Bug 1810893
| Summary: | mountOptions is ignored for "import storage domain" from GUI | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Virtualization Manager | Reporter: | nijin ashok <nashok> | |
| Component: | ovirt-engine | Assignee: | Ahmad Khiet <akhiet> | |
| Status: | CLOSED ERRATA | QA Contact: | Ilan Zuckerman <izuckerm> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | medium | |||
| Version: | 4.3.8-1 | CC: | akhiet, mkalinin, pelauter, rdlugyhe, tnisan | |
| Target Milestone: | ovirt-4.4.0 | Keywords: | ZStream | |
| Target Release: | --- | Flags: | rdlugyhe:
needinfo-
lsvaty: testing_plan_complete- |
|
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ovirt-engine 4.4.0-27 22b6f82 | Doc Type: | Bug Fix | |
| Doc Text: |
Previously, using the Administration Portal to import a storage domain omitted custom mount options for NFS storage servers. The current release fixes this issue by including the custom mount options.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1828067 (view as bug list) | Environment: | ||
| Last Closed: | 2020-08-04 13:21:58 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | Storage | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1828067 | |||
|
Description
nijin ashok
2020-03-06 06:41:36 UTC
I have verified the when passing additional mount options from webAdmin UI, they are being passed to the vdsm as additional parameters. There is still a problem of how vdsm treats those params (for example 'ro'). For this, additional BZ was opened: https://bugzilla.redhat.com/show_bug.cgi?id=1823207 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: RHV Manager (ovirt-engine) 4.4 security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:3247 |