Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1525348 - multipath: "spurious uevent, path already in pathvec" errors [NEEDINFO]
multipath: "spurious uevent, path already in pathvec" errors
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: device-mapper-multipath (Show other bugs)
7.4
x86_64 Linux
medium Severity medium
: rc
: ---
Assigned To: Ben Marzinski
Lin Li
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2017-12-13 01:19 EST by yisheng
Modified: 2018-07-03 01:32 EDT (History)
9 users (show)

See Also:
Fixed In Version: device-mapper-multipath-0.4.9-119.el7
Doc Type: Bug Fix
Doc Text:
Cause: multipathd was logging a notification message at the error severity level. Consequence: Customers logging for error messages n the logs could think that something was wrong with multipathd Fix: The message severity level has been moved down to notice. Result: Customers will no longer see these messages when scanning the logs for error severity messages.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-04-10 12:13:30 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
lilin: needinfo? (yiwu)
lilin: needinfo? (yiwu)


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2018:0884 None None None 2018-04-10 12:14 EDT

  None (edit)
Description yisheng 2017-12-13 01:19:07 EST
Description of problem:

The following messages appear in /var/log/messages, when server is booting up.


---
[rhel7u4]$ cat var/log/messages|grep "spurious uevent"
Dec  7 18:27:33 <daemon.err> rhel7u4 multipathd:sde: spurious uevent, path already in pathvec
Dec  7 18:27:33 <daemon.err> rhel7u4 multipathd:sdb: spurious uevent, path already in pathvec
Dec  7 18:27:33 <daemon.err> rhel7u4 multipathd:sdc: spurious uevent, path already in pathvec
Dec  7 18:27:33 <daemon.err> rhel7u4 multipathd:sdd: spurious uevent, path already in pathvec
---

Per the confirmation with other senior engineer, it mentioned that these are informational only, it is harmless and could be ignored safely. 
Could you please advise why such messages are classified as "daemon.err" in /var/log/messages? Is it possible to make it shown as "daemon.info" or "daemon.notice" in /var/log/messages?  Please advise. thank you


Version-Release number of selected component (if applicable):
rhel7u4 with kernel-3.10.0-693.2.2.el7.x86_64
device-mapper-multipath-0.4.9-111.el7.x86_64

How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:

Could you please advise why such messages are classified as "daemon.err" in /var/log/messages, if they are harmless? Is it possible to make it shown as "daemon.info" or "daemon.notice" in /var/log/messages?


Additional info:
Comment 2 yisheng 2017-12-13 01:33:39 EST
Since Customer have a batch of server which would be online(production) soon, their monitoring system are sensitive to such "daemon.err" messages. 

So, I will put this BZ severity as high, please kindly let me know, if you have any concerns. 

Thank you

Vansen Ng
Comment 4 Ben Marzinski 2017-12-13 13:16:09 EST
There is no good reason for them to have that severity. I'm fine with moving them down to a Notice. I'm not sure that there is time for this to make RHEL-7.5, not that I have any objection to it going in.  If the bug gets all its ACKs, I'd have no worries about making this change.
Comment 5 yisheng 2017-12-14 01:09:14 EST
Thanks for the clarification.  Please kindly check if we have any plan to fix it in coming version or we have any other reason to keep the current severity of such messages.  

Thank you
Customer Experience and Engagement, Red Hat
Comment 9 Ben Marzinski 2018-01-31 14:49:12 EST
I've moved the level of these messages down to a notice.
Comment 16 errata-xmlrpc 2018-04-10 12:13:30 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2018:0884

Note You need to log in before you can comment on or make changes to this bug.