Skip to content
Snippets Groups Projects
  1. May 20, 2020
  2. Apr 16, 2020
  3. Apr 15, 2020
  4. Apr 14, 2020
    • Jason Anderson's avatar
      [haproxy-config] Fix missing servers in split cfg · 6d00236e
      Jason Anderson authored
      When using the split config style, all backends would be empty, which
      meant that HAProxy was unable to serve any traffic. This turned out to
      be due to a bad default in the split config template.
      
      Closes-Bug: #1872545
      Change-Id: I952e526e735e1d31445963f04d41d66bbdbfdee4
      Unverified
      6d00236e
    • Zuul's avatar
      cee03f4b
    • James Kirsch's avatar
      Refactor copy certificates task · 4d155d69
      James Kirsch authored
      Refactor service configuration to use the copy certificates task. This
      reduces code duplication and simplifies implementing encrypting backend
      HAProxy traffic for individual services.
      
      Change-Id: I0474324b60a5f792ef5210ab336639edf7a8cd9e
      4d155d69
    • Mark Goddard's avatar
      Fix service_mapped_to_host filter for common services · 8cc58e36
      Mark Goddard authored
      In Ibecac60d1417269bbe25a280996ca9de6e6d018f, the services in the common
      role were marked as being mapped to the 'all' group, since the
      'service_mapped_to_host' filter expects every service definition to have
      either a 'group' or 'host_in_groups' field. While this allows the filter
      to pass the common services without error, it will not actually show
      them as being mapped to any hosts. This is because the filter uses the
      'group_names' variable, which contains all of the groups that a host
      belongs to, except the default 'all' group.
      
      This change fixes the issue by returning True from
      service_mapped_to_host when the service's group is 'all'.
      
      Change-Id: I39c8416f5d30a535c1743f9c43434b7d2a382196
      Related-Bug: #1868596
      8cc58e36
    • Zuul's avatar
      Merge "[elasticsearch] Update config for 6.x" · 3f631421
      Zuul authored
      3f631421
  5. Apr 13, 2020
    • Radosław Piliszek's avatar
      Fix Designate not to use etcd coordination backend · 3c234603
      Radosław Piliszek authored
      etcd via tooz does not support group membership required by
      Designate coordination.
      The best k-a can do is not to configure etcd in Designate.
      
      Change-Id: I2f64f928e730355142ac369d8868cf9f65ca357e
      Closes-bug: #1872205
      Related-bug: #1840070
      3c234603
  6. Apr 12, 2020
  7. Apr 11, 2020
    • Rafael Weingärtner's avatar
      Allow operators to use "ceilometer-upgrade" parameters · 6fcccdae
      Rafael Weingärtner authored
      Allow operators to use custom parameters with the ceilometer-upgrade
      command. This is quite useful when using the dynamic pollster subsystem;
      that sub-system provides flexibility to create and edit pollsters configs,
      which affects gnocchi resource-type configurations. However, Ceilometer
      uses default and hard-coded resource-type configurations; if one customizes
      some of its default resource-types, he/she can get into trouble during
      upgrades. Therefore, the only way to work around it is to use the
      "--skip-gnocchi-resource-types" flag. This PR introduces a method for
      operators to execute such customization, and many others if needed.
      
      Depends-On: https://review.opendev.org/#/c/718190/
      Change-Id: I92f0edba92c9e3707d89b3ff4033ac886b29cf6d
      6fcccdae
    • Zuul's avatar
      b9f07bc3
  8. Apr 10, 2020
  9. Apr 09, 2020
    • Zuul's avatar
      Merge "Perform host configuration during upgrade" · 6cd0641e
      Zuul authored
      6cd0641e
    • Dincer Celik's avatar
      Introduce /etc/timezone to Debian/Ubuntu containers · 4b5df0d8
      Dincer Celik authored
      Some services look for /etc/timezone on Debian/Ubuntu, so we should
      introduce it to the containers.
      
      In addition, added prechecks for /etc/localtime and /etc/timezone.
      
      Closes-Bug: #1821592
      Change-Id: I9fef14643d1bcc7eee9547eb87fa1fb436d8a6b3
      4b5df0d8
    • John Garbutt's avatar
      Fix live migration to use migration int. address · 628c27ce
      John Garbutt authored
      In kolla ansible we typically configure services to communicate via IP
      addresses rather than hostnames. One accidental exception to this was
      live migration, which used the hostname of the destination even when
      not required (i.e. TLS not being used for libvirt).
      
      To make such hostnames work, k-a adds entries to /etc/hosts in the
      bootstrap-servers command. Alternatively users may provide DNS.
      
      One problem with using /etc/hosts is that, if a new compute host is
      added to the cloud, or an IP address is changed, that will not be
      reflected in the /etc/hosts file of other hosts. This would cause live
      migration to the new host from an old host to fail, as the name cannot
      be resolved.
      
      The workaround for this was to update the /etc/hosts file (perhaps via
      bootstrap-servers) on all hosts after adding new compute hosts. Then the
      nova_libvirt container had to be restarted to pick up the change.
      
      Similarly, if user has overridden the migration_interface, the used
      hostname could point to a wrong address on which libvirt would not
      listen.
      
      This change adds the live_migration_inbound_addr option to nova.conf. If
      TLS is not in use for libvirt, this will be set to the IP address of the
      host on the migration network. If TLS is enabled for libvirt,
      live_migration_inbound_addr will be set to migration_hostname, since
      certificates will typically reference the hostname rather than the
      host's IP. With libvirt TLS enabled, DNS is recommended to avoid the
      /etc/hosts issue which is likely the case in production deployments.
      
      Change-Id: I0201b46a9fbab21433a9f53685131aeb461543a8
      Closes-Bug: #1729566
      628c27ce
    • Zuul's avatar
    • James Kirsch's avatar
      Add support for encrypting backend Keystone HAProxy traffic · b475643c
      James Kirsch authored
      This patch introduces an optional backend encryption for Keystone
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Keystone service.
      
      Change-Id: I6351147ddaff8b2ae629179a9bc3bae2ebac9519
      Partially-Implements: blueprint add-ssl-internal-network
      b475643c
    • Michal Nasiadka's avatar
      OVN Support · 8a0740df
      Michal Nasiadka authored
      Implement OVN Ansible role.
      
      Implements: blueprint ovn-controller-neutron-ansible
      
      Depends-On: https://review.opendev.org/713422
      Change-Id: Icd425dea85d58db49c838839d8f0b864b4a89a78
      8a0740df
  10. Apr 08, 2020
    • Mark Goddard's avatar
      Perform host configuration during upgrade · 1d70f509
      Mark Goddard authored
      This is a follow up to I001defc75d1f1e6caa9b1e11246abc6ce17c775b. To
      maintain previous behaviour, and ensure we catch any host configuration
      changes, we should perform host configuration during upgrade.
      
      Change-Id: I79fcbf1efb02b7187406d3c3fccea6f200bcea69
      Related-Bug: #1860161
      1d70f509
  11. Apr 06, 2020
  12. Apr 05, 2020
Loading