On Mon, Dec 18, 2017 at 3:20 PM, Martin Perina <mperina@redhat.com> wrote:On Mon, Dec 18, 2017 at 2:13 PM, Martin Sivak <msivak@redhat.com> wrote:The engine only updates a short list of packages during host deploy If I remember correctly.MartinNo longer true in 4.2: https://bugzilla.redhat.com/show_bug.cgi?id=1380498 Does it also apply for new host installtions or just upgrades?
On Mon, Dec 18, 2017 at 2:01 PM, Sandro Bonazzola <sbonazzo@redhat.com> wrote:2017-12-18 13:57 GMT+01:00 Eyal Edri <eedri@redhat.com>:On Mon, Dec 18, 2017 at 2:53 PM, Sandro Bonazzola <sbonazzo@redhat.com> wrote:2017-12-18 12:42 GMT+01:00 Yaniv Kaul <ykaul@redhat.com>:On Mon, Dec 18, 2017 at 12:43 PM, Sandro Bonazzola <sbonazzo@redhat.com> wrote:Hi, I'd like to discuss what's being tested by oVirt System Test.I'm investigating on a sanlock issue that affects hosted engine hc suite.I installed a CentOS minimal VM and set repositories as in http://jenkins.ovirt.org/job/ovirt-system-tests_hc-basic- suite-master/128/artifact/expo rted-artifacts/reposync-config .repo Upgrade from CentOS 1708 (7.4) minimal is:Aggiornamento:bind-libs-lite x86_64 32:9.9.4-51.el7_4.1 centos-updates-el7 733 kbind-license noarch 32:9.9.4-51.el7_4.1 centos-updates-el7 84 knss x86_64 3.28.4-15.el7_4 centos-updates-el7 849 knss-softokn x86_64 3.28.3-8.el7_4 centos-updates-el7 310 knss-softokn-freebl x86_64 3.28.3-8.el7_4 centos-updates-el7 214 knss-sysinit x86_64 3.28.4-15.el7_4 centos-updates-el7 60 knss-tools x86_64 3.28.4-15.el7_4 centos-updates-el7 501 kselinux-policy noarch 3.13.1-166.el7_4.7 centos-updates-el7 437 kselinux-policy-targeted noarch 3.13.1-166.el7_4.7 centos-updates-el7 6.5 Msystemd x86_64 219-42.el7_4.4 centos-updates-el7 5.2 Msystemd-libs x86_64 219-42.el7_4.4 centos-updates-el7 376 ksystemd-sysv x86_64 219-42.el7_4.4 centos-updates-el7 70 kEnabling the CentOS repos:grub2 x86_64 1:2.02-0.65.el7.centos.2 updates 29 kin sostituzione di grub2.x86_64 1:2.02-0.64.el7.centosgrub2-tools x86_64 1:2.02-0.65.el7.centos.2 updates 1.8 Min sostituzione di grub2-tools.x86_64 1:2.02-0.64.el7.centosgrub2-tools-extra x86_64 1:2.02-0.65.el7.centos.2 updates 993 kin sostituzione di grub2-tools.x86_64 1:2.02-0.64.el7.centosgrub2-tools-minimal x86_64 1:2.02-0.65.el7.centos.2 updates 170 kin sostituzione di grub2-tools.x86_64 1:2.02-0.64.el7.centoskernel x86_64 3.10.0-693.11.1.el7 updates 43 MAggiornamento:NetworkManager x86_64 1:1.8.0-11.el7_4 updates 1.6 MNetworkManager-libnm x86_64 1:1.8.0-11.el7_4 updates 1.2 MNetworkManager-team x86_64 1:1.8.0-11.el7_4 updates 156 kNetworkManager-tui x86_64 1:1.8.0-11.el7_4 updates 224 kNetworkManager-wifi x86_64 1:1.8.0-11.el7_4 updates 184 kbash x86_64 4.2.46-29.el7_4 updates 1.0 Mbind-libs-lite x86_64 32:9.9.4-51.el7_4.1 centos-updates-el7 733 kbind-license noarch 32:9.9.4-51.el7_4.1 centos-updates-el7 84 kbinutils x86_64 2.25.1-32.base.el7_4.1 updates 5.4 Mcpio x86_64 2.11-25.el7_4 updates 210 kcryptsetup-libs x86_64 1.7.4-3.el7_4.1 updates 223 kcurl x86_64 7.29.0-42.el7_4.1 updates 267 kglibc x86_64 2.17-196.el7_4.2 updates 3.6 Mglibc-common x86_64 2.17-196.el7_4.2 updates 11 Mgrub2-common noarch 1:2.02-0.65.el7.centos.2 updates 726 kgrub2-pc x86_64 1:2.02-0.65.el7.centos.2 updates 29 kgrub2-pc-modules noarch 1:2.02-0.65.el7.centos.2 updates 845 kiptables x86_64 1.4.21-18.2.el7_4 updates 428 kkernel-tools x86_64 3.10.0-693.11.1.el7 updates 5.1 Mkernel-tools-libs x86_64 3.10.0-693.11.1.el7 updates 5.0 Mkexec-tools x86_64 2.0.14-17.2.el7 updates 333 kkmod x86_64 20-15.el7_4.6 updates 120 kkmod-libs x86_64 20-15.el7_4.6 updates 50 klibblkid x86_64 2.23.2-43.el7_4.2 updates 176 klibcurl x86_64 7.29.0-42.el7_4.1 updates 219 klibgcc x86_64 4.8.5-16.el7_4.1 updates 98 klibgomp x86_64 4.8.5-16.el7_4.1 updates 154 klibmount x86_64 2.23.2-43.el7_4.2 updates 178 klibpciaccess x86_64 0.13.4-3.1.el7_4 updates 26 klibstdc++ x86_64 4.8.5-16.el7_4.1 updates 301 klibuuid x86_64 2.23.2-43.el7_4.2 updates 79 kncurses x86_64 5.9-14.20130511.el7_4 updates 304 kncurses-base noarch 5.9-14.20130511.el7_4 updates 68 kncurses-libs x86_64 5.9-14.20130511.el7_4 updates 316 knss x86_64 3.28.4-15.el7_4 centos-updates-el7 849 knss-softokn x86_64 3.28.3-8.el7_4 centos-updates-el7 310 knss-softokn-freebl x86_64 3.28.3-8.el7_4 centos-updates-el7 214 knss-sysinit x86_64 3.28.4-15.el7_4 centos-updates-el7 60 knss-tools x86_64 3.28.4-15.el7_4 centos-updates-el7 501 kopenssh x86_64 7.4p1-13.el7_4 updates 509 kopenssh-clients x86_64 7.4p1-13.el7_4 updates 654 kopenssh-server x86_64 7.4p1-13.el7_4 updates 458 kpython-gobject-base x86_64 3.22.0-1.el7_4.1 updates 294 kpython-perf x86_64 3.10.0-693.11.1.el7 updates 5.1 Mselinux-policy noarch 3.13.1-166.el7_4.7 centos-updates-el7 437 kselinux-policy-targeted noarch 3.13.1-166.el7_4.7 centos-updates-el7 6.5 Msudo x86_64 1.8.19p2-11.el7_4 updates 1.1 Msystemd x86_64 219-42.el7_4.4 centos-updates-el7 5.2 Msystemd-libs x86_64 219-42.el7_4.4 centos-updates-el7 376 ksystemd-sysv x86_64 219-42.el7_4.4 centos-updates-el7 70 ktzdata noarch 2017c-1.el7 updates 468 kutil-linux x86_64 2.23.2-43.el7_4.2 updates 2.0 Mwpa_supplicant x86_64 1:2.6-5.el7_4.1 updates 1.2 Mmeaning this environement is not receiving updates to core packages like the kernel.Restricting to libvirt, with the repos used in the job libvirt packages doesn't even exists, making yum install libvirt just fail.I think you already know I'm against filtering packages from the repos even if I understand it saves a huge amount of space and download time.I may be wrong, but I tend to not trust OST results since it's not testing real life environments. Any chance we can improve OST to match what users are going to have on their systems?Specifically for the hosted-engine use case, I had the same suspicion, so I patched Lago to use '--network' in virt-sysprep and added 'update' command to ensure all hosts are fully up-to-date when deployed.It did not solve the issue.Generally:1. Updating the images take quite some time, per run.2. I agree every X months we should be updating the images. Every Q for example. I've already discussed this with Gal. If CentOS would have released a new baseline, that would have been more real life scenario, btw.3. That being said, if you need a dependency, you need to depend on it, and we'll pull it. We do not ask (I think?) to 'yum update' your system before deploying oVirt.Actually yes, we require it. See https://ovirt.org/documentation/install-guide/chap-Insta lling_oVirt/ It explicitly says to yum update before proceeding with the deployment and reboot the machine if kernel has been updated.Isn't that just for engine side? do we have the same requirement for hypervisors as well?Not 100% sure but ovirt-engine in 4.2 should be performing yum update on host upgrade and this obviously don't pull in new packages if they are filtered out at repository level.Adding Martin to keep me honest on this.4. There were, luckily, very few o-s-t only issues thus far. It may happen, and we will run into those, but we have not so far encountered many. Some we did not bother pursue, though are clear bugs (I remember an annoying one with 'mount' command not getting back at all, etc.)Y.
_______________________________________________
Devel mailing list
Devel@ovirt.org
http://lists.ovirt.org/mailman/listinfo/devel --
_______________________________________________
Devel mailing list
Devel@ovirt.org
http://lists.ovirt.org/mailman/listinfo/devel --phone: +972-9-7692018
irc: eedri (on #tlv #rhev-dev #rhev-integ)
_______________________________________________
Devel mailing list
Devel@ovirt.org
http://lists.ovirt.org/mailman/listinfo/devel
--Martin Perina
Associate Manager, Software Engineering
Red Hat Czech s.r.o.--phone: +972-9-7692018
irc: eedri (on #tlv #rhev-dev #rhev-integ)