Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
This project is now read‑only. Starting Monday, February 2, please use https://ibm-ceph.atlassian.net/ for all bug tracking management.

Bug 2390032

Summary: [GSS] MGRs constantly failed over and interfering with upgrade
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Bipin Kunal <bkunal>
Component: CephadmAssignee: Adam King <adking>
Status: CLOSED ERRATA QA Contact: Sayalee <saraut>
Severity: high Docs Contact:
Priority: unspecified    
Version: 7.1CC: akane, cephqe-warriors, jcaratza
Target Milestone: ---   
Target Release: 9.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-20.1.0-14 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 2390033 2392390 (view as bug list) Environment:
Last Closed: 2026-01-29 06:57:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2359626    
Bug Blocks: 2390033, 2392390    

Description Bipin Kunal 2025-08-21 07:53:37 UTC
This bug was initially created as a copy of Bug #2359626

I am copying this bug because: 



Description of problem:

The mgr is constantly getting block listed and thus the upgrade cannot be done. 

can the Cu bind Ip's manually using this KCS to fix the issue? https://access.redhat.com/solutions/5215611 

 

MirrorSnapshotScheduleHandler: client blocklisted
Apr 09 17:35:58 REDACTED-CHECK CASE ceph-mgr[2866456]: [rbd_support INFO root] MirrorSnapshotScheduleHandler: load_schedules Apr 09 17:35:58 REDACTED-CHECK CASE ceph-mon[2447551]: cephx server REDACTED-CHECK CASE: handle_request failed to decode CephXAuthenticate: End of buffer [buffer:2] Apr 09 17:43:09 REDACTED-CHECK CASE ceph-mgr[2866456]: [rbd_support ERROR root] MirrorSnapshotScheduleHandler: client blocklisted
 

 
###mgr services

 

{ "dashboard": "https://192.168.40.0:8443/", "prometheus": "http://192.168.40.0:9283/" }
 

###blocklist ls

 

...
192.168.40.0:6801/4226360658 2025-04-10T13:40:38.616662+0000 192.168.40.2:6800/3372243277 2025-04-10T16:23:06.971121+0000 192.168.40.0:6800/2334011339 2025-04-11T02:59:36.791432+0000 192.168.40.2:0/2475770005 2025-04-10T09:03:45.112130+0000 192.168.40.2:6801/3610157754 2025-04-10T18:57:54.870301+0000 192.168.40.0:0/3672398821 2025-04-10T16:29:42.304930+0000 192.168.40.2:0/373832528 2025-04-10T16:23:06.971121+0000 192.168.40.0:0/1827183734 2025-04-10T17:47:06.322431+0000 192.168.40.2:0/948086613 2025-04-10T18:06:12.342970+0000 192.168.40.2:6801/3972703784 2025-04-11T04:32:11.815662+0000 192.168.40.0:0/1063320037 2025-04-11T03:39:48.900039+0000 192.168.40.0:0/4081072026 2025-04-10T17:14:09.805264+0000 192.168.40.0:6800/475375498 2025-04-10T17:14:09.805264+0000 listed 1365 entries  
 

###mgr dump 

"epoch": 5393,
    "flags": 0,
    "active_gid": 1475139045,
    "active_name": "~REDACTED-CHECK CASE~",
    "active_addrs": {
        "addrvec": [
            {
                "type": "v2",
                "addr": "192.168.40.0:6800",
                "nonce": 265725562
            },
            {
                "type": "v1",
                "addr": "192.168.40.0:6801",
                "nonce": 265725562
            }
        ]
    },
    "active_addr": "192.168.40.0:6801/265725562",
    "active_change": "2025-04-10T05:50:27.749957+0000",
    "active_mgr_features": 4540138322906710015,
    "available": true, 
 


Version-Release number of selected component (if applicable):
7.1

How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Storage PM bot 2025-08-21 07:53:46 UTC
Please specify the severity of this bug. Severity is defined here:
https://bugzilla.redhat.com/page.cgi?id=fields.html#bug_severity.

Comment 11 errata-xmlrpc 2026-01-29 06:57:31 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat Ceph Storage 9.0 Security and Enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2026:1536