Bug 1110380 - Expose nova.conf virt_type parameter in staypuft
Summary: Expose nova.conf virt_type parameter in staypuft
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: rubygem-staypuft
Version: Foreman (RHEL 6)
Hardware: Unspecified
OS: Unspecified
high
low
Target Milestone: ga
: Installer
Assignee: Scott Seago
QA Contact: Toure Dunnon
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-06-17 14:14 UTC by Lars Kellogg-Stedman
Modified: 2019-09-09 16:16 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-08-21 18:04:34 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2014:1090 0 normal SHIPPED_LIVE Red Hat Enterprise Linux OpenStack Platform Enhancement Advisory 2014-08-22 15:28:08 UTC

Description Lars Kellogg-Stedman 2014-06-17 14:14:34 UTC
For testing the staypuft installer in a virtual environment it would be tremendously useful to be able to specify virt_type=qemu in nova.conf.  Setting this manually requires disabling puppet, which will otherwise reset virt_type to the default settinge every time it runs.

Comment 2 Russell Bryant 2014-06-19 14:29:32 UTC
I checked with danpb on IRC, and confirmed that when nova asks libvirt for a VM with KVM, it will invoke qemu such that it will fail if KVM can not be used.  So, this is needed for nova to work in a test environment using VMs.

Comment 3 Stephen Gordon 2014-06-19 14:38:40 UTC
To be explicit, appropriate action for now is to expose the kvm v qemu option.

Comment 4 Russell Bryant 2014-06-19 14:41:00 UTC
(In reply to Stephen Gordon from comment #3)
> To be explicit, appropriate action for now is to expose the kvm v qemu
> option.

Right, there are other values that nova accepts for this option, but they should *not* be allowed.

Comment 5 Stephen Gordon 2014-06-19 14:46:26 UTC
In the future we may also add support for other drivers, so I am thinking a radio option like this:

    Driver:
        (    ) Libvirt/KVM
        (    ) Libvirt/QEMU
        (    ) vCenter

Even though Libvirt/KVM and Libvirt/QEMU are really the same driver with different virt_type setting the this should be handled behind the scenes.

Similarly when we add vCenter it has a host of other options to configure, different to the Libvirt ones, but we can consider that in a later phase.

Comment 6 Russell Bryant 2014-06-19 14:56:00 UTC
Also note that packstack does this detection and setting automatically using the following bits:

  packstack/puppet/modules/packstack/lib/facter/is_virtual_packstack.rb

  Facter.add("is_virtual_packstack") do
    setcode do
      Facter::Util::Resolution.exec('grep hypervisor /proc/cpuinfo > /dev/null && echo true || echo false')
    end
  end

Comment 7 Russell Bryant 2014-06-19 14:57:55 UTC
(In reply to Russell Bryant from comment #6)
> Also note that packstack does this detection and setting automatically using
> the following bits:
> 
>   packstack/puppet/modules/packstack/lib/facter/is_virtual_packstack.rb
> 
>   Facter.add("is_virtual_packstack") do
>     setcode do
>       Facter::Util::Resolution.exec('grep hypervisor /proc/cpuinfo >
> /dev/null && echo true || echo false')
>     end
>   end

While this seems like a handy puppet approach to doing the check, I don't think it's right.  I don't get this on my laptop for example.  I think the check needs to be for something else (vmx or svm, I think).

Comment 18 errata-xmlrpc 2014-08-21 18:04:34 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2014-1090.html


Note You need to log in before you can comment on or make changes to this bug.