Bug 1500529 - The output from "openstack overcloud container image prepare" should exclude lines with neutron in OSP12
Summary: The output from "openstack overcloud container image prepare" should exclude ...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: python-tripleoclient
Version: 12.0 (Pike)
Hardware: Unspecified
OS: Unspecified
urgent
urgent
Target Milestone: rc
: 12.0 (Pike)
Assignee: Steve Baker
QA Contact: Alexander Chuzhoy
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-10-10 20:46 UTC by Alexander Chuzhoy
Modified: 2018-02-05 19:15 UTC (History)
8 users (show)

Fixed In Version: python-tripleoclient-7.3.3-1.el7ost openstack-tripleo-common-7.6.3-0.20171028055750.el7ost
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-12-13 22:13:59 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2017:3462 0 normal SHIPPED_LIVE Red Hat OpenStack Platform 12.0 Enhancement Advisory 2018-02-16 01:43:25 UTC

Description Alexander Chuzhoy 2017-10-10 20:46:16 UTC
The output from "openstack overcloud container image prepare" should exclude lines with neutron in OSP12.

Environment:
openstack-tripleo-common-7.6.1-0.20170926174320.el7ost.noarch
python-tripleoclient-7.3.1-0.20170925220840.f114a61.el7ost.noarch

Currently running "openstack overcloud container image prepare" also generate lines with neutron. These lines shouldn't be there.

Comment 1 Jon Schlueter 2017-10-10 20:53:04 UTC
By including the tech-preview images it imposes the extra bandwidth and storage for the extra unused container images.  But this is at the risk of extra complexity and additional parameter if you want to access the tech-preview bits.

From a generated file these should probably be dropped if you don't specify a --tech-preview option for the prepare command.

- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-dhcp-agent-docker:20171004.1
- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-l3-agent-docker:20171004.1
- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-metadata-agent-docker:20171004.1
- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-openvswitch-agent-docker:20171004.1
- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-server-docker:20171004.1
- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-server-opendaylight-docker:20171004.1
- imagename: docker-registry.engineering.redhat.com/rhosp12/openstack-neutron-sriov-agent-docker:20171004.1

Comment 2 Alexander Chuzhoy 2017-10-11 13:55:52 UTC
This affects deployments with local registry, as this step isn't needed for remote registry scenario.

Comment 3 Martin André 2017-10-11 14:27:54 UTC
See my comment [1] in bug #1500528. The images can be filtered out if you pass it your roles_data.yaml and heat environment files to the prepare command.

I'm tempted to mark this bug as a duplicate of #1500528 since the issue will go away once we include the docker.yaml and docker-ha.yaml heat environment files by default in the prepare command.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1500528#c2

Comment 4 Steve Baker 2017-10-12 02:22:56 UTC
This one is a bit different to bug 1500528 and bug 1500531 because the images are built, they're just tech-preview.

Since this is just for optimising storage and transfer time, I don't think this is urgent, but it is worth discussing the possible options.

In this case I think Martin's suggestion is best, there is already a mechanism to filter by only the images which will be used (tech-preview or other). That mechanism is to run prepare with the --service-environment-file and --roles-file arguments.

Another option to hide the existence of tech-preview images is to add a conditional block to overcloud_containers.yaml.j2 so they only get the tech-preview images if they add an argument like this to the prepare call

  --set tech-preview-images=true

I'm setting needinfo for anyone on which approach we should do

Comment 5 Martin André 2017-10-12 15:05:39 UTC
I'd be careful about adding more options to the prepare command, it's already quite complex to use as it today.

I think this bug goes away once we add the docker.yaml and docker-ha.yaml files by default to the prepare command, since the downstream files do not include the containerized neutron.

Comment 8 Alexander Chuzhoy 2017-10-31 16:23:05 UTC
FailedQA.

Environment:
python-tripleoclient-7.3.3-0.20171019055723.153bc4f.el7ost.noarch



Result:

openstack overcloud container image prepare|grep neutron
- imagename: tripleoupstream/centos-binary-neutron-dhcp-agent:latest
- imagename: tripleoupstream/centos-binary-neutron-l3-agent:latest
- imagename: tripleoupstream/centos-binary-neutron-metadata-agent:latest
- imagename: tripleoupstream/centos-binary-neutron-openvswitch-agent:latest
- imagename: tripleoupstream/centos-binary-neutron-sriov-agent:latest
- imagename: tripleoupstream/centos-binary-neutron-server:latest
- imagename: tripleoupstream/centos-binary-neutron-server-ovn:latest




(undercloud) [stack@undercloud-0 dd]$ grep neutron rhos12.yaml 
  DockerNeutronApiImage: 192.168.24.1:8787/openstack-neutron-server-docker:latest
  DockerNeutronConfigImage: 192.168.24.1:8787/openstack-neutron-server-docker:latest
  DockerNeutronDHCPImage: 192.168.24.1:8787/openstack-neutron-dhcp-agent-docker:latest
  DockerNeutronL3AgentImage: 192.168.24.1:8787/openstack-neutron-l3-agent-docker:latest
  DockerNeutronMetadataImage: 192.168.24.1:8787/openstack-neutron-metadata-agent-docker:latest
  DockerNeutronOvnApiImage: 192.168.24.1:8787/openstack-neutron-server-ovn-docker:latest
  DockerNeutronOvnConfigImage: 192.168.24.1:8787/openstack-neutron-server-ovn-docker:latest
  DockerNeutronSriovImage: 192.168.24.1:8787/openstack-neutron-sriov-agent-docker:latest
  DockerOpenvswitchImage: 192.168.24.1:8787/openstack-neutron-openvswitch-agent-docker:latest


  DockerNeutronApiImage: 192.168.24.1:8787/openstack-neutron-server-docker:latest
  DockerNeutronConfigImage: 192.168.24.1:8787/openstack-neutron-server-docker:latest
  DockerNeutronDHCPImage: 192.168.24.1:8787/openstack-neutron-dhcp-agent-docker:latest
  DockerNeutronL3AgentImage: 192.168.24.1:8787/openstack-neutron-l3-agent-docker:latest
  DockerNeutronMetadataImage: 192.168.24.1:8787/openstack-neutron-metadata-agent-docker:latest
  DockerNeutronOvnApiImage: 192.168.24.1:8787/openstack-neutron-server-ovn-docker:latest
  DockerNeutronOvnConfigImage: 192.168.24.1:8787/openstack-neutron-server-ovn-docker:latest
  DockerNeutronSriovImage: 192.168.24.1:8787/openstack-neutron-sriov-agent-docker:latest
  DockerOpenvswitchImage: 192.168.24.1:8787/openstack-neutron-openvswitch-agent-docker:latest

Comment 10 Jon Schlueter 2017-11-03 15:59:26 UTC
fixes are in latest build

Comment 12 Alexander Chuzhoy 2017-11-08 16:41:38 UTC
The "fixed in version" should probably be python-tripleoclient-7.3.2-2.el7ost

Note that using python-tripleoclient-7.3.3-0 re-introduces the issue.

Comment 13 Jon Schlueter 2017-11-08 17:28:28 UTC
upgrades is running into issue with 7.3.3-0.XXXX dlrn build is greater than 7.3.2-2 stable tarball build

Just bumped to 7.3.3 upstream tag which pulls in 2 more patches than we had but looks sane and will be part of next import

Comment 15 Alexander Chuzhoy 2017-11-15 15:14:40 UTC
Verified:
python-tripleoclient-7.3.3-3.el7ost.noarch
openstack-tripleo-common-7.6.3-3.el7ost.noarch

The output from "openstack overcloud container image prepare" command doesn't include lines with neutron now.

Comment 18 errata-xmlrpc 2017-12-13 22:13:59 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2017:3462


Note You need to log in before you can comment on or make changes to this bug.