Bug 2086441 - [RFE] add rgw_curl_tcp_keepalive option for http client requests
Summary: [RFE] add rgw_curl_tcp_keepalive option for http client requests
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: RGW
Version: 5.1
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: ---
: 5.3
Assignee: Matt Benjamin (redhat)
QA Contact: Tejas
Akash Raj
URL:
Whiteboard:
: 2119591 (view as bug list)
Depends On:
Blocks: 2126049
TreeView+ depends on / blocked
 
Reported: 2022-05-16 07:10 UTC by James Biao
Modified: 2023-01-11 17:41 UTC (History)
12 users (show)

Fixed In Version: ceph-16.2.10-14.el8cp
Doc Type: Enhancement
Doc Text:
.The option to enable TCP keepalive managed by `libcurl` is added With this release, the option to enable TCP keepalive on the HTTP client sockets managed by `libcurl` is added to make sync and other operations initiated by Ceph Object Gateway more resilient to network instability. This does not apply to connections received by the HTTP frontend, but only to HTTP requests sent by the Ceph Object Gateway, such as Keystone for authentication, sync requests from multi-site, and requests to key management servers for SSE.
Clone Of:
Environment:
Last Closed: 2023-01-11 17:39:46 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHCEPH-4313 0 None None None 2022-05-16 07:16:40 UTC
Red Hat Product Errata RHSA-2023:0076 0 None None None 2023-01-11 17:41:11 UTC

Comment 3 Matt Benjamin (redhat) 2022-08-18 21:43:35 UTC
*** Bug 2119591 has been marked as a duplicate of this bug. ***

Comment 63 errata-xmlrpc 2023-01-11 17:39:46 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat Ceph Storage 5.3 security update and Bug Fix), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:0076


Note You need to log in before you can comment on or make changes to this bug.