Skip to content
Snippets Groups Projects
  1. Jan 12, 2021
  2. Nov 19, 2020
  3. Nov 11, 2020
    • Alban Lecorps's avatar
      Add override timeout for openstack exporter · 99680b56
      Alban Lecorps authored
      Add scrape_timeout option in
      prometheus_openstack_exporter job in order
      to avoid timeout for large Openstack environment.
      
      Change-Id: If96034e602bee3b3eea34a2656047355e1d17eec
      Closes-Bug: #1903547
      99680b56
  4. Nov 10, 2020
  5. Nov 09, 2020
    • Michal Nasiadka's avatar
      ovn: Do not schedule SNAT routers on computes · 06baf514
      Michal Nasiadka authored
      Currently we set enable-chassis-as-gw on compute nodes when distributed FIP
      is enabled - that is not required for FIP functionality.
      
      Change-Id: Ic880a9479fa0cdbb1d1cae3dbe9523ef2e1132ce
      Closes-Bug: #1901960
      06baf514
  6. Nov 05, 2020
    • OpenStack Release Bot's avatar
      Update master for stable/victoria · 2ae8b66f
      OpenStack Release Bot authored
      Add file to the reno documentation build to show release notes for
      stable/victoria.
      
      Use pbr instruction to increment the minor version number
      automatically so that master versions are higher than the versions on
      stable/victoria.
      
      Change-Id: Iad61fa88f8afa7d5f39154b9466338b417bbf40a
      Sem-Ver: feature
      2ae8b66f
  7. Oct 24, 2020
    • linpeiwen's avatar
      Add support for GlusterFS NFS Manila backend · f01492b1
      linpeiwen authored
      Follows existing backends patterns to add support for the GlusterFS
      NFS driver.
      NFS server type used by the GlusterFS backend, Gluster or Ganesha,
      currently supports Gluster.
      The GlusterFS NFS driver needs to install the glusterfs-fuse package
      in the kolla images manila share container in advance, which has been merged
      in https://review.opendev.org/747510
      
      Change-Id: I7fdb121b5bf9850d62246a24f9b17d226028c2ca
      f01492b1
  8. Oct 22, 2020
    • Mark Goddard's avatar
      Fix permission denied during Fernet key rotation · b45679f1
      Mark Goddard authored
      During a deploy, if keystone Fernet key rotation happens before the
      keystone container starts, the rotation may fail with 'permission
      denied'. This happens because config.json for Keystone sets the
      permissions for /etc/keystone/fernet-keys.
      
      This change fixes the issue by also setting the permissions for
      /etc/keystone/fernet-keys in config.json for keystone-fernet and
      keystone-ssh.
      
      Change-Id: I561e4171d14dcaad8a2a9a36ccab84a670daa904
      Closes-Bug: #1888512
      b45679f1
    • Mark Goddard's avatar
      Fix keystone-startup.sh - remove Fernet key age check · ba8c27f5
      Mark Goddard authored
      Currently we check the age of the primary Fernet key on Keystone
      startup, and fail if it is older than the rotation interval. While this
      may seem sensible, there are various reasons why the key may be older
      than this:
      
      * if the rotation interval is not a factor of the number of seconds in a
        week, the rotation schedule will be lumpy, with the last rotation
        being up to twice the nominal rotation interval
      * if a keystone host is unavailable at its scheduled rotation time,
        rotation will not happen. This may happen multiple times
      
      We could do several things to avoid this issue:
      
      1. remove the check on the age of the key
      2. multiply the rotation interval by some factor to determine the
         allowed key age
      
      This change goes for the more simple option 1. It also cleans up some
      terminology in the keystone-startup.sh script.
      
      Closes-Bug: #1895723
      
      Change-Id: I2c35f59ae9449cb1646e402e0a9f28ad61f918a8
      ba8c27f5
  9. Oct 19, 2020
  10. Oct 14, 2020
    • zhoulinhui's avatar
      Revert VMware deprecation · b6846d6e
      zhoulinhui authored
      Nova has reversed their deprecation of the VMware driver, and the Kolla
      community has shown an interest in it.
      
      Change-Id: I82f1074da56ed16c08317d1f92ed7f0a6f4a149a
      b6846d6e
  11. Oct 12, 2020
    • James Kirsch's avatar
      Add support for encrypting backend Neutron API Server · 93ad57f4
      James Kirsch authored
      Add TLS support for backend Neutron API Server communication using
      HAProxy to perform TLS termination. When used in conjunction with
      enabling TLS for service API endpoints, network communication will be
      encrypted end to end, from client through HAProxy to the Neutron
      service.
      
      Change-Id: Ib333a1f1bd12491df72a9e52d961161210e2d330
      Partially-Implements: blueprint add-ssl-internal-network
      93ad57f4
  12. Oct 08, 2020
    • Mark Goddard's avatar
      baremetal: Install iptables for Docker if enabled · bc1d02d8
      Mark Goddard authored
      If iptables is not installed, e.g. in the CentOS 8 cloud image, and
      Docker iptables management is enabled, we get the following errors:
      
      Failed to find iptables: exec: \"iptables\": executable file not found
      in $PATH failed to start daemon: Error initializing network controller:
      error obtaining controller instance: failed to create NAT chain DOCKER:
      Iptables not found
      
      This change installs the iptables package Docker iptables management is
      enabled.
      
      Change-Id: I3ba5318debccafb28c3cbce8e4e9813c28b086fc
      Closes-Bug: #1899060
      bc1d02d8
  13. Oct 06, 2020
    • nikparasyr's avatar
      Allow overwrite of placement-api wsgi config · fc4327d9
      nikparasyr authored
      Use with_first_found on placement-api-wsgi to allow
      overwrite from users and keep consistency with other
      roles.
      
      Change-Id: I11c84db6df1bb5be61db5b6b0adf8c160a2bd931
      Closes-Bug: #1898766
      fc4327d9
  14. Oct 05, 2020
    • Michal Nasiadka's avatar
      Use Docker healthchecks for core services · c52a89ae
      Michal Nasiadka authored
      This change enables the use of Docker healthchecks for core OpenStack
      services.
      Also check-failures.sh has been updated to treat containers with
      unhealthy status as failed.
      
      Implements: blueprint container-health-check
      Change-Id: I79c6b11511ce8af70f77e2f6a490b59b477fefbb
      c52a89ae
  15. Oct 04, 2020
    • Radosław Piliszek's avatar
      Coordinate haproxy and keepalived restarts · c2d0bf30
      Radosław Piliszek authored
      Keepalived and haproxy cooperate to provide control plane HA in
      kolla-ansible deployments.
      Certain care should be exerted to avoid prolonged availability
      loss during reconfigurations and upgrades.
      This patch aims to provide this care.
      There is nothing special about keepalived upgrade compared to
      reconfig, hence it is simplified to run the same code as for
      deploy.
      The broken logic of safe upgrade is replaced by common handler
      code which's goal is to ensure we down current master only after
      we have backups ready.
      
      This change introduces a switch to kolla_docker module that allows
      to ignore missing containers (as they are logically stopped).
      ignore_missing is the switch's name.
      All tests are included.
      
      Change-Id: I22ddec5f7ee4a7d3d502649a158a7e005fe29c48
      c2d0bf30
    • Mark Goddard's avatar
      Update release note for httpd keep alive · 66c0472e
      Mark Goddard authored
      Adds information about change of default.
      
      Change-Id: I9041345bbffefe6059d5ff151ebff07b6e26321a
      Related: blueprint add-ssl-internal-network
      66c0472e
  16. Oct 01, 2020
  17. Sep 26, 2020
  18. Sep 25, 2020
  19. Sep 24, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 7c2df87d
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Ironic service.
      
      Change-Id: I9edf7545c174ca8839ceaef877bb09f49ef2b451
      Partially-Implements: blueprint add-ssl-internal-network
      7c2df87d
  20. Sep 23, 2020
  21. Sep 22, 2020
    • Pierre Riteau's avatar
      Reduce the use of SQLAlchemy connection pooling · c8177202
      Pierre Riteau authored
      When the internal VIP is moved in the event of a failure of the active
      controller, OpenStack services can become unresponsive as they try to
      talk with MariaDB using connections from the SQLAlchemy pool.
      
      It has been argued that OpenStack doesn't really need to use connection
      pooling with MariaDB [1]. This commit reduces the use of connection
      pooling via two configuration options:
      
      - max_pool_size is set to 1 to allow only a single connection in the
        pool (it is not possible to disable connection pooling entirely via
        oslo.db, and max_pool_size = 0 means unlimited pool size)
      - lower connection_recycle_time from the default of one hour to 10
        seconds, which means the single connection in the pool will be
        recreated regularly
      
      These settings have shown better reactivity of the system in the event
      of a failover.
      
      [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html
      
      Change-Id: Ib6a62d4428db9b95569314084090472870417f3d
      Closes-Bug: #1896635
      c8177202
    • Radosław Piliszek's avatar
      Add support for with_frontend and with_backend · 3916c156
      Radosław Piliszek authored
      This allows for more config flexibility - e.g. running multiple
      backends with a common frontend.
      
      Note this is a building block for future work on letsencrypt
      validator (which should offer backend and share frontend with
      any service running off 80/443 - which would be only horizon
      in the current default config), as well as any work towards
      single port (that is single frontend) and multiple services
      anchored at paths of it (which is the new recommended default).
      
      Change-Id: Ie088fcf575e4b5e8775f1f89dd705a275725e26d
      Partially-Implements: blueprint letsencrypt-https
      3916c156
    • Radosław Piliszek's avatar
      Change the default haproxy template to split variant · 9451ac61
      Radosław Piliszek authored
      This allows for more config flexibility - e.g. running multiple
      backends with a common frontend.
      It is not possible with the 'listen' approach (which enforces
      frontend).
      Additionally, it does not really make sense to support two ways
      to do the exact same thing as the process is automated and
      'listen' is really meant for humans not willing to write separate
      sections.
      Hence this deprecates 'listen' variant.
      
      At the moment both templates work exactly the same.
      The real flexibility comes in following patches.
      
      Note this is a building block for future work on letsencrypt
      validator (which should offer backend and share frontend with
      any service running off 80/443 - which would be only horizon
      in the current default config), as well as any work towards
      single port (that is single frontend) and multiple services
      anchored at paths of it (which is the new recommended default).
      
      Change-Id: I2362aaa3e8069fe146d42947b8dddf49376174b5
      Partially-Implements: blueprint letsencrypt-https
      9451ac61
    • Radosław Piliszek's avatar
      Fix default mode in haproxy_single_service_split · a45ef7cc
      Radosław Piliszek authored
      haproxy_single_service_listen (the default template) was already fine.
      
      Closes-Bug: #1896591
      TrivialFix
      
      Change-Id: Id68fe19ea87565aa36fb74f2a2ca66cb951169f6
      a45ef7cc
  22. Sep 21, 2020
  23. Sep 17, 2020
    • Mark Goddard's avatar
      Support TLS encryption of RabbitMQ client-server traffic · 761ea9a3
      Mark Goddard authored
      This change adds support for encryption of communication between
      OpenStack services and RabbitMQ. Server certificates are supported, but
      currently client certificates are not.
      
      The kolla-ansible certificates command has been updated to support
      generating certificates for RabbitMQ for development and testing.
      
      RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when
      The Zuul 'tls_enabled' variable is true.
      
      Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5
      Implements: blueprint message-queue-ssl-support
      761ea9a3
    • Michal Nasiadka's avatar
      Change mariadb image to mariadb-server · a7941e24
      Michal Nasiadka authored
      Since change [1] merged we have two mariadb images (mariadb and mariadb-server)
      Let's use mariadb-server in kolla-ansible, so we can deprecate mariadb image.
      
      [1]: https://review.opendev.org/#/c/710217/
      
      Change-Id: I4ae2ccaaba8fb516f469f4ce8628e8c61de03f0d
      a7941e24
  24. Sep 01, 2020
    • Pierre Riteau's avatar
      Remove unused configuration for prometheus-openstack-exporter · 295f8d1b
      Pierre Riteau authored
      The Prometheus OpenStack exporter was needlessly configured to use the
      prometheus Docker volume and change permissions of /data, which does
      not exist in the container image.
      
      This must have been copy-pasted from existing Prometheus code.
      
      Change-Id: I96017c17e68ca7a00a2d5ac41f2f43ef87694514
      295f8d1b
  25. Aug 24, 2020
  26. Aug 23, 2020
  27. Aug 19, 2020
    • Pierre Riteau's avatar
      Add workaround for keystonemiddleware/neutron memcached issue · 5a52d8e4
      Pierre Riteau authored
      There is an issue where keystonemiddleware connections to memcached from
      neutron-server grow beyond configured values [1], eventually reaching
      the maximum number of connections accepted by memcached servers. Other
      services do not appear to be affected by this issue.
      
      A workaround is to use the advanced memcached pool. Despite its
      documentation claiming to only work with Python 2, it appears to work
      fine on Python 3.
      
      [1] https://bugs.launchpad.net/keystonemiddleware/+bug/1883659
      
      Change-Id: Ifbbc2022839cbc575848d830600241c61603c80b
      Closes-Bug: #1892210
      5a52d8e4
    • Jegor van Opdorp's avatar
      Add cinder auth config to nova-cell nova.conf.j2 · de16013b
      Jegor van Opdorp authored
      Fixes an issue during deleting evacuated instances with encrypted block
      devices.
      
      Change-Id: I9b9b689ef7e1e41b597e2c5f6b96f3ed011193c5
      Closes-Bug: 1891462
      Related-Bug: 1850279
      de16013b
    • Florian LEDUC's avatar
      Use iSCSI multipath for libvirt · 56710de5
      Florian LEDUC authored
      * Multipath daemon allows to reach block devices
      via multiple paths for better resiliency and performance.
      Multipathd periodically checks the failed iscsi paths
      and maintains a list of valid paths. Libvirt can use more
      than one iSCSI path when option volume_use_multipath is set
      and when multipathd enabled.
      
      Change-Id: I54629656803c4989f7673e8c69d2a820609b5960
      Implements: blueprint nova-libvirt-multipath-iscsi
      56710de5
    • likui's avatar
      Fix ownership and permissions of admin-openrc.sh · 16f97867
      likui authored
      
      Previously the post-deploy.yml playbook was executed with become: true,
      and the admin-openrc.sh file templated without an owner or mode
      specified. This resulted in admin-openrc.sh being owned by root with 644
      permissions.
      
      This change creates the file without become: true, and explicitly sets
      the owner to the user executing Ansible, and the mode to 600.
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Closes-Bug: #1891704
      
      Change-Id: Iadf43383a7f2bf377d4666a55a38d92bd70711aa
      16f97867
Loading