Bug 2052027

Summary: cephfs: rados omap leak after deletesnapshot
Product: [Red Hat Storage] Red Hat OpenShift Data Foundation Reporter: Madhu Rajanna <mrajanna>
Component: csi-driverAssignee: Madhu Rajanna <mrajanna>
Status: CLOSED ERRATA QA Contact: Yuli Persky <ypersky>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 4.10CC: madam, muagarwa, ocs-bugs, odf-bz-bot
Target Milestone: ---   
Target Release: ODF 4.10.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: 4.10.0-151 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-13 18:53:05 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Comment 7 Yuli Persky 2022-03-15 12:59:15 UTC
@Madhu, 

Can you please provide instructions how to verify this BZ ? 

what log ( please provide name or example of a name) should I check after the snapshot is deleted and what record should I see there /or should not ?

Comment 9 Yuli Persky 2022-03-16 10:24:34 UTC
The BZ was verified on ____4.10.0-189 ___

1) I've created number of cephfs snapshots

2) later on logged in to the tollbox pod and run the following command: 

rados listomapkeys csi.snaps.default --pool=ocs-storagecluster-cephfilesystem-metadata --namespace=csi

result: got an output of snapshot identifiers. 

3) Deleted one of the snapshots ( with the identifier that was listed in the poreveioous step output) 

result: rados listomapkeys csi.snaps.default --pool=ocs-storagecluster-cephfilesystem-metadata --namespace=csi output does NOT show the deleted snapshot identifier. 

==> The fix was successfully verified.

Comment 11 errata-xmlrpc 2022-04-13 18:53:05 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security & bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:1372