Bug 1814120
Summary: | Enable blacklisting devices by default and update default data disks for RAID 6 as 10 | ||||||
---|---|---|---|---|---|---|---|
Product: | [Red Hat Storage] Red Hat Gluster Storage | Reporter: | SATHEESARAN <sasundar> | ||||
Component: | rhhi | Assignee: | Gobinda Das <godas> | ||||
Status: | CLOSED ERRATA | QA Contact: | SATHEESARAN <sasundar> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | rhhiv-1.7 | CC: | godas, rhs-bugs | ||||
Target Milestone: | --- | ||||||
Target Release: | RHHI-V 1.8 | ||||||
Hardware: | x86_64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | cockpit-ovirt-0.14.3-1.el8ev | Doc Type: | Enhancement | ||||
Doc Text: |
The web console now supports the blacklisting of mpath devices.
|
Story Points: | --- | ||||
Clone Of: | |||||||
: | 1814125 (view as bug list) | Environment: | |||||
Last Closed: | 2020-08-04 14:52:05 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1814125 | ||||||
Bug Blocks: | 1779977 | ||||||
Attachments: |
|
Description
SATHEESARAN
2020-03-17 05:20:37 UTC
Tested with cockpit-ovirt-dashboard-0.14.3 Started with HC deployment with cockpit, observed with bricks tabs that RAID5 and RAID6 has default value of 10 for data disk count, and also the blacklisting gluster devices enabled by default. Post this attaching the screenshot of the same Created attachment 1674652 [details]
Verified screenshot
Screenshot shows RAID6 option with default disk count of 10 and 'blacklist gluster devices' enabled by default
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (RHHI for Virtualization 1.8 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:3314 |