- Mar 14, 2024
-
-
Michal Nasiadka authored
Change-Id: Iab40eb92c7e4a9092471bef9d4477a4fa34f1c85
-
- Mar 12, 2024
-
-
Michal Nasiadka authored
Closes-Bug: #2057676 Change-Id: I9e0287a4e80b1ebcecf9e3b66c11d4233970a30b
-
German Espinoza authored
This patch fixes ovs-dpdk images pull by adding the variable kolla_role_name to the ovs-dpdk vars, so services-image-pull can work correctly. Closes-Bug: #2041864 Change-Id: I2e799290a57ebfacbc0ff9a0b1ca3dc956c513df Signed-off-by:
German Espinoza <gespinoza@whitestack.com>
-
- Mar 11, 2024
-
-
Michal Arbet authored
This patch fixes the creation of the openvswitch bridge by fixing an ansible task that was rewritten to use an ansible module, but unfortunately, its loop was implemented incorrectly. Closes-Bug: #2056332 Change-Id: Ia55a36c0f9b122b72d757ca973e7d8f76ae84344
-
Michal Arbet authored
Tooz 6.0.1 includes commit [1], which introduced parsing the username from the Redis connection URL. As a result, services started authenticating as admin which, by the way, was incorrect even before, as either a created user or the default one should have been used. The reason it worked before is simply because the username 'admin' wasn't parsed anywhere. This patch fixes the user being used and sets the correct 'default' one. [1] https://review.opendev.org/c/openstack/tooz/+/907656 Closes-Bug: #2056667 Depends-On: https://review.opendev.org/c/openstack/kolla/+/911703 Change-Id: I5568dba15fa98e009ad4a9e41756aba0fa659371
-
- Mar 05, 2024
-
-
Michal Nasiadka authored
As per [1]. [1]: https://rabbitmq-website.pages.dev/docs/feature-flags Depends-On: https://review.opendev.org/c/openstack/kolla/+/911093 Change-Id: Ib5bfc99a5023e4b949c1ea38eca9bfd1ea9cd633
-
- Feb 28, 2024
-
-
Will Szumski authored
This is useful for backwards compatability. Depends-On: https://review.opendev.org/c/openstack/kolla/+/909865 Change-Id: Ib2936580db5e7ab3479722bc353c39063010b5f2
-
Mark Goddard authored
These were omitted from I387c9d8f5c01baf6054381834ecf4e554d0fff35 and I387c9d8f5c01baf6054381834ecf4e554d0fff35. Closes-Bug: #2041855 Change-Id: I25e5450d1caeebd9c900c190fc0079988f1ca574
-
- Feb 15, 2024
-
-
Bartosz Bezak authored
This reverts commit d77372e8. Reason for revert: service role support has been fixed in Ironic [1] and added to Kolla-Ansible. [1] https://review.opendev.org/c/openstack/ironic/+/907148 Closes-Bug: #2051837 Change-Id: I49664e3a353f54e0d51f454c552a78846ba64101
-
Bartosz Bezak authored
Ironic enabled secure RBAC with system scoped enforcement [1]. Some API calls, for instance 'baremetal:driver:get' needs system scope role by design [2], even with elevated access project scope service role [3]. [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://opendev.org/openstack/ironic/src/commit/8ec56066223301230ac0ed0f0c471a10d366b474/ironic/common/policy.py#L1349-L1357 [3] https://review.opendev.org/c/openstack/kolla-ansible/+/908007 Related-Bug: #2051837 Change-Id: Id6313d7dd343b82d4c9ccf7bf429d340ea0e93d1
-
Bartosz Bezak authored
Add the service role to ironic service users. Ironic recently enforced new policy validation as part of the RBAC efforts. [1][2] Service user support was also added to Ironic. [3] Admin role needs to stay as not all services added service role support. [4][5] [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://opendev.org/openstack/governance/src/commit/e2a47de10a689a78c31765fd1b020f17c0d3109c/goals/selected/consistent-and-secure-rbac.rst#phase-2 [3] https://review.opendev.org/c/openstack/ironic/+/907148 [4] https://review.opendev.org/q/topic:bp%252Fpolicy-service-role-default [5] https://review.opendev.org/q/topic:%22New-Location-Apis%22 Related-Bug: #2051837 Change-Id: I048402c2247188cf57f35437f557f84ac25d4ff2
-
Bartosz Bezak authored
Ironic recently started to enforce new policies and scope [1]. And Ironic is one of the sole openstack project which need system scope for some admin related api calls [2]. However Ironic also started to allow project-scope behaviour for service role with setting ``rbac_service_role_elevated_access``[3] [4]. This change enables this setting to get similar behaviour of service role as other openstack projects. [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://opendev.org/openstack/governance/src/commit/e2a47de10a689a78c31765fd1b020f17c0d3109c/goals/selected/consistent-and-secure-rbac.rst?display=source#L261 [3] https://review.opendev.org/c/openstack/ironic/+/907148 [4] https://opendev.org/openstack/ironic/src/commit/8ec56066223301230ac0ed0f0c471a10d366b474/releasenotes/notes/service-project-service-role-fix-e4d1a8c23856926a.yaml Related-Bug: #2051837 Change-Id: If8d7cf1663145d0398a2e936486e2b316d4df5e0
-
Michal Nasiadka authored
In order to do this - we need to add service role to Nova and Cinder. Closes-Bug: #2049762 Change-Id: Ic121bf9f90c9865cd4d08890c80247570ef310ae
-
- Feb 12, 2024
-
-
Dawud authored
Fixes not being able to add additional plugins at build time due to the `grafana` volume being mounted over the existing `/var/lib/grafana` directory. This is fixed by copying the dashboards into the container from an existing bind mount instead of using the ``grafana`` volume. This however leaves behind the volume which should be removed with `docker volume rm grafana` or by setting `grafana_remove_old_volume` to `True`. Closes-Bug: #2039498 Change-Id: Ibcffa5d8922c470f655f447558d4a9c73b1ba361
-
- Feb 07, 2024
-
-
Michal Arbet authored
New horizon release use [1] for cache backend instead of [2] as it was in previous versions. This patch: 1. Removes override from config and configure only memcached endpoints, not backend specification itself. This will avoid bugs in future in case BACKEND will be switched again. 2. Remove 'memcached' context from kolla_address filter and use 'url' as [1] don't support inet6:[{address}] for ipv6 but supports [{address}] which 'url' provides. [1] django.core.cache.backends.memcached.PyMemcacheCache [2] django.core.cache.backends.memcached.MemcachedCache Change-Id: Ie3a8f47e7b776b6aa2bb9b1522fdd4514ea1484b
-
Michal Arbet authored
This patch implements horizon's preferred way how to configure itself described in docs [1], [1] https://docs.openstack.org/horizon/latest/configuration/settings.html Depends-On: https://review.opendev.org/c/openstack/kolla/+/906339 Change-Id: I60ab4634bf4333c47d00b12fc4ec00570062bd18
-
Michal Nasiadka authored
That is the ovs-vsctl default but Ansible module is failing in reconfigure step - and secure breaks external connectivity in OVN. From OVS docs: fail_mode: optional string, either secure or standalone When a controller is configured, it is, ordinarily, responsible for setting up all flows on the switch. Thus, if the connection to the controller fails, no new network connections can be set up. If the connection to the controller stays down long enough, no packets can pass through the switch at all. This setting de‐ termines the switch’s response to such a situation. It may be set to one of the following: standalone If no message is received from the controller for three times the inactivity probe interval (see inactiv‐ ity_probe), then Open vSwitch will take over responsibil‐ ity for setting up flows. In this mode, Open vSwitch causes the bridge to act like an ordinary MAC-learning switch. Open vSwitch will continue to retry connecting to the controller in the background and, when the connection succeeds, it will discontinue its standalone behavior. secure Open vSwitch will not set up flows on its own when the controller connection fails or when no controllers are defined. The bridge will continue to retry connecting to any defined controllers forever. The default is standalone if the value is unset, but future ver‐ sions of Open vSwitch may change the default. Change-Id: Ica4dda2914113e8f8349e7227161cb81a02b33ee
-
- Feb 06, 2024
-
-
Michal Arbet authored
This patch adds check_mode: false to tasks in restart_services.yml which just checking some WSREP status and if port is UP. Closes-Bug: #2052501 Change-Id: I92a591900d85138a87991a18dd4339efd053ef1b
-
- Feb 05, 2024
-
-
Michal Nasiadka authored
Change-Id: Iaf337c4a44bf065e96d6f30598e519ffc78de554
-
Michal Arbet authored
The purpose of this patch is to make it easier to review changes, because renaming and changing the file in one patch will generate diff when the entire file will be deleted on the one hand and new file (actually just renamed) will be new on the other hand, which is hard to review. Change-Id: I17a16ce746faa8898a457cadbb6f996f964a5b6f
-
Michal Nasiadka authored
It's been introduced in [1] and seems to be used by ovn-controller. [1]: https://patchwork.ozlabs.org/project/openvswitch/patch/1458866450-1967-1-git-send-email-russell@ovn.org/ Change-Id: I90e91f2923d58eb3c70e8d6efdc4e1212fbdc14f
-
- Jan 31, 2024
-
-
Maksim Malchuk authored
Closes-Bug: #2051731 Change-Id: Idf035bacbf5c2195d813ec4702362897f2ff907d Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
Bartosz Bezak authored
Ironic started enforcing new RBAC policies [1]. Kolla/Kayobe CI jobs are failing, as K-A doesn't have service role support. Moreover Ironic RBAC is not yet stable enough [2]. Disable enforcing new policies until fix merges and Kolla Ansible service role support is added. [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://review.opendev.org/c/openstack/ironic/+/907148 Related-Bug: #2051837 Change-Id: I424cff6ac96dfe0dd5dc58afca2b785f494c9f02
-
- Jan 30, 2024
-
-
Grzegorz Koper authored
Closes-Bug: #2049607 Change-Id: I14ae2be2e19ad06e3190e2e948bac7ce77e80d4b
-
Michal Arbet authored
This patch basically does a simple thing, on the basis of a variable neutron_dns_integration it enables/disables DNS integration. There is also precheck added which checks whether dns_domain in neutron.conf has a non-default value if DNS integration is enabled as this is requirement. [1] https://docs.openstack.org/neutron/latest/admin/config-dns-int.html [2] https://docs.openstack.org/neutron/latest/admin/config-dns-int-ext-serv.html#config-dns-int-ext-serv Closes-Bug: #2049503 Change-Id: I90f0f8dcec6fa0112179f050d96e9d9db5956cf8
-
Michal Arbet authored
This patch disables periodic compute.instance.exists notifications when designate is enabled. Related-Bug: #2049503 Change-Id: I39fe2db9182de23c1df814d911eec15e86317702
-
- Jan 29, 2024
-
-
Alex-Welsh authored
Service user passwords will now be updated in keystone if services are reconfigured with new passwords set in config. This behaviour can be overridden. Closes-Bug: #2045990 Change-Id: I91671dda2242255e789b521d19348b0cccec266f
-
- Jan 24, 2024
-
-
Bartosz Bezak authored
Change-Id: Ib0325c12cf965e7df7c1ac6b17ca87187a4cb91d
-
Dr. Jens Harbott authored
As horizon is now using Django 4 after a recent requirements update, we need to clean our config from settings that were long deprecated and now no longer work. [0] https://review.opendev.org/c/openstack/horizon/+/891828 [1] https://review.opendev.org/c/openstack/horizon/+/827092 Change-Id: I47533a2ad436578c98503284c25db4fd51896506
-
- Jan 17, 2024
-
-
Piotr Parczewski authored
Enables modifying the interval and sets the recommended default value. [1] https://docs.ceph.com/en/latest/mgr/prometheus/#configuration Change-Id: I4b91d184485aa52b3c06011f9dbb6b34bcad3ca8
-
Matt Crees authored
Shard allocation is disabled at the start of the OpenSearch upgrade task. This is set as a transient setting, meaning it will be removed once the containers are restarted. However, if there is not change in the OpenSearch container it will not be restarted so the cluster is left in a broken state: unable to allocate shards. This patch moves the pre-upgrade tasks to within the handlers, so shard allocation and the flush are only performed when the OpenSearch container is going to be restarted. Closes-Bug: #2049512 Change-Id: Ia03ba23bfbde7d50a88dc16e4f117dec3c98a448
-
- Jan 11, 2024
-
-
wu.chunyang authored
This change fixes the trove failed to discover swift endpoint by adding service_credentials in guest-agent.conf Closes-Bug: #2048829 Change-Id: I185484d2a0d0a2d4016df6acf8a6b0a7f934c237
-
wu.chunyang authored
This change fixes the trove guest instance failed to connect to RabbitMQ by adding quorum queues support to oslo_messaging_rabbit section in guest-agent.conf. Closes-Bug: #2048822 Change-Id: I94908f8e20981f20fbe4dc18e2091d3798f8b801
-
wu.chunyang authored
This change fixes the trove guest instance failed to connect to RabbitMQ by adding durable queues support to oslo_messaging_rabbit section in guest-agent.conf. Partial-Bug: #2048822 Change-Id: I8efc3c92e861816385e6cda3b231a950a06bf57d
-
- Jan 08, 2024
-
-
Pierre Riteau authored
The addition of an instance resize operation [1] to CI testing is triggering a failure in kolla-ansible-debian-ovn jobs, which are using a nodeset with multiple nodes: oslo_concurrency.processutils.ProcessExecutionError: Unexpected error while running command. Command: scp -r /var/lib/nova/instances/8ca2c7e8-acae-404c-af7d-6cac38e354b8_resize/disk 192.0.2.2:/var/lib/nova/instances/8ca2c7e8-acae-404c-af7d-6cac38e354b8/disk Exit code: 255 Stdout: '' Stderr: "Warning: Permanently added '[192.0.2.2]:8022' (ED25519) to the list of known hosts.\r\nsubsystem request failed on channel 0\r\nscp: Connection closed\r\n" This is not seen on Ubuntu Jammy, which uses OpenSSH 8.9, while Debian Bookworm uses OpenSSH 9.2. This is likely related to this change in OpenSSH 9.0 [2]: This release switches scp(1) from using the legacy scp/rcp protocol to using the SFTP protocol by default. Configure sftp subsystem like on RHEL9 derivatives. Even though it is not yet required for Ubuntu, we also configure it so we are ready for the Noble release. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/904249 [2] https://www.openssh.com/txt/release-9.0 Closes-Bug: #2048700 Change-Id: I9f1129136d7664d5cc3b57ae5f7e8d05c499a2a5
-
Michal Arbet authored
This patch sets URL to glance worker. If this is set, other glance workers will know how to contact this one directly if needed. For image import, a single worker stages the image and other workers need to be able to proxy the import request to the right one. With current setup glance image import just not working. Closes-Bug: #2048525 Change-Id: I4246dc8a80038358cd5b6e44e991b3e2ed72be0e
-
- Jan 05, 2024
-
-
Mark Goddard authored
The prometheus_cadvisor container has high CPU usage. On various production systems I checked it sits around 13-16% on controllers, averaged over the prometheus 1m scrape interval. When viewed with top we can see it is a bit spikey and can jump over 100%. There are various bugs about this, but I found https://github.com/google/cadvisor/issues/2523 which suggests reducing the per-container housekeeping interval. This defaults to 1s, which provides far greater granularity than we need with the default prometheus scrape interval of 60s. Reducing the housekeeping interval to 60s on a production controller reduced the CPU usage from 13% to 3.5% average. This still seems high, but is more reasonable. Change-Id: I89c62a45b1f358aafadcc0317ce882f4609543e7 Closes-Bug: #2048223
-
Dawud authored
HAProxy exposes a Prometheus metrics endpoint, it just needs to be enabled. Enable this and remove configuration for prometheus-haproxy-exporter. Remaining prometheus-haproxy-exporter containers will automatically be removed. Change-Id: If6e75691d2a996b06a9b95cb0aae772db54389fb Co-Authored-By:
Matt Anson <matta@stackhpc.com>
-
Michal Arbet authored
Some containers exiting with 143 instead of 0, but this is still OK. This patch just allows ExitCode 143 (SIGTERM) as fix. Details in bugreport. Services which exited with 143 (SIGTERM): kolla-cron-container.service kolla-designate_producer-container.service kolla-keystone_fernet-container.service kolla-letsencrypt_lego-container.service kolla-magnum_api-container.service kolla-mariadb_clustercheck-container.service kolla-neutron_l3_agent-container.service kolla-openvswitch_db-container.service kolla-openvswitch_vswitchd-container.service kolla-proxysql-container.service Partial-Bug: #2048130 Change-Id: Ia8c85d03404cfb368e4013066c67acd2a2f68deb
-
- Jan 04, 2024
-
-
Michal Nasiadka authored
These were missed in I081aa1345603fa27c390e4e09231a5ff226bcb39 Change-Id: I2884bca3c06ff98004e318757a20b60c12375924
-