Bug 2126028 - exporter python script does not support IPV6
Summary: exporter python script does not support IPV6
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: rook
Version: 4.12
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: ODF 4.15.0
Assignee: Parth Arora
QA Contact: Shay Rozen
URL:
Whiteboard:
Depends On:
Blocks: 2246375
TreeView+ depends on / blocked
 
Reported: 2022-09-12 08:12 UTC by Parth Arora
Modified: 2024-03-19 15:19 UTC (History)
7 users (show)

Fixed In Version: 4.15.0-103
Doc Type: Release Note
Doc Text:
.Support IPv6 for external mode (developer preview) With this release, IPv6 is supported in Openshift Data foundation external mode deployments.
Clone Of:
Environment:
Last Closed: 2024-03-19 15:19:50 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github rook rook pull 12143 0 None open external: add support for IPV6 ceph daemons 2023-06-23 22:05:26 UTC
Red Hat Product Errata RHSA-2024:1383 0 None None None 2024-03-19 15:19:58 UTC

Description Parth Arora 2022-09-12 08:12:39 UTC
Description of problem (please be detailed as possible and provide log
snippests):
exporter python script should support  IPV6, part of https://bugzilla.redhat.com/show_bug.cgi?id=2064426#c2.

Version of all relevant components (if applicable):


Does this issue impact your ability to continue to work with the product
(please explain in detail what is the user impact)?


Is there any workaround available to the best of your knowledge?


Rate from 1 - 5 the complexity of the scenario you performed that caused this
bug (1 - very simple, 5 - very complex)?


Can this issue reproducible?


Can this issue reproduce from the UI?


If this is a regression, please provide more details to justify this:


Steps to Reproduce:
1.
2.
3.


Actual results:


Expected results:


Additional info:

Comment 2 Travis Nielsen 2022-09-12 15:07:14 UTC
Need details about what is needed to support ipv6.

Comment 3 Parth Arora 2022-10-11 13:33:40 UTC
@mudit need to understand the priority of this issue, 
Does it need to be in 4.12?

Comment 4 Travis Nielsen 2022-10-17 15:08:46 UTC
Moving out of 4.12 since there is not a clear requirement

Comment 5 Mudit Agarwal 2022-10-18 03:48:21 UTC
We are doing a GA for IPv6 support in 4.12 So ideally we should support this as well.
Eran, please share your thoughts.

Comment 23 Shay Rozen 2024-01-08 09:17:35 UTC
Exporter script is working on ceph cluster ipv6:
[root@argo016 ~]# python3.6 exporter.py  --rbd-data-pool-name rbd
[{"name": "rook-ceph-mon-endpoints", "kind": "ConfigMap", "data": {"data": "argo016=[2620:52:0:880:ae1f:6bff:fe0a:1844]:6789", "maxMonId": "0", "mapping": "{}"}}, {"name": "rook-ceph-mon", "kind": "Secret", "data": {"admin-secret": "admin-secret", "fsid": "495fb7f8-aae3-11ee-ab77-ac1f6b0a1844", "mon-secret": "mon-secret"}}, {"name": "rook-ceph-operator-creds", "kind": "Secret", "data": {"userID": "client.healthchecker", "userKey": "AQAsvZtljZbPOBAAW1F2B9AOIwVWQaIJlzSmng=="}}, {"name": "monitoring-endpoint", "kind": "CephCluster", "data": {"MonitoringEndpoint": "2620:52:0:880:ae1f:6bff:fe0a:1844", "MonitoringPort": "9283"}}, {"name": "rook-csi-rbd-node", "kind": "Secret", "data": {"userID": "csi-rbd-node", "userKey": "AQAsvZtl5eQ8ORAAQR8MI5uHnXAhZwom+UWYLA=="}}, {"name": "rook-csi-rbd-provisioner", "kind": "Secret", "data": {"userID": "csi-rbd-provisioner", "userKey": "AQAsvZtlT9egORAARydZt6N7On8FKsfdDIB4Gw=="}}, {"name": "rook-ceph-dashboard-link", "kind": "Secret", "data": {"userID": "ceph-dashboard-link", "userKey": "https://[2620:52:0:880:ae1f:6bff:fe0a:1844]:8443/"}}, {"name": "ceph-rbd", "kind": "StorageClass", "data": {"pool": "rbd", "csi.storage.k8s.io/provisioner-secret-name": "rook-csi-rbd-provisioner", "csi.storage.k8s.io/controller-expand-secret-name": "rook-csi-rbd-provisioner", "csi.storage.k8s.io/node-stage-secret-name": "rook-csi-rbd-node"}}]

Comment 29 errata-xmlrpc 2024-03-19 15:19:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.15.0 security, enhancement, & bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2024:1383


Note You need to log in before you can comment on or make changes to this bug.