-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace ISC dhcp4-server with isc-kea-dhcp4-server #113
Conversation
Kea is the successor of ISC DHCP and will hopefully not cause problems as like issue #109.
I just looked into it; in the configuration docs is a topic about how to assign log levels to log topics like this:
The loggers are then listed in the logger section. Their severity can be set to log-level I'd really like to see us making use of this great feature as it would get rid of #70, finally. Please let me know what you think about this opportunity. |
The current proposed config logs events with a severity of WARN and above. Afaik lease information are already left out. I will keep an eye on it while deploying the first (test) installations. I would not recommend turning off logging at all (loglevel NONE). |
config syntax fixes use raw instead of udp socket stop sysv service before removing sysv files on initial install
Tested on sn01. Seems to work fine. |
Does this mean, it has been rolled out on all supernodes? |
Nope. Only on sn01 so far. Let's test it for some days before we break all our supernodes. |
On the hardly used sn01 we get a handful of "kea-dhcp4[XXX]: ERROR [kea-dhcp4.packets.140175791149824] DHCP4_BUFFER_RECEIVE_FAIL error on attempt to receive packet: Truncated DHCPv4 packet (len=0) received, at least 236 is expected." messages per day. We might want to silence them with mailfilters in the journald role. |
Please keep in mind, that I role out master on our supernodes on a regular basis. It's not really an option to keep in mind which tags are safe to deploy and which aren't. |
@AiyionPrime I actually thought that we should roll out the change on all supernodes. I think that rolling the change out on a single supernode does not really help in finding issues... That's something we could have done if we'd have a parallel test network as 1977er suggested. @1977er To me it looks quite stable. At least as stable as ISC. So shall we roll it out everywhere or shall we modify the Playbooks and restore the old dhcp-role as "legacy_dhcp" or something and use it for the supernodes running ISC DHCP? |
When rolling out KEA: deinstallation of legacy isc-dhcpd was not in the scope of this role and has to be done manually. |
isc-dhcp-server is the one to be removed, |
I assumed isc-dhcp-client ships dhclient which is partially used on some systems to get ip addresses for eth0 from ISPs. There I did not touch that one. |
This PR is already merged and targets a removed package now. Can we close and remove it? |
I did not intend to reopen it, just thought this would be a good place to discuss the manual migration strategy. |
My very first PR.