- Jan 12, 2021
-
-
Piotr Parczewski authored
It is now possible to deploy either 1.x or 2.x version of Prometheus. The new 2.x version introduces breaking changes in terms of storage format and command line options. Change-Id: I80cc6f1947f3740ef04b29839bfa655b14fae146 Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Nov 19, 2020
-
-
Victor Chembaev authored
Change-Id: I1ff4cbdf3f60cb7fd5fe5d3c5d498e05fe2df79a Closes-Bug: #1904702
-
- Nov 11, 2020
-
-
Alban Lecorps authored
Add scrape_timeout option in prometheus_openstack_exporter job in order to avoid timeout for large Openstack environment. Change-Id: If96034e602bee3b3eea34a2656047355e1d17eec Closes-Bug: #1903547
-
- Nov 10, 2020
-
-
Isaac Prior authored
Change-Id: If6c50606fa3da353728ae4d916df20fcc95b8927
-
- Nov 09, 2020
-
-
Michal Nasiadka authored
Currently we set enable-chassis-as-gw on compute nodes when distributed FIP is enabled - that is not required for FIP functionality. Change-Id: Ic880a9479fa0cdbb1d1cae3dbe9523ef2e1132ce Closes-Bug: #1901960
-
- Nov 05, 2020
-
-
OpenStack Release Bot authored
Add file to the reno documentation build to show release notes for stable/victoria. Use pbr instruction to increment the minor version number automatically so that master versions are higher than the versions on stable/victoria. Change-Id: Iad61fa88f8afa7d5f39154b9466338b417bbf40a Sem-Ver: feature
-
- Oct 24, 2020
-
-
linpeiwen authored
Follows existing backends patterns to add support for the GlusterFS NFS driver. NFS server type used by the GlusterFS backend, Gluster or Ganesha, currently supports Gluster. The GlusterFS NFS driver needs to install the glusterfs-fuse package in the kolla images manila share container in advance, which has been merged in https://review.opendev.org/747510 Change-Id: I7fdb121b5bf9850d62246a24f9b17d226028c2ca
-
- Oct 22, 2020
-
-
Mark Goddard authored
During a deploy, if keystone Fernet key rotation happens before the keystone container starts, the rotation may fail with 'permission denied'. This happens because config.json for Keystone sets the permissions for /etc/keystone/fernet-keys. This change fixes the issue by also setting the permissions for /etc/keystone/fernet-keys in config.json for keystone-fernet and keystone-ssh. Change-Id: I561e4171d14dcaad8a2a9a36ccab84a670daa904 Closes-Bug: #1888512
-
Mark Goddard authored
Currently we check the age of the primary Fernet key on Keystone startup, and fail if it is older than the rotation interval. While this may seem sensible, there are various reasons why the key may be older than this: * if the rotation interval is not a factor of the number of seconds in a week, the rotation schedule will be lumpy, with the last rotation being up to twice the nominal rotation interval * if a keystone host is unavailable at its scheduled rotation time, rotation will not happen. This may happen multiple times We could do several things to avoid this issue: 1. remove the check on the age of the key 2. multiply the rotation interval by some factor to determine the allowed key age This change goes for the more simple option 1. It also cleans up some terminology in the keystone-startup.sh script. Closes-Bug: #1895723 Change-Id: I2c35f59ae9449cb1646e402e0a9f28ad61f918a8
-
- Oct 19, 2020
-
-
Michal Nasiadka authored
The correct path according to Ubuntu cron manpage [1] is /var/spool/cron/crontabs/$USER [1]: http://manpages.ubuntu.com/manpages/trusty/man8/cron.8.html Closes-Bug: #1898765 Change-Id: Id5fc354e3e32cae2468cd2557a2967859e3b4e16
-
- Oct 14, 2020
-
-
zhoulinhui authored
Nova has reversed their deprecation of the VMware driver, and the Kolla community has shown an interest in it. Change-Id: I82f1074da56ed16c08317d1f92ed7f0a6f4a149a
-
- Oct 12, 2020
-
-
James Kirsch authored
Add TLS support for backend Neutron API Server communication using HAProxy to perform TLS termination. When used in conjunction with enabling TLS for service API endpoints, network communication will be encrypted end to end, from client through HAProxy to the Neutron service. Change-Id: Ib333a1f1bd12491df72a9e52d961161210e2d330 Partially-Implements: blueprint add-ssl-internal-network
-
- Oct 08, 2020
-
-
Mark Goddard authored
If iptables is not installed, e.g. in the CentOS 8 cloud image, and Docker iptables management is enabled, we get the following errors: Failed to find iptables: exec: \"iptables\": executable file not found in $PATH failed to start daemon: Error initializing network controller: error obtaining controller instance: failed to create NAT chain DOCKER: Iptables not found This change installs the iptables package Docker iptables management is enabled. Change-Id: I3ba5318debccafb28c3cbce8e4e9813c28b086fc Closes-Bug: #1899060
-
- Oct 06, 2020
-
-
nikparasyr authored
Use with_first_found on placement-api-wsgi to allow overwrite from users and keep consistency with other roles. Change-Id: I11c84db6df1bb5be61db5b6b0adf8c160a2bd931 Closes-Bug: #1898766
-
- Oct 05, 2020
-
-
Michal Nasiadka authored
This change enables the use of Docker healthchecks for core OpenStack services. Also check-failures.sh has been updated to treat containers with unhealthy status as failed. Implements: blueprint container-health-check Change-Id: I79c6b11511ce8af70f77e2f6a490b59b477fefbb
-
- Oct 04, 2020
-
-
Radosław Piliszek authored
Keepalived and haproxy cooperate to provide control plane HA in kolla-ansible deployments. Certain care should be exerted to avoid prolonged availability loss during reconfigurations and upgrades. This patch aims to provide this care. There is nothing special about keepalived upgrade compared to reconfig, hence it is simplified to run the same code as for deploy. The broken logic of safe upgrade is replaced by common handler code which's goal is to ensure we down current master only after we have backups ready. This change introduces a switch to kolla_docker module that allows to ignore missing containers (as they are logically stopped). ignore_missing is the switch's name. All tests are included. Change-Id: I22ddec5f7ee4a7d3d502649a158a7e005fe29c48
-
Mark Goddard authored
Adds information about change of default. Change-Id: I9041345bbffefe6059d5ff151ebff07b6e26321a Related: blueprint add-ssl-internal-network
-
- Oct 01, 2020
-
-
wu.chunyang authored
Change-Id: Ic3faf90ef7aea1c506e113fe77f62d916d1b118b Implements: blueprint implement-automatic-deploy-of-octavia
-
Radosław Piliszek authored
Since [1] and [2] merged, K-A has to control Neutron migrations to migrate all required projects. This patch additionally fixes the other observed issue. [1] https://review.opendev.org/750075 [2] https://review.opendev.org/753543 Change-Id: I09e1b421e9066890b50bd82331a3050de252464f Closes-Bug: #1894380 Depends-On: https://review.opendev.org/755346
-
- Sep 26, 2020
-
-
Radosław Piliszek authored
All docs are included. Change-Id: Ie29ff7ca340812c8dc0dac493518c87cf7bf137b Partially-Implements: blueprint letsencrypt-https
-
- Sep 25, 2020
-
-
Mark Goddard authored
Change-Id: I439e8afc87d21aa8b7f381534c963e39f69c5d73
-
Michal Nasiadka authored
keystone-startup.sh is using fernet_token_expiry instead of fernet_key_rotation_interval - which effects in restart loop of keystone containers - when restarted after 2-3 days. Closes-Bug: #1895723 Change-Id: Ifff77af3d25d9dc659fff34f2ae3c6f2670df0f4
-
- Sep 24, 2020
-
-
James Kirsch authored
This patch introduces an optional backend encryption for the Ironic API service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Ironic service. Change-Id: I9edf7545c174ca8839ceaef877bb09f49ef2b451 Partially-Implements: blueprint add-ssl-internal-network
-
- Sep 23, 2020
-
-
Pierre Riteau authored
Change-Id: I5befc72a4894d625ca352b27df9d3aa84a2f5b2c
-
- Sep 22, 2020
-
-
Pierre Riteau authored
When the internal VIP is moved in the event of a failure of the active controller, OpenStack services can become unresponsive as they try to talk with MariaDB using connections from the SQLAlchemy pool. It has been argued that OpenStack doesn't really need to use connection pooling with MariaDB [1]. This commit reduces the use of connection pooling via two configuration options: - max_pool_size is set to 1 to allow only a single connection in the pool (it is not possible to disable connection pooling entirely via oslo.db, and max_pool_size = 0 means unlimited pool size) - lower connection_recycle_time from the default of one hour to 10 seconds, which means the single connection in the pool will be recreated regularly These settings have shown better reactivity of the system in the event of a failover. [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html Change-Id: Ib6a62d4428db9b95569314084090472870417f3d Closes-Bug: #1896635
-
Radosław Piliszek authored
This allows for more config flexibility - e.g. running multiple backends with a common frontend. Note this is a building block for future work on letsencrypt validator (which should offer backend and share frontend with any service running off 80/443 - which would be only horizon in the current default config), as well as any work towards single port (that is single frontend) and multiple services anchored at paths of it (which is the new recommended default). Change-Id: Ie088fcf575e4b5e8775f1f89dd705a275725e26d Partially-Implements: blueprint letsencrypt-https
-
Radosław Piliszek authored
This allows for more config flexibility - e.g. running multiple backends with a common frontend. It is not possible with the 'listen' approach (which enforces frontend). Additionally, it does not really make sense to support two ways to do the exact same thing as the process is automated and 'listen' is really meant for humans not willing to write separate sections. Hence this deprecates 'listen' variant. At the moment both templates work exactly the same. The real flexibility comes in following patches. Note this is a building block for future work on letsencrypt validator (which should offer backend and share frontend with any service running off 80/443 - which would be only horizon in the current default config), as well as any work towards single port (that is single frontend) and multiple services anchored at paths of it (which is the new recommended default). Change-Id: I2362aaa3e8069fe146d42947b8dddf49376174b5 Partially-Implements: blueprint letsencrypt-https
-
Radosław Piliszek authored
haproxy_single_service_listen (the default template) was already fine. Closes-Bug: #1896591 TrivialFix Change-Id: Id68fe19ea87565aa36fb74f2a2ca66cb951169f6
-
- Sep 21, 2020
-
-
Radosław Piliszek authored
via KOLLA_SKIP and KOLLA_UNSET Change-Id: I7d9af21c2dd8c303066eb1ee4dff7a72bca24283 Related-Bug: #1837551
-
Radosław Piliszek authored
via kolla_sysctl_conf_path Change-Id: I09b20fa008a7fecedcb599b4792f24215179b853
-
- Sep 17, 2020
-
-
Mark Goddard authored
This change adds support for encryption of communication between OpenStack services and RabbitMQ. Server certificates are supported, but currently client certificates are not. The kolla-ansible certificates command has been updated to support generating certificates for RabbitMQ for development and testing. RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when The Zuul 'tls_enabled' variable is true. Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5 Implements: blueprint message-queue-ssl-support
-
Michal Nasiadka authored
Since change [1] merged we have two mariadb images (mariadb and mariadb-server) Let's use mariadb-server in kolla-ansible, so we can deprecate mariadb image. [1]: https://review.opendev.org/#/c/710217/ Change-Id: I4ae2ccaaba8fb516f469f4ce8628e8c61de03f0d
-
- Sep 01, 2020
-
-
Pierre Riteau authored
The Prometheus OpenStack exporter was needlessly configured to use the prometheus Docker volume and change permissions of /data, which does not exist in the container image. This must have been copy-pasted from existing Prometheus code. Change-Id: I96017c17e68ca7a00a2d5ac41f2f43ef87694514
-
- Aug 24, 2020
-
-
Nick Jones authored
Enabling both l2_population and arp_responder for LinuxBridge can cause problems in some configurations [0]. This commit removes the explicit 'true', reverting it to the default which is 'False'. Closes-Bug: #1892776 [0] https://bugs.launchpad.net/neutron/+bug/1661717 Change-Id: Ia9445a651fd7a082835a858964bcb9e8e325338d Signed-off-by:
Nick Jones <nick@dischord.org>
-
Radosław Piliszek authored
Change-Id: I6910bcdb122e42337d7938405f792fa0fe32e49b Closes-Bug: #1892686
-
- Aug 23, 2020
-
-
Radosław Piliszek authored
Change-Id: Iffadcddfb70650cdf4c6c4d9ec3b7471d63f5ff8 Closes-Bug: #1892622
-
- Aug 19, 2020
-
-
Pierre Riteau authored
There is an issue where keystonemiddleware connections to memcached from neutron-server grow beyond configured values [1], eventually reaching the maximum number of connections accepted by memcached servers. Other services do not appear to be affected by this issue. A workaround is to use the advanced memcached pool. Despite its documentation claiming to only work with Python 2, it appears to work fine on Python 3. [1] https://bugs.launchpad.net/keystonemiddleware/+bug/1883659 Change-Id: Ifbbc2022839cbc575848d830600241c61603c80b Closes-Bug: #1892210
-
Jegor van Opdorp authored
Fixes an issue during deleting evacuated instances with encrypted block devices. Change-Id: I9b9b689ef7e1e41b597e2c5f6b96f3ed011193c5 Closes-Bug: 1891462 Related-Bug: 1850279
-
Florian LEDUC authored
* Multipath daemon allows to reach block devices via multiple paths for better resiliency and performance. Multipathd periodically checks the failed iscsi paths and maintains a list of valid paths. Libvirt can use more than one iSCSI path when option volume_use_multipath is set and when multipathd enabled. Change-Id: I54629656803c4989f7673e8c69d2a820609b5960 Implements: blueprint nova-libvirt-multipath-iscsi
-
likui authored
Previously the post-deploy.yml playbook was executed with become: true, and the admin-openrc.sh file templated without an owner or mode specified. This resulted in admin-openrc.sh being owned by root with 644 permissions. This change creates the file without become: true, and explicitly sets the owner to the user executing Ansible, and the mode to 600. Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Closes-Bug: #1891704 Change-Id: Iadf43383a7f2bf377d4666a55a38d92bd70711aa
-