Bug 1468225

Summary: mongodb fills with event type of "objectstore.http.request" with gnocchi driver=swift
Product: Red Hat OpenStack Reporter: Pradeep Kilambi <pkilambi>
Component: python-ceilometermiddlewareAssignee: RHOS Maint <rhos-maint>
Status: CLOSED ERRATA QA Contact: Sasha Smolyak <ssmolyak>
Severity: urgent Docs Contact:
Priority: urgent    
Version: 10.0 (Newton)CC: aguetta, apevec, david.costakos, dwilson, ebarrera, jdanjou, jjoyce, jraju, jschluet, lhh, mburns, mnadeem, pkilambi, rhel-osp-director-maint, sacpatil, sputhenp, srevivo, tvignaud, vaggarwa
Target Milestone: z4Keywords: Triaged, ZStream
Target Release: 10.0 (Newton)   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: python-ceilometermiddleware-0.5.1-3.el7ost, puppet-swift-9.5.0-2.el7ost, openstack-tripleo-heat-templates-5.2.0-23.el7ost Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 1416546 Environment:
Last Closed: 2017-09-06 17:06:29 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1416546    
Bug Blocks: 1468223    

Comment 7 Sadique Puthen 2017-07-24 13:47:42 UTC
Julien,

Is this https://review.openstack.org/#/c/478953/ also part of the backport for OSP-10? If no, can we include it as part of this bz?

Disable swift middleware ceilometer pipeline by default

This generates tons of unnecessary events when gnocchi uses swift backend.
We end up filtering most of these anyway. So lets disable this so it
doesn't put useless load. Also changing the default project to service as
thats what gnocchi uses to authenticate with swift.

Comment 12 Sasha Smolyak 2017-08-20 05:53:59 UTC
No events from swift, no resource in gnocchi resource list

Comment 14 errata-xmlrpc 2017-09-06 17:06:29 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:2653