73c1d300df
As per [1], patched monitors raise the AUTH_INSECURE_GLOBAL_ID_RECLAIM_ALLOWED health alert if auth_allow_insecure_global_id_reclaim is enabled. This is ok for general deployments, but it's not required in CI deployments. Adding this option to the mon section using the CephConfigOverrides approach ensures the cluster stay in health_ok. [1] https://docs.ceph.com/en/latest/security/CVE-2021-20288/ Change-Id: Ib8d3f62d233ce5a42e9923547c08add6e5859cfb |
||
---|---|---|
.. | ||
network | ||
README.rst | ||
ceph-min-osds.yaml | ||
disable-unbound.yaml | ||
multinode-containers.yaml | ||
multinode-core.yaml | ||
neutron_l3_qos.yaml | ||
neutron_sec_group_quota.yaml | ||
octavia-kvm.yaml | ||
ovb-ha.yaml | ||
scenario000-multinode-containers.yaml | ||
scenario000-standalone.yaml | ||
scenario001-multinode-containers.yaml | ||
scenario001-standalone.yaml | ||
scenario002-standalone.yaml | ||
scenario003-standalone.yaml | ||
scenario004-standalone.yaml | ||
scenario007-multinode-containers.yaml | ||
scenario007-standalone.yaml | ||
scenario010-multinode-containers.yaml | ||
scenario010-standalone.yaml | ||
scenario012-standalone.yaml | ||
scenario013-standalone.yaml | ||
standalone-ipa.yaml |
README.rst
This directory contains environments that are used in tripleo-ci.
They may change from release to release or within a release, and should
not be relied upon in a production environment. The top-level
environments
directory in tripleo-heat-templates contains
the production-ready environment files.