Bug 1821251
Summary: | Support network bound disk encryption with static IP configuration with RHHI-V | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat Gluster Storage | Reporter: | SATHEESARAN <sasundar> |
Component: | gluster-ansible | Assignee: | Gobinda Das <godas> |
Status: | CLOSED ERRATA | QA Contact: | SATHEESARAN <sasundar> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | rhgs-3.5 | CC: | asakthiv, godas, pprakash, puebele, rhs-bugs, sabose, sasundar, sheggodu |
Target Milestone: | --- | Keywords: | ZStream |
Target Release: | RHGS 3.5.z Batch Update 2 | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | gluster-ansible-infra-1.0.4-8.el8rhgs,gluster-ansible-roles-1.0.5-8.el8rhgs | Doc Type: | Enhancement |
Doc Text: |
Previously, host root disk was encrypted using clevis, during the reboot of host the user was required to manually enter passphrase to unlock root disk. In this release, tang server is configured to automate the reboot process without manual entry of passphrase, on Red Hat Hyperconverged Infrastructure for Virtualization deployments.
|
Story Points: | --- |
Clone Of: | 1821248 | Environment: |
rhhiv, rhel8
|
Last Closed: | 2020-06-16 05:57:32 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1821248 |
Description
SATHEESARAN
2020-04-06 11:52:57 UTC
Tested with gluster-ansible-infra-1.0.4-8.el8rhgs 1. Hosts are configured with static IPs 2. Inventory file is edited with static IP, prefix, and the gateway. 3. Execute the playbook 4. Rebooted the host The host could boot properly with static IP configured and doesn't wait for encryption passphrase prompt RDT updated Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:2575 |