Bug 2392395
| Summary: | [7.1z backport][GSS]last_purged_snaps_scrub updates can cause high frequency OSDMap updates leading to performance issues | ||
|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Bipin Kunal <bkunal> |
| Component: | RADOS | Assignee: | Radoslaw Zarzynski <rzarzyns> |
| Status: | CLOSED ERRATA | QA Contact: | Pawan <pdhiran> |
| Severity: | high | Docs Contact: | Rivka Pollack <rpollack> |
| Priority: | unspecified | ||
| Version: | 7.1 | CC: | bhubbard, bkunal, ceph-eng-bugs, cephqe-warriors, nojha, pdhiran, rpollack, rzarzyns, tserlin, vumrao |
| Target Milestone: | --- | ||
| Target Release: | 7.1z8 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | ceph-18.2.1-355.el9cp | Doc Type: | Bug Fix |
| Doc Text: |
.`osd_beacon_report_interval` configurable parameter is now adhered to
Previously, when scrubbing metadata on purged snapshots, the OSD component ignored the `osd_beacon_report_interval` parameter. This parameter is designed to throttle the generation of new OSDMaps. As a result, in high-volume scrubbing scenarios, the lack of throttling could overwhelm components that listen for new OSDMaps.
With this fix, the `osd_beacon_report_interval` parameter is now correctly applied during metadata scrubbing on purged snapshots. This fix ensures that OSDMap generation is throttled as intended.
|
Story Points: | --- |
| Clone Of: | 2391692 | Environment: | |
| Last Closed: | 2025-09-30 15:03:16 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2391692 | ||
| Bug Blocks: | |||
|
Description
Bipin Kunal
2025-09-01 13:57:34 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat Ceph Storage 7.1 security and bug fix updates), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2025:17059 |