Bug 2101949

Summary: [RHOSP 16.1] Remove processes plugin from list of default plugins for collectd deployments
Product: Red Hat OpenStack Reporter: Leif Madsen <lmadsen>
Component: openstack-tripleo-heat-templatesAssignee: Leif Madsen <lmadsen>
Status: CLOSED ERRATA QA Contact: Leonid Natapov <lnatapov>
Severity: medium Docs Contact: Joanne O'Flynn <joflynn>
Priority: medium    
Version: 16.1 (Train)CC: astupnik, jelynch, joflynn, lnatapov, mburns
Target Milestone: z9Keywords: Triaged
Target Release: 16.1 (Train on RHEL 8.2)   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openstack-tripleo-heat-templates-11.3.2-1.20220705063839.29a02c1.el8ost Doc Type: Removed functionality
Doc Text:
In Red Hat OpenStack Platform (RHOSP) 16.1.9, the collectd processes plugin is removed from the default list of plugins. Loading the plugin can cause flooding issues and does not provide value when running in a containerized environment because it only recognizes the collectd and sensubility processes rather than the expected system processes. Bug fixes and support will be provided through the end of the 16.1.9 lifecycle but no new feature enhancements will be made.
Story Points: ---
Clone Of: 2101944 Environment:
Last Closed: 2022-12-07 20:29:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2101944    
Bug Blocks: 2101948    

Comment 6 Leonid Natapov 2022-11-06 04:37:07 UTC
CollectdDefaultPlugins:
    default:
      - cpu
      - df
      - disk
      - hugepages
      - interface
      - load
      - memory
      - unixsock
      - uptime

Comment 15 errata-xmlrpc 2022-12-07 20:29:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat OpenStack 16.1.9 (openstack-tripleo-heat-templates) security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:8796