41:40 UTC ---

REVIEW: https://review.gluster.org/22364 (gfapi: provide an api for setting statedump path) posted (#1) for review on master by Amar Tumballi

--- Additional comment from Amar Tumballi on 2019-06-14 05:28:24 UTC ---

The patch is now merged.

Comment 18 errata-xmlrpc 2019-10-30 12:21:54 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2019:3249