Hi Jason. Well, I don't tried that, because I am afraid to break something :/ I don’t really understand what are you doing there :( Thanks anyways. Regards Torsten > Am 31.07.2020 um 16:46 schrieb Torsten Ennenbach <tennenbach@xxxxxxxxxxxx>: > > Wow, > > Thx I will try this asap. Thats a … solution… > Unfortunately I can’t, tell you how this is happened :( > > As far as I remember, this images was a cloned snapshot, without deep-flatten active as feature. > > Thx Jason. > > -- > > >> Am 31.07.2020 um 14:43 schrieb Jason Dillaman <jdillama@xxxxxxxxxx <mailto:jdillama@xxxxxxxxxx>>: >> >> On Fri, Jul 31, 2020 at 8:10 AM Torsten Ennenbach >> <tennenbach@xxxxxxxxxxxx <mailto:tennenbach@xxxxxxxxxxxx>> wrote: >>> >>> Hi Jason >>> >>>> Am 31.07.2020 um 14:08 schrieb Jason Dillaman <jdillama@xxxxxxxxxx <mailto:jdillama@xxxxxxxxxx>>: >>>> >>>> rados >>>> -p rbd listomapvals rbd_header.f907bc6b8b4567 >>> >>> rados -p rbd listomapvals rbd_header.f907bc6b8b4567 >>> error getting omap keys rbd/rbd_header.f907bc6b8b4567: (2) No such file or directory >> >> Ack. This can be fixed, but do you have any idea how the child image >> was removed? The removal process should delete its link to the parent >> before it's actually deleted (same w/ the flatten process). If there >> is some bug allowing images to slip through, I would like to fix it. >> >> First step to removing that link manually will be to get the image id >> of the "delete-me-please" image via "rbd info". You can then run the >> following to find the matching key entry for that image id (it's >> buried in a binary blob): >> >> (looking for 106e8126b1f2 in my example) >> $ rados -p rbd listomapvals rbd_children >> <..... snip ....> >> key (32 bytes): >> 00000000 02 00 00 00 00 00 00 00 0c 00 00 00 31 30 36 65 |............106e| >> 00000010 38 31 32 36 62 31 66 32 04 00 00 00 00 00 00 00 |8126b1f2........| >> 00000020 >> >> value (19 bytes) : >> 00000000 01 00 00 00 0b 00 00 00 31 30 37 37 64 32 36 64 |........1077d26d| >> 00000010 38 66 64 |8fd| >> 00000013 >> < .... snip .... > >> >> You will then need to use hexedit (or something similar) to create a >> file w/ that exact binary key value that matches your image id. Below >> I've tweaked the hex from above key to match the xxd import format: >> >> $ cat <<EOF > key.txt >>> 00000000: 02 00 00 00 00 00 00 00 0c 00 00 00 31 30 36 65 ............106e >>> 00000010: 38 31 32 36 62 31 66 32 04 00 00 00 00 00 00 00 8126b1f2........ >>> EOF >> $ xxd -r -g 1 key.txt key.bin >> $ xxd -g 1 key.bin >> 00000000: 02 00 00 00 00 00 00 00 0c 00 00 00 31 30 36 65 ............106e >> 00000010: 38 31 32 36 62 31 66 32 04 00 00 00 00 00 00 00 8126b1f2........ >> >> You can now provide that binary key file to rados to remove the offending key: >> >> $ rados -p rbd rmomapkey rbd_children --omap-key-file key.bin >> >> >>> >>> Torsten >>> _______________________________________________ >>> ceph-users mailing list -- ceph-users@xxxxxxx <mailto:ceph-users@xxxxxxx> >>> To unsubscribe send an email to ceph-users-leave@xxxxxxx <mailto:ceph-users-leave@xxxxxxx> >>> >> >> >> -- >> Jason >> > _______________________________________________ ceph-users mailing list -- ceph-users@xxxxxxx To unsubscribe send an email to ceph-users-leave@xxxxxxx