Re: [Openstack-operators] Migration Openstack Instances and cloud-init

2016-07-04 Thread Michael Stang
Hi Hamza,
 
thank you for your answere. So I have to comment out the modules i don't want to
run when I understand this right?
 
Why are the changes made to the instance when I start a snapshot of the instance
and not every time when I start the instance itself? What event triggers the
cloud-init to make this changes?
 
What would happen when I remove the cloud-init package, will the instance still
be working and what disadventages would I have then?
 
Thank you and kind regards,
Michael
 
 

> Achi Hamza  hat am 2. Juli 2016 um 14:30 geschrieben:
> 
>  Hi Michael,
>   
>  You can change this behavior in the /etc/cloud/cloud.cfg config file.
>   
>  Regards,
>  Hamza
> 
>  On 1 July 2016 at 07:02, Michael Stang  mailto:michael.st...@dhbw-mannheim.de > wrote:
>> >Hi all,
> > 
> >I tried to copy instances (based on the ubuntu cloud image) from our
> > production cloud to our test cloud according to this description
> > 
> > 
> >   
> > http://docs.openstack.org/user-guide/cli_use_snapshots_to_migrate_instances.html
> > 
> >but when I start the instance on the test cloud the root password ist
> > resetet and it seems that the cloud-init is invoked and change the instance
> > like it is the first start. Is there a way to prevent this behaviour so the
> > instance stays unchanged when I start it on the test cloud?
> > 
> >Thanks and kind regards,
> >Michael
> > 
> >___
> >OpenStack-operators mailing list
> >OpenStack-operators@lists.openstack.org
> > mailto:OpenStack-operators@lists.openstack.org
> >http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators
> >  > 

 
Viele Grüße

Michael Stang
Laboringenieur, Dipl. Inf. (FH)

Duale Hochschule Baden-Württemberg Mannheim
Baden-Wuerttemberg Cooperative State University Mannheim
ZeMath Zentrum für mathematisch-naturwissenschaftliches Basiswissen
Fachbereich Informatik, Fakultät Technik
Coblitzallee 1-9
68163 Mannheim

Tel.: +49 (0)621 4105 - 1367
michael.st...@dhbw-mannheim.de
http://www.dhbw-mannheim.de___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators


Re: [Openstack-operators] [nova] Fail build request if we can't inject files?

2016-07-04 Thread Daniel P. Berrange
On Sun, Jul 03, 2016 at 10:08:04AM -0500, Matt Riedemann wrote:
> I want to use the gate-tempest-dsvm-neutron-full-ssh in nova since it runs
> ssh validation + neutron + config drive + metadata service, which will test
> the virtual device tagging 2.32 microversion API (added last week).
> 
> The job has a file injection test that fails consistently which is keeping
> it from being voting.
> 
> After debugging, the problem is the files to inject are silently ignored
> because n-cpu is configured with libvirt.inject_partition=-2 by default.
> That disables file injection:
> 
> https://github.com/openstack/nova/blob/faf50a747e03873c3741dac89263a80112da915a/nova/virt/libvirt/driver.py#L3030
> 
> We don't even log a warning if the user requested files to inject and we
> can't honor it. If I were a user and tried to inject files when creating a
> server but they didn't show up in the guest, I'd open a support ticket
> against my cloud provider. So I don't think a warning (that only the admin
> sees) is sufficient here. This isn't something that's discoverable from the
> API either, it's really host configuration / capability (something we still
> need to tackle).

Won't the user provided files also get made available by the config drive /
metadata service ?  I think that's the primary reason for file injection not
being a fatal problem. Oh that and the fact that we've wanted to kill it for
at least 3 years now :-)

Regards,
Daniel
-- 
|: http://berrange.com  -o-http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org  -o- http://virt-manager.org :|
|: http://autobuild.org   -o- http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org   -o-   http://live.gnome.org/gtk-vnc :|

___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators


Re: [Openstack-operators] [openstack-dev] [nova] Fail build request if we can't inject files?

2016-07-04 Thread Roman Podoliaka
Hi all,

> Won't the user provided files also get made available by the config drive /
> metadata service ?

I believe, they should.

Not sure it's the same problem, so just FYI: we recently encountered
an issue with VFAT formatted config drives when nova-compute is
deployed on CentOS or RHEL:

https://bugs.launchpad.net/cirros/+bug/1598783
https://bugs.launchpad.net/mos/+bug/1587960

Thanks,
Roman

___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators


Re: [Openstack-operators] [nova] Fail build request if we can't inject files?

2016-07-04 Thread Matt Riedemann

On 7/4/2016 3:40 AM, Daniel P. Berrange wrote:


Won't the user provided files also get made available by the config drive /
metadata service ?  I think that's the primary reason for file injection not
being a fatal problem. Oh that and the fact that we've wanted to kill it for
at least 3 years now :-)

Regards,
Daniel



Ugh, good point, except force_config_drive defaults to False and running 
the metadata service is optional.


In the case of this failing in the tempest-dsvm-neutron-full-ssh job, 
the instance is not created with a config drive, but the metadata 
service is running. Tempest doesn't check for the files there though 
because it's configured to expect file injection to work, so it ssh's 
into the guest and looks for the files.


I have several changes up related to this:

https://review.openstack.org/#/q/topic:bug/1598581

One is making Tempest disable file injection tests by default since Nova 
disables file injection by default (at least for the libvirt driver).


Another is changing devstack to actually configure nova/tempest for file 
injection which is what the job should have been doing anyway.


My nova fix is not going to fly because of config drive (which I could 
check from the virt driver) and the metadata service (which I can't from 
the virt driver). So I guess the best we can do is log something...


--

Thanks,

Matt Riedemann


___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators


Re: [Openstack-operators] [gnocchi] profiling and benchmarking 2.1.x

2016-07-04 Thread gordon chung
hi folks,

i didn't get as far as i'd hope so i've decided to release what i have 
currently and create another deck for more 'future enhancements' 
benchmarking.

the following deck aims to show how performance changes as you scale out 
Ceph and some configuration options that can help stabilise Gnocchi+Ceph 
performance: http://www.slideshare.net/GordonChung/gnocchi-profiling-v2.

this is by no means a large scale architecture -- the tests are run 
against tens of thousands metrics currently -- but it's a start until we 
get more data. i'm hoping to test against a larger dataset going 
forward. also, will be testing some enhancements we've been discussing 
for Gnocchi 3.x

hope it helps.

cheers,


On 25/06/2016 8:50 AM, Curtis wrote:
> On Fri, Jun 24, 2016 at 2:09 PM, gordon chung  wrote:
>> hi,
>>
>> i realised i didn't post this beyond IRC, so here are some initial
>> numbers for some performance/benchmarking i did on Gnocchi.
>>
>> http://www.slideshare.net/GordonChung/gnocchi-profiling-21x
>>
>> as a headsup, the data above is using Ceph and with pretty much a
>> default configuration. i'm currently doing more tests to see how it
>> works if you actually start turning some knobs on Ceph (spoiler: it gets
>> better).
>
> Thanks Gordon. I will definitely take a look through your slides.
> Looking forward to what test results you get when you start turning
> some knobs.
>
> Thanks,
> Curtis.
>
>>
>> cheers,
>>
>> --
>> gord
>> ___
>> OpenStack-operators mailing list
>> OpenStack-operators@lists.openstack.org
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators
>
>
>

-- 
gord
___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators


[Openstack-operators] Quota exceeded for resources: ['security_group'].

2016-07-04 Thread ????????
hi everyone,

when i create cluster:
openstack dataprocessing cluster create --json my_cluster_create_vmdk.json


with??


sudo vim my_worker_template_create_vmdk.json  
{
"plugin_name": "vanilla-vmdk",
"hadoop_version": "2.7.1",
"node_processes": [
"nodemanager",
"datanode"
],
"name": "vanilla-vmdk-worker",
"floating_ip_pool": "public",
"flavor_id": "2",
"auto_security_group": true
}
sudo vim my_master_template_create_vmdk.json  
{
"plugin_name": "vanilla",
"hadoop_version": "2.7.1",
"node_processes": [
"namenode",
"resourcemanager"
],
"name": "vanilla-vmdk-master",
"floating_ip_pool": "public",
"flavor_id": "2",
"auto_security_group": true
}



it is error in sahara.log:


2016-07-05 11:37:08.427 45905 DEBUG heatclient.common.http 
[req-83467fbd-ca47-42eb-9988-5b138df783c9 7fff70fbbf83441a9b3c4d91a5613825 
6cb156a82d0f486a9f50132be9438eb6 - - -] [instance: none, cluster: 
0271f779-0900-456b-a34f-a951f77e3114] curl -g -i -X POST -H 'Accept: 
application/json' -H 'User-Agent: python-heatclient' -H 'Content-Type: 
application/json' -H 'X-Auth-User: sahara' -H 'X-Auth-Token: 
{SHA1}9ffea1e4748e333888f830a439074ebfa6c0513d' -d '{"files": 
{"file://master.yaml": "description: 'Data Processing Cluster by Sahara\n\n  
Sahara cluster name: my-cluster-vmdk-2\n\n  Sahara engine: heat.3.0\n\n  Node 
group master'\nheat_template_version: '2013-05-23'\noutputs:\n  instance:\n
value:\n  name:\nget_attr: [inst, name]\n  physical_id: 
{get_resource: inst}\nparameters:\n  instance_index: {type: 
string}\nresources:\n  floating_ip:\nproperties: {pool: public}\ntype: 
OS::Nova::FloatingIP\n  floating_ip_assoc:\nproperties:\n  floating_ip: 
{get_resource: floating_ip}\n  server_id: {get_resource: inst}\ntype: 
OS::Nova::FloatingIPAssociation\n  inst:\nproperties:\n  admin_user: 
sahara\n  flavor: '2'\n  image: 3355bf5d-798f-4f50-b83c-daa417fe4189\n  
key_name: my_stack\n  name:\nlist_join:\n- '-'\n
- - my-cluster-vmdk-2\n  - master\n  - {get_param: 
instance_index}\n  security_groups:\n  - {get_resource: 
my-cluster-vmdk-2-master-ef810b61}\n  user_data:\nstr_replace:\n
  params:\nwc_notify:\n  get_attr: 
[master-wc-handle, curl_cli]\n  template: \"#!/bin/bash\\necho 
\\\"ssh-rsa 
B3NzaC1yc2EDAQABAAABAQC/DWL+Mq3JV3LU6PvFowPIJSeu2BTCTNi1gUScGd7f15ykQzisczg0upM5Xd12uVqIGgPmC7grB2LTxL2T7Kqe9GOyqZskgff18YjCBCWRpsdWqmnQVQGpGvfYHPgvWxUPc+3Cu60JBWe775w5AFrBbZCRHE/dgrvhgXxJUUnkmxrTgf4oEc+sEq8o0s7s5ro4wOrT6Fqeo5QkDYMkKkGqBL41NGQrRQnuY8HwT64u9ZY6aoqHYkRDVwJManpemauwpuRywooP0fiQPy5lxNZYCko6KEUpzm7zlP4NTirEEeZxKgFaF0WE70BbJQVi5r3IsQTd0IdIW05I3TvOw6J5\\\n
\\ Generated-by-Sahara\\n\\\" >> 
/home/sahara//.ssh/authorized_keys\\n\\n# ==\\\n\\ COMMENT OUT 
Defaults requiretty in /etc/sudoers \\nsed '/^Defaults\\\n
\\requiretty*/ s/^/#/' -i /etc/sudoers\\n\\n\\n\\nwhile true; do\\n
wc_notify\\\n\\ --insecure --data-binary '{\\\"status\\\": 
\\\"SUCCESS\\\"}'\\nif [ $? -eq\\\n\\ 0 ]; then\\n
break\\nfi\\nsleep 10\\ndone\\n\"\ntype: OS::Nova::Server\n  
master-wc-handle: {type: 'OS::Heat::WaitConditionHandle'}\n  
master-wc-waiter:\ndepends_on: inst\nproperties:\n  handle: 
{get_resource: master-wc-handle}\n  timeout: 3600\ntype: 
OS::Heat::WaitCondition\n  my-cluster-vmdk-2-master-ef810b61:\n
properties:\n  GroupDescription: 'Data Processing Cluster by Sahara\n\n 
   Sahara cluster name: my-cluster-vmdk-2\n\nSahara engine: 
heat.3.0\n\nAuto security group for Sahara Node Group: master'\n  
SecurityGroupIngress:\n  - {CidrIp: 0.0.0.0/0, FromPort: '8088', 
IpProtocol: tcp, ToPort: '8088'}\n  - {CidrIp: '::/0', FromPort: '8088', 
IpProtocol: tcp, ToPort: '8088'}\n  - {CidrIp: 0.0.0.0/0, FromPort: '8032', 
IpProtocol: tcp, ToPort: '8032'}\n  - {CidrIp: '::/0', FromPort: '8032', 
IpProtocol: tcp, ToPort: '8032'}\n  - {CidrIp: 0.0.0.0/0, FromPort: 
'50070', IpProtocol: tcp, ToPort: '50070'}\n  - {CidrIp: '::/0', FromPort: 
'50070', IpProtocol: tcp, ToPort: '50070'}\n  - {CidrIp: 0.0.0.0/0, 
FromPort: '9000', IpProtocol: tcp, ToPort: '9000'}\n  - {CidrIp: '::/0', 
FromPort: '9000', IpProtocol: tcp, ToPort: '9000'}\n  - {CidrIp: 0.0.0.0/0, 
FromPort: '22', IpProtocol: tcp, ToPort: '22'}\n  - {CidrIp: '::/0', 
FromPort: '22', IpProtocol: tcp, ToPort: '22'}\ntype: 
AWS::EC2::SecurityGroup\n", "file://worker.yaml": "description: 'Data 
Processing Cluster by Sahara\n\n  Sahara cluster name: my-cluster-vmdk-2\n\n  
Sahara engine: heat.3.0\n\n  Node group worker'\nheat_template_version: 
'2013-05-2

Re: [Openstack-operators] Quota exceeded for resources: ['security_group'].

2016-07-04 Thread Vincent Legoll (IdGC)

Hello,

Le 05/07/2016 06:02, 云淡风轻 a écrit :

when i create cluster:
 openstack dataprocessing cluster create --json my_cluster_create_vmdk.json

[...]

How to deal it ,thanks !


Look at the actual quotas:

$ nova quota-show | grep security_group
| security_groups | 10|
| security_group_rules| 20|

Then grow them a bit:

$ nova quota-update --security-groups 11 --security-group-rules 21 

There's the equivalent unified client (openstack) commands, should be easy to 
find

Hope this helps

--
Vincent Legoll
EGI FedCloud task force
Cloud Computing at IdGC
France Grilles / CNRS / IPHC

___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators