Skip to content
Snippets Groups Projects
  1. Oct 27, 2021
  2. Oct 22, 2021
    • Radosław Piliszek's avatar
      Fix wrong distro assumptions · 4e5e9abc
      Radosław Piliszek authored
      It seems some cases were missed in reviews and not fixed by
      the previous iterations:
      Ifc252ae793e6974356fcdca810b373f362d24ba5
      I838e526b930d5276d3ce24f5188262af7eb33280
      
      Change-Id: Id57da1c5024e1efc5810baca8fbe18967cf95a68
      4e5e9abc
    • Radosław Piliszek's avatar
      Drop enable_host_ntp · 9dee2a92
      Radosław Piliszek authored
      As promised for Xena.
      
      Change-Id: Id634426a1961f0b883068e4ed80e7d1633e5708e
      9dee2a92
  3. Oct 20, 2021
  4. Oct 17, 2021
    • Radosław Piliszek's avatar
      [mariadb] Start new nodes serially · c94cc4a6
      Radosław Piliszek authored
      There seems to be a bug in Galera that causes
      TASK [mariadb : Check MariaDB service WSREP sync status]
      to fail.
      One (in case of 3-node cluster) or more (possible with
      more-than-3-node clusters) nodes may "lose the race" and get stuck
      in the "initialized" state of WSREP.
      This is entirely random as is the case with most race issues.
      MariaDB service restart on that node will fix the situation but
      it's unwieldy.
      The above may happen because Kolla Ansible starts and waits for
      all new nodes at once.
      This did not bother the old galera (galera 3) which figured out
      the ordering for itself and let each node join the cluster properly.
      The proposed workaround is to start and wait for nodes serially.
      
      Change-Id: I449d4c2073d4e3953e9f09725577d2e1c9d563c9
      Closes-Bug: #1947485
      c94cc4a6
  5. Oct 11, 2021
  6. Oct 07, 2021
    • Michal Arbet's avatar
      Trivial fix shebang in keystone's fernet-node-sync.sh.j2 · f1cbff6b
      Michal Arbet authored
      Change-Id: I86aeafccd2a2bff1d89a40785e1a6715097bb849
      f1cbff6b
    • Radosław Piliszek's avatar
      Fix privileges for MariaDB 10.5 · c7c14e1c
      Radosław Piliszek authored
      "BINLOG MONITOR" and "SLAVE MONITOR" replace
      "REPLICATION CLIENT" (which is now an alias for "BINLOG MONITOR").
      The validation in Ansible MySQL collection is too simple to
      understand aliases and breaks. Hence, let's use the canonical
      names and adapt per service according to its needs.
      
      Change-Id: I1175e4846384accd19942620dc155d0c5728e64b
      c7c14e1c
  7. Oct 06, 2021
  8. Oct 04, 2021
  9. Oct 01, 2021
    • Radosław Piliszek's avatar
      Do not load br_netfilter · 15259002
      Radosław Piliszek authored
      Nor set related sysctls.
      More details in the reno.
      
      Change-Id: I898548ecc6df3caa094c3222159b7ba1e16dc211
      Closes-Bug: #1945789
      15259002
    • Mark Goddard's avatar
      monasca: change default of monasca_ntp_server · 1d0171fc
      Mark Goddard authored
      Updates the default value of 'monasca_ntp_server' from
      'external_ntp_servers[0]' to '0.pool.ntp.org'.  This is due to the
      removal of the 'external_ntp_servers' variable as part of the removal of
      Chrony deployment.
      
      Change-Id: I2e7538a2e95c7b8e9280eb051ee634b4313db129
      1d0171fc
  10. Sep 30, 2021
  11. Sep 29, 2021
  12. Sep 28, 2021
    • Niklas Hagman's avatar
      Transition Keystone admin user to system scope · 2e933dce
      Niklas Hagman authored
      A system-scoped token implies the user has authorization to act on the
      deployment system. These tokens are useful for interacting with
      resources that affect the deployment as a whole, or exposes resources
      that may otherwise violate project or domain isolation.
      
      Since Queens, the keystone-manage bootstrap command assigns the admin
      role to the admin user with system scope, as well as in the admin
      project. This patch transitions the Keystone admin user from
      authenticating using project scoped tokens to system scoped tokens.
      This is a necessary step towards being able to enable the updated oslo
      policies in services that allow finer grained access to system-level
      resources and APIs.
      
      An etherpad with discussion about the transition to the new oslo
      service policies is:
      
      https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible
      
      
      
      Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585
      Signed-off-by: default avatarNiklas Hagman <ubuntu@post.blinkiz.com>
      2e933dce
  13. Sep 27, 2021
  14. Sep 26, 2021
    • Michal Arbet's avatar
      Add way to change weight of haproxy backend per service · 7c2b4bea
      Michal Arbet authored
      This patch adding option to control weight of haproxy
      backends per service via host variable.
      
      Example:
      
      [control]
      server1 haproxy_nova_api_weight=10
      server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10
      server3 haproxy_keystone_admin_weight=50
      
      If weight is not defined, everything is working as before.
      
      Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
      7c2b4bea
  15. Sep 23, 2021
  16. Sep 22, 2021
  17. Sep 21, 2021
  18. Sep 20, 2021
  19. Sep 16, 2021
  20. Sep 13, 2021
  21. Sep 10, 2021
  22. Sep 07, 2021
    • Michał Nasiadka's avatar
      toolbox: Allow different users logging to ansible.log · 24e6a6ce
      Michał Nasiadka authored
      Currently only operations done with default kolla_toolbox user are logged
      to /var/log/kolla/ansible.log.
      
      In order to fix logging, permissions to ansible.log must allow writing
      for other users in kolla group - and then a separate patch will follow
      to make custom ansible.cfg file usable by other toolbox users.
      
      Partial-Bug: #1942846
      Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
      24e6a6ce
  23. Sep 03, 2021
    • Radosław Piliszek's avatar
      Bump libvirtd memlock ulimit · 11d7233c
      Radosław Piliszek authored
      This is required for libvirtd with cgroupsv2 (Debian Bullseye and
      soon others).
      Otherwise, device attachments simply fail.
      The warning message suggests filtering will be disabled but it
      actually just fails the action entirely.
      
      Change-Id: Id1fbd49a31a6e6e51b667f646278b93897c05b21
      Closes-Bug: #1941940
      11d7233c
  24. Aug 30, 2021
    • Radosław Piliszek's avatar
      Restore libvirtd cgroupfs mount · 34c49b9d
      Radosław Piliszek authored
      It was removed in [1] as part of cgroupsv2 cleanup.
      However, the testing did not catch the fact that the legacy
      cgroups behaviour was actually still breaking despite latest
      Docker and setting to use host's cgroups namespace.
      
      [1] 286a03ba
      
      Closes-Bug: #1941706
      Change-Id: I629bb9e70a3fd6bd1e26b2ca22ffcff5e9e8c731
      34c49b9d
  25. Aug 20, 2021
  26. Aug 19, 2021
    • Michal Arbet's avatar
      Rename role haproxy to loadbalancer · ffd53512
      Michal Arbet authored
      For now role haproxy is maintaining haproxy
      and keepalived. In follow-up changes there is also
      proxysql added.
      
      This patch is *only* renaming/moving stuff to more
      prominent role loadbalancer, and moving also specific
      templates to subdirectory.
      
      This was done only to better diff in follow-up
      changes.
      
      Change-Id: I1d39d5bcaefc4016983bf267a2736b742cc3a555
      ffd53512
    • Radosław Piliszek's avatar
      Add ability to retry image pulling · cbb567cb
      Radosław Piliszek authored
      Sometimes, the registries may intermittently fail to deliver the
      images. This is often seen in the CI, though it also happens with
      production deployments, even those with internal registries and/or
      registry mirrors - due to sheer load when trying to pull the
      images from many hosts.
      
      This patchs adds two new vars to control retry behaviour.
      The default has been set to make users happier by default. :-)
      
      Change-Id: I81ad7d8642654f8474f11084c6934aab40243d35
      cbb567cb
    • Radosław Piliszek's avatar
      Remove an unused file · 16a4a9e5
      Radosław Piliszek authored
      It seems to have been mistakenly introduced by
      de00bf49
      "Simplify handler conditionals"
      
      Change-Id: I65b6e322fa11a870f32099bbfd62150cbea4feb5
      16a4a9e5
  27. Aug 18, 2021
  28. Aug 17, 2021
    • Michal Arbet's avatar
      Use Docker healthchecks for keystone-fernet container · 90fd9152
      Michal Arbet authored
      This change enables the use of Docker healthchecks for
      keystone-fernet container. It checks if "key 0" has
      right permissions, and if rsync is able to distribute
      keys to other keystones.
      
      Implements: blueprint container-health-check
      Change-Id: I17bea723d4109e869cd05d211f6f8e4653f46e17
      90fd9152
    • Skylar Kelty's avatar
      Update Manila deploy steps for Wallaby · 8d5dde37
      Skylar Kelty authored
      Manila has changed from using subfolders to subvolumes.
      We need a bit of a tidy up to prevent deploy errors.
      This change also adds the ability to specify the ceph FS
      Manila uses instead of relying on the default "first found".
      
      Closes-Bug: #1938285
      Closes-Bug: #1935784
      Change-Id: I1d0d34919fbbe74a4022cd496bf84b8b764b5e0f
      8d5dde37
  29. Aug 16, 2021
Loading