- Sep 18, 2019
-
-
Mark Goddard authored
We have agreed to remove support for Oracle Linux. http://lists.openstack.org/pipermail/openstack-discuss/2019-June/006896.html Change-Id: If11b4ff37af936a0cfd34443e8babb952307882b
-
- Sep 12, 2019
-
-
Scott Solkhon authored
This commit adds the necessary configuration to the Swift account, container and object configuration files to enable the Swift recon cli. In order to give the object server on each Swift host access to the recon files, a Docker volume is mounted into each container which generates them. The volume is then mounted read only into the object server container. Note that multiple containers append to the same file. This should not be a problem since Swift uses a lock when appending. Change-Id: I343d8f45a78ebc3c11ed0c68fe8bec24f9ea7929 Co-authored-by:
Doug Szumski <doug@stackhpc.com>
-
- Sep 10, 2019
-
-
Hongbin Lu authored
After the integration with placement [1], we need to configure how zun-compute is going to work with nova-compute. * If zun-compute and nova-compute run on the same compute node, we need to set 'host_shared_with_nova' as true so that Zun will use the resource provider (compute node) created by nova. In this mode, containers and VMs could claim allocations against the same resource provider. * If zun-compute runs on a node without nova-compute, no extra configuration is needed. By default, each zun-compute will create a resource provider in placement to represent the compute node it manages. [1] https://blueprints.launchpad.net/zun/+spec/use-placement-resource-management Change-Id: I2d85911c4504e541d2994ce3d48e2fbb1090b813
-
- Sep 05, 2019
-
-
Marcin Juszkiewicz authored
Instead of changing Docker daemon command line let's change config for Docker instead. In /etc/docker/daemon.json file as it should be. Custom Docker options can be set with 'docker_custom_config' variable. Old 'docker_custom_option' is still present but should be avoided. Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Change-Id: I1215e04ec15b01c0b43bac8c0e81293f6724f278
-
- Aug 23, 2019
-
-
Michal Nasiadka authored
ceph-ansible by default generates what we call nova.keyring as openstack.keyring - adding a note to not confuse users. Change-Id: I3992a037ab8e7947e35521b5c721a89bd954fdcd
-
- Aug 16, 2019
-
-
Radosław Piliszek authored
Change-Id: Icf3f01516185afb7b9f642407b06a0204c36ecbe Closes-Bug: #1840315 Signed-off-by:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Aug 15, 2019
-
-
Kien Nguyen authored
Masakari provides Instances High Availability Service for OpenStack clouds by automatically recovering failed Instances. Depends-On: https://review.openstack.org/#/c/615469/ Change-Id: I0b3457232ee86576022cff64eb2e227ff9bbf0aa Implements: blueprint ansible-masakari Co-Authored-By:
Gaëtan Trellu <gaetan.trellu@incloudus.com>
-
- Aug 14, 2019
-
-
Scott Solkhon authored
This feature is disabled by default, and can be enabled by setting 'enable_swift_s3api' to 'true' in globals.yml. Two middlewares are required for Swift S3 - s3api and s3token. Additionally, we need to configure the authtoken middleware to delay auth decisions to give s3token a chance to authorise requests using EC2 credentials. Change-Id: Ib8e8e3a1c2ab383100f3c60ec58066e588d3b4db
-
- Aug 06, 2019
-
-
Mark Goddard authored
Docker is now always installed using the community edition (CE) packages. Change-Id: I8c3fe44fd9d2da99b5bb1c0ec3472d7e1b5fb295
-
- Jul 16, 2019
-
-
Michal Nasiadka authored
* Ubuntu ships with nfs-ganesha 2.6.0, which requires to do an rpcbind udp test on startup (was fixed later) * Add rpcbind package to be installed by kolla-ansible bootstrap when ceph_nfs is enabled * Update Ceph deployment docs with a note Change-Id: Ic19264191a0ed418fa959fdc122cef543446fbe5
-
- Jul 15, 2019
-
-
chenxing authored
Change-Id: I6974858a0a44d85a065502ed7b3a8e2797be7228 Closes-Bug: #1832979
-
- Jul 10, 2019
-
-
Raimund Hook authored
Updated the docs to refer to the openstack client, rather than the (old) neutron client. TrivialFix Change-Id: I82011175f7206f52570a0f7d1c6863ad8fa08fd0
-
chenxing authored
The "backup_driver" option should be configured to cinder.backup.drivers.ceph.CephBackupDriver instead of cinder.backup.drivers.ceph. Change-Id: I22457023c6ad76b508bcbe05e37517c18f1ffc81 Closes-Bug: #1832878
-
- Jul 04, 2019
-
-
Mark Goddard authored
There are now several good tools for deploying Ceph, including Ceph Ansible and ceph-deploy. Maintaining our own Ceph deployment is a significant maintenance burden, and we should focus on our core mission to deploy OpenStack. Given that this is a significant part of kolla ansible currently we will need a long deprecation period and a migration path to another tool. Change-Id: Ic603c85c04d8794580a19f9efaa7a8589565f4f6 Partially-Implements: blueprint remove-ceph
-
- Jun 24, 2019
-
-
chenxing authored
The Hitachi NAS Platform iSCSI driver was marked as not supported by Cinder in the Ocata realease[1]. [1] https://review.opendev.org/#/c/444287/ Change-Id: I1a25789374fddaefc57bc59badec06f91ee6a52a Closes-Bug: #1832821
-
- Jun 20, 2019
-
-
Doug Szumski authored
This commit should help guide people migrating to Kolla Monasca through the murky depths of the migration process. Since Kolla did not support Monasca in Queens, some of these steps which could be automated are not. Change-Id: I79051cca27178c3cf1671f5c603e38baf929c55c
-
- Jun 17, 2019
-
-
chenxing authored
This ensures we have version-specific references to other projects [1]. Note that this doesn't mean the URLs are actually valid - we need to do more work (linkcheck?) here, but it's an improvement nonetheless. [1] https://docs.openstack.org/openstackdocstheme/latest/#external-link-helper Change-Id: I118e4d211617c5df66ff04dc04e308a1d2fc67ad
-
- Jun 07, 2019
-
-
Carlos Goncalves authored
The project has been retired and there will be no Train release [1]. This patch removes Neutron LBaaS support in Kolla. [1] https://review.opendev.org/#/c/658494/ Change-Id: Ic0d3da02b9556a34d8c27ca21a1ebb3af1f5d34c
-
- Jun 05, 2019
-
-
Gaetan Trellu authored
- Remove trusted_cidrs that has just been removed from Qinling code. - Remove use_api_certificate because it's true by default - Improve list syntax - Add etcd section Change-Id: I0426a9d61fbeaa23a1affbc7e981a78283e88263
-
- May 31, 2019
-
-
Gaetan Trellu authored
Qinling is an OpenStack project to provide "Function as a Service". This project aims to provide a platform to support serverless functions. Change-Id: I239a0130f8c8b061b531dab530d65172b0914d7c Implements: blueprint ansible-qinling-support Story: 2005760 Task: 33468
-
- May 30, 2019
-
-
ZijianGuo authored
Change-Id: I75955012a839e52281e9a409eeab4a2c8d778cd2 Signed-off-by:
ZijianGuo <guozijn@gmail.com>
-
- May 17, 2019
-
-
Mark Goddard authored
Right now every controller rotates fernet keys. This is nice because should any controller die, we know the remaining ones will rotate the keys. However, we are currently over-rotating the keys. When we over rotate keys, we get logs like this: This is not a recognized Fernet token <token> TokenNotFound Most clients can recover and get a new token, but some clients (like Nova passing tokens to other services) can't do that because it doesn't have the password to regenerate a new token. With three controllers, in crontab in keystone-fernet we see the once a day correctly staggered across the three controllers: ssh ctrl1 sudo cat /etc/kolla/keystone-fernet/crontab 0 0 * * * /usr/bin/fernet-rotate.sh ssh ctrl2 sudo cat /etc/kolla/keystone-fernet/crontab 0 8 * * * /usr/bin/fernet-rotate.sh ssh ctrl3 sudo cat /etc/kolla/keystone-fernet/crontab 0 16 * * * /usr/bin/fernet-rotate.sh Currently with three controllers we have this keystone config: [token] expiration = 86400 (although, keystone default is one hour) allow_expired_window = 172800 (this is the keystone default) [fernet_tokens] max_active_keys = 4 Currently, kolla-ansible configures key rotation according to the following: rotation_interval = token_expiration / num_hosts This means we rotate keys more quickly the more hosts we have, which doesn't make much sense. Keystone docs state: max_active_keys = ((token_expiration + allow_expired_window) / rotation_interval) + 2 For details see: https://docs.openstack.org/keystone/stein/admin/fernet-token-faq.html Rotation is based on pushing out a staging key, so should any server start using that key, other servers will consider that valid. Then each server in turn starts using the staging key, each in term demoting the existing primary key to a secondary key. Eventually you prune the secondary keys when there is no token in the wild that would need to be decrypted using that key. So this all makes sense. This change adds new variables for fernet_token_allow_expired_window and fernet_key_rotation_interval, so that we can correctly calculate the correct number of active keys. We now set the default rotation interval so as to minimise the number of active keys to 3 - one primary, one secondary, one buffer. This change also fixes the fernet cron job generator, which was broken in the following cases: * requesting an interval of more than 1 day resulted in no jobs * requesting an interval of more than 60 minutes, unless an exact multiple of 60 minutes, resulted in no jobs It should now be possible to request any interval up to a week divided by the number of hosts. Change-Id: I10c82dc5f83653beb60ddb86d558c5602153341a Closes-Bug: #1809469
-
- Apr 08, 2019
-
-
Doug Szumski authored
The recent addition of this flag make the configuration of stand-alone Monasca slightly simpler. Change-Id: Ib4c03926daa3f0f3de0fa4412cd785d87ed5500c
-
- Mar 14, 2019
-
-
Scott Solkhon authored
Adds support to seperate Swift access and replication traffic from other storage traffic. In a deployment where both Ceph and Swift have been deployed, this changes adds functionalality to support optional seperation of storage network traffic. This adds two new network interfaces 'swift_storage_interface' and 'swift_replication_interface' which maintain backwards compatibility. The Swift access network interface is configured via 'swift_storage_interface', which defaults to 'storage_interface'. The Swift replication network interface is configured via 'swift_replication_interface', which defaults to 'swift_storage_interface'. If a separate replication network is used, Kolla Ansible now deploys separate replication servers for the accounts, containers and objects, that listen on this network. In this case, these services handle only replication traffic, and the original account-, container- and object- servers only handle storage user requests. Change-Id: Ib39e081574e030126f2d08f51de89641ddb0d42e
-
- Mar 08, 2019
-
-
Doug Szumski authored
In some scenarios it may be useful to perform custom formatting of logs before forwarding them. For example, the JSON formatter plugin can be used to convert an event to JSON. Change-Id: I3dd9240c5910a9477456283b392edc9566882dcd
-
- Mar 07, 2019
-
-
Arkadiy Shinkarev authored
When using custom storage backends with cinder.conf overrides file, precheck stage in kolla-ansible is fail. This commit adds option 'skip_cinder_backend_check' (default: False) to cinder role. Change-Id: Ifee138ad8b281903ea2365441aada044c80c46f0
-
- Feb 28, 2019
-
-
Mark Goddard authored
To avoid links to OpenStack docs getting out of date in our docs, use the latest version. Ideally after cutting each stable branch we should change these links to use the current release. Co-Authored-By: Isaiah Inuwa Change-Id: Ia1e3c720f4e688861b8f76874a3943b0f4e50b17
-
- Feb 25, 2019
-
-
Christian Berendt authored
Change-Id: Id8276448c6e779b2b4a0aafee45d953c4f009fc1
-
- Feb 14, 2019
-
-
Doug Szumski authored
Until the Monasca Kafka client fork is removed it is currently required to run Kafka in compatibility mode. It is also necessary to disable an optimisation in the Kafka brokers to clean up idle connections. This is because the optimisation was added after the Monasca Kafka client was forked, and the client hasn't been updated since. These settings are now applied automatically when Monasca is enabled. Change-Id: I6935f1fb29f4f731cf3c9a70a0adf4d5812ca55e
-
Pedro Alvarez authored
Change-Id: I3defe0c38f41d7335e1cbafb75523c3cd44323ee
-
- Feb 07, 2019
-
-
caowei authored
Use option "enabled_filters" from group "filter_scheduler". Change-Id: I042f0b011c060f9dbc645dbdbb60068cb41c0cc8
-
- Feb 01, 2019
-
-
Scott Solkhon authored
Change-Id: I12af64725c0beec2ece0367c3773230c57908254
-
- Jan 24, 2019
-
-
binhong.hua authored
By default, docker containers inherit ulimit from limits of docker deamon. On CentOS 7, docker daemon default NOFILE is 1048576. It can found in /usr/lib/systemd/system/docker.service. The big limit will cause many problem. we should control it in production environment. Change-Id: Iab962446a94ef092977728259d9818b86cfa7f68
-
- Jan 13, 2019
-
-
zhangshj authored
Change-Id: I89d9f7a90d72e6c5df7dde078ed7407eedd6f92f
-
- Jan 10, 2019
-
-
Michal Nasiadka authored
Change-Id: If87cdb132875c4e2c5dff2cc427e00f7a95927de
-
- Jan 08, 2019
-
-
tone.zhang authored
Since Rocky release Kolla Ceph supports both bluestore and filestore Ceph OSD. In multinode mode, users can overwrite “ceph_osd_store_type” in the inventory file and deploy the mixed Ceph OSD. Change-Id: I4582861c81fdea5fb67114cf3ac1e48f7812f0d7 Signed-off-by:
tone.zhang <tone.zhang@arm.com>
-
- Jan 03, 2019
-
-
Mark Goddard authored
Change-Id: I3bd50cb1e7db85acbf8ab20fc7bdd945b5232aaa
-
- Dec 17, 2018
-
-
Patrick O'Neill authored
Add an enable_cinder_backend_quobyte option to etc/kolla/globals.yml to enable use the Quobyte Cinder backend. Change the bind mounts for /var/lib/nova/mnt to include the shared propogation if Quobyte is enabled. Update the documentation to include a section on configuring the Cinder. Implements: blueprint cinder-quobyte-backend Change-Id: I364939407ad244fe81cea40f880effdbcaa8a20d
-
- Nov 30, 2018
-
-
João Feteira authored
Added the missing option neutron_plugin_agent: "opendaylight" added to the opendaylight documentation page. Without it the deployment would not use the neutron_plugin_agent but the default one: openvswitch . Change-Id: I56a377e1faab9a50f36383ea59b45bf5a9155bcf
-
Paul Bourke authored
When using external Ceph the operator must create pools for each service and configure keyrings with appropriate permissions. The official Ceph docs describe this in detail so let operators know this. Change-Id: Ic3e52e1fbbf09ec09ac21b5b3067092b195812f1
-