- Apr 20, 2022
-
-
Marcin Juszkiewicz authored
We have only one value for install_type now and it gets removed from image names. Change-Id: I8bf95fd7aa9dd26b80d618ca0fcb097003b4cb0a
-
- Apr 11, 2022
-
-
Marcin Juszkiewicz authored
Change-Id: Ia2f549ba119ac09c4d1e4279baf594a42480511f
-
- Apr 06, 2022
-
-
Radosław Piliszek authored
Change-Id: I2ae1a402e723cd1063618d1b9fb18f6adb27a390
-
Radosław Piliszek authored
Change-Id: I8e4096d7136d0ce9e54f1af0bb9ba110487fb35b
-
Radosław Piliszek authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/832163 Change-Id: Ia2dba1854e925041ae23c731273b810bb2d5ec30
-
- Mar 30, 2022
-
-
Michal Nasiadka authored
This key can be used by users in networking-generic-switch scenario instead of adding cleartext password in ml2_conf.ini. Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
-
- Mar 24, 2022
-
-
Michał Nasiadka authored
In most real world deployments, there will be multiple backend DNS servers, allow to specify all of them for the pool configuration. Change-Id: Ic9737d0446a807891b429f080ae1bf048a3c8e4a
-
- Mar 21, 2022
-
-
Mark Goddard authored
Change Ia1239069ccee39416b20959cbabad962c56693cf added support for running a libvirt daemon on the host, rather than using the nova_libvirt container. It did not cover migration of existing hosts from using a container to using a host daemon. This change adds a kolla-ansible nova-libvirt-cleanup command which may be used to clean up the nova_libvirt container, volumes and related items on hosts, once it has been disabled. The playbook assumes that compute hosts have been emptied of VMs before it runs. A future extension could support migration of existing VMs, but this is currently out of scope. Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
-
Mark Goddard authored
In some cases it may be desirable to run the libvirt daemon on the host. For example, when mixing host and container OS distributions or versions. This change makes it possible to disable the nova_libvirt container, by setting enable_nova_libvirt_container to false. The default values of some Docker mounts and other paths have been updated to point to default host directories rather than Docker volumes when using a host libvirt daemon. This change does not handle migration of existing systems from using a nova_libvirt container to libvirt on the host. Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504 Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
-
- Mar 10, 2022
-
-
Mark Goddard authored
In Kolla Ansible OpenStack deployments, by default, libvirt is configured to allow read-write access via an unauthenticated, unencrypted TCP connection, using the internal API network. This is to facilitate migration between hosts. By default, Kolla Ansible does not use encryption for services on the internal network (and did not support it until Ussuri). However, most other services on the internal network are at least authenticated (usually via passwords), ensuring that they cannot be used by anyone with access to the network, unless they have credentials. The main issue here is the lack of authentication. Any client with access to the internal network is able to connect to the libvirt TCP port and make arbitrary changes to the hypervisor. This could include starting a VM, modifying an existing VM, etc. Given the flexibility of the domain options, it could be seen as equivalent to having root access to the hypervisor. Kolla Ansible supports libvirt TLS [1] since the Train release, using client and server certificates for mutual authentication and encryption. However, this feature is not enabled by default, and requires certificates to be generated for each compute host. This change adds support for libvirt SASL authentication, and enables it by default. This provides base level of security. Deployments requiring further security should use libvirt TLS. [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021 Closes-Bug: #1964013 Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
-
- Feb 25, 2022
-
-
Radosław Piliszek authored
Ironic has changed the default PXE to be iPXE (as opposed to plain PXE) in Yoga. Kolla Ansible supports either one or the other and we tend to stick to upstream defaults so this change enables iPXE instead of plain PXE - by default - the users are allowed to change back and they need to take one other action so it is good to remind them via upgrade notes either way. Change-Id: If14ec83670d2212906c6e22c7013c475f3c4748a
-
- Feb 18, 2022
-
-
alecorps authored
An FCD, also known as an Improved Virtual Disk (IVD) or Managed Virtual Disk, is a named virtual disk independent of a virtual machine. Using FCDs for Cinder volumes eliminates the need for shadow virtual machines. This patch adds Kolla support. Change-Id: Ic0b66269e6d32762e786c95cf6da78cb201d2765
-
- Feb 17, 2022
-
-
Alban Lecorps authored
NSXP is the OpenStack support for the NSX Policy platform. This is supported from neutron in the Stein version. This patch adds Kolla support This adds a new neutron_plugin_agent type 'vmware_nsxp'. The plugin does not run any neutron agents. Change-Id: I9e9d8f07e586bdc143d293e572031368af7f3fca
-
- Feb 02, 2022
-
-
Buddhika Sanjeewa authored
Enables zun to access cinder volumes when cinder is configured to use external ceph. Copies ceph config file and ceph cinder keyring to /etc/ceph in zun_compute container. Closes-Bug: 1848934 Change-Id: Ie56868d5e9ed37a9274b8cbe65895f3634b895c8
-
- Jan 31, 2022
-
-
Michal Nasiadka authored
Custom themes support for horizon deployment. - horizon role task added for copying theme files - added theme copying into the container in templates - docs and reno updated Change-Id: If9982c8e18be31772cb031ef72b7eebd4d768be5 Co-Authored-By:
Jakub Darmach <jakub@stackhpc.com> Depends-On: https://review.opendev.org/c/openstack/kayobe/+/824565 Depends-On: https://review.opendev.org/c/openstack/kolla/+/826672
-
- Jan 20, 2022
-
-
Michal Nasiadka authored
Change-Id: I8bf5453c6943fd2ad8912e5d80af179296ada894
-
- Jan 09, 2022
-
-
Stig Telfer authored
Some ID provider configurations do not require a certificate file. Change the logic to allow this, and update documentation accordingly. Change-Id: I2c34a6b5894402bbebeb3fb96768789bc3c7fe84
-
- Dec 23, 2021
-
-
Radosław Piliszek authored
Per [1] and exchange on IRC. [1] http://lists.openstack.org/pipermail/openstack-discuss/2021-December/026437.html Change-Id: I322500e7204eb129d7bf085006627e8c4aaaa934
-
Radosław Piliszek authored
Change-Id: I27496528c684c993a3e470265ba86cc29c136c7b
-
- Dec 20, 2021
-
-
Radosław Piliszek authored
This is a docs amendment to let users know that calling init-runonce is not a required deployment step and it may not work for them if they modified the defaults. Change-Id: Ia3922b53d91a1a820447fec6a8074b941edc2ee9
-
- Nov 25, 2021
-
-
Doug Szumski authored
Nova provides a mechanism to set static vendordata via a file [1]. This patch provides support in Kolla Ansible for using this feature. Arguably this could be part of a generic mechansim for copying arbitrary config, but: - It's not clear if there is anything else that would take advantage of this - One size might not fit all [1] https://docs.openstack.org/nova/latest/configuration/config.html#api.vendordata_jsonfile_path Change-Id: Id420376d96d0c40415c369ae8dd36e845a781820
-
- Oct 22, 2021
-
-
Radosław Piliszek authored
As promised for Xena. Change-Id: Id634426a1961f0b883068e4ed80e7d1633e5708e
-
- Oct 20, 2021
-
-
Mark Goddard authored
Change-Id: I3a9c49c73a932b3d5ceed65c92190e5d72e27bbb Closes-Bug: #1626259
-
- Oct 12, 2021
-
-
Maksim Malchuk authored
This change updates documentation, examples and tests to support Ironic inspection through DHCP-relay. The dnsmasq service should be configured with more specific format set in the variable ``ironic_dnsmasq_dhcp_range``. See the dnsmasq manual page [1]. [1] https://thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.html Change-Id: I9488a72db588e31289907668f1997596a8ccdec6 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Oct 06, 2021
-
-
Piotr Parczewski authored
Curl would not work without -L on old openstack.org URLs. TrivialFix Change-Id: I7ed7bd336f4b874fc6027cb9ad20669b08e4a7e9
-
- Oct 04, 2021
-
-
Gaël THEROND (Fl1nt) authored
* Fix various typos and formatting. * Add documentation about custom collector backend. * Add documentation about custom storage backend. Change-Id: If937afc5ce2a2747f464fbaf38a5dcf2e57ba04f Closes-bug: #1940842
-
- Sep 30, 2021
-
-
Mark Goddard authored
* Register Swift-compatible endpoints in Keystone * Load balance across RadosGW API servers using HAProxy The support is exercised in the cephadm CI jobs, but since RGW is not currently enabled via cephadm, it is not yet tested. https://docs.ceph.com/en/latest/radosgw/keystone/ Implements: blueprint ceph-rgw Change-Id: I891c3ed4ed93512607afe65a42dd99596fd4dbf9
-
Michał Nasiadka authored
Change-Id: I51e2b62f563e66b6bb919621272662f3f8721eb2
-
- Sep 26, 2021
-
-
Michal Arbet authored
This patch adding option to control weight of haproxy backends per service via host variable. Example: [control] server1 haproxy_nova_api_weight=10 server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10 server3 haproxy_keystone_admin_weight=50 If weight is not defined, everything is working as before. Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
-
- Sep 16, 2021
-
-
Radosław Piliszek authored
Docs adapted to match. Removed the unsupported-for-quay option to set up a pull-through cache. Closes-Bug: #1942134 Change-Id: If5a26b1ba4bf35bc29306c24f608396dbf5e3371
-
Michal Arbet authored
Haproxy was renamed in [1]. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/770618 Change-Id: Ib2d7f0774fede570a8c4c315d83afd420c31da0b
-
- Aug 20, 2021
-
-
Radosław Piliszek authored
To follow best security practices and help fellow operators. More details inline and in the linked bug report. Closes-Bug: #1940547 Change-Id: Ide9e9009a6e272f20a43319f27d257efdf315f68
-
- Aug 17, 2021
-
-
Skylar Kelty authored
Manila has changed from using subfolders to subvolumes. We need a bit of a tidy up to prevent deploy errors. This change also adds the ability to specify the ceph FS Manila uses instead of relying on the default "first found". Closes-Bug: #1938285 Closes-Bug: #1935784 Change-Id: I1d0d34919fbbe74a4022cd496bf84b8b764b5e0f
-
- Aug 06, 2021
-
-
Ilya Popov authored
Basically, there are three main installation scenario: Scenario 1: Ironic installation together with other openstack services including keystone. In this case variable enable_keystone is set to true and keystone service will be installed together with ironic installation. It is possible realise this scenario, no fix needed Scenario 2: Ironic installation with connection to already installed keystone. In this scenario we have to set enable_keystone to “No” to prevent from new keystone service installation during the ironic installation process. But in other hand, we need to have correct sections in ironic.conf to provide all information needed to connect to existing keystone. But all sections for keystone are added to ironic.conf only if enable_keystone var is set to “Yes”. It isn’t possible to realise this scenario. Proposed fix provide support for this scenario, where multiple regions share the same keystone service. Scenario 3: No keystone integration. Ironic don't connect to Keystone. It is possible realise this scenario, no fix needed Proposed solution also keep the default behaviour: if no enable_keystone_integration is manually defined by default it takes value of enable_keystone variable and all behaviour is the same. But if we don't want to install keystone and want to connect to existing one at the same time, it will be possible to set enable_keystone var to “No” (preventing keystone from installation) and at the same time set ironic_enable_keystone_integration to Yes to allow needed section appear in ironic.conf through templating. Change-Id: I0c7e9a28876a1d4278fb2ed8555c2b08472864b9
-
- Aug 05, 2021
-
-
Piotr Parczewski authored
Change-Id: I0d7c7f47e6653cf2903589a9c86798a8c6404af5
-
- Jul 28, 2021
-
-
Radosław Piliszek authored
As mentioned in the Iced014acee7e590c10848e73feca166f48b622dc commit message, in Ussuri+ we can use ``+sbwtdcpu none +sbwtdio none`` as well. This is due to relying on RMQ-provided erlang in version 23.x. This change adds the extra arguments by default. It should be backported down to Ussuri before we do a release with Iced014acee7e590c10848e73feca166f48b622dc. Change-Id: I32e247a6cb34d7f6763b544f247fd408dce2b3a2
-
Mark Goddard authored
In Ussuri, nova stopped using separate Ceph keys for the volumes and vms pools by default. Instead, we set ceph_nova_keyring to the value of ceph_cinder_keyring by default, which is ceph.client.cinder.keyring. This is in line with the Ceph OpenStack integration guide [1]. However, the user used by nova to access the vms pool (ceph_nova_user) defaults to nova, meaning that nova will still try to use a ceph.client.nova.keyring, which probably does not exist. We did not see this issue in CI, because we set ceph_nova_user to cinder. This change fixes the issue by setting ceph_nova_user to the value of ceph_cinder_user by default, which is cinder. Closes-Bug: #1934145 Related-Bug: #1928690 [1] https://docs.ceph.com/en/latest/rbd/rbd-openstack/ Change-Id: I6aa8db2214e07906f1f3e035411fc80ba911a274
-
- Jul 27, 2021
-
-
wu.chunyang authored
Nova always tries to create the rabbitmq user regardless of whether RabbitMQ is enabled or not. This ps also adds an external rabbitmq doc. Change-Id: Iec517226e4c82ea351889b55689a3efceaadcc76
-
- Jul 22, 2021
-
-
Mark Goddard authored
In the Xena release, Ironic removed the iSCSI driver [1]. The recommended driver is direct, which uses HTTP to transfer the disk image. This requires an HTTP server, and the simplest option is to use the one currently deployed when enable_ironic_ipxe is set to true. For this reason, this patch always enables the HTTP server running on the conductor. iPXE is still enabled separately, since it cannot currently be used at the same time as PXE. [1] https://review.opendev.org/c/openstack/ironic/+/789382 Change-Id: I30c2ad2bf2957ac544942aefae8898cdc8a61ec6
-
- Jul 21, 2021
-
-
Pierre Riteau authored
The variable octavia_amphora_flavor should be octavia_amp_flavor. The variable for customising network and subnet was only mentioned in the example. Change-Id: I3ba5a7ccc2c810fea12bc48584c064738e5aa35e
-