Skip to content
Snippets Groups Projects
  1. Nov 07, 2023
    • Will Szumski's avatar
      Support exposing prometheus_server externally · 37c2ab2a
      Will Szumski authored
      This avoids the need to use a proxy, or some other means, to connect to
      Prometheus. This is disabled by default and can be enabled by setting
      enable_prometheus_server_external to true.
      
      Change-Id: Ia0af044ff436c2a204b357750a16ff49fcdfec45
      37c2ab2a
  2. May 02, 2022
    • Pierre Riteau's avatar
      Fix typos in docs · 555cd39f
      Pierre Riteau authored
      This is a follow up to I7e5c1e20c7b66b64cbd333f669ef8d8da60daaa8.
      
      Change-Id: I11a86f59c1fb9cddde3370b544ee7bf4e8ae4fb4
      555cd39f
  3. Mar 25, 2022
    • Jan Horstmann's avatar
      Change grafana provisioning.yaml indentation · 3d91e69a
      Jan Horstmann authored
      This commit changes the indentation scheme used in
      `ansible/roles/grafana/templates/provisioning.yaml.j2` to the commonly
      used pattern of two whitespaces.
      
      Change-Id: I2f9d34930ed06aa2e63f7cc28bfdda7046fc3e67
      3d91e69a
  4. Feb 22, 2022
    • Pierre Riteau's avatar
      Remove grafana [session] configuration · f3756282
      Pierre Riteau authored
      These configuration settings were removed in Grafana 6.2. Instead we can
      use [remote_cache], but it is not required since it will use database
      settings by default.
      
      Change-Id: I37966027aea9039b2ecba4214444507e9d87f513
      f3756282
  5. Feb 14, 2022
  6. Mar 16, 2021
    • Bartosz Bezak's avatar
      Add support for custom grafana dashboards · a9e30382
      Bartosz Bezak authored
      Allow users to import custom grafana dashboards.
      Dashboards as JSON files should be placed into
      "{{ node_custom_config }}/grafana/dashboards/" folder.
      
      Change-Id: Id0f83b8d08541b3b74649f097b10c9450201b426
      a9e30382
  7. Aug 19, 2020
    • Rafael Weingärtner's avatar
      Standardize use and construction of endpoint URLs · f425c067
      Rafael Weingärtner authored
      
      The goal for this push request is to normalize the construction and use
       of internal, external, and admin URLs. While extending Kolla-ansible
       to enable a more flexible method to manage external URLs, we noticed
       that the same URL was constructed multiple times in different parts
       of the code. This can make it difficult for people that want to work
       with these URLs and create inconsistencies in a large code base with
       time. Therefore, we are proposing here the use of
       "single Kolla-ansible variable" per endpoint URL, which facilitates
       for people that are interested in overriding/extending these URLs.
      
      As an example, we extended Kolla-ansible to facilitate the "override"
      of public (external) URLs with the following standard
      "<component/serviceName>.<companyBaseUrl>".
      Therefore, the "NAT/redirect" in the SSL termination system (HAproxy,
      HTTPD or some other) is done via the service name, and not by the port.
      This allows operators to easily and automatically create more friendly
       URL names. To develop this feature, we first applied this patch that
       we are sending now to the community. We did that to reduce the surface
        of changes in Kolla-ansible.
      
      Another example is the integration of Kolla-ansible and Consul, which
      we also implemented internally, and also requires URLs changes.
      Therefore, this PR is essential to reduce code duplicity, and to
      facility users/developers to work/customize the services URLs.
      
      Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93
      Signed-off-by: default avatarRafael Weingärtner <rafael@apache.org>
      f425c067
  8. Mar 10, 2020
  9. Feb 25, 2020
  10. Feb 22, 2020
    • James Kirsch's avatar
      Construct service configuration urls using kolla_internal_fqdn · 256322a8
      James Kirsch authored
      Service configuration urls should be constructed using
      kolla_internal_fqdn instead of kolla_internal_vip_address. Otherwise SSL
      validation will fail when certificates are issued using domain names.
      
      Change-Id: I21689e22870c2f6206e37c60a3c33e19140f77ff
      Closes-Bug: 1862419
      256322a8
  11. Oct 16, 2019
    • Radosław Piliszek's avatar
      Implement IPv6 support in the control plane · bc053c09
      Radosław Piliszek authored
      Introduce kolla_address filter.
      Introduce put_address_in_context filter.
      
      Add AF config to vars.
      
      Address contexts:
      - raw (default): <ADDR>
      - memcache: inet6:[<ADDR>]
      - url: [<ADDR>]
      
      Other changes:
      
      globals.yml - mention just IP in comment
      
      prechecks/port_checks (api_intf) - kolla_address handles validation
      
      3x interface conditional (swift configs: replication/storage)
      
      2x interface variable definition with hostname
      (haproxy listens; api intf)
      
      1x interface variable definition with hostname with bifrost exclusion
      (baremetal pre-install /etc/hosts; api intf)
      
      neutron's ml2 'overlay_ip_version' set to 6 for IPv6 on tunnel network
      
      basic multinode source CI job for IPv6
      
      prechecks for rabbitmq and qdrouterd use proper NSS database now
      
      MariaDB Galera Cluster WSREP SST mariabackup workaround
      (socat and IPv6)
      
      Ceph naming workaround in CI
      TODO: probably needs documenting
      
      RabbitMQ IPv6-only proto_dist
      
      Ceph ms switch to IPv6 mode
      
      Remove neutron-server ml2_type_vxlan/vxlan_group setting
      as it is not used (let's avoid any confusion)
      and could break setups without proper multicast routing
      if it started working (also IPv4-only)
      
      haproxy upgrade checks for slaves based on ipv6 addresses
      
      TODO:
      
      ovs-dpdk grabs ipv4 network address (w/ prefix len / submask)
      not supported, invalid by default because neutron_external has no address
      No idea whether ovs-dpdk works at all atm.
      
      ml2 for xenapi
      Xen is not supported too well.
      This would require working with XenAPI facts.
      
      rp_filter setting
      This would require meddling with ip6tables (there is no sysctl param).
      By default nothing is dropped.
      Unlikely we really need it.
      
      ironic dnsmasq is configured IPv4-only
      dnsmasq needs DHCPv6 options and testing in vivo.
      
      KNOWN ISSUES (beyond us):
      
      One cannot use IPv6 address to reference the image for docker like we
      currently do, see: https://github.com/moby/moby/issues/39033
      (docker_registry; docker API 400 - invalid reference format)
      workaround: use hostname/FQDN
      
      RabbitMQ may fail to bind to IPv6 if hostname resolves also to IPv4.
      This is due to old RabbitMQ versions available in images.
      IPv4 is preferred by default and may fail in the IPv6-only scenario.
      This should be no problem in real life as IPv6-only is indeed IPv6-only.
      Also, when new RabbitMQ (3.7.16/3.8+) makes it into images, this will
      no longer be relevant as we supply all the necessary config.
      See: https://github.com/rabbitmq/rabbitmq-server/pull/1982
      
      For reliable runs, at least Ansible 2.8 is required (2.8.5 confirmed
      to work well). Older Ansible versions are known to miss IPv6 addresses
      in interface facts. This may affect redeploys, reconfigures and
      upgrades which run after VIP address is assigned.
      See: https://github.com/ansible/ansible/issues/63227
      
      Bifrost Train does not support IPv6 deployments.
      See: https://storyboard.openstack.org/#!/story/2006689
      
      
      
      Change-Id: Ia34e6916ea4f99e9522cd2ddde03a0a4776f7e2c
      Implements: blueprint ipv6-control-plane
      Signed-off-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      bc053c09
  12. May 16, 2018
  13. May 03, 2018
    • Mark Giles's avatar
      Automatically add Prometheus as a Grafana datasource · 6777c903
      Mark Giles authored
      Assuming both Prometheus and Grafana are enabled, this change
      configures Grafana such that it can use data collected by the
      Prometheus server.
      
      Partially-Implements: blueprint prometheus
      Change-Id: I0290806d0c622b1de33cf7047f099795b4c780b9
      6777c903
  14. Apr 13, 2018
  15. Feb 19, 2018
    • Doug Szumski's avatar
      Support configuring grafana local admin username · b8979c20
      Doug Szumski authored
      The grafana local admin username can be configured by overriding
      the admin user field in the grafana.ini file. However, this will
      fail when kolla-ansible attempts to configure any enabled
      datasources for grafana because the local admin password is
      hardcoded to 'admin'. This change allows the grafana local admin
      password to be configured via group vars so that the correct
      username is used when configuring datasources.
      
      Closes-Bug: #1750408
      Change-Id: I0962200894f7a0452da1c249a68f9230b6fab13f
      b8979c20
  16. Jul 24, 2017
  17. May 23, 2017
  18. Apr 14, 2017
    • Bertrand Lallau's avatar
      Fix Grafana config file template to use variables · a49e18a7
      Bertrand Lallau authored
      Grafana session/provider_config property actually uses a static user
      and a static database name.
      If grafana_database_user and grafana_database_name default value is
      changed, the config generated will not be updated accordingly.
      
      Change-Id: I517daab5439ab1aef56a4b3a11104bd0717223bf
      Closes-Bug: #1682810
      a49e18a7
  19. Oct 26, 2016
  20. Oct 18, 2016
  21. Oct 10, 2016
    • Jeffrey Zhang's avatar
      Fix the wrong setting for Grafana session · 0c15da00
      Jeffrey Zhang authored
      The provider_config is configured wrong. And Grafana only supports one
      Memcached instance for session, which is bad for high available.
      
      Use mysql to provider the session storage.
      
      TrivialFix
      
      Change-Id: I889a961d7f36f44701654fbac04b4bff05043506
      0c15da00
  22. Sep 26, 2016
  23. Sep 14, 2016
Loading