Skip to content
Snippets Groups Projects
  1. Nov 21, 2024
  2. Aug 30, 2024
  3. Jul 09, 2024
  4. Feb 21, 2024
  5. Nov 29, 2023
  6. Nov 28, 2023
    • Jan Gutter's avatar
      etcd: Add support for more scenarios · ed3b27cc
      Jan Gutter authored
      This commit addresses a few shortcomings in the etcd service:
        * Adding or removing etcd nodes required manual intervention.
      
        * The etcd service would have brief outages during upgrades or
          reconfigures because restarts weren't always serialised.
      
      This makes the etcd service follow a similar pattern to mariadb:
        * There is now a distiction between bootstrapping the cluster
          and adding / removing another member.
      
        * This more closely follows etcd's upstream bootstrapping
          guidelines.
      
        * The etcd role now serialises restarts internally so the
          kolla_serial pattern is no longer appropriate (or necessary).
      
      This does not remove the need for manual intervention in all
      failure modes: the documentation has been updated to address the
      most common issues.
      
      Note that there's repetition in the container specifications: this
      is somewhat deliberate. In a future cleanup, it's intended to reduce
      the duplication.
      
      Change-Id: I39829ba0c5894f8e549f9b83b416e6db4fafd96f
      ed3b27cc
  7. Nov 07, 2023
  8. Oct 18, 2022
    • Marcin Juszkiewicz's avatar
      Update RHEL family information · 33d37575
      Marcin Juszkiewicz authored
      Some time ago we dropped RHEL as one of possible options. During 'Zed'
      cycle we added Rocky Linux 9 as alternative to CentOS Stream 9.
      
      This change updates some mentions of both.
      
      Change-Id: I9ed93efcb7d1ff97b1c7d8342db8252aba2a9887
      33d37575
  9. Jul 27, 2022
  10. Jan 11, 2022
  11. Jan 03, 2022
  12. Dec 23, 2021
  13. Apr 19, 2021
  14. Mar 25, 2021
  15. Mar 02, 2021
  16. Jan 27, 2021
    • Piotr Parczewski's avatar
      [docs] Unify project's naming convention · 5db72659
      Piotr Parczewski authored
      There are inconsitencies across the documentation and the source code files
      when it comes to project's name (Kolla Ansible vs. Kolla-Ansible). This
      commit aims at unifying it so that the naming becomes consistent everywhere.
      
      Change-Id: I903b2e08f5458b1a1abc4af3abefe20b66c23a54
      5db72659
  17. Dec 23, 2020
  18. Oct 12, 2020
    • James Kirsch's avatar
      Add support for encrypting backend Neutron API Server · 93ad57f4
      James Kirsch authored
      Add TLS support for backend Neutron API Server communication using
      HAProxy to perform TLS termination. When used in conjunction with
      enabling TLS for service API endpoints, network communication will be
      encrypted end to end, from client through HAProxy to the Neutron
      service.
      
      Change-Id: Ib333a1f1bd12491df72a9e52d961161210e2d330
      Partially-Implements: blueprint add-ssl-internal-network
      93ad57f4
  19. Sep 26, 2020
  20. Sep 17, 2020
    • Mark Goddard's avatar
      Support TLS encryption of RabbitMQ client-server traffic · 761ea9a3
      Mark Goddard authored
      This change adds support for encryption of communication between
      OpenStack services and RabbitMQ. Server certificates are supported, but
      currently client certificates are not.
      
      The kolla-ansible certificates command has been updated to support
      generating certificates for RabbitMQ for development and testing.
      
      RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when
      The Zuul 'tls_enabled' variable is true.
      
      Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5
      Implements: blueprint message-queue-ssl-support
      761ea9a3
  21. Aug 19, 2020
    • wu.chunyang's avatar
      remove obsolete configurations · 3c312a4d
      wu.chunyang authored
      remove cluster_interface from project.
      update storage_interface docs.and remove
      storage_interface_address variable
      
      Change-Id: I3f811db988234f94b5ed0cc9d24233f70784f58d
      3c312a4d
  22. Aug 04, 2020
    • James Kirsch's avatar
      Update TLS documentation · 589803c1
      James Kirsch authored
      Updated TLS documentation to reflect new features and configuration
      options added in Ussuri.
      
      Change-Id: I74550eaf394287b14fc521293cc4b5ea8074192c
      Partially-Implements: blueprint add-ssl-internal-network
      589803c1
  23. Jul 27, 2020
  24. May 13, 2020
  25. Apr 30, 2020
    • James Kirsch's avatar
      Add support for encrypting Glance api · f87814f7
      James Kirsch authored
      Add TLS support for Glance api using HAProxy to perform TLS termination.
      
      Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809
      Partially-Implements: blueprint add-ssl-internal-network
      f87814f7
  26. Apr 20, 2020
    • Raimund Hook's avatar
      Update Advanced Config guide to clarify paths · 08682243
      Raimund Hook authored
      
      This update clears up an additional path that was mentioned in the
      Advanced Configuration documentation, but not actually picked up in the
      playbooks.
      
      This specifically affects Service Configuration overrides. The docs have
      been cleaned up to reflect the way the playbooks pick up the override
      files.
      
      Change-Id: Id15fe139af6462217c2ac26d7d21c5eac5368e12
      Closes-Bug: 1873782
      Signed-off-by: default avatarRaimund Hook <openstack@sting-ray.za.net>
      08682243
  27. Apr 09, 2020
    • James Kirsch's avatar
      Add support for encrypting backend Keystone HAProxy traffic · b475643c
      James Kirsch authored
      This patch introduces an optional backend encryption for Keystone
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Keystone service.
      
      Change-Id: I6351147ddaff8b2ae629179a9bc3bae2ebac9519
      Partially-Implements: blueprint add-ssl-internal-network
      b475643c
  28. Feb 11, 2020
  29. Jan 28, 2020
    • James Kirsch's avatar
      Generate self signed TLS certificates · d100904f
      James Kirsch authored
      Generate both internal and external self signed TLS certificates.
      Duplicate the certificate if internal and external VIPs are the same.
      
      Change-Id: I16b345c0b29ff13e042eed8798efe644e0ad2c74
      Partially-Implements: blueprint custom-cacerts
      d100904f
    • James Kirsch's avatar
      Copy CA into containers. · 511ba9f6
      James Kirsch authored
      When kolla_copy_ca_into_containers is set to "yes", the Certificate
      Authority in /etc/kolla/certificates will be copied into service
      containers to enable trust for that CA. This is especially useful when
      the CA is self signed, and would not be trusted by default.
      
      Partially-Implements: blueprint custom-cacerts
      
      Change-Id: I4368f8994147580460ebe7533850cf63a419d0b4
      511ba9f6
  30. Jan 06, 2020
  31. Dec 20, 2019
  32. Nov 01, 2019
  33. Oct 23, 2019
  34. Oct 22, 2019
  35. Oct 14, 2019
  36. Sep 17, 2019
    • Doug Szumski's avatar
      Update documentation on overriding config files · 98bed6c2
      Doug Szumski authored
      The main motivation here is to document a mechanism which can be
      used to configure Nova cells on a per-cell basis without introducing
      a myriad of additional locations to put config files. The
      following changes are made:
      
      - Remove the note about only ini files being supported because
        merge_yaml is now used
      - Expand on supported config file locations
      - Add a section on using conditionals in the config file
      
      Partially Implements: blueprint support-nova-cells
      Change-Id: I92599e501506fdacaf3adb94cc6fffcf6fea2af3
      98bed6c2
  37. Aug 22, 2019
    • Krzysztof Klimonda's avatar
      Implement TLS encryption for internal endpoints · b0ecd8b6
      Krzysztof Klimonda authored
      This review is the first one in a series of patches and it introduces an
      optional encryption for internal openstack endpoints, implementing part
      of the add-ssl-internal-network spec.
      
      Change-Id: I6589751626486279bf24725f22e71da8cd7f0a43
      b0ecd8b6
  38. May 17, 2019
    • binhong.hua's avatar
      Make kolla-ansible support extra volumes · 12ff28a6
      binhong.hua authored
      When integrating 3rd party component into openstack with kolla-ansible,
      maybe have to mount some extra volumes to container.
      
      Change-Id: I69108209320edad4c4ffa37dabadff62d7340939
      Implements: blueprint support-extra-volumes
      12ff28a6
  39. Mar 14, 2019
    • Scott Solkhon's avatar
      Support separate Swift storage networks · a781c643
      Scott Solkhon authored
      Adds support to seperate Swift access and replication traffic from other storage traffic.
      
      In a deployment where both Ceph and Swift have been deployed,
      this changes adds functionalality to support optional seperation
      of storage network traffic. This adds two new network interfaces
      'swift_storage_interface' and 'swift_replication_interface' which maintain
      backwards compatibility.
      
      The Swift access network interface is configured via 'swift_storage_interface',
      which defaults to 'storage_interface'. The Swift replication network
      interface is configured via 'swift_replication_interface', which
      defaults to 'swift_storage_interface'.
      
      If a separate replication network is used, Kolla Ansible now deploys separate
      replication servers for the accounts, containers and objects, that listen on
      this network. In this case, these services handle only replication traffic, and
      the original account-, container- and object- servers only handle storage
      user requests.
      
      Change-Id: Ib39e081574e030126f2d08f51de89641ddb0d42e
      a781c643
Loading