Bug 1761816

Summary: Beast frontend reads body in small pieces
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Casey Bodley <cbodley>
Component: RGWAssignee: Casey Bodley <cbodley>
Status: CLOSED ERRATA QA Contact: Tejas <tchandra>
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0CC: cbodley, ceph-eng-bugs, ceph-qe-bugs, kbader, mbenjamin, sweil, tserlin
Target Milestone: rcKeywords: CodeChange
Target Release: 4.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-14.2.4-14.el8cp, ceph-14.2.4-2.el7cp Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-01-31 12:47:36 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Casey Bodley 2019-10-15 12:51:47 UTC
Description of problem:

The buffer used by the beast frontend typically does not expand past 512 bytes when reading http headers, and this same buffer is used to parse the request body. Reading large PUT Object requests in small pieces generates many more system calls than larger reads.

Comment 1 RHEL Program Management 2019-10-15 12:51:52 UTC
Please specify the severity of this bug. Severity is defined here:
https://bugzilla.redhat.com/page.cgi?id=fields.html#bug_severity.

Comment 7 errata-xmlrpc 2020-01-31 12:47:36 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:0312