- Jan 12, 2021
-
-
Piotr Parczewski authored
It is now possible to deploy either 1.x or 2.x version of Prometheus. The new 2.x version introduces breaking changes in terms of storage format and command line options. Change-Id: I80cc6f1947f3740ef04b29839bfa655b14fae146 Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Nov 23, 2020
-
-
LinPeiWen authored
The two parameters "manila_glusterfs_volume_pattern" and "manila_glusterfs_mount_point_base" do not require default Change-Id: I58e7cdf1193900be54c136caabe6e41cedf5a932
-
- Nov 19, 2020
-
-
Victor Chembaev authored
Change-Id: I1ff4cbdf3f60cb7fd5fe5d3c5d498e05fe2df79a Closes-Bug: #1904702
-
- Nov 11, 2020
-
-
Alban Lecorps authored
Add scrape_timeout option in prometheus_openstack_exporter job in order to avoid timeout for large Openstack environment. Change-Id: If96034e602bee3b3eea34a2656047355e1d17eec Closes-Bug: #1903547
-
- Nov 10, 2020
-
-
Isaac Prior authored
Change-Id: If6c50606fa3da353728ae4d916df20fcc95b8927
-
Radosław Piliszek authored
Now that it has its own branch and published images. Depends-On: https://review.opendev.org/761822 Change-Id: I99924b52ee4e0aca1ca4c416190292e561b5c043
-
- Nov 09, 2020
-
-
Michal Nasiadka authored
Currently we set enable-chassis-as-gw on compute nodes when distributed FIP is enabled - that is not required for FIP functionality. Change-Id: Ic880a9479fa0cdbb1d1cae3dbe9523ef2e1132ce Closes-Bug: #1901960
-
- Nov 08, 2020
-
-
Radosław Piliszek authored
CentOS 8 should work fine without the workaround. This change adds the missing CentOS 8 IPv6 CI job as well. Change-Id: I58af7a09b5ae09a10b9efc33c1f30c2efc6613f7
-
- Oct 29, 2020
-
-
Mark Goddard authored
This was required in Train and Ussuri for the 5.x to 6.x upgrade, but is no longer necessary. Change-Id: I8a08f1c411c243c4d1cb6efd0e82de67a5151197
-
- Oct 27, 2020
-
-
Radosław Piliszek authored
Makes 'import_tasks' not change behaviour compared to 'include_tasks'. Change-Id: I600be7c3bd763b3b924bd4a45b4e7b4dca7a33e3
-
Radosław Piliszek authored
Main plays are action-redirect-stubs, ideal for import_tasks. This avoids 'include' penalty and makes logs/ara look nicer. Fixes haproxy and rabbitmq not to check the host group as well. Change-Id: I46136fc40b815e341befff80b54a91ef431eabc0 Partially-Implements: blueprint performance-improvements
-
- Oct 24, 2020
-
-
linpeiwen authored
Follows existing backends patterns to add support for the GlusterFS NFS driver. NFS server type used by the GlusterFS backend, Gluster or Ganesha, currently supports Gluster. The GlusterFS NFS driver needs to install the glusterfs-fuse package in the kolla images manila share container in advance, which has been merged in https://review.opendev.org/747510 Change-Id: I7fdb121b5bf9850d62246a24f9b17d226028c2ca
-
- Oct 22, 2020
-
-
Mark Goddard authored
During a deploy, if keystone Fernet key rotation happens before the keystone container starts, the rotation may fail with 'permission denied'. This happens because config.json for Keystone sets the permissions for /etc/keystone/fernet-keys. This change fixes the issue by also setting the permissions for /etc/keystone/fernet-keys in config.json for keystone-fernet and keystone-ssh. Change-Id: I561e4171d14dcaad8a2a9a36ccab84a670daa904 Closes-Bug: #1888512
-
Mark Goddard authored
Currently we check the age of the primary Fernet key on Keystone startup, and fail if it is older than the rotation interval. While this may seem sensible, there are various reasons why the key may be older than this: * if the rotation interval is not a factor of the number of seconds in a week, the rotation schedule will be lumpy, with the last rotation being up to twice the nominal rotation interval * if a keystone host is unavailable at its scheduled rotation time, rotation will not happen. This may happen multiple times We could do several things to avoid this issue: 1. remove the check on the age of the key 2. multiply the rotation interval by some factor to determine the allowed key age This change goes for the more simple option 1. It also cleans up some terminology in the keystone-startup.sh script. Closes-Bug: #1895723 Change-Id: I2c35f59ae9449cb1646e402e0a9f28ad61f918a8
-
- Oct 19, 2020
-
-
Michal Nasiadka authored
The correct path according to Ubuntu cron manpage [1] is /var/spool/cron/crontabs/$USER [1]: http://manpages.ubuntu.com/manpages/trusty/man8/cron.8.html Closes-Bug: #1898765 Change-Id: Id5fc354e3e32cae2468cd2557a2967859e3b4e16
-
- Oct 12, 2020
-
-
Radosław Piliszek authored
Config plays do not need to check containers. This avoids skipping tasks during the genconfig action. Ironic and Glance rolling upgrades are handled specially. Swift and Bifrost do not use the handlers at all. Partially-Implements: blueprint performance-improvements Change-Id: I140bf71d62e8f0932c96270d1f08940a5ba4542a
-
James Kirsch authored
Add TLS support for backend Neutron API Server communication using HAProxy to perform TLS termination. When used in conjunction with enabling TLS for service API endpoints, network communication will be encrypted end to end, from client through HAProxy to the Neutron service. Change-Id: Ib333a1f1bd12491df72a9e52d961161210e2d330 Partially-Implements: blueprint add-ssl-internal-network
-
- Oct 10, 2020
-
-
Benjamin FÜHRMANN authored
When applying upgrade action on Swift, rolling restart was not stopping containers on the right hosts if all Swift containers were not deployed on the same host. This patch proposes to use the same kind of detection already done in reconfigure and associate a container to a group. Closes-Bug: 1899280 Change-Id: I75e31554228350ff2e1c2f53ff864f8649c8d618 Signed-off-by:
Benjamin FÜHRMANN <benjamin.fuhrmann@gmail.com>
-
- Oct 09, 2020
-
-
Pierre Riteau authored
Change-Id: I639145a709f1d3b9882bbdfb20a754646d1f5270
-
wu.chunyang authored
remove redundant space line replace octavia user with {{ octavia_keystone_user }} Change-Id: I284acc580a1a530eede3e0227febe8667dea5d47
-
- Oct 08, 2020
-
-
Mark Goddard authored
If iptables is not installed, e.g. in the CentOS 8 cloud image, and Docker iptables management is enabled, we get the following errors: Failed to find iptables: exec: \"iptables\": executable file not found in $PATH failed to start daemon: Error initializing network controller: error obtaining controller instance: failed to create NAT chain DOCKER: Iptables not found This change installs the iptables package Docker iptables management is enabled. Change-Id: I3ba5318debccafb28c3cbce8e4e9813c28b086fc Closes-Bug: #1899060
-
Radosław Piliszek authored
This fixes the `certificates` command to not include CSRs in the haproxy bundle. The regex was wrong. Change-Id: If25a6d5dd40f507fea4470be01baeeb7c8a790b4
-
wu.chunyang authored
we use octavia user to upload image currently, so it is better to create a octavia openrc file for user Implements: blueprint implement-automatic-deploy-of-octavia Change-Id: Ib53d00fa4a6ee59b8a0b2245f83786a6af0cbf53
-
Mark Goddard authored
implemented as a separate command (kolla-ansible octavia-certificates) Implements: blueprint implement-automatic-deploy-of-octavia Co-Authored-By:
wu.chunyang <wuchunyang@yovole.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Change-Id: I2c5b26ce9e363f35c523865904a582f7960aa682
-
- Oct 06, 2020
-
-
nikparasyr authored
Use with_first_found on placement-api-wsgi to allow overwrite from users and keep consistency with other roles. Change-Id: I11c84db6df1bb5be61db5b6b0adf8c160a2bd931 Closes-Bug: #1898766
-
Mark Goddard authored
* ipxe_enabled was removed in Ussuri, now there is a separate ipxe boot interface. * iPXE now has its own set of configuration for the bootfile and config template, and the values previously set when iPXE is enabled are now the default in ironic. The overrides have been removed, since they match the iPXE defaults. Change-Id: I9d9f030ee4be979d0a849b59e5eb991f2d82f6a4
-
- Oct 05, 2020
-
-
Michal Nasiadka authored
[1]: https://review.opendev.org/#/c/561802/ Change-Id: Id335502ad464aa417162b2576ffae3818d30cba1
-
Michal Nasiadka authored
This change enables the use of Docker healthchecks for core OpenStack services. Also check-failures.sh has been updated to treat containers with unhealthy status as failed. Implements: blueprint container-health-check Change-Id: I79c6b11511ce8af70f77e2f6a490b59b477fefbb
-
- Oct 04, 2020
-
-
Radosław Piliszek authored
Keepalived and haproxy cooperate to provide control plane HA in kolla-ansible deployments. Certain care should be exerted to avoid prolonged availability loss during reconfigurations and upgrades. This patch aims to provide this care. There is nothing special about keepalived upgrade compared to reconfig, hence it is simplified to run the same code as for deploy. The broken logic of safe upgrade is replaced by common handler code which's goal is to ensure we down current master only after we have backups ready. This change introduces a switch to kolla_docker module that allows to ignore missing containers (as they are logically stopped). ignore_missing is the switch's name. All tests are included. Change-Id: I22ddec5f7ee4a7d3d502649a158a7e005fe29c48
-
- Oct 02, 2020
-
-
wu.chunyang authored
this patchset has implemented: - network (lb-mgmt-net) - security groups and rules (used by amphora and health manager) - amphora flavor (used by amphora) - nova keypair (used by amphora at the time of debugging) Add a octavia_amp_listen_port variable which used by amphora Add amp_image_owner_id in octavia.conf Implements: blueprint implement-automatic-deploy-of-octavia Co-Authored-By:
zhangchun <zhangchun@yovole.com> Depends-On: https://review.opendev.org/652030 Change-Id: I67009d046925cfc02c1e0073c80085c1471975f6
-
- Oct 01, 2020
-
-
Radosław Piliszek authored
Since [1] and [2] merged, K-A has to control Neutron migrations to migrate all required projects. This patch additionally fixes the other observed issue. [1] https://review.opendev.org/750075 [2] https://review.opendev.org/753543 Change-Id: I09e1b421e9066890b50bd82331a3050de252464f Closes-Bug: #1894380 Depends-On: https://review.opendev.org/755346
-
- Sep 30, 2020
-
-
Michal Nasiadka authored
blueprint container-health-check Implements healthchecks option in kolla_docker Ansible module Change-Id: I9323d4e75378d06f52b869f31009fd656bf270d2
-
- Sep 28, 2020
-
-
Michal Nasiadka authored
Update to CentOS 8 versions of packages in docker-ce repo (that are now available) Change-Id: I50d28ea31c3c29322974b91a72a2bd7999324ac7
-
- Sep 26, 2020
-
-
Radosław Piliszek authored
All docs are included. Change-Id: Ie29ff7ca340812c8dc0dac493518c87cf7bf137b Partially-Implements: blueprint letsencrypt-https
-
- Sep 25, 2020
-
-
Michal Nasiadka authored
keystone-startup.sh is using fernet_token_expiry instead of fernet_key_rotation_interval - which effects in restart loop of keystone containers - when restarted after 2-3 days. Closes-Bug: #1895723 Change-Id: Ifff77af3d25d9dc659fff34f2ae3c6f2670df0f4
-
- Sep 24, 2020
-
-
James Kirsch authored
This patch introduces an optional backend encryption for the Ironic API service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Ironic service. Change-Id: I9edf7545c174ca8839ceaef877bb09f49ef2b451 Partially-Implements: blueprint add-ssl-internal-network
-
- Sep 23, 2020
-
-
Pierre Riteau authored
Change-Id: I5befc72a4894d625ca352b27df9d3aa84a2f5b2c
-
- Sep 22, 2020
-
-
Mark Goddard authored
If the common role is executed against a set of hosts that are not all in the fluentd group, the run_once tasks that find customisations may be skipped. This causes a later failure when accessing the registered variables for those tasks. This issue was raised on the mailing list: http://lists.openstack.org/pipermail/openstack-discuss/2020-September/016932.html This issue only affects the master branch, due to addition of groups for the common role in I6a4676bf6efeebc61383ec7a406db07c7a868b2a. This change fixes the issue by always running the find tasks, if fluentd is enabled. Change-Id: I559c4b94d18c7f36d43e1d88629ed44668abf859
-
Pierre Riteau authored
When the internal VIP is moved in the event of a failure of the active controller, OpenStack services can become unresponsive as they try to talk with MariaDB using connections from the SQLAlchemy pool. It has been argued that OpenStack doesn't really need to use connection pooling with MariaDB [1]. This commit reduces the use of connection pooling via two configuration options: - max_pool_size is set to 1 to allow only a single connection in the pool (it is not possible to disable connection pooling entirely via oslo.db, and max_pool_size = 0 means unlimited pool size) - lower connection_recycle_time from the default of one hour to 10 seconds, which means the single connection in the pool will be recreated regularly These settings have shown better reactivity of the system in the event of a failover. [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html Change-Id: Ib6a62d4428db9b95569314084090472870417f3d Closes-Bug: #1896635
-
Radosław Piliszek authored
This allows for more config flexibility - e.g. running multiple backends with a common frontend. Note this is a building block for future work on letsencrypt validator (which should offer backend and share frontend with any service running off 80/443 - which would be only horizon in the current default config), as well as any work towards single port (that is single frontend) and multiple services anchored at paths of it (which is the new recommended default). Change-Id: Ie088fcf575e4b5e8775f1f89dd705a275725e26d Partially-Implements: blueprint letsencrypt-https
-