- Oct 06, 2021
-
-
Marcin Juszkiewicz authored
We do not need anymore as APT already knows how to do HTTPS. Change-Id: I0b89b17ea2443e4578906afe4b518477462f981f
-
- Oct 04, 2021
-
-
Christian Berendt authored
Change-Id: I6da412d6d3e7d067c8d903ee884711ac509d24aa
-
- Oct 01, 2021
-
-
Mark Goddard authored
Updates the default value of 'monasca_ntp_server' from 'external_ntp_servers[0]' to '0.pool.ntp.org'. This is due to the removal of the 'external_ntp_servers' variable as part of the removal of Chrony deployment. Change-Id: I2e7538a2e95c7b8e9280eb051ee634b4313db129
-
- Sep 30, 2021
-
-
wu.chunyang authored
chrony is not supported in Xena cycle, remove it from kolla Moved tasks from chrony role to chrony-cleanup.yml playbook to avoid a vestigial chrony role. Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I5a730d55afb49d517c85aeb9208188c81e2c84cf
-
Mark Goddard authored
* Register Swift-compatible endpoints in Keystone * Load balance across RadosGW API servers using HAProxy The support is exercised in the cephadm CI jobs, but since RGW is not currently enabled via cephadm, it is not yet tested. https://docs.ceph.com/en/latest/radosgw/keystone/ Implements: blueprint ceph-rgw Change-Id: I891c3ed4ed93512607afe65a42dd99596fd4dbf9
-
Mark Goddard authored
Source images get the most test coverage, so it makes sense to deploy these by default. Change-Id: I8d0c8750e2c1600e84cc2e677a4eae0e9f502dac
-
- Sep 28, 2021
-
-
Niklas Hagman authored
A system-scoped token implies the user has authorization to act on the deployment system. These tokens are useful for interacting with resources that affect the deployment as a whole, or exposes resources that may otherwise violate project or domain isolation. Since Queens, the keystone-manage bootstrap command assigns the admin role to the admin user with system scope, as well as in the admin project. This patch transitions the Keystone admin user from authenticating using project scoped tokens to system scoped tokens. This is a necessary step towards being able to enable the updated oslo policies in services that allow finer grained access to system-level resources and APIs. An etherpad with discussion about the transition to the new oslo service policies is: https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585 Signed-off-by:
Niklas Hagman <ubuntu@post.blinkiz.com>
-
- Sep 27, 2021
-
-
Radosław Piliszek authored
Closes-Bug: #1945070 Change-Id: I1b2a82b57cb9884b6c3c3ad07f6449ae29042a3d
-
- Sep 26, 2021
-
-
Michal Arbet authored
This patch adding option to control weight of haproxy backends per service via host variable. Example: [control] server1 haproxy_nova_api_weight=10 server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10 server3 haproxy_keystone_admin_weight=50 If weight is not defined, everything is working as before. Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
-
- Sep 23, 2021
-
-
Michał Nasiadka authored
This change bumps up max supported Ansible version to 4.x (ansible-core 2.11.x) and minimum to 2.10. Change-Id: I8b9212934dfab3831986e8db55671baee32f4bbd
-
- Sep 22, 2021
-
-
Piotr Parczewski authored
Change-Id: I16fdb2f93ddb656eeacd3f2b84190f9bdcfaa21c
-
- Sep 21, 2021
-
-
Mark Goddard authored
This allows one variable to specify the tag for all MariaDB images. Change-Id: I164cdd41787f8bd52d8e08cb380d42625a8bbd84 TrivialFix
-
- Sep 20, 2021
-
-
Radosław Piliszek authored
Closes-Bug: #1944114 Change-Id: Idd525fda7ff94f70794f4c582cd74470c7f40fae
-
- Sep 16, 2021
-
-
Radosław Piliszek authored
Docs adapted to match. Removed the unsupported-for-quay option to set up a pull-through cache. Closes-Bug: #1942134 Change-Id: If5a26b1ba4bf35bc29306c24f608396dbf5e3371
-
Michal Arbet authored
Haproxy was renamed in [1]. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/770618 Change-Id: Ib2d7f0774fede570a8c4c315d83afd420c31da0b
-
- Sep 13, 2021
-
-
Bernd Mueller authored
Signed-off-by:
Bernd Mueller <mueller@b1-systems.de> Change-Id: Idb8a82acbd8193fd3fe71c080a1c57e8614d89ec
-
- Sep 10, 2021
-
-
Pierre Riteau authored
When running kolla-ansible upgrade with a host limit that does not include controllers, the neutron upgrade fails. Change-Id: I7125a6ef1f180db6997026ff27e84feb04ee239d Closes-Bug: #1939691
-
- Sep 07, 2021
-
-
Michał Nasiadka authored
Currently only operations done with default kolla_toolbox user are logged to /var/log/kolla/ansible.log. In order to fix logging, permissions to ansible.log must allow writing for other users in kolla group - and then a separate patch will follow to make custom ansible.cfg file usable by other toolbox users. Partial-Bug: #1942846 Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
-
- Sep 03, 2021
-
-
Radosław Piliszek authored
This is required for libvirtd with cgroupsv2 (Debian Bullseye and soon others). Otherwise, device attachments simply fail. The warning message suggests filtering will be disabled but it actually just fails the action entirely. Change-Id: Id1fbd49a31a6e6e51b667f646278b93897c05b21 Closes-Bug: #1941940
-
- Aug 30, 2021
-
-
Radosław Piliszek authored
It was removed in [1] as part of cgroupsv2 cleanup. However, the testing did not catch the fact that the legacy cgroups behaviour was actually still breaking despite latest Docker and setting to use host's cgroups namespace. [1] 286a03ba Closes-Bug: #1941706 Change-Id: I629bb9e70a3fd6bd1e26b2ca22ffcff5e9e8c731
-
- Aug 20, 2021
-
-
Radosław Piliszek authored
to behave like it is most commonly expected - query Nova in the same region. Closes-Bug: #1939291 Change-Id: I584a83d352c747a799b5dab1d3b8159ba3805454
-
Radosław Piliszek authored
To follow best security practices and help fellow operators. More details inline and in the linked bug report. Closes-Bug: #1940547 Change-Id: Ide9e9009a6e272f20a43319f27d257efdf315f68
-
- Aug 19, 2021
-
-
Michal Arbet authored
For now role haproxy is maintaining haproxy and keepalived. In follow-up changes there is also proxysql added. This patch is *only* renaming/moving stuff to more prominent role loadbalancer, and moving also specific templates to subdirectory. This was done only to better diff in follow-up changes. Change-Id: I1d39d5bcaefc4016983bf267a2736b742cc3a555
-
Radosław Piliszek authored
Sometimes, the registries may intermittently fail to deliver the images. This is often seen in the CI, though it also happens with production deployments, even those with internal registries and/or registry mirrors - due to sheer load when trying to pull the images from many hosts. This patchs adds two new vars to control retry behaviour. The default has been set to make users happier by default. :-) Change-Id: I81ad7d8642654f8474f11084c6934aab40243d35
-
Radosław Piliszek authored
It seems to have been mistakenly introduced by de00bf49 "Simplify handler conditionals" Change-Id: I65b6e322fa11a870f32099bbfd62150cbea4feb5
-
- Aug 18, 2021
-
-
Marc 'risson' Schmitt authored
Signed-off-by:
Marc 'risson' Schmitt <marc.schmitt@risson.space> Closes-Bug: #1940286 Change-Id: I647f8615e9fd0cc0db7c737ce4afbd1bdd0d40d4
-
- Aug 17, 2021
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for keystone-fernet container. It checks if "key 0" has right permissions, and if rsync is able to distribute keys to other keystones. Implements: blueprint container-health-check Change-Id: I17bea723d4109e869cd05d211f6f8e4653f46e17
-
- Aug 16, 2021
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for nova-spicehtml5proxy service. Implements: blueprint container-health-check Change-Id: I584c588c20781e6c6567429811aecf97967baea3
-
- Aug 13, 2021
-
-
Jan Horstmann authored
Certain overrides for rabbitmq may need to be set for `rabbitmqctl` in kolla-toolbox aswell. This commit allows to override `rabbitmq-env.conf` and `erl_inetrc` in kolla-toolbox. Change-Id: Idef6adcf9700f75a2db503444a8de093ee21a9c5
-
Radosław Piliszek authored
Closes-Bug: #1939883 Change-Id: Ica311acba445cccac1d20757ced6f15a064ebcaa
-
- Aug 12, 2021
-
-
Michał Nasiadka authored
Change-Id: I2fe738249018e25e79fd726bc931be6b7bd91934
-
Michal Arbet authored
Kolla-ansible upgrade task is calling different handlers as deploy task and these handlers are missing healthcheck key. This patch is fixing this. Closes-Bug: #1939679 Change-Id: Id83d20bfd89c27ccf70a3a79938f428cdb5d40fc
-
Pierre Riteau authored
CentOS binary packages for Xena have moved Neutron's api-paste.ini file to /etc/neutron [1]. Ubuntu packages already provide this file at this location. Source images should also have api-paste.ini installed there. [1] https://review.rdoproject.org/r/c/openstack/neutron-distgit/+/34845 Depends-On: https://review.opendev.org/c/openstack/kolla/+/804269 Change-Id: Ideb0247578afb8cc36bb6ac26d8ef7fda494bee3
-
- Aug 10, 2021
-
-
Radosław Piliszek authored
We get a nice optimisation by using a filtered loop instead of task skipping per service with 'when'. Partially-Implements: blueprint performance-improvements Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
-
Mark Goddard authored
Follow up for I0c7e9a28876a1d4278fb2ed8555c2b08472864b9 which added a ironic_enable_keystone_integration variable to support Ironic in multi-region environments. This change skips Keystone service registration based on ironic_enable_keystone_integration rather than enable_keystone. It also updates the ironic-inspector.conf template to use the new variable. Change-Id: I2ecba4999e194766258ac5beed62877d43829313
-
- Aug 09, 2021
-
-
Doug Szumski authored
This patch adds support for integrating Prometheus with Fluentd. This can be used to extract useful information about the status of Fluentd, such as output buffer capacity and logging rate, and also to extract metrics from logs via custom Fluentd configuration. More information can be found here in [1]. [1] https://docs.fluentd.org/monitoring-fluentd/monitoring-prometheus Change-Id: I233d6dd744848ef1f1589a462dbf272ed0f3aaae
-
Mark Goddard authored
Missing comma in config.json template rendered invalid JSON with VMware plugin agent. Closes-Bug: #1939080 Change-Id: I3d0c6421e3da7e1e753b99cf87c32fc238a21523
-
- Aug 06, 2021
-
-
Victor Morales authored
Dumper and Loader are classes seem to be loaded but not used in the merge_yaml file. This change removes them for reducing the number of lines. Change-Id: I87ef305903ab02226fcaa725ece622647d17811c
-
Ilya Popov authored
Basically, there are three main installation scenario: Scenario 1: Ironic installation together with other openstack services including keystone. In this case variable enable_keystone is set to true and keystone service will be installed together with ironic installation. It is possible realise this scenario, no fix needed Scenario 2: Ironic installation with connection to already installed keystone. In this scenario we have to set enable_keystone to “No” to prevent from new keystone service installation during the ironic installation process. But in other hand, we need to have correct sections in ironic.conf to provide all information needed to connect to existing keystone. But all sections for keystone are added to ironic.conf only if enable_keystone var is set to “Yes”. It isn’t possible to realise this scenario. Proposed fix provide support for this scenario, where multiple regions share the same keystone service. Scenario 3: No keystone integration. Ironic don't connect to Keystone. It is possible realise this scenario, no fix needed Proposed solution also keep the default behaviour: if no enable_keystone_integration is manually defined by default it takes value of enable_keystone variable and all behaviour is the same. But if we don't want to install keystone and want to connect to existing one at the same time, it will be possible to set enable_keystone var to “No” (preventing keystone from installation) and at the same time set ironic_enable_keystone_integration to Yes to allow needed section appear in ironic.conf through templating. Change-Id: I0c7e9a28876a1d4278fb2ed8555c2b08472864b9
-
Piotr Parczewski authored
Change-Id: Ib9ea83dd0019a4c4703e673a783c45ab07afe4e7
-