- Nov 07, 2023
-
-
Will Szumski authored
This avoids the need to use a proxy, or some other means, to connect to Prometheus. This is disabled by default and can be enabled by setting enable_prometheus_server_external to true. Change-Id: Ia0af044ff436c2a204b357750a16ff49fcdfec45
-
James Kirsch authored
Add support for automatic provisioning and renewal of HTTPS certificates via LetsEncrypt. Spec is available at: https://etherpad.opendev.org/p/kolla-ansible-letsencrypt-https Depends-On: https://review.opendev.org/c/openstack/kolla/+/887347 Co-Authored-By:
Michal Arbet <michal.arbet@ultimum.io> Implements: blueprint letsencrypt-https Change-Id: I35317ea0343f0db74ddc0e587862e95408e9e106
-
Christian Berendt authored
Enable the jobboard feature for the Octavia amphora provider. This requires Redis as a dependency, a precheck is added to ensure proper configuration. https://docs.openstack.org/octavia/latest/install/install-amphorav2.html Change-Id: Iec3c8a4b4e257557dc8ec995c41d0ad7e88e13e2
-
- Jan 31, 2023
-
-
yangshaoxue authored
Support to deploy skyline by kolla-ansible. Implements: blueprint skyline Depends-On: https://review.opendev.org/c/openstack/kolla/+/826948 Change-Id: Ice5621491a432ba32138abd6f62d1f815cc219e0
-
- Dec 01, 2022
-
-
Michal Nasiadka authored
This change replaces ElasticSearch with OpenSearch, and Kibana with OpenSearch Dashboards. It migrates the data from ElasticSearch to OpenSearch upon upgrade. No TLS support is in this patch (will be a followup). A replacement for ElasticSearch Curator will be added as a followup. Depends-On: https://review.opendev.org/c/openstack/kolla/+/830373 Co-authored-by:
Doug Szumski <doug@stackhpc.com> Co-authored-by:
Kyle Dean <kyle@stackhpc.com> Change-Id: Iab10ce7ea5d5f21a40b1f99b28e3290b7e9ce895
-
- Nov 11, 2022
-
-
Doug Szumski authored
Kolla Ansible is switching to OpenSearch and is dropping support for deploying ElasticSearch. This is because the final OSS release of ElasticSearch has exceeded its end of life. Monasca is affected because it uses both Logstash and ElasticSearch. Whilst it may continue to work with OpenSearch, Logstash remains an issue. In the absence of any renewed interest in the project, we remove support for deploying it. This helps to reduce the complexity of log processing configuration in Kolla Ansible, freeing up development time. Change-Id: I6fc7842bcda18e417a3fd21c11e28979a470f1cf
-
- Jul 29, 2022
-
-
Michal Arbet authored
Kolla environment currently uses haproxy to fullfill HA in mariadb. This patch is switching haproxy to proxysql if enabled. This patch is also replacing mariadb's user 'haproxy' with user 'monitor'. This replacement has two reasons: - Use better name to "monitor" galera claster as there are two services using this user (HAProxy, ProxySQL) - Set password for monitor user as it's always better to use password then not use. Previous haproxy user didn't use password as it was historically not possible with haproxy and mariadb-clustercheck wasn't implemented. Depends-On: https://review.opendev.org/c/openstack/kolla/+/769385 Depends-On: https://review.opendev.org/c/openstack/kolla/+/765781 Depends-On: https://review.opendev.org/c/openstack/kolla/+/850656 Change-Id: I0edae33d982c2e3f3b5f34b3d5ad07a431162844
-
- Apr 08, 2022
-
-
Marcin Juszkiewicz authored
Change-Id: I562fa187094f212003d0b17d20675f771cf082e6
-
- Mar 30, 2022
-
-
Michal Nasiadka authored
This key can be used by users in networking-generic-switch scenario instead of adding cleartext password in ml2_conf.ini. Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
-
- Mar 17, 2022
-
-
jinyuanliu authored
This project [1] can provide a one-stop solution to log collection, cleaning, indexing, analysis, alarm, visualization, report generation and other needs, which involves helping operator or maintainer to quickly solve retrieve problems, grasp the operational health of the platform, and improve the level of platform management. [1] https://wiki.openstack.org/wiki/Venus Change-Id: If3562bbed6181002b76831bab54f863041c5a885
-
- Mar 10, 2022
-
-
Mark Goddard authored
In Kolla Ansible OpenStack deployments, by default, libvirt is configured to allow read-write access via an unauthenticated, unencrypted TCP connection, using the internal API network. This is to facilitate migration between hosts. By default, Kolla Ansible does not use encryption for services on the internal network (and did not support it until Ussuri). However, most other services on the internal network are at least authenticated (usually via passwords), ensuring that they cannot be used by anyone with access to the network, unless they have credentials. The main issue here is the lack of authentication. Any client with access to the internal network is able to connect to the libvirt TCP port and make arbitrary changes to the hypervisor. This could include starting a VM, modifying an existing VM, etc. Given the flexibility of the domain options, it could be seen as equivalent to having root access to the hypervisor. Kolla Ansible supports libvirt TLS [1] since the Train release, using client and server certificates for mutual authentication and encryption. However, this feature is not enabled by default, and requires certificates to be generated for each compute host. This change adds support for libvirt SASL authentication, and enables it by default. This provides base level of security. Deployments requiring further security should use libvirt TLS. [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021 Closes-Bug: #1964013 Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
-
- Feb 17, 2022
-
-
Alban Lecorps authored
NSXP is the OpenStack support for the NSX Policy platform. This is supported from neutron in the Stein version. This patch adds Kolla support This adds a new neutron_plugin_agent type 'vmware_nsxp'. The plugin does not run any neutron agents. Change-Id: I9e9d8f07e586bdc143d293e572031368af7f3fca
-
- Sep 30, 2021
-
-
Mark Goddard authored
* Register Swift-compatible endpoints in Keystone * Load balance across RadosGW API servers using HAProxy The support is exercised in the cephadm CI jobs, but since RGW is not currently enabled via cephadm, it is not yet tested. https://docs.ceph.com/en/latest/radosgw/keystone/ Implements: blueprint ceph-rgw Change-Id: I891c3ed4ed93512607afe65a42dd99596fd4dbf9
-
- Jun 21, 2021
-
-
Radosław Piliszek authored
Following upstream which removed ZFSSA support in Ussuri [1]. [1] https://review.opendev.org/c/openstack/cinder/+/690137 Change-Id: Idb311e18b437fba696759ecb1cf2a6b4803aa5c5
-
- Jun 16, 2021
-
-
wu.chunyang authored
Remove rally role as planned Change-Id: Ic898efe42b21b01c45d4621af2cf90ecd7afc398
-
- Jun 11, 2021
-
-
Matthias Runge authored
the project is deprecated and in the process of being removed from OpenStack upstream. Change-Id: I9d5ebed293a5fb25f4cd7daa473df152440e8b50
-
- Apr 27, 2021
-
-
Doug Szumski authored
In the Xena cycle it was decided to remove the Monasca Grafana fork due to lack of maintenance. This commit removes the service and provides a limited workaround using the Monasca Grafana datasource with vanilla Grafana. Depends-On: I9db7ec2df050fa20317d84f6cea40d1f5fd42e60 Change-Id: I4917ece1951084f6665722ba9a91d47764d3709a
-
- Feb 15, 2021
-
-
Pedro Henrique authored
This pull request adds support for the OpenID Connect authentication flow in Keystone and enables both ID and access token authentication flows. The ID token configuration is designed to allow users to authenticate via Horizon using an identity federation; whereas the Access token is used to allow users to authenticate in the OpenStack CLI using a federated user. Without this PR, if one wants to configure OpenStack to use identity federation, he/she needs to do a lot of configurations in the keystone, Horizon, and register quite a good number of different parameters using the CLI such as mappings, identity providers, federated protocols, and so on. Therefore, with this PR, we propose a method for operators to introduce/present the IdP's metadata to Kolla-ansible, and based on the presented metadata, Kolla-ansible takes care of all of the configurations to prepare OpenStack to work in a federated environment. Implements: blueprint add-openid-support Co-Authored-By:
Jason Anderson <jasonanderson@uchicago.edu> Change-Id: I0203a3470d7f8f2a54d5e126d947f540d93b8210
-
- Dec 22, 2020
-
-
Kendall Nelson authored
As announced on the openstack-discuss ML[1], Karbor is retiring this cycle (Wallaby). Needed-By: https://review.opendev.org/c/openstack/karbor/+/767032 [1] http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018643.html Change-Id: I222cf302e507f6a9de0347c79ec536aa7be22bb6
-
- Dec 16, 2020
-
-
Ghanshyam Mann authored
Searchlight project is retiring in Wallaby cycle[1]. This commit removes the ansible roles of Searchlight project before its code is removed. Needed-By: https://review.opendev.org/c/openstack/searchlight/+/764526 [1] http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018637.html Change-Id: I85aab66376ea4f1376c2705066ba3c7e5645644f
-
Ghanshyam Mann authored
Qinling project is retiring in Wallaby cycle[1]. This commit removes the ansible roles of Qinling project before its code is removed. Needed-By: https://review.opendev.org/c/openstack/qinling/+/764521 [1] http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018638.html Change-Id: I6543bacff638b1649511f7e779807954c34ef570
-
- Oct 08, 2020
-
-
Mark Goddard authored
implemented as a separate command (kolla-ansible octavia-certificates) Implements: blueprint implement-automatic-deploy-of-octavia Co-Authored-By:
wu.chunyang <wuchunyang@yovole.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Change-Id: I2c5b26ce9e363f35c523865904a582f7960aa682
-
- Oct 02, 2020
-
-
wu.chunyang authored
this patchset has implemented: - network (lb-mgmt-net) - security groups and rules (used by amphora and health manager) - amphora flavor (used by amphora) - nova keypair (used by amphora at the time of debugging) Add a octavia_amp_listen_port variable which used by amphora Add amp_image_owner_id in octavia.conf Implements: blueprint implement-automatic-deploy-of-octavia Co-Authored-By:
zhangchun <zhangchun@yovole.com> Depends-On: https://review.opendev.org/652030 Change-Id: I67009d046925cfc02c1e0073c80085c1471975f6
-
- Jun 20, 2020
-
-
gugug authored
more info: https://review.opendev.org/#/c/721733/ Depends-On: I561ead226f714d98c8e06e6027715a64c3a8e47e Depends-On: I21c9ab9820f78cf76adf11c5f0591c60f76372a8 Change-Id: Ic740d090211ee331b374a6dac69dfde466df7200 Co-Authored-By:
jacky06 <zhang.min@99cloud.net>
-
- Jun 09, 2020
-
-
Christian Berendt authored
Change-Id: Iea3f4f3d2e5c6040c1e0bc7bfae8719cc7d8ac55
-
- Feb 11, 2020
-
-
Michal Nasiadka authored
Kolla-Ansible Ceph deployment mechanism has been deprecated in Train [1]. This change removes the Ansible code and associated CI jobs. [1]: https://review.opendev.org/669214 Change-Id: Ie2167f02ad2f525d3b0f553e2c047516acf55bc2
-
- Jan 07, 2020
-
-
Viktor Michalek authored
Change-Id: Ie97d3ebbb73722d9b216dd5385255babafab352e
-
- Nov 18, 2019
-
-
Michal Nasiadka authored
Change-Id: Ie35ea07b8b6f95cbb56eb722ae2366c00243e562
-
Michal Nasiadka authored
Opendaylight support has been deprecated in Train - time to remove it. Change-Id: I3a61bfbcbf366c327ea3e25d2424bc3fedca29f0
-
- Aug 15, 2019
-
-
Kien Nguyen authored
Masakari provides Instances High Availability Service for OpenStack clouds by automatically recovering failed Instances. Depends-On: https://review.openstack.org/#/c/615469/ Change-Id: I0b3457232ee86576022cff64eb2e227ff9bbf0aa Implements: blueprint ansible-masakari Co-Authored-By:
Gaëtan Trellu <gaetan.trellu@incloudus.com>
-
- Jun 24, 2019
-
-
chenxing authored
The Hitachi NAS Platform iSCSI driver was marked as not supported by Cinder in the Ocata realease[1]. [1] https://review.opendev.org/#/c/444287/ Change-Id: I1a25789374fddaefc57bc59badec06f91ee6a52a Closes-Bug: #1832821
-
- May 31, 2019
-
-
Gaetan Trellu authored
Qinling is an OpenStack project to provide "Function as a Service". This project aims to provide a platform to support serverless functions. Change-Id: I239a0130f8c8b061b531dab530d65172b0914d7c Implements: blueprint ansible-qinling-support Story: 2005760 Task: 33468
-
- Mar 15, 2019
-
-
Eduardo Gonzalez authored
Depends-On: https://review.openstack.org/#/c/642958 Depends-On: https://review.openstack.org/642984 Change-Id: If795a9eb3ec92f75867ce3f755d6b832eba31af9
-
- Mar 08, 2019
-
-
Bai Yongjun authored
Because kolla-ansible not have cyborg so should add it. Implements: blueprint add-cyborg-to-kolla-ansible Depend-On: I497e67e3a754fccfd2ef5a82f13ccfaf890a6fcd Change-Id: I6f7ae86f855c5c64697607356d0ff3161f91b239
-
- Nov 22, 2018
-
-
Nick Jones authored
blueprint database-backup-recovery Introduce a new option, mariadb_backup, which takes a backup of all databases hosted in MariaDB. Backups are performed using XtraBackup, the output of which is saved to a dedicated Docker volume on the target host (which defaults to the first node in the MariaDB cluster). It supports either full (the default) or incremental backups. Change-Id: Ied224c0d19b8734aa72092aaddd530155999dbc3
-
- Nov 02, 2018
-
-
Doug Szumski authored
The Monasca Grafana fork allows users to log into Grafana with their OpenStack user credentials and see metrics associated with their OpenStack project. The long term goal is to enable Keystone support in upstream Grafana, but this work seems to have stalled. Partially-Implements: blueprint monasca-grafana Change-Id: Icc04613b2571c094ae23b66d0bcc38b58c0ee4e1
-
Doug Szumski authored
The Monasca Agent collects metrics and in this change is deployed across the control plane. These metrics are collected into an OpenStack project. It supports configuring a small number of plugins, which can be extended in later commits. It also makes the Monasca Agent credentials available to other roles, such as the common role to allow forwarding logs to Monasca. Partially-Implements: blueprint monasca-roles Change-Id: I76b34fc5e1c76407a45fcf272268d5798b473ca2
-
- Jul 17, 2018
-
-
yuqian authored
Co-Authored-By:
caowei <cao.wei@99cloud.net> Co-Authored-By:
yuqian <yu.qian@99cloud.net> Change-Id: If8143b720203fe75cf586248f1fa1d3fde34c750 blueprint: onos-support
-
- Jul 11, 2018
-
-
Jorge Niedbalski authored
This patch extends the prometheus role for being able to deploy the prometheus-alertmanager[0] container. The variable enable_prometheus_alertmanager decides if the container should be deployed and enabled. If enabled, the following configuration and actions are performed: - The alerting section on the prometheus-server configuration is added pointing the prometheus-alertmanager host group as targets. - HAProxy is configured to load-balance over the prometheus-alertmanager host group. (external/internal). Please note that a default (dummy) configuration is provided, that allows the service to start, the operator should extend it via a node custom config [0] https://github.com/openstack/kolla/tree/master/docker/prometheus/prometheus-alertmanager Change-Id: I3a13342c67744a278cc8d52900a913c3ccc452ae Closes-Bug: 1774725 Signed-off-by:
Jorge Niedbalski <jorge.niedbalski@linaro.org>
-
- Jun 03, 2018
-
-
Gary Kotton authored
NSXV3 is the OpenStack support for the NSX Transformers platform. This is supported from neutron in the Mitaka version. This patch adds Kolla support This adds a new neutron_plugin_agent type 'vmware_nsxv3'. The plugin does not run any neutron agents. Change-Id: I1ecd7e5f3471e4ff03cfe8c9a3aff17af3fe1842
-