Bug 2030663 - Update Network statistics types in DWH
Summary: Update Network statistics types in DWH
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine-dwh
Version: 4.3.0
Hardware: x86_64
OS: Linux
high
high
Target Milestone: ovirt-4.5.0
: 4.5.0
Assignee: Aviv Litman
QA Contact: Pavel Novotny
URL:
Whiteboard:
Depends On: 1980192
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-12-09 12:27 UTC by Aviv Litman
Modified: 2022-05-26 16:23 UTC (History)
9 users (show)

Fixed In Version: ovirt-engine-dwh-4.4.5
Doc Type: No Doc Update
Doc Text:
Clone Of: 1980192
Environment:
Last Closed: 2022-05-26 16:23:22 UTC
oVirt Team: Metrics
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHV-44178 0 None None None 2021-12-09 12:28:30 UTC
Red Hat Product Errata RHSA-2022:4711 0 None None None 2022-05-26 16:23:52 UTC
oVirt gerrit 117988 0 master MERGED Update Network statistics types 2021-12-19 13:44:52 UTC

Comment 3 Pavel Novotny 2022-05-06 23:21:22 UTC
Verified in
ovirt-engine-4.5.0.6-0.7.el8ev.noarch
ovirt-engine-dwh-4.5.2-1.el8ev.noarch

No regressions found, all panels showing ethernet interface data work correctly.
Also columns types in respective views collecting the host/VM ethernet statistics were update from NIMERIC(18, 4) to NUMERIC(20, 0) and NUMERIC(24, 4)
so the values, in case of high traffic or faulty NIC, should not overflow now, at least less probably.

Comment 8 errata-xmlrpc 2022-05-26 16:23:22 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:4711


Note You need to log in before you can comment on or make changes to this bug.