Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

- CASMPET-7175: iSCSI SBPS: radosgw-admin cmd fails with "auth: unabl… #291

Merged
merged 1 commit into from
Aug 14, 2024

Conversation

ravikanth-nalla-hpe
Copy link
Contributor

@ravikanth-nalla-hpe ravikanth-nalla-hpe commented Aug 13, 2024

Summary and Scope

CASMPET-7175: iSCSI SBPS: radosgw-admin cmd fails with "auth: unable to find a keyring..." part of s3fs mount for "boot-images"
- "radosgw-admin cmd..." is supposed to be issued on master node to generate s3 access/ secret key and not on
worker nodes. Fixed CFS play to create s3 access/ secret key on master node followed by mounting s3 boot images
on all worker nodes using this s3 key.

Issues and Related PRs

List and characterize relationship to Jira/Github issues and other pull requests. Be sure to list dependencies.

  • Resolves [issue id](issue link)
  • Change will also be needed in <insert branch name here>
  • Future work required by [issue id](issue link)
  • Documentation changes required in [issue id](issue link)
  • Merge with/before/after <insert PR URL here>

Testing

Tested worker nodes personalization on bare metal system: starlord with CSM 1.6.0-alpha.55 bits

Tested on:

baremetal system: starlord

Test description:

Tested iSCSI SBPS CFS plays (worker node personalization) on starlord with CSM 1.6. Observed that radosgw-admin command for s3 access/ secret key generation on master node followed by mounting s3 boot images using s3fs command on worker nodes is successful.

  • Were the install/upgrade-based validation checks/tests run (goss tests/install-validation doc)?
  • Were continuous integration tests run? If not, why?
  • Was upgrade tested? If not, why?
  • Was downgrade tested? If not, why?
  • Were new tests (or test issues/Jiras) created for this change?

Risks and Mitigations

None

Pull Request Checklist

  • Version number(s) incremented, if applicable (NA)
  • Copyrights updated
  • License file intact (NA)
  • Target branch correct
  • CHANGELOG.md updated
  • Testing is appropriate and complete, if applicable
  • HPC Product Announcement prepared, if applicable (NA)

…e to find a keyring..."

part of s3fs mount for boot images (boot-images bucket)
  - fixed CFS play to create s3 access/ secret key on master node followed by mounting
    s3 boot images with this s3 key on worker nodes.
Copy link
Contributor

@dborman-hpe dborman-hpe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@dborman-hpe
Copy link
Contributor

@ravikanth-nalla-hpe please update the checklist in the PR, checking off all items once you have either verified them, or determined that they don't apply to this PR.

@ravikanth-nalla-hpe
Copy link
Contributor Author

@ravikanth-nalla-hpe please update the checklist in the PR, checking off all items once you have either verified them, or determined that they don't apply to this PR.

Updated. Thanks.

@dborman-hpe dborman-hpe merged commit 0ca5b9f into develop Aug 14, 2024
5 checks passed
@mharding-hpe mharding-hpe deleted the feature/CASMPET-7175-new branch August 15, 2024 14:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants