This makes me think that if I have a custom etc/kayobe/kolla/config/telegraf/telegraf.conf that it should be the one deployed to all nodes in the telegraf group, but that was ignored, instead it took the one from the venv.
EDIT: I think it's because there's no entry for /etc/kolla/config/telegraf on the Ensure the Kolla OpenStack configuration directories exist:
In that block about copying telegraf.conf in the telegraf role:
- name: Copying over telegraf config file services[ 'telegraf' ] }}" directory }}/telegraf/ telegraf. conf" service. group] telegraf. conf"
vars:
service: "{{ telegraf_
template:
src: "{{ item }}"
dest: "{{ node_config_
mode: "0660"
become: true
when:
- inventory_hostname in groups[
- service.enabled | bool
with_first_found:
- "{{ node_custom_config }}/telegraf/{{ inventory_hostname }}/telegraf.conf"
- "{{ node_custom_config }}/telegraf/
- "telegraf.conf.j2"
notify:
- Restart telegraf container
This makes me think that if I have a custom etc/kayobe/ kolla/config/ telegraf/ telegraf. conf that it should be the one deployed to all nodes in the telegraf group, but that was ignored, instead it took the one from the venv.
EDIT: I think it's because there's no entry for /etc/kolla/ config/ telegraf on the Ensure the Kolla OpenStack configuration directories exist:
TASK [kolla-openstack : Ensure the Kolla OpenStack configuration directories exist] ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* * kolla/config/ aodh', 'dest': '/etc/kolla/ config/ aodh', 'patterns': '*', 'enabled': 'no'}) kolla/config/ barbican' , 'dest': '/etc/kolla/ config/ barbican' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ blazar' , 'dest': '/etc/kolla/ config/ blazar' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ ceilometer' , 'dest': '/etc/kolla/ config/ ceilometer' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ cinder' , 'dest': '/etc/kolla/ config/ cinder' , 'patterns': '*', 'enabled': True}) kolla/config/ cloudkitty' , 'dest': '/etc/kolla/ config/ cloudkitty' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ designate' , 'dest': '/etc/kolla/ config/ designate' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ /fluentd/ filter' , 'dest': '/etc/kolla/ config/ fluentd/ filter' , 'patterns': '*.conf', 'enabled': True}) kolla/config/ /fluentd/ input', 'dest': '/etc/kolla/ config/ fluentd/ input', 'patterns': '*.conf', 'enabled': True}) kolla/config/ fluentd/ output' , 'dest': '/etc/kolla/ config/ fluentd/ output' , 'patterns': '*.conf', 'enabled': True}) kolla/config/ glance' , 'dest': '/etc/kolla/ config/ glance' , 'patterns': '*', 'enabled': True}) kolla/config/ gnocchi' , 'dest': '/etc/kolla/ config/ gnocchi' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ grafana' , 'dest': '/etc/kolla/ config/ grafana' , 'patterns': '*', 'enabled': True}) kolla/config/ haproxy' , 'dest': '/etc/kolla/ config/ haproxy' , 'patterns': '*', 'enabled': 'yes'}) kolla/config/ haproxy- config' , 'dest': '/etc/kolla/ config/ haproxy- config' , 'patterns': '*', 'enabled': 'yes'}) kolla/config/ heat', 'dest': '/etc/kolla/ config/ heat', 'patterns': '*', 'enabled': True}) kolla/config/ horizon' , 'dest': '/etc/kolla/ config/ horizon' , 'patterns': '*', 'enabled': True, 'untemplated_dirs': ['themes']}) kolla/config/ ', 'dest': '/etc/kolla/ config/ ', 'patterns': 'influx*', 'enabled': False}) kolla/config/ ironic' , 'dest': '/etc/kolla/ config/ ironic' , 'patterns': '*', 'enabled': 'no', 'ignore': ['ironic- agent.initramfs ', 'ironic- agent.kernel' ]}) kolla/config/ keystone' , 'dest': '/etc/kolla/ config/ keystone' , 'patterns': '*', 'enabled': True}) kolla/config/ keepalived' , 'dest': '/etc/kolla/ config/ keepalived' , 'patterns': '*', 'enabled': 'yes'}) kolla/config/ magnum' , 'dest': '/etc/kolla/ config/ magnum' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ manila' , 'dest': '/etc/kolla/ config/ manila' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ mariadb' , 'dest': '/etc/kolla/ config/ mariadb' , 'patterns': '*', 'enabled': 'yes'}) kolla/config/ masakari' , 'dest': '/etc/kolla/ config/ masakari' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ murano' , 'dest': '/etc/kolla/ config/ murano' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ neutron' , 'dest': '/etc/kolla/ config/ neutron' , 'patterns': '*', 'enabled': True, 'ignore': ['ml2_conf.ini']}) kolla/config/ nova', 'dest': '/etc/kolla/ config/ nova', 'patterns': '*', 'enabled': True}) kolla/config/ nova_compute' , 'dest': '/etc/kolla/ config/ nova_compute' , 'patterns': '*', 'enabled': True}) certificates/ libvirt' , 'dest': '/etc/kolla/ config/ nova/nova- libvirt' , 'patterns': ['clientcert.pem', 'clientkey.pem', 'cacert.pem'], 'enabled': False, 'untemplated': ['clientcert.pem', 'clientkey.pem', 'cacert.pem']}) certificates/ libvirt' , 'dest': '/etc/kolla/ config/ nova/nova- libvirt' , 'patterns': ['servercert.pem', 'serverkey.pem'], 'enabled': False, 'untemplated': ['servercert.pem', 'serverkey.pem']}) kolla/config/ octavia' , 'dest': '/etc/kolla/ config/ octavia' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ opensearch' , 'dest': '/etc/kolla/ config/ opensearch' , 'patterns': '*', 'enabled': False}) kolla/config/ placement' , 'dest': '/etc/kolla/ config/ placement' , 'patterns': '*', 'enabled': True}) kolla/config/ prometheus' , 'dest': '/etc/kolla/ config/ prometheus' , 'patterns': '*', 'enabled': True}) kolla/config/ sahara' , 'dest': '/etc/kolla/ config/ sahara' , 'patterns': '*', 'enabled': 'no'}) kolla/config/ swift', 'dest': '/etc/kolla/ config/ swift', 'patterns': '*', 'enabled': 'no', 'untemplated': ['account.builder', 'account.ring.gz', 'container. builder' , 'container. ring.gz' , 'object.builder', 'object.ring.gz']})
Saturday 10 February 2024 14:36:35 +0000 (0:00:00.091) 0:00:09.832 *****
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
ok: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/
skipping: [localhost] => (item={'src': '/etc/kayobe/