The year-old BZ 1016886 describes three problems that any libgfapi application 
would have, not just KVM.  

As for the rpc-auth-allow-insecure=on setting, has any progress been made in 
this area?   I think this setting should be unnecessary, and it's really 
important in general that Gluster have some way of optionally authenticating 
clients other than by client port number.  Do SSL sockets solve this problem of 
authenticating in the control plane?

Two of these problems can be fixed by just altering the virt "group" -- the 
settings that you get with the gluster command

- gluster volume set your-volume group virt

And then just document that when you configure a volume for KVM virtualization, 
use the above command, right?  This is why we have volume "group" feature, 
right?

In /var/lib/glusterd/groups/virt file, it has this:

[root@g60ds-1 groups]# more virt
quick-read=off
read-ahead=off
io-cache=off
stat-prefetch=off
eager-lock=enable
remote-dio=enable
quorum-type=auto
server-quorum-type=server

Just add 1 lines to it:

allow-insecure=on

And change stat-prefetch to "on", and you'll have eliminated 2 of the 3 things 
that every KVM user has to do to Gluster.  eager-lock is the default now so 
that can be removed.

-ben


----- Original Message -----
> From: "Vijay Bellur" <vbel...@redhat.com>
> To: "Gluster Devel" <gluster-devel@gluster.org>
> Sent: Monday, October 27, 2014 5:38:24 AM
> Subject: [Gluster-devel] Fwd: [ovirt-devel] Using libgfapi on Gluster Storage 
> Domains
> 
> FYI - if you are interested in trying out libgfapi support with oVirt.
> 
> -Vijay
> 
> ---------- Forwarded message ----------
> From: Federico Simoncelli < fsimo...@redhat.com >
> Date: Fri, Oct 24, 2014 at 12:06 AM
> Subject: [ovirt-devel] Using libgfapi on Gluster Storage Domains
> To: oVirt Development < de...@ovirt.org >
> 
> 
> Hi everyone, if you want to try and use the libgfapi support included
> in qemu when accessing volumes on gluster storage domains you can try
> to apply this patch:
> 
> http://gerrit.ovirt.org/33768
> 
> As far as I know Jason Brooks already tried it and he reported a
> positive feedback.
> 
> What has been tested so far is:
> 
> - qemu uses libgfapi to access the disks on gluster storage domains
> 
> - hotplug of disks on gluster storage domains works as expected (libgfapi)
> 
> - hotunplug works as expected (no failure when removing a disk that is
> using libgfapi)
> 
> - live snpashots work as expected
> 
> - disks of vms started before this patch are not affected (they won't
> use libgfapi since there's no way to do an hot swap)
> 
> One major flow that is yet untested is live storage migration.
> 
> Remember that you may need to do some special configuration on your
> gluster volumes (most notably the allow-insecure ports option) as
> described here:
> 
> http://www.ovirt.org/Features/GlusterFS_Storage_Domain
> 
> Please try and test the patch if you're interested and report your
> feedback.
> 
> Thanks,
> --
> Federico
> _______________________________________________
> Devel mailing list
> de...@ovirt.org
> http://lists.ovirt.org/mailman/listinfo/devel
> 
> 
> _______________________________________________
> Gluster-devel mailing list
> Gluster-devel@gluster.org
> http://supercolony.gluster.org/mailman/listinfo/gluster-devel
> 
_______________________________________________
Gluster-devel mailing list
Gluster-devel@gluster.org
http://supercolony.gluster.org/mailman/listinfo/gluster-devel

Reply via email to