Skip to content
Snippets Groups Projects
  1. Jun 25, 2020
    • Mark Goddard's avatar
      Support CA certificate for fluentd & Elasticsearch · 31f3f848
      Mark Goddard authored
      Currently there is no way to configure a CA certificate bundle file for
      fluentd to Elasticsearch communication. This change adds a new variable,
      'fluentd_elasticsearch_cacert' with a default value set to the value of
      'openstack_cacert.
      
      Closes-Bug: #1885109
      
      Change-Id: I5bbf55a4dd4ccce9fa2635cee720139c088268e3
      31f3f848
  2. Jun 20, 2020
  3. Jun 19, 2020
  4. Jun 18, 2020
    • Konstantinos Mouzakitis's avatar
      Adding support for multiple globals files · f6d8c0d4
      Konstantinos Mouzakitis authored
      Added a spec file for this blueprint.
      Changed the kolla-ansible script to accept more than one
      globals.yml file. That will still be the main one but operators
      will be able to create more, under the /etc/kolla/globals.d
      directory.
      Also added some paragraphs in the quickstart documentation
      about this.
      Finally, Adding a release note
      
      Change-Id: I34eb91d0e2ed80694594b8fc6801cf8ad77da754
      Implements: blueprint multiple-globals-files
      f6d8c0d4
    • wu.chunyang's avatar
      Add support of octavia dev mod · 36b93dd6
      wu.chunyang authored
      Similarly to other OpenStack services octavia should support
      kolla dev mod for debugging.
      
      Change-Id: I81b79dc0a4c5e40a67af7120a4109dfe11098a97
      36b93dd6
  5. Jun 16, 2020
    • Xing Zhang's avatar
      Switch octavia to use service project in service_auth · c2037885
      Xing Zhang authored
      Recently a patch [1] was merged to stop adding the octavia user to the
      admin project, and remove it on upgrade. However, the octavia
      configuration was not updated to use the service project, causing load
      balancer creation to fail.
      
      There is also an issue for existing deployments in simply switching to
      the service project. While existing load balancers appear to continue to
      work, creating new load balancers fails due to the security group
      belonging to the admin project. At a minimum, the deployer needs to
      create a security group in the service project, and update
      'octavia_amp_secgroup_list' to match its ID. Ideally the flavor and
      network would also be recreated in the service project, although this
      does not seem to impact operation and will result in downtime for
      existing Amphorae.
      
      This change adds a new variable, 'octavia_service_auth_project', that
      can be used to set the project. The default in Ussuri is 'service',
      switching to the new behaviour. For backports of this patch it should be
      switched to 'admin' to maintain compatibility.
      
      If a deployer sets 'octavia_service_auth_project' to 'admin', the
      octavia user will be assigned the admin role in the admin project, as
      was done previously.
      
      Closes-Bug: #1882643
      Related-Bug: #1873176
      
      [1] https://review.opendev.org/720243/
      
      
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Change-Id: I1efd0154ebaee69373ae5bccd391ee9c68d09b30
      c2037885
    • James Kirsch's avatar
      Replace internal and external VIP CA with root CA · e3cd02ed
      James Kirsch authored
      Replaced "kolla_external_fqdn_cacert" and "kolla_internal_fqdn_cacert" with
      "kolla_admin_openrc_cacert". OS_CACERT is now set to the value of
      "kolla_admin_openrc_cacert" in the generated admin-openrc.sh file.
      
      Change-Id: If195d5402579cee9a14b91f63f5fde84eb84cccf
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/#/c/731344/
      e3cd02ed
  6. Jun 15, 2020
    • James Kirsch's avatar
      Generate Root CA for Self-Signed Certificates · a982d3ac
      James Kirsch authored
      Update the certificate generation task to create a root CA for the
      self-signed certificates. The internal and external facing certificates
      are then generated using the root CA.
      
      Updated openstack_cacert to use system CA trust store in CI tests
      certificate by default.
      
      Change-Id: I6c2adff7d0128146cf086103ff6060b0dcefa37b
      Partially-Implements: blueprint add-ssl-internal-network
      a982d3ac
    • Mark Goddard's avatar
      Remove max count from Cinder online schema migration · 55c0787d
      Mark Goddard authored
      During an upgrade from Stein to Train, Kolla Ansible fails while running
      TASK [cinder : Running Cinder online schema migration]
      
      This is because the `--max_count 10` option is used, which returns 1
      while migrations are processed. According to the upgrade documentation,
      the command should be rerun while the exit status is 1:
      https://docs.openstack.org/cinder/train/upgrade.html
      
      This issue was introduced by a change to the image [1] which fixed a bug
      in the way that the max count was interpreted, but exposed an issue in
      using the max count.
      
      This change fixes the issue by ceasing to pass MAX_NUMBER, which will
      cause all migrations to occur in a single pass.
      
      [1] https://review.opendev.org/#/c/712055
      
      Change-Id: Ia786d037f5484f18294188639c956d4ed5ffbc2a
      Closes-Bug: #1880753
      55c0787d
    • gugug's avatar
      Remove mongodb supported for panko backend · 7ae99328
      gugug authored
      more info: https://opendev.org/openstack/kolla-ansible/commit/a6c97d7284c7de437ebfc9f8ee289244f29e65d7
      
      
      
      Change-Id: I44850d6bb77fec33aa93e1b523eadfe0ef9483a8
      Co-Authored-By: default avatarjacky06 <zhang.min@99cloud.net>
      7ae99328
    • Michal Arbet's avatar
      Remove chrony package if containerized chrony is enabled · 3d747b72
      Michal Arbet authored
      This patch is removing chrony package
      from docker host when containerized chrony is enabled.
      It is also fixing issue with chrony container running
      under Ubuntu docker host as noted below.
      
      + exec /usr/sbin/chronyd -d -f /etc/chrony/chrony.conf
      2020-06-08T08:19:09Z chronyd version 3.4 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +SECHASH +IPV6 -DEBUG)
      2020-06-08T08:19:09Z Fatal error : Could not open configuration file /etc/chrony/chrony.conf : Permission denied
      
      Added also removal apparmor profile for ubuntu when
      containerized chrony is enabled, as chrony's package
      is not removing apparmor profile, and therefore
      containerized chrony is not working.
      
      Change-Id: Icf3bbae38b9f5630b69d5c8cf6a8bee11786a836
      Closes-Bug: #1882513
      3d747b72
    • Radosław Piliszek's avatar
      Fix Grafana datasource update · 7bd88050
      Radosław Piliszek authored
      Grafana changed the error message wording.
      Match on the shortest sane string to play it safe.
      
      Change-Id: Ic175ebdb1da6ef66047309ff07bcbba98fc67008
      Closes-Bug: #1881890
      7bd88050
    • wu.chunyang's avatar
      fix deploy nova failed when use kolla_dev_mod · 40096b48
      wu.chunyang authored
      There's a logic error here, we call nova role from nova.yml file
      under ansible folder. we should clone code before run
      bootstrap_service task. if not, /opt/stack/nova which is empty
      will mount to nova_api container.
      
      Change-Id: Icc54c15080db9c2dc92709480e00b990e5a88662
      40096b48
  7. Jun 10, 2020
  8. Jun 09, 2020
  9. Jun 05, 2020
    • x191859's avatar
      Add missing become to some VMWare tasks · 640bbc38
      x191859 authored
      Fixed on ``Copying VMware vCenter CA file`` and ``Copying over nsx.ini``.
      
      Change-Id: If909f59e7e4b241594c6b2567784ecad23e74226
      Closes-Bug: #1882252
      640bbc38
  10. Jun 02, 2020
  11. May 29, 2020
  12. May 23, 2020
    • Doug Szumski's avatar
      Switch to Monasca API for logs · b39a0f80
      Doug Szumski authored
      The Monasca Log API has been removed and in this change we switch
      to using the unified API. If dedicated log APIs are required then
      this can be supported through configuration. Out of the box the
      Monasca API is used for both logs and metrics which is envisaged to
      work for most use cases.
      
      In order to use the unified API for logs, we need to disable the
      legacy Kafka client. We also rename the Monasca API config file
      to remove a warning about using the old style name.
      
      Depends-On: https://review.opendev.org/#/c/728638
      Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
      b39a0f80
    • xiaojueguan's avatar
      Remove post_config from the Kibana role · fbc47e60
      xiaojueguan authored
      
      Since at least Stein, there is no visible effect from these tasks.
      The Kibana dashboard seems to be working exactly the same,
      greeting user on the first use with "please configure my index".
      I tested on both Ubuntu and CentOS.
      In new E*K stack (Ussuri+, CentOS8+) it even causes play errors.
      
      Co-authored-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      Change-Id: Iafc6986cce9cbaa0ea9e219ca85d7d01a61308cf
      Closes-Bug: #1799689
      fbc47e60
  13. May 21, 2020
  14. May 20, 2020
  15. May 19, 2020
  16. May 15, 2020
    • Will Szumski's avatar
      Improve fernet_token_expiry precheck · 810acea6
      Will Szumski authored
      The pre-check was broken, see bug report for details.
      
      Change-Id: I089f1e288bae6c093be66181c81a4373a6ef3de4
      Closes-Bug: #1856021
      810acea6
    • Jeffrey Zhang's avatar
      Configure RabbitMQ user tags in nova-cell role · 869e3f21
      Jeffrey Zhang authored
      The RabbitMQ 'openstack' user has the 'administrator' tag assigned via
      the RabbitMQ definitions.json file.
      
      Since the Train release, the nova-cell role also configures the RabbitMQ
      user, but omits the tag. This causes the tag to be removed from the
      user, which prevents it from accessing the management UI and API.
      
      This change adds support for configuring user tags to the
      service-rabbitmq role, and sets the administrator tag by default.
      
      Change-Id: I7a5d6fe324dd133e0929804d431583e5b5c1853d
      Closes-Bug: #1875786
      869e3f21
  17. May 13, 2020
    • James Kirsch's avatar
      Add support for encrypting Barbican API · 2e08ffd6
      James Kirsch authored
      This patch introduces an optional backend encryption for the Barbican
      API service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Barbican service.
      
      Change-Id: I62a43b36ebe4a03230bf944980b45e4b6938871b
      Partially-Implements: blueprint add-ssl-internal-network
      2e08ffd6
  18. May 11, 2020
    • Will Szumski's avatar
      Add extras directory to prometheus config · d05578f5
      Will Szumski authored
      This provides a generic mechanism to include extra files
      that you can reference in prometheus.yml, for example:
      
      scrape_targets:
        - job_name: ipmi
          params:
            module: default
          scrape_interval: 1m
          scrape_timeout: 30s
          metrics_path: /ipmi
          scheme: http
          file_sd_configs:
          - files:
            - /etc/prometheus/extras/file_sd/ipmi-exporter-targets.yml
            refresh_interval: 5m
      
      Change-Id: Ie2f085204b71725b901a179ee51541f1f383c6fa
      Related: blueprint custom-prometheus-targets
      d05578f5
    • Will Szumski's avatar
      Support customizing prometheus.cfg files · 956a29f8
      Will Szumski authored
      This provides a mechanism to scrape targets defined outside of kolla-ansible.
      
      Depends-On: https://review.opendev.org/#/c/685671/
      Change-Id: I0950341b147bb374b4128f09f807ef5a756f5dfa
      Related: blueprint custom-prometheus-targets
      956a29f8
  19. May 05, 2020
  20. Apr 30, 2020
    • James Kirsch's avatar
      Add support for encrypting Horizon and Placement API · e3d5a91a
      James Kirsch authored
      This patch introduces an optional backend encryption for Horizon and
      Placement services. When used in conjunction with enabling TLS for
      service API endpoints, network communcation will be encrypted end to
      end, from client through HAProxy to the Horizon and Placement services.
      
      Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d
      Partially-Implements: blueprint add-ssl-internal-network
      e3d5a91a
    • James Kirsch's avatar
      Add support for encrypting Glance api · f87814f7
      James Kirsch authored
      Add TLS support for Glance api using HAProxy to perform TLS termination.
      
      Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809
      Partially-Implements: blueprint add-ssl-internal-network
      f87814f7
    • Hongbin Lu's avatar
      Zun: Add zun-cni-daemon to compute node · 91678f67
      Hongbin Lu authored
      Zun has a new component "zun-cni-daemon" which should be
      deployed in every compute nodes. It is basically an implementation
      of CNI (Container Network Interface) that performs the neutron
      port binding.
      
      If users is using the capsule (pod) API, the recommended deployment
      option is using "cri" as capsule driver. This is basically to use
      a CRI runtime (i.e. CRI plugin for containerd) for supporting
      capsules (pods). A CRI runtime needs a CNI plugin which is what
      the "zun-cni-daemon" provides.
      
      The configuration is based on the Zun installation guide [1].
      It consits of the following steps:
      * Configure the containerd daemon in the host. The "zun-compute"
        container will use grpc to communicate with this service.
      * Install the "zun-cni" binary at host. The containerd process
        will invoke this binary to call the CNI plugin.
      * Run a "zun-cni-daemon" container. The "zun-cni" binary will
        communicate with this container via HTTP.
      
      Relevant patches:
      Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime
      Install guide: https://review.opendev.org/#/c/707948/
      Devstack plugin: https://review.opendev.org/#/c/705338/
      Kolla image: https://review.opendev.org/#/c/708273/
      
      [1] https://docs.openstack.org/zun/latest/install/index.html
      
      Depends-On: https://review.opendev.org/#/c/721044/
      Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
      91678f67
  21. Apr 29, 2020
  22. Apr 28, 2020
  23. Apr 27, 2020
    • Radosław Piliszek's avatar
      Check that used Ansible can see Kolla Ansible · 32fc2599
      Radosław Piliszek authored
      Fix-feature following up on the original check [1] to make it
      test the correct interpreter.
      
      Additionally, this change removes last, unneeded call to
      random python - getting script directory is perfectly
      doable in bash.
      
      All checks are done from Python, not Ansible, due to its
      performance. Python version feels snappy (0.2 s to check),
      compared to sluggish Ansible (2.0 s to check).
      What is more, relying on Ansible would require hacky solutions
      to e.g. prevent custom config from interfering with it.
      We might be willing to steer Ansible from Python in the future
      anyhow.
      
      [1] Icf0399d21b3fde8d530d73e6e7ee4a57665da276
      
      Change-Id: Ib8f2e6b6672e7c06aa94bc226c4d72640d25d8c2
      Closes-Bug: #1856346
      32fc2599
    • Christian Berendt's avatar
      Deprecate rabbitmq_hipe_compile · 19564b15
      Christian Berendt authored
      Erlang 22.x dropped support for HiPE so use of "rabbitmq_hipe_compile"
      is deprecated.
      
      Change-Id: I8e0173c7aa6204e5b4c60dafbb8b464482cae90b
      19564b15
    • ramboman's avatar
      [octavia] Adds region_name if enable_barbican · 6c372312
      ramboman authored
      Adds necessary "region_name" to octavia.conf when
      "enable_barbican" is set to "true".
      
      Closes-Bug: #1867926
      
      Change-Id: Ida61cef4b9c9622a5e925bac4583fba281469a39
      6c372312
Loading