[Bugs] [Bug 1322805] [scale] Brick process does not start after node reboot

bugzilla at redhat.com bugzilla at redhat.com
Tue May 3 11:00:02 UTC 2016


https://bugzilla.redhat.com/show_bug.cgi?id=1322805



--- Comment #30 from Vijay Bellur <vbellur at redhat.com> ---
COMMIT: http://review.gluster.org/13998 committed in master by Raghavendra G
(rgowdapp at redhat.com) 
------
commit 50ca12326bde53895b7227b12ef4d74a69e2a0f9
Author: Prasanna Kumar Kalever <prasanna.kalever at redhat.com>
Date:   Thu Apr 14 19:02:19 2016 +0530

    rpc: define client port range

    Problem:
    when bind-insecure is 'off', all the clients bind to secure ports,
    if incase all the secure ports exhaust the client will no more bind
    to secure ports and tries gets a random port which is obviously insecure.

    we have seen the client obtaining a port number in the range 49152-65535
    which are actually reserved as part of glusterd's pmap_registry for bricks,
    hence this will lead to port clashes between client and brick processes.

    Solution:
    If we can define different port ranges for clients incase where secure
ports
    exhaust, we can avoid the maximum port clashes with in gluster processes.

    Still we are prone to have clashes with other non-gluster processes, but
    the chances being very low in the rhgs Env, but that's a different story
    on its own, which will be handled in upcoming patches.

    Change-Id: Ib5ce05991aa1290ccb17f6f04ffd65caf411feaf
    BUG: 1322805
    Signed-off-by: Prasanna Kumar Kalever <prasanna.kalever at redhat.com>
    Reviewed-on: http://review.gluster.org/13998
    Smoke: Gluster Build System <jenkins at build.gluster.com>
    NetBSD-regression: NetBSD Build System <jenkins at build.gluster.org>
    CentOS-regression: Gluster Build System <jenkins at build.gluster.com>
    Reviewed-by: Atin Mukherjee <amukherj at redhat.com>
    Reviewed-by: Raghavendra G <rgowdapp at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=aQH8Ylbwyi&a=cc_unsubscribe


More information about the Bugs mailing list