Release notes for Red Hat Ceph Storage 2.5
Chapter 1. Introduction
Red Hat Ceph Storage is a massively scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Chapter 2. Acknowledgments
Red Hat Ceph Storage version 2.0 contains many contributions from the Red Hat Ceph Storage team. Additionally, the Ceph project is seeing amazing growth in the quality and quantity of contributions from individuals and organizations in the Ceph community. We would like to thank all members of the Red Hat Ceph Storage team, all of the individual contributors in the Ceph community, and additionally (but not limited to) the contributions from organizations such as:
- Ubuntu Kylin
- Deutsche Telekom
Chapter 3. Major Updates
This section lists all major updates, enhancements, and new features introduced in this release of Red Hat Ceph Storage.
A heartbeat message for Jumbo frames has been added
Previously, if a network included jumbo frames and the maximum transmission unit (MTU) was not configured properly on all network parts, a lot of problems, such as slow requests, and stuck peering and backfilling processes occurred. In addition, the OSD logs did not include any heartbeat timeout messages because the heartbeat message packet size is below 1500 bytes. This update adds a heartbeat message for Jumbo frames.
osd_hack_prune_past_interval option is now supported
osd_hack_prune_past_interval option helps to reduce memory usage for the past intervals entries, which can help with recovery of unhealthy clusters.
This option can cause data loss, therefore, use it only when instructed by the Red Hat Support Engineers.
The default value for the
min_in_ratio option has been increased to
min_in_ratio option prevents Monitors from marking OSDs as
out when the amount of
out OSDs drops below certain fraction of all OSDs in the cluster. In previous releases, the default value of
min_in_ratio was set to
0.3. With this update, the value has been increased to
RocksDB is enabled as an option to replace
This update enables an option to use the
RocksDB back end for the
omap database as opposed to
RocksDB uses the multi-threading mechanism in compaction so that it better handles the situation when the
omap directories become very large (more than 40 G).
LevelDB compaction takes a lot of time in such a situation and causes OSD daemons to time out.
For details about conversion from
RocksDB, see the Ceph - Steps to convert OSD omap backend from leveldb to rocksdb solution on Red Hat Customer Portal.
The software repository containing the
ceph-ansible package has changed
Earlier versions of Red Hat Ceph Storage relied on the
ceph-ansible package in the
rhel-7-server-rhscon-2-installer-rpms repository. The Red Hat Storage Console 2 product is nearing end-of-life. Therefore, use the
ceph-ansible package provided by the
rhel-7-server-rhceph-2-tools-rpms repository instead.
Changing the default compression behavior of
Disabling compression reduces the size of the I/O operations, but not the I/O operations themselves.
The old default values:
filestore_rocksdb_options = "max_background_compactions=8;compaction_readahead_size=2097152"
The new default values:
filestore_rocksdb_options = "max_background_compactions=8;compaction_readahead_size=2097152;compression=kNoCompression"
Also, this does not effect any existing OSD, only those OSDs that have been manually converted or newly provisioned OSDs.
RocksDB cache size can now be larger than 2 GB
Previously, you could not set values larger than 2 GB. Now, the value for
rocksdb_cache_size parameter, can be set to a larger size, such as 4 GB.
Support for the Red Hat Ceph Storage Dashboard
The Red Hat Ceph Storage Dashboard provides a monitoring dashboard for Ceph clusters to visualize the cluster state. The dashboard is accessible from a web browser and provides a number of metrics and graphs about the state of the cluster, Monitors, OSDs, Pools, or network.
For details, see the Monitoring Ceph Clusters with Red Hat Ceph Storage Dashboard section in the Administration Guide for Red Hat Ceph Storage 2.
Split threshold is now randomized
Previously, the split threshold was not randomized, so that many OSDs reached it at the same time. As a consequence, such OSDs incurred high latency because they all split directories at once. With this update, the split threshold is randomized which ensures that OSDs split directories over a large period of time.
Logging the time out of disk operations
Ceph OSDs now log when they shutdown due to disk operations timing out by default.
--yes-i-really-mean-it override option is mandatory for executing the
radosgw-admin orphans find command
radosgw-admin orphans find command can inadvertently remove data objects still in use, if followed by another operation, such as, a
rados rm command. Users are now warned before attempting to produce lists of potentially orphaned objects.
Perform offline compaction on an OSD
ceph-osdomap-tool now has a
compact command to perform offline compaction on an OSD’s
For S3 and Swift protocols, an option to list buckets/containers in natural (partial) order has been added
Listing containers in sorted order is canonical in both protocols, but is costly, and not required by some client applications. The performance and workload cost of S3 and Swift bucket/container listings is reduced for sharded buckets/containers when the
allow_unordered extension is used.
Asynchronous Garbage Collection
An asynchronous mechanism for executing the Ceph Object Gateway garbage collection using the
librados APIs has been introduced. The original garbage collection mechanism serialized all processing, and lagged behind applications in specific workloads. Garbage collection performance has been significantly improved, and can be tuned to specific site requirements.
Deploying Ceph using
ceph-ansible on Ubuntu
Previously, Red Hat did not provide the
ceph-ansible package for Ubuntu. With this release, you can use the Ansible automation application to deploy a Ceph Storage Cluster from an Ubuntu node. See Chapter 3 in the Red Hat Ceph Storage Installation Guide for Ubuntu for more details.
Chapter 4. Deprecated Functionality
This section provides an overview of functionality that has been deprecated in all minor releases up to this release of Red Hat Ceph Storage.
The Red Hat Storage Console
The Red Hat Storage Console has reached the end of its life cycle, and is deprecated. Use the Ansible automation application with the
ceph-ansible playbooks to install a Red Hat Storage Ceph cluster. For details, see the Installation Guide for Red Hat Enterprise Linux or Ubuntu.
For cluster monitoring, you can use the Red Hat Ceph Storage Dashboard that provides a monitoring dashboard to visualize the state of a cluster. For details, see the Monitoring Ceph Clusters with Red Hat Ceph Storage Dashboard section in the Administration Guide.
salt packages have been deprecated and removed
The installation of the Calamari web interface no longer requires the
salt packages, because of several security vulnerabilities. Remove the
salt packages manually to mitigate those security vulnerabilities, if they are installed.
Chapter 5. Known Issues
This section documents known issues found in this release of Red Hat Ceph Storage.
nfs-ganesha-rgw utility cannot write to the NFS mount, if SELinux is enabled
nfs-ganesha-rgw utility does not run in an unconfined SELinux domain. When SELinux is enabled, write operations to the NFS mount fails. To work around this issue, use SELinux in permissive mode.
The Ceph-pools Dashboard displays previously deleted pools
The Ceph-pools Dashboard continues to reflect the pools, which have been deleted from the Ceph Storage Cluster.
Installing the Red Hat Ceph Storage Dashboard with a non-default password fails
Currently, you must use the default password when installing the Red Hat Ceph Storage Dashboard. After the installation finishes, you can change the default password. For details see the Changing the default Red Hat Ceph Storage Dashboard password section in the Administration Guide for Red Hat Ceph Storage 2.
In the Red Hat Ceph Storage Dashboard, on reboot of an OSD node the OSD IDs are repeated
In the Ceph OSD Information dashboard, the OSD IDs are repeated on a reboot of an OSD node.
The Red Hat Ceph Storage Dashboard does not display certain graphs correctly
The graphs Top 5 Pools by Capacity Used, and Pool Capacity - Past 7 days are not displayed on the Ceph Pools and Ceph cluster dashboards. Also, on the Ceph OSD Information dashboard, the graph BlueStore IO Summary - all OSD’s @ 95%ile displays an Internal Error.
The Ceph version is not reflected in the Red Hat Ceph Storage Dashboard after the Monitor node is rebooted
In the Ceph Version Configuration section of the Ceph Cluster Dashboard, the Ceph Monitor version is reflects as "-" on a reboot of Ceph Monitor node.
When adding an OSD to the Red Hat Ceph Storage Dashboard, some details are not displayed
On adding an OSD node to a Ceph storage cluster, the details such as hostname, Disk/OSD Summary, and OSD versions of the newly added OSD are not displayed in the Ceph Backend Storage, Ceph Cluster, and Ceph OSD Information dashboards.
Installing and upgrading containerized Ceph fails
Using Full Qualified Domain Names (FQDN) in the
/etc/hostname file for containerized Ceph deployments will fail when installing and upgrading Ceph. When using the
ceph-ansible playbook to install Ceph, the installation will fail with the following error message:
"msg": "The task includes an option with an undefined variable. The error was: 'osd_pool_default_pg_num' is undefined
To work around the installation failure, change the FQDN in the
/etc/hostname file to the short host name on all nodes in the storage cluster. Next, rerun the
ceph-ansible playbook to install Ceph. When upgrading Ceph with the
rolling_update playbook, the upgrade will fail with the following error message:
"FAILED - RETRYING: container | waiting for the containerized monitor to join the quorum"
To work around the upgrade failure, change the FQDN in the
/etc/hostname file to the short host name on all nodes in the storage cluster. Next, restart the corresponding Ceph daemons running on each node in the storage cluster, then rerun the
rolling_update playbook to upgrade Ceph.
copy_admin_key option, when set to
true, does not copy the keyring to other nodes
ceph-ansible with the
copy_admin_key option set to
true, the administrator’s keyring does not copy to the other nodes in the Ceph Storage Cluster. To work around this issue, you must manually copy the administrator’s keyring file to the other nodes. For example, as the
root user on the Ceph Monitor node:
#scp /etc/ceph/<cluster_name>.client.admin.keyring <destination_node_name>:/etc/ceph/
Chapter 6. Notable Bug Fixes
This section describes bugs fixed in this release of Red Hat Ceph Storage that have significant impact on users.
OSD operations are no longer blocked when the
osd_scrub_sleep option is set
Previously, the scrubbing operation was moved into the unified operations queue, but the
osd_scrub_sleep option did not change. Consequently, setting the
osd_scrub_sleep option was blocking OSD operations. With this update, setting the
osd_scrub_sleep option no longer blocks OSD operations by doing the scrub sleep operation asynchronously.
Some OSDs fail to come up after reboot
Previously, on a machine with more than five OSDs, some OSDs failed to come up after a reboot because the
systemd unit for the
ceph-disk utility timed out after 120 seconds. With this release, the
ceph-disk code no longer fails, if the OSD
udev rule triggers prior to the mounting of the
Swift POST operations no longer generate random 500 errors
Previously, when making changes to the same bucket through multiple Ceph Object Gateways, under certain circumstances under heavy load, the Ceph Object Gateway returned a 500 error. With this release, the chances are reduced to cause a race condition.
In containerized deployment,
ceph-disk now retries when it cannot find a partition
Due to a possible race condition between kernel and the
udev utility, the device file for a partition was not created when the
ceph-disk utility searched for it. Consequently, the
ceph-disk utility could not create the partition. In this release, when
ceph-disk cannot find the partition, it retries the search again, thus working around this possible race condition.
Stale bucket index entries are no longer left over after object deletions
Previously, under certain circumstances, deleted objects were incorrectly interpreted as incomplete delete transactions because of an incorrect time. As a consequence, the delete operations were reported successful in the Ceph Object Gateway logs, but the deleted objects were not correctly removed from bucket indexes. The incorrect time comparison has been fixed, and deleting objects works correctly.
The Ceph Object Gateway no longer refuses an S3 upload when the Content-Type field is missing
When doing a Simple Storage Service (S3) upload, if the Content-Type field was missing from the policy part of the upload, then Ceph Object Gateway refused the upload with a 403 error:
Policy missing condition: Content-Type
With this update, the S3 POST policy does not require the Content-Type field.
The OSD no longer times out when backfilling
Previously, backfilling objects with hundreds of thousands of
omap entries could cause the OSD to time out. With this release, the backfilling process now reads a maximum of 8096
omap entries at a time, allowing the OSDs to continue running.
Swift buckets can now be accessed anonymously
Previously, it was not possible anonymously access a Swift bucket, even if the permissions allowed it. The logic to anonymously access Swift buckets was missing. With this release, that logic has been added. As a result, Swift buckets can now be accessed anonymously, if the permissions allow the access.
Unreconstructable object errors are not handled properly
During a backfill or recovery operation of an erasure coded pool, the unreconstructable object errors were not handled properly. As a consequence, the OSDs terminated unexpectedly with the following message:
osd/ReplicatedPG.cc: recover_replicas: object added to missing set for backfill, but is not in recovering, error!
With this update, the error handling has been corrected and two new placement group (PG) states have been added:
backfill_unfound. As a result, the OSD does not terminate unexpectedly, and the PG state indicates that the PG contains unfound objects.
The Ceph Object Gateway successfully starts after upgrading Red Hat OpenStack Platform 11 to 12
Previously, when upgrading Red Hat OpenStack Platform 11 to 12, the Ceph Object Gateway would fail to start because port 8080 was already in use by
haproxy. With this release, you can specify the IP address and port bindings for the Ceph Object Gateway. As a result, the Ceph Object Gateway will start properly.
Objects eligible for expiration are no longer infrequently passed over
Previously, due to an off-by-one error in expiration processing in the Ceph Object Gateway, objects eligible for expiration could infrequently be passed over, and consequently were not removed. The underlying source code has been modified, and the objects are no longer passed over.
Folders starting with an underscore (_) are not in the bucket index
Previously, a server-side copy mishandled object names starting with an underscore. This led to objects being created with two leading underscores. The Ceph Object Gateway code has been fixed to properly handle leading underscores. As a result, objects names with leading underscores behave correctly.
Fixed a memory leak with the Ceph Object Gateway
A buffer used to transfer incoming PUT data was incorrectly sized at the maximum chunk value of 4 MB. This was leading to a space leak of unused buffer space when PUTs of smaller objects were processed. The Ceph Object Gateway can leak space when processing large numbers of PUT requests less than 4M in size. As a result, the incorrect buffer sizing logic was fixed.
ceph-ansible now disables the Ceph Object Gateway service as expected when upgrading the OpenStack container
When upgrading the OpenStack container from version 11 to 12, the
ceph-ansible utility did not properly disable the Ceph Object Gateway service provided by the overcloud image. Consequently, the containerized Ceph Object Gateway service entered a failed state because the port it used was bound. The
ceph-ansible utility has been updated to properly disable the system Ceph Object Gateway service. As a result, the containerized Ceph Object Gateway service starts as expected after upgrading the OpenStack container from version 11 to 12.
ceph-ansible utility no longer fails when upgrading from Red Hat OpenStack Platform 11 to 12
Ceph containers set their socket name by either the short host name or by the fully qualified domain name (FQDN). Previously, the
ceph-ansible utility could not predict which host name type would be used. With this release,
ceph-ansible checks for both socket names.
Relocated some OSD options the
rolling-update.yml Ceph Ansible playbook
Previously, when doing a minor Ceph upgrade, for example, upgrading version 10.2.9 to 10.2.10, the
nodeep-scrub OSD options did not get applied. Since a daemon does not exist for these versions, the
mgr section in the
rolling-update.yml file was skipped. With this release, the OSD options are set properly after all the Ceph Monitors have been upgraded.
Slow OSD startup after upgrading to Red Hat Ceph Storage 2.5
Ceph Storage Clusters that have large
omap databases experience slow OSD startup due to scanning and repairing during the upgrade from Red Hat Ceph Storage 2.4 to 2.5. The rolling update may take longer than the specified time out of 5 minutes. Before running the Ansible
rolling_update.yml playbook, set the
handler_health_osd_check_delay option to 180 in the
An inconsistent PG state can reappear long after the PG was repaired
In rare circumstances after a PG has been repaired and the primary changes, the inconsistent state can falsely reappear, even without a scrub being performed. This bug fix cleans up stray scrub error counts to prevent this.
expected_num_objects option was not working as expected
Previously, when using the
ceph osd pool create command with
expected_num_objects option, placement group (PG) directories were not pre-created at pool creation time as expected, resulting in performance drops when filestore splitting occurred. With this update, the
expected_num_objects parameter is now passed through to filestore correctly, and PG directories for the expected number of objects are pre-created at pool creation time.
The Ceph Object Gateway handles requests for negative byte-range objects correctly
The Ceph Object Gateway was treating negative byte-range object requests as invalid, whereas such requests succeed and return the whole object in AWS S3. This caused applications which expected the AWS behavior for negative or other invalid range requests saw unexpected errors and possible failure. In this update, a new option
rgw_ignore_get_invalid_range was added to Ceph Object Gateway. When the
rgw_ignore_get_invalid_range option is
true (non-default), the Ceph Object Gateway behavior for invalid range requests is backward compatible with AWS.
Fixed the Ceph Object Gateway multiple site sync for versioned buckets and objects
Previously, internal Ceph Object Gateway multi-site sync logic behaved incorrectly in some scenarios when attempting to sync containers with S3 object versioning enabled. In particular, when a new object upload was followed immediately by an attribute or ACL setting operation. Objects in versioning-enabled containers would fail to sync in some scenarios. For example, when using the
s3cmd sync command to mirror a filesystem directory. With this update, the Ceph Object Gateway multi-site replication logic has been corrected for the known failure cases.
Improving performance of the Ceph Object Gateway when using SSL
The Ceph Object Gateway’s use of
libcurl was slower and had a bigger memory footprint. With this update, the Ceph Object Gateway reuses the
libcurl data structures, which improves SSL efficiency when authenticating using OpenStack Keystone with SSL.
Update to the
ceph-disk Unit Files
The transition to containerized Ceph left some
ceph-disk unit files. The files were harmless, but appeared as failing, which could be distressing to the operator. With this update, executing the
switch-from-non-containerized-to-containerized-ceph-daemons.yml playbook disables the
ceph-disk unit files too.
The listing of versioned-bucket objects was returning an additional entry
When listing large versioning-enabled buckets with a marker, that marker was also listed. Listings would include an extra duplicate entry for each 1000 objects in the bucket. With this update, the marker is no longer included in bucket listings, and the correct number of entries are returned.
Cache entries were not refreshing as expected
The new time-based metadata cache entry expiration logic did not include logic to update the expiration time on already-cached entries being updated in place. Cache entries became permanently stale after expiration, leading to a performance regression as metadata objects were effectively not cached and always read from the cluster. Logic was added to update the expiration time of cached entries when updated.
The Ceph Object Gateway was using large amounts of the CPU
Because of the linkage between the Ceph Object Gateway and
tcmalloc, a bug was found causing high CPU utilization when
tcmalloc tries to reclaim space for specific workloads. This bug seems to be
tcmalloc version specific. The linkage between the Ceph Object Gateway and
tcmalloc has been reverted for Red Hat Ceph Storage 2.
The Ceph Object Gateway retry logic can cause high-CPU utilization
A bug in the Ceph Object Gateway retry logic can cause a non-terminating condition in operations processing, which can lead to high-CPU utilization and less noticeable side effects. This high-CPU utilization triggered a "busy-loop" in various workloads. In this update, the error-handling logic has been fixed to handle this condition.
Reduce OSD memory usage for Ceph Object Gateway workloads
The OSD memory usage was tuned to reduce unnecessary usage, especially for Ceph Object Gateway workloads.
Ceph Monitor does not mark an OSD down when the cluster network is down
In some cases, when a new OSD was added into an existed storage cluster, the OSD heartbeat peers were not updated. This happened if the new OSD did not get any PGs mapped to it. With this fix, the existing OSDs will refresh their heartbeat peers when a new OSD joins the storage cluster. As a result, the Ceph Monitor marks the OSD daemon as down if the OSD node’s cluster network is down.
Better recovery from cache inconsistency for the Ceph Object Gateway nodes
When the Ceph Object Gateway nodes were experiencing a heavy load, cache transmission updates sent through the watch or notify requests were being lost. Consequently, certain Ceph Object Gateway nodes were left with stale cache data, which causes several problems, notably that the bucket index contained old data. With this update, secondary cache coherency mechanisms have been added:
- Bucket operations now look for errors that indicate cache inconsistency.
- Ability to forcibly refresh has been added.
- A timeout to bound the age of any cache entry, forcing an eventual refresh at some point has been added.
As a result, the Ceph Object Gateway nodes recover from cache inconsistency rather than entering a persistent, user-visible error state.
Chapter 7. Sources
The updated Red Hat Ceph Storage packages are available at the following locations:
- For Red Hat Enterprise Linux: http://ftp.redhat.com/redhat/linux/enterprise/7Server/en/RHCEPH/SRPMS/
- For Ubuntu: https://rhcs.download.redhat.com/ubuntu/