Bug 1408143 - Failure to amend a volume will cause the volume to become illegal
Summary: Failure to amend a volume will cause the volume to become illegal
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: vdsm
Classification: oVirt
Component: Core
Version: ---
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ovirt-4.1.0-beta
: 4.19.2
Assignee: Maor
QA Contact: Kevin Alon Goldblatt
URL:
Whiteboard:
Depends On: 1405938
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-12-22 09:44 UTC by Maor
Modified: 2017-02-01 14:54 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1405938
Environment:
Last Closed: 2017-02-01 14:54:10 UTC
oVirt Team: Storage
Embargoed:
rule-engine: ovirt-4.1+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
oVirt gerrit 68606 0 None None None 2016-12-22 09:44:36 UTC
oVirt gerrit 68987 0 master MERGED amend: Replace the use of CopyData in internal management. 2017-01-09 17:32:49 UTC
oVirt gerrit 69938 0 master MERGED core: Add generation when calling amend vds command. 2017-01-11 14:11:46 UTC
oVirt gerrit 70011 0 ovirt-engine-4.1 MERGED core: Add generation when calling amend vds command. 2017-01-13 15:30:36 UTC
oVirt gerrit 70012 0 ovirt-4.1 MERGED amend: Replace the use of CopyData in internal management. 2017-01-15 13:55:33 UTC

Description Maor 2016-12-22 09:44:37 UTC
+++ This bug was initially created as a clone of Bug #1405938 +++

Description of problem:
As part of Using CopyDataDivEndpoint to maintain jobs in VDSM, if a failure occurs, the volume will become illegal based on the infrastructure behavior.
Some of the operations does not need to make the volume to be illegal on a failure like amend (or sparsify?)

One possible solution is to add a flag that will indicate if the volume should become illegal on failure or not.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

--- Additional comment from Nir Soffer on 2016-12-19 04:20:14 EST ---

I discussed this with Adam, and we agreed that:

- Operation on illegal volumes are ok, can use now set_illegal=False
- Atomic operations on volume metadata are ok, can use new set_illegal=False
- Any other operation on volume data or qcow2 metadata must set the volume to 
  illegal before the operation and the volume should remain illegal if the
  operation failed.

Comment 1 Maor 2016-12-22 09:47:36 UTC
Now that BZ1405938 is solved and the infrastructure has the ability to determine if the volume will be illegal or not on failure, the amend operation should be changed to use the new infrastructure.

Comment 2 Kevin Alon Goldblatt 2017-01-29 15:55:29 UTC
Verified with the following code:
-------------------------------------------
ovirt-engine-4.1.1-0.0.master.20170126161333.git83fd7e0.el7.centos.noarch
vdsm-4.19.3-1.gitdfa4d67.el7.centos.x86_64

Verified with the following scenario:
------------------------------------------
1. On a system with the DC and Cluster with compatibility ver 4.0  create a new VM with block disks
2. Upgrade the DC and Cluster
3. Set the block image LV to inactive 
4. Amend the volume - fails to amend - volume is not in illegal state 


Moving to VERIFIED!

Comment 3 Kevin Alon Goldblatt 2017-01-29 15:56:07 UTC
Moving to verified based on Comment 2


Note You need to log in before you can comment on or make changes to this bug.