Bug 2314213
Summary: | [6.1z backport] [CEE] Error 401 on some RGW servers | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Matt Benjamin (redhat) <mbenjamin> |
Component: | RGW | Assignee: | Marcus Watts <mwatts> |
Status: | CLOSED ERRATA | QA Contact: | Hemanth Sai <hmaheswa> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.1 | CC: | bkunal, ceph-eng-bugs, cephqe-warriors, ckulal, dwalveka, jcaratza, kjosy, mbenjamin, mkasturi, mwatts, qshi, tserlin, yariyama |
Target Milestone: | --- | Flags: | jcaratza:
needinfo?
(mwatts) dwalveka: needinfo? (mwatts) |
Target Release: | 6.1z9 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | ceph-17.2.6-272.el9cp | Doc Type: | Bug Fix |
Doc Text: |
Keystone is now able to invalidate its cache and existing tokens even if they have not expired
Previously, the code failed to invalidate the cache if the response from the Keystone API was that the “admin token” is invalid. The admin token was cached and verified to see if it had expired before using it. As a result, Swift API requests for clients were dropped, causing Error 401 on some RGW servers until the service was restarted.
With this fix, Keystone is now able to invalidate its cache and existing tokens even if they have not expired.
|
Story Points: | --- |
Clone Of: | 2297453 | Environment: | |
Last Closed: | 2025-04-28 05:30:20 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2297453 | ||
Bug Blocks: | 2313170 |
Description
Matt Benjamin (redhat)
2024-09-23 13:05:18 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: Red Hat Ceph Storage 6.1 bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2025:4238 |