Bug 2192596
| Summary: | [Backport-4.12.z][KMS][VAULT] Storage cluster remains in 'Progressing' state during deployment with storage class encryption, despite all pods being up and running. | |||
|---|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | arun kumar mohan <amohan> | |
| Component: | ocs-operator | Assignee: | arun kumar mohan <amohan> | |
| Status: | CLOSED ERRATA | QA Contact: | Parag Kamble <pakamble> | |
| Severity: | high | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 4.13 | CC: | amohan, ebenahar, kbg, kramdoss, muagarwa, ocs-bugs, odf-bz-bot, pakamble, sheggodu, skatiyar | |
| Target Milestone: | --- | Keywords: | Regression | |
| Target Release: | ODF 4.12.4 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | 4.12.4-1 | Doc Type: | Bug Fix | |
| Doc Text: |
Previously, Multicloud Object Gateway (MCG) Key Management Service (KMS) encryption was enabled even when the clusterwide encryption was not enabled and only when the KMS encryption was enabled. This was because MCG encryption was set to enable when one of these conditions was true:
* storagecluster.Spec.Encryption.Enable
* storagecluster.Spec.Encryption.ClusterWide
* storagecluster.Spec.Encryption.KeyManagementService.Enable.
With this fix, MCG encryption is enabled only when the storagecluster spec has KMS enabled and any one of the following conditions is true:
* Encryption.Enabled OR
* Encryption.ClusterWide is true OR
* MCG is in Standalone mode
As a result, MCG is encrypted appropriately.
|
Story Points: | --- | |
| Clone Of: | 2189984 | |||
| : | 2209254 (view as bug list) | Environment: | ||
| Last Closed: | 2023-06-14 21:20:41 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 2189984 | |||
| Bug Blocks: | 2209254 | |||
|
Description
arun kumar mohan
2023-05-02 12:46:10 UTC
Updating the internal whiteboard to include next 4.12.z release PR up for 4.12 branch: https://github.com/red-hat-storage/ocs-operator/pull/2045 Hi Arun, plz create a BZ for 4.11.z as well, once 4.12.z backport is merged... also plz update the RDT. Verified the Fix on 4.12.4-1. Fix is working as expected. Now storagecluster status showing as 'Ready' state when its configured with the storageclass encryption with KVM. Cluster Version =================== ❯ oc get csv -n openshift-storage ─╯ NAME DISPLAY VERSION REPLACES PHASE mcg-operator.v4.12.4-rhodf NooBaa Operator 4.12.4-rhodf mcg-operator.v4.12.3-rhodf Succeeded ocs-operator.v4.12.4-rhodf OpenShift Container Storage 4.12.4-rhodf ocs-operator.v4.12.3-rhodf Succeeded odf-csi-addons-operator.v4.12.4-rhodf CSI Addons 4.12.4-rhodf odf-csi-addons-operator.v4.12.3-rhodf Succeeded odf-operator.v4.12.4-rhodf OpenShift Data Foundation 4.12.4-rhodf odf-operator.v4.12.3-rhodf Succeeded Encrypted storageclass is created ================================= ❯ oc get sc ocs-storagecluster-ceph-rbd-encrypted ─╯ NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE ocs-storagecluster-ceph-rbd-encrypted openshift-storage.rbd.csi.ceph.com Delete Immediate false 14m Storage Cluster Status ====================== ❯ oc get storageclusters.ocs.openshift.io -n openshift-storage ─╯ NAME AGE PHASE EXTERNAL CREATED AT VERSION ocs-storagecluster 18m Ready 2023-06-02T06:54:38Z 4.12.0 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat OpenShift Data Foundation 4.12.4 security and Bug Fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:3609 The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days |