Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 1513066 - SNMPv3 configuration for securityMode, authProtocol and privProtocol is hardcoded
Summary: SNMPv3 configuration for securityMode, authProtocol and privProtocol is hardc...
Alias: None
Product: Red Hat Gluster Storage
Classification: Red Hat
Component: web-admin-tendrl-notifier
Version: rhgs-3.3
Hardware: Unspecified
OS: Unspecified
Target Milestone: ---
: ---
Assignee: gowtham
QA Contact: sds-qe-bugs
Depends On: 1515276
Blocks: 1640638
TreeView+ depends on / blocked
Reported: 2017-11-14 17:08 UTC by Martin Bukatovic
Modified: 2019-01-08 17:03 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2017-11-15 16:52:50 UTC
Target Upstream Version:

Attachments (Terms of Use)

System ID Priority Status Summary Last Updated
Github Tendrl notifier issues 142 None None None 2017-11-14 17:08:12 UTC

Description Martin Bukatovic 2017-11-14 17:08:13 UTC
Description of problem

Right now, the SNMPv3 configuration for securityMode, authProtocol and privProtocol is hardcoded with the following defaults:

* securityMode: authPriv
* authProtocol: MD5
* privProtocol: DES

we need to evaluate if those defaults makes sense and/or if we require them to be configurable.

Version-Release number


Comment 2 Nishanth Thomas 2017-11-15 13:02:49 UTC
I would propose to take this in a future release as we are close 3.3.1 timelines and this bug not critical enough to affect the core functionality.

Comment 3 RHEL Product and Program Management 2017-11-15 16:52:50 UTC
Development Management has reviewed and declined this request.
You may appeal this decision by reopening this request.

Note You need to log in before you can comment on or make changes to this bug.