The year-old BZ 1016886 describes three problems that any libgfapi application would have, not just KVM. As for the rpc-auth-allow-insecure=on setting, has any progress been made in this area? I think this setting should be unnecessary, and it's really important in general that Gluster have some way of optionally authenticating clients other than by client port number. Do SSL sockets solve this problem of authenticating in the control plane? Two of these problems can be fixed by just altering the virt "group" -- the settings that you get with the gluster command - gluster volume set your-volume group virt And then just document that when you configure a volume for KVM virtualization, use the above command, right? This is why we have volume "group" feature, right? In /var/lib/glusterd/groups/virt file, it has this: [root@g60ds-1 groups]# more virt quick-read=off read-ahead=off io-cache=off stat-prefetch=off eager-lock=enable remote-dio=enable quorum-type=auto server-quorum-type=server Just add 1 lines to it: allow-insecure=on And change stat-prefetch to "on", and you'll have eliminated 2 of the 3 things that every KVM user has to do to Gluster. eager-lock is the default now so that can be removed. -ben ----- Original Message ----- > From: "Vijay Bellur" <vbellur@xxxxxxxxxx> > To: "Gluster Devel" <gluster-devel@xxxxxxxxxxx> > Sent: Monday, October 27, 2014 5:38:24 AM > Subject: Fwd: [ovirt-devel] Using libgfapi on Gluster Storage Domains > > FYI - if you are interested in trying out libgfapi support with oVirt. > > -Vijay > > ---------- Forwarded message ---------- > From: Federico Simoncelli < fsimonce@xxxxxxxxxx > > Date: Fri, Oct 24, 2014 at 12:06 AM > Subject: [ovirt-devel] Using libgfapi on Gluster Storage Domains > To: oVirt Development < devel@xxxxxxxxx > > > > Hi everyone, if you want to try and use the libgfapi support included > in qemu when accessing volumes on gluster storage domains you can try > to apply this patch: > > http://gerrit.ovirt.org/33768 > > As far as I know Jason Brooks already tried it and he reported a > positive feedback. > > What has been tested so far is: > > - qemu uses libgfapi to access the disks on gluster storage domains > > - hotplug of disks on gluster storage domains works as expected (libgfapi) > > - hotunplug works as expected (no failure when removing a disk that is > using libgfapi) > > - live snpashots work as expected > > - disks of vms started before this patch are not affected (they won't > use libgfapi since there's no way to do an hot swap) > > One major flow that is yet untested is live storage migration. > > Remember that you may need to do some special configuration on your > gluster volumes (most notably the allow-insecure ports option) as > described here: > > http://www.ovirt.org/Features/GlusterFS_Storage_Domain > > Please try and test the patch if you're interested and report your > feedback. > > Thanks, > -- > Federico > _______________________________________________ > Devel mailing list > Devel@xxxxxxxxx > http://lists.ovirt.org/mailman/listinfo/devel > > > _______________________________________________ > Gluster-devel mailing list > Gluster-devel@xxxxxxxxxxx > http://supercolony.gluster.org/mailman/listinfo/gluster-devel > _______________________________________________ Gluster-devel mailing list Gluster-devel@xxxxxxxxxxx http://supercolony.gluster.org/mailman/listinfo/gluster-devel