Skip to content
Snippets Groups Projects
  1. Feb 14, 2022
  2. Feb 02, 2022
    • Buddhika Sanjeewa's avatar
      Deploy Zun with Cinder Ceph support · eb7e0f6f
      Buddhika Sanjeewa authored
      Enables zun to access cinder volumes when cinder is configured to use
      external ceph.
      Copies ceph config file and ceph cinder keyring to /etc/ceph in
      zun_compute container.
      
      Closes-Bug: 1848934
      Change-Id: Ie56868d5e9ed37a9274b8cbe65895f3634b895c8
      eb7e0f6f
  3. Jan 31, 2022
  4. Jan 20, 2022
  5. Jan 09, 2022
    • Stig Telfer's avatar
      OpenID Connect certifiate file is optional · 78f29fdc
      Stig Telfer authored
      Some ID provider configurations do not require a certificate file.
      Change the logic to allow this, and update documentation accordingly.
      
      Change-Id: I2c34a6b5894402bbebeb3fb96768789bc3c7fe84
      78f29fdc
  6. Jan 07, 2022
  7. Jan 03, 2022
  8. Dec 31, 2021
  9. Dec 23, 2021
  10. Dec 21, 2021
  11. Dec 20, 2021
    • Radosław Piliszek's avatar
      [docs] Mark init-runonce properly · 1c93c8ea
      Radosław Piliszek authored
      This is a docs amendment to let users know that calling
      init-runonce is not a required deployment step and it may not work
      for them if they modified the defaults.
      
      Change-Id: Ia3922b53d91a1a820447fec6a8074b941edc2ee9
      1c93c8ea
  12. Nov 25, 2021
  13. Nov 11, 2021
  14. Nov 10, 2021
  15. Nov 09, 2021
  16. Nov 04, 2021
  17. Oct 27, 2021
  18. Oct 22, 2021
  19. Oct 20, 2021
  20. Oct 12, 2021
  21. Oct 06, 2021
  22. Oct 04, 2021
    • Gaël THEROND (Fl1nt)'s avatar
      Add missing CloudKitty documentation. · d5aa73c4
      Gaël THEROND (Fl1nt) authored
      * Fix various typos and formatting.
      * Add documentation about custom collector backend.
      * Add documentation about custom storage backend.
      
      Change-Id: If937afc5ce2a2747f464fbaf38a5dcf2e57ba04f
      Closes-bug: #1940842
      d5aa73c4
  23. Sep 30, 2021
  24. Sep 28, 2021
    • Niklas Hagman's avatar
      Transition Keystone admin user to system scope · 2e933dce
      Niklas Hagman authored
      A system-scoped token implies the user has authorization to act on the
      deployment system. These tokens are useful for interacting with
      resources that affect the deployment as a whole, or exposes resources
      that may otherwise violate project or domain isolation.
      
      Since Queens, the keystone-manage bootstrap command assigns the admin
      role to the admin user with system scope, as well as in the admin
      project. This patch transitions the Keystone admin user from
      authenticating using project scoped tokens to system scoped tokens.
      This is a necessary step towards being able to enable the updated oslo
      policies in services that allow finer grained access to system-level
      resources and APIs.
      
      An etherpad with discussion about the transition to the new oslo
      service policies is:
      
      https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible
      
      
      
      Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585
      Signed-off-by: default avatarNiklas Hagman <ubuntu@post.blinkiz.com>
      2e933dce
  25. Sep 26, 2021
    • Michal Arbet's avatar
      Add way to change weight of haproxy backend per service · 7c2b4bea
      Michal Arbet authored
      This patch adding option to control weight of haproxy
      backends per service via host variable.
      
      Example:
      
      [control]
      server1 haproxy_nova_api_weight=10
      server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10
      server3 haproxy_keystone_admin_weight=50
      
      If weight is not defined, everything is working as before.
      
      Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
      7c2b4bea
  26. Sep 23, 2021
  27. Sep 16, 2021
  28. Aug 25, 2021
    • Mark Goddard's avatar
      docs: Add placeholder page for CI & testing information · d8641e90
      Mark Goddard authored
      Change-Id: Iebcac0827c6f715c6b804223cdcf2cc2e425120b
      d8641e90
    • Mark Goddard's avatar
      Add kolla-ansible gather-facts command · d9a37589
      Mark Goddard authored
      In some situations it may be helpful to populate the fact cache on
      demand. The 'kolla-ansible gather-facts' command may be used to do this.
      
      One specific case where this may be helpful is when running kolla-ansible
      with a --limit argument, since in that case hosts that match the limit
      will gather facts for hosts that fall outside the limit. In the extreme
      case of a limit that matches only one host, it will serially gather
      facts for all other hosts. To avoid this issue, run 'kolla-ansible
      gather-facts' without a limit to populate the fact cache in parallel
      before running the required command with a limit.
      
      Change-Id: I79db9bca23aa1bd45bafa7e7500a90de5a684593
      d9a37589
  29. Aug 22, 2021
  30. Aug 20, 2021
  31. Aug 17, 2021
    • Skylar Kelty's avatar
      Update Manila deploy steps for Wallaby · 8d5dde37
      Skylar Kelty authored
      Manila has changed from using subfolders to subvolumes.
      We need a bit of a tidy up to prevent deploy errors.
      This change also adds the ability to specify the ceph FS
      Manila uses instead of relying on the default "first found".
      
      Closes-Bug: #1938285
      Closes-Bug: #1935784
      Change-Id: I1d0d34919fbbe74a4022cd496bf84b8b764b5e0f
      Unverified
      8d5dde37
  32. Aug 06, 2021
    • Ilya Popov's avatar
      Extra var ironic_enable_keystone_integration added. · da4fd2d6
      Ilya Popov authored
      Basically, there are three main installation scenario:
      
      Scenario 1:
      Ironic installation together with other openstack services
      including keystone. In this case variable enable_keystone
      is set to true and keystone service will be installed
      together with ironic installation. It is possible realise this
      scenario, no fix needed
      
      Scenario 2:
      Ironic installation with connection to already installed
      keystone. In this scenario we have to set enable_keystone
      to “No” to prevent from new keystone service installation
      during the ironic installation process. But in other hand,
      we need to have correct sections in ironic.conf to provide
      all information needed to connect to existing keystone.
      But all sections for keystone are added to ironic.conf only
      if enable_keystone var is set to “Yes”. It isn’t possible
      to realise this scenario. Proposed fix provide support for
      this scenario, where multiple regions share the same
      keystone service.
      
      Scenario 3:
      No keystone integration. Ironic don't connect to Keystone.
      It is possible realise this scenario, no fix needed
      
      Proposed solution also keep the default behaviour: if no
      enable_keystone_integration is manually defined by default
      it takes value of enable_keystone variable and all behaviour
      is the same. But if we don't want to install keystone and
      want to connect to existing one at the same time, it will be
      possible to set enable_keystone var to “No”
      (preventing keystone from installation) and at the same
      time set ironic_enable_keystone_integration to Yes to allow
      needed section appear in ironic.conf through templating.
      
      Change-Id: I0c7e9a28876a1d4278fb2ed8555c2b08472864b9
      da4fd2d6
  33. Aug 05, 2021
  34. Jul 29, 2021
    • Will Szumski's avatar
      Support multiple inventories · 6c72fa81
      Will Szumski authored
      Multiple inventories can now be passed to `kolla-ansible`.  This can be
      useful to construct a common inventory that is shared between multiple
      environments.
      
      Change-Id: I2ac5d7851b310bea2ba362b353f18c592a0a6a2e
      6c72fa81
Loading