Skip to content
Snippets Groups Projects
  1. Jul 09, 2020
  2. Jun 27, 2020
    • James Kirsch's avatar
      Fix etcd protocol configuration · a1584322
      James Kirsch authored
      The etcd service protocol is currently configured with internal_protocol.
      The etcd service is not load balanced by a HAProxy container, so
      there is no proxy layer to do TLS termination when internal_protocol
      is configured to be "https".
      
      Until the etcd service is configured to deploy with native TLS
      termination, the etcd uses should be independent of
      internal_protocol, and "http" by default.
      
      Change-Id: I730c02331514244e44004aa06e9399c01264c65d
      Closes-Bug: 1884137
      a1584322
  3. Jun 11, 2020
    • Michal Arbet's avatar
      Fix group_vars and cinder template per documentation · f1addfa3
      Michal Arbet authored
      When installing kolla with external ceph, ceph_cinder_user
      var has to be set per documentation instead of ceph_cinder_volume_user.
      This value is also rendered in example etc/kolla/globals.yml file.
      
      This patch is fixing this bug or, let's say typo.
      
      Change-Id: Id82b07867f4bc0e5d5e56363f0122014df6892bc
      f1addfa3
  4. Apr 03, 2020
  5. Mar 26, 2020
  6. Jan 29, 2020
    • Michal Nasiadka's avatar
      External Ceph: add ceph_*_user variables · fdf3729f
      Michal Nasiadka authored
      To make the configuration easier for the user, and to allow non-standard
      ceph authentication ids - introduce ceph_*_user variables.
      
      Change-Id: I24e01c43c826b62b6748d93a498f4b7d8ce9e309
      fdf3729f
  7. Jan 13, 2020
    • James Kirsch's avatar
      Configure services to use Certificate Authority · c15dc203
      James Kirsch authored
      Include a reference to the globally configured Certificate Authority to
      all services. Services use the CA to verify HTTPs connections.
      
      Change-Id: I38da931cdd7ff46cce1994763b5c713652b096cc
      Partially-Implements: blueprint support-trusted-ca-certificate-file
      c15dc203
  8. Dec 16, 2019
  9. Dec 07, 2019
  10. Oct 16, 2019
    • Radosław Piliszek's avatar
      Implement IPv6 support in the control plane · bc053c09
      Radosław Piliszek authored
      Introduce kolla_address filter.
      Introduce put_address_in_context filter.
      
      Add AF config to vars.
      
      Address contexts:
      - raw (default): <ADDR>
      - memcache: inet6:[<ADDR>]
      - url: [<ADDR>]
      
      Other changes:
      
      globals.yml - mention just IP in comment
      
      prechecks/port_checks (api_intf) - kolla_address handles validation
      
      3x interface conditional (swift configs: replication/storage)
      
      2x interface variable definition with hostname
      (haproxy listens; api intf)
      
      1x interface variable definition with hostname with bifrost exclusion
      (baremetal pre-install /etc/hosts; api intf)
      
      neutron's ml2 'overlay_ip_version' set to 6 for IPv6 on tunnel network
      
      basic multinode source CI job for IPv6
      
      prechecks for rabbitmq and qdrouterd use proper NSS database now
      
      MariaDB Galera Cluster WSREP SST mariabackup workaround
      (socat and IPv6)
      
      Ceph naming workaround in CI
      TODO: probably needs documenting
      
      RabbitMQ IPv6-only proto_dist
      
      Ceph ms switch to IPv6 mode
      
      Remove neutron-server ml2_type_vxlan/vxlan_group setting
      as it is not used (let's avoid any confusion)
      and could break setups without proper multicast routing
      if it started working (also IPv4-only)
      
      haproxy upgrade checks for slaves based on ipv6 addresses
      
      TODO:
      
      ovs-dpdk grabs ipv4 network address (w/ prefix len / submask)
      not supported, invalid by default because neutron_external has no address
      No idea whether ovs-dpdk works at all atm.
      
      ml2 for xenapi
      Xen is not supported too well.
      This would require working with XenAPI facts.
      
      rp_filter setting
      This would require meddling with ip6tables (there is no sysctl param).
      By default nothing is dropped.
      Unlikely we really need it.
      
      ironic dnsmasq is configured IPv4-only
      dnsmasq needs DHCPv6 options and testing in vivo.
      
      KNOWN ISSUES (beyond us):
      
      One cannot use IPv6 address to reference the image for docker like we
      currently do, see: https://github.com/moby/moby/issues/39033
      (docker_registry; docker API 400 - invalid reference format)
      workaround: use hostname/FQDN
      
      RabbitMQ may fail to bind to IPv6 if hostname resolves also to IPv4.
      This is due to old RabbitMQ versions available in images.
      IPv4 is preferred by default and may fail in the IPv6-only scenario.
      This should be no problem in real life as IPv6-only is indeed IPv6-only.
      Also, when new RabbitMQ (3.7.16/3.8+) makes it into images, this will
      no longer be relevant as we supply all the necessary config.
      See: https://github.com/rabbitmq/rabbitmq-server/pull/1982
      
      For reliable runs, at least Ansible 2.8 is required (2.8.5 confirmed
      to work well). Older Ansible versions are known to miss IPv6 addresses
      in interface facts. This may affect redeploys, reconfigures and
      upgrades which run after VIP address is assigned.
      See: https://github.com/ansible/ansible/issues/63227
      
      Bifrost Train does not support IPv6 deployments.
      See: https://storyboard.openstack.org/#!/story/2006689
      
      
      
      Change-Id: Ia34e6916ea4f99e9522cd2ddde03a0a4776f7e2c
      Implements: blueprint ipv6-control-plane
      Signed-off-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      bc053c09
  11. Aug 15, 2019
  12. Jun 24, 2019
  13. Jun 18, 2019
  14. Mar 06, 2019
    • Jim Rollenhagen's avatar
      Allow swift proxy server to use independent hostnames · 31ed556e
      Jim Rollenhagen authored
      This allows swift service endpoints to use custom hostnames, and adds the
      following variables:
      
      * swift_internal_fqdn
      * swift_external_fqdn
      
      These default to the old values of kolla_internal_fqdn or
      kolla_external_fqdn.
      
      This also adds a swift_proxy_server_listen_port option, which defaults to
      swift_proxy_server_port for backward compatibility.
      
      This option allow the user to differentiate between the port the
      service listens on, and the port the service is reachable on. This is
      useful for external load balancers which live on the same host as the
      service itself.
      
      While we're in here, use the ``internal_protocol`` variable for the swift
      endpoint in cinder's swift backup driver configuration, instead of hardcoding
      to ``http``.
      
      Change-Id: Ibc01618383c26e16c0067f7f6b9cf5160d968d1e
      Implements: blueprint service-hostnames
      31ed556e
    • Jim Rollenhagen's avatar
      Allow cinder services to use independent hostnames · 45bde4b9
      Jim Rollenhagen authored
      This allows cinder service endpoints to use custom hostnames, and adds the
      following variables:
      
      * cinder_internal_fqdn
      * cinder_external_fqdn
      
      These default to the old values of kolla_internal_fqdn or
      kolla_external_fqdn.
      
      This also adds a cinder_api_listen_port option, which defaults to
      cinder_api_port for backward compatibility.
      
      This option allow the user to differentiate between the port the
      service listens on, and the port the service is reachable on. This is
      useful for external load balancers which live on the same host as the
      service itself.
      
      Change-Id: I2a5036456afac6135dca3723ae754ea9f8bc8475
      Implements: blueprint service-hostnames
      45bde4b9
    • Jim Rollenhagen's avatar
      Use keystone_*_url var in all configs · 2e4e6050
      Jim Rollenhagen authored
      We're duplicating code to build the keystone URLs in nearly every
      config, where we've already done it in group_vars. Replace the
      redundancy with a variable that does the same thing.
      
      Change-Id: I207d77870e2535c1cdcbc5eaf704f0448ac85a7a
      2e4e6050
  15. Mar 01, 2019
    • Mark Goddard's avatar
      Use new cinder target_helper option · 1c22da32
      Mark Goddard authored
      The iscsi_helper option was deprecated in favour of target_helper in
      Queens, and will be removed in the Stein release.
      
      This also renames the cinder_iscsi_helper variable to
      cinder_target_helper, deprecating but still supporting the former name
      until the Train release.
      
      Change-Id: Ie38c09b2dd8598f62b0733c8444eec5f6ce3daac
      1c22da32
  16. Feb 08, 2019
    • Jim Rollenhagen's avatar
      Allow glance services to use independent hostnames · a819ef12
      Jim Rollenhagen authored
      This allows glance service endpoints to use custom hostnames, and adds the
      following variables:
      
      * glance_internal_fqdn
      * glance_external_fqdn
      
      These default to the old values of kolla_internal_fqdn or
      kolla_external_fqdn.
      
      This also adds a glance_api_listen_port option, which defaults to
      glance_api_port for backward compatibility.
      
      This option allow the user to differentiate between the port the
      service listens on, and the port the service is reachable on. This is
      useful for external load balancers which live on the same host as the
      service itself.
      
      Change-Id: Icb91f728533e2db1908b23dabb0501cf9f8a2b75
      Implements: blueprint service-hostnames
      a819ef12
  17. Dec 17, 2018
    • Patrick O'Neill's avatar
      Add support for Quobyte backend to Cinder and Nova · f77cc87e
      Patrick O'Neill authored
      Add an enable_cinder_backend_quobyte option to etc/kolla/globals.yml to
      enable use the Quobyte Cinder backend.
      Change the bind mounts for /var/lib/nova/mnt to include the shared
      propogation if Quobyte is enabled.
      Update the documentation to include a section on configuring the Cinder.
      
      Implements: blueprint cinder-quobyte-backend
      
      Change-Id: I364939407ad244fe81cea40f880effdbcaa8a20d
      f77cc87e
    • Kien Nguyen's avatar
      Configure vitrage notification topic · 838cffd9
      Kien Nguyen authored
      According [1], vitrage notification has to be configured in Nova,
      Neutron, Cinder & Aodh config file.
      
      [1] https://review.openstack.org/#/c/302802/
      
      Change-Id: Iaf8cd7d40e6eb988adf4d208e6ad784f1004caa5
      838cffd9
  18. Nov 05, 2018
  19. Oct 01, 2018
    • Mark Goddard's avatar
      Fix Cinder backup driver · 5beece25
      Mark Goddard authored
      Cinder has dropped [1] support for legacy backup services. It is now
      necessary to specify the full class of the backup driver, rather than
      just the module name. This was causing the kolla-ansible ceph jobs to
      fail.
      
      [1] https://review.openstack.org/#/c/595372
      
      Change-Id: Icf0ee475ba73f013d4266332d999362651d9475b
      5beece25
  20. Aug 07, 2018
  21. Jun 01, 2018
    • Zhangfei Gao's avatar
      osprofiler support redis · ce809aea
      Zhangfei Gao authored
      Currently osprofiler only choose elasticsearch,
      which is only supported on x86.
      On other platform like aarch64 osprofiler can
      not be used since no elasticsearch package.
      
      Enable osprofiler by enable_osprofiler: "yes",
      which choose elasticsearch by default.
      Choose redis by enable_redis: "yes" & osprofiler_backend: "redis"
      On platform without elasticsearch support like aarch64
      set enable_elasticsearch: "no"
      
      Change-Id: I68fe7a33e11d28684962fc5d0b3d326e90784d78
      ce809aea
  22. May 23, 2018
  23. Apr 18, 2018
    • Kevin TIBI's avatar
      Fix SSL api for multiple services · a81a5d5d
      Kevin TIBI authored
      If SSL is enabled, api of multiple services returns
      wrong external URL without https prefix.
      
      Removal of condition for deletion of http  header.
      
      Change-Id: I4264e04d0d6b9a3e11ef7dd7add6c5e166cf9fb4
      Closes-Bug: #1749155
      Closes-Bug: #1717491
      a81a5d5d
  24. Jan 29, 2018
  25. Dec 06, 2017
  26. Nov 22, 2017
    • Andrew Smith's avatar
      Add support for hybrid messaging backends · fd1d3af0
      Andrew Smith authored
      This commit separates the messaging rpc and notify transports in order
      to support separate and different oslo.messaging backends
      
      This patch:
      * add rpc and notify variables
      * update service role conf templates
      * add example to globals.yaml
      * add release note
      
      Implements: blueprint hybrid-messaging
      Change-Id: I34691c2895c8563f1f322f0850ecff98d11b5185
      fd1d3af0
  27. Oct 06, 2017
  28. Oct 05, 2017
  29. Sep 28, 2017
  30. Sep 25, 2017
  31. Sep 21, 2017
  32. Jul 25, 2017
  33. Jul 21, 2017
  34. Jul 18, 2017
  35. Jul 13, 2017
  36. Jul 07, 2017
Loading