Bug 2227842
Summary: | [rgw-ms][object-encryption][multipart upload]: TOOLING: On multisite setup where SSE-S3 configured, there is md5sum mismatch while downloading multipart object. | |||
---|---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Matt Benjamin (redhat) <mbenjamin> | |
Component: | RGW-Multisite | Assignee: | Casey Bodley <cbodley> | |
Status: | CLOSED ERRATA | QA Contact: | Vidushi Mishra <vimishra> | |
Severity: | high | Docs Contact: | Akash Raj <akraj> | |
Priority: | unspecified | |||
Version: | 6.1 | CC: | akraj, cbodley, ceph-eng-bugs, cephqe-warriors, dparkes, jquinn, kdreyer, mbenjamin, mcaldeir, mkasturi, mwatts, rmandyam, skoduri, tserlin, ukurundw, vereddy, vimishra | |
Target Milestone: | --- | Keywords: | TestBlocker, TestOnly | |
Target Release: | 6.1z2 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | ceph-17.2.6-139.el9cp | Doc Type: | Release Note | |
Doc Text: |
.Original multipart uploads can now be identified in multi-site configurations
Previously, a data corruption bug was fixed in 6.1z1 that effected multipart uploads with server-side encryption in multi-site configurations.
With this enhancement, a new tool, `radosgw-admin bucket resync encrypted multipart`, can be used to identify these original multi-part uploads. The `LastModified` timestamp of any identified object is incremented by 1 NS to cause peer zones to replicate it again. For multi-site deployments that make any use of Server-Side encryption, users are recommended to run this command against every bucket in every zone after all zones have upgraded.
|
Story Points: | --- | |
Clone Of: | 2162337 | |||
: | 2228203 (view as bug list) | Environment: | ||
Last Closed: | 2023-10-12 16:34:33 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 2162337 | |||
Bug Blocks: | 2192813, 2214252, 2221020, 2228203, 2235257 |
Description
Matt Benjamin (redhat)
2023-07-31 16:18:04 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat Ceph Storage 6.1 security, enhancement, and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:5693 The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days |