Bug 2069314
| Summary: | OCS external mode should allow specifying names for all Ceph auth principals | ||
|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | Neha Berry <nberry> |
| Component: | rook | Assignee: | Parth Arora <paarora> |
| Status: | CLOSED ERRATA | QA Contact: | Vijay Avuthu <vavuthu> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 4.8 | CC: | ebondare, lars, madam, mmuench, muagarwa, nberry, ocs-bugs, odf-bz-bot, olakra, paarora, sagrawal, shan, shmohan, tnielsen, vavuthu |
| Target Milestone: | --- | Flags: | paarora:
needinfo+
paarora: needinfo+ |
| Target Release: | ODF 4.11.0 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | 4.11.0-96 | Doc Type: | No Doc Update |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1996830 | Environment: | |
| Last Closed: | 2022-08-24 13:49:54 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1996830 | ||
| Bug Blocks: | |||
|
Comment 5
Travis Nielsen
2022-05-16 15:18:32 UTC
Yes, @vavuthu should be testing this verified here: https://ocs4-jenkins-csb-odf-qe.apps.ocp-c1.prod.psi.redhat.com/job/qe-deploy-ocs-cluster/13952/console 022-06-27 15:40:30 10:10:30 - MainThread - ocs_ci.utility.connection - INFO - Executing cmd: python3 /tmp/external-cluster-details-exporter-2kazn3tr.py --rbd-data-pool-name rbd --rgw-endpoint 10.x.xxx.xx7:8080 --cluster-name jnk-pr6046-b2994 --cephfs-filesystem-name cephfs --restricted-auth-permission true on 10.x.xxx.xx9 2022-06-27 15:40:31 10:10:31 - MainThread - ocs_ci.utility.connection - INFO - Executing cmd: ceph auth get client.admin on 10.x.xxx.xx9 2022-06-27 15:40:31 10:10:31 - MainThread - ocs_ci.utility.templating - INFO - apiVersion: v1 > rbd_node_secret, rbd_provisioner_secret, cephfs_node_secret and cephfs_provisioner_secret are created as expected. client.csi-cephfs-node-jnk-pr6046-b2994-cephfs key: AQAWgrlidaf+MRAAz2jF6uQxLr5LnN9v0T7dOw== caps: [mds] allow rw caps: [mgr] allow rw caps: [mon] allow r, allow command 'osd blocklist' caps: [osd] allow rw tag cephfs *=cephfs client.csi-cephfs-provisioner-jnk-pr6046-b2994-cephfs key: AQAWgrliH3dfMhAAYrfnvWePGE4+ZzecgAoHVw== caps: [mgr] allow rw caps: [mon] allow r, allow command 'osd blocklist' caps: [osd] allow rw tag cephfs metadata=cephfs client.csi-rbd-node-jnk-pr6046-b2994-rbd key: AQAWgrligyYfMRAAq1JzoKFVfinZaiP8o8XnbQ== caps: [mon] profile rbd, allow command 'osd blocklist' caps: [osd] profile rbd pool=rbd client.csi-rbd-provisioner-jnk-pr6046-b2994-rbd key: AQAWgrlikQmaMRAAkB0U/IHSYcpfok0Uj2jZbQ== caps: [mgr] allow rw caps: [mon] profile rbd, allow command 'osd blocklist' caps: [osd] profile rbd pool=rbd > $ oc -n openshift-storage get StorageClass ocs-external-storagecluster-cephfs -n openshift-storage -o yaml allowVolumeExpansion: true apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: annotations: description: Provides RWO and RWX Filesystem volumes creationTimestamp: "2022-06-27T10:10:32Z" managedFields: parameters: clusterID: openshift-storage csi.storage.k8s.io/controller-expand-secret-name: rook-csi-cephfs-provisioner-jnk-pr6046-b2994-cephfs csi.storage.k8s.io/controller-expand-secret-namespace: openshift-storage csi.storage.k8s.io/node-stage-secret-name: rook-csi-cephfs-node-jnk-pr6046-b2994-cephfs csi.storage.k8s.io/node-stage-secret-namespace: openshift-storage csi.storage.k8s.io/provisioner-secret-name: rook-csi-cephfs-provisioner-jnk-pr6046-b2994-cephfs csi.storage.k8s.io/provisioner-secret-namespace: openshift-storage fsName: cephfs pool: cephfs_data $ oc -n openshift-storage get StorageClass ocs-external-storagecluster-ceph-rbd -n openshift-storage -o yaml allowVolumeExpansion: true apiVersion: storage.k8s.io/v1 kind: StorageClass parameters: clusterID: openshift-storage csi.storage.k8s.io/controller-expand-secret-name: rook-csi-rbd-provisioner-jnk-pr6046-b2994-rbd csi.storage.k8s.io/controller-expand-secret-namespace: openshift-storage csi.storage.k8s.io/fstype: ext4 csi.storage.k8s.io/node-stage-secret-name: rook-csi-rbd-node-jnk-pr6046-b2994-rbd csi.storage.k8s.io/node-stage-secret-namespace: openshift-storage csi.storage.k8s.io/provisioner-secret-name: rook-csi-rbd-provisioner-jnk-pr6046-b2994-rbd csi.storage.k8s.io/provisioner-secret-namespace: openshift-storage imageFeatures: layering,deep-flatten,exclusive-lock,object-map,fast-diff imageFormat: "2" pool: rbd provisioner: openshift-storage.rbd.csi.ceph.com Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:6156 |