Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 1597320 - [Tracking] 'iSCSI Login negotiation failed' messages in logs while draining pods from one node to another
Summary: [Tracking] 'iSCSI Login negotiation failed' messages in logs while draining p...
Keywords:
Status: ASSIGNED
Alias: None
Product: Red Hat Gluster Storage
Classification: Red Hat
Component: gluster-block
Version: cns-3.7
Hardware: Unspecified
OS: Unspecified
high
urgent
Target Milestone: ---
: ---
Assignee: Prasanna Kumar Kalever
QA Contact: Rahul Hinduja
URL:
Whiteboard:
: 1625824 1654409 (view as bug list)
Depends On: 1624670 1624678
Blocks: 1595763 OCS-3.11.1-devel-triage-done 1642792 1568868 1622458 1629847
TreeView+ depends on / blocked
 
Reported: 2018-07-02 14:55 UTC by Neha Berry
Modified: 2019-04-11 08:19 UTC (History)
18 users (show)

Fixed In Version:
Doc Type: Known Issue
Doc Text:
Few paths are missing for iscsi mpath device. This is because, either CHAP security values mismatch or iscsi CSG: stage 0 has been skipped. Both will result in iSCSI login negotiation to fail. To workaround this issue, delete the app pod which will trigger the restart of the pod. The pod start will then update the credentials and relogins.
Clone Of: 1595763
Environment:
Last Closed:
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Bugzilla 1595763 None NEW "iSCSI Login negotiation failed" messages in logs while draining pods from one node to another 2019-04-10 10:25:09 UTC

Internal Links: 1595763

Comment 2 Jan Safranek 2018-07-03 16:47:07 UTC
Unfortunately, OpenShift node does not log iscsiadm commands it runs so I can't check if it tried an authenticated login or not. I can prepare a build with them if this bug is easy enough to reproduce.

In the code I can't see a hole that would allow OpenShift miss authentication in a small fraction of targets.

Comment 40 Bipin Kunal 2018-09-24 10:27:47 UTC
*** Bug 1625824 has been marked as a duplicate of this bug. ***

Comment 42 Prasanna Kumar Kalever 2019-02-07 08:31:54 UTC
*** Bug 1654409 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.