- Mar 22, 2022
-
-
Will Szumski authored
Change-Id: Ie87a7488dad369464793b47c3d2db67d7dc1694e
-
- May 30, 2021
-
-
Radosław Piliszek authored
Makes nova-libvirt container always run in 'host' CgroupnsMode to ensure it works. Change-Id: I75105baf434977c68bc5c8ca1f5213e602c52c8c
-
Radosław Piliszek authored
This is required to support Debian Bullseye (11) - need to set nova-libvirt to use 'host' CgroupnsMode. Change-Id: I40213d4092fa325bcf37bb1fb4437ab125fe328b
-
- May 28, 2021
-
-
Pierre Riteau authored
The mariadb image was removed in Wallaby, leading to database backup failures. Change-Id: I90986e7521779997df2782767bb95efcbd8ef232 Closes-Bug: #1928129
-
- May 19, 2021
-
-
Michał Nasiadka authored
Docker 5.0.0 [1] dropped requirement for six, but still imports it. [1]: https://github.com/docker/docker-py/issues/2807 Closes-Bug: #1928915 Change-Id: I726541f4b3fdc357387a44c6a2153593a10bf282
-
- May 14, 2021
-
-
Michał Nasiadka authored
docker-ce on Debian/Ubuntu gets started just after installation, before baremetal role configures daemon.json - which results in iptables rules being implemented - but not removed on docker engine restart. Closes-Bug: #1923203 Change-Id: Ib1faa092e0b8f0668d1752490a34d0c2165d58d2
-
- May 12, 2021
-
-
Mark Goddard authored
* add CentOS Stream 8 info & reno * mark RHEL as deprecated in docs Change-Id: Ifa3b8c7365e4092202bf9e89b67293cf8d983e0a
-
- May 11, 2021
-
-
Piotr Parczewski authored
Reference: https://github.com/prometheus/alertmanager#turn-off-high-availability Closes-Bug: #1926463 Change-Id: I60e1dedeac25fa8fe9538a3a8e582bd8cc9324d7
-
- May 10, 2021
-
-
Michal Arbet authored
This task is writing private key from passwords to /etc/kolla/octavia-worker/{{ octavia_amp_ssh_key_name }} even if user disabled octavia auto configure. This patch is adding conditional for this task and skipping it if octavia_auto_configure: "no". Closes-Bug: #1927727 Change-Id: Ib993b387d681921d804f654bea780a1481b2b0d0
-
- May 06, 2021
-
-
Michał Nasiadka authored
In order for DVR to work on VLAN tenant networks we need to configure external_ids:ovn-chassis-mac-mappings with per node generated MAC [1] on computes [1]. [1]: https://github.com/ovn-org/ovn/commit/1fed74cfc1a1e3b29cf86eab2e96048813019b57 Co-Authored-By:
Bartosz Bezak <bartosz@stackhpc.com> Depends-On: https://review.opendev.org/c/openstack/neutron/+/782250 Change-Id: I3a3ccde5b9ef2afb4c3e9206f13827687880cb57
-
- May 05, 2021
-
-
Radosław Piliszek authored
Per [1]. [1] http://eavesdrop.openstack.org/meetings/kolla/2021/kolla.2021-04-28-15.00.html Change-Id: Ie109d15db1e26e20b78efdb4ab0653d24054820f
-
- Apr 27, 2021
-
-
Radosław Piliszek authored
As agreed during IRC meeting. [1] [1] http://eavesdrop.openstack.org/meetings/kolla/2021/kolla.2021-04-07-15.00.html Change-Id: Ibffa019e2106784e97f5c482106bb5082f788752
-
Doug Szumski authored
In the Xena cycle it was decided to remove the Monasca Grafana fork due to lack of maintenance. This commit removes the service and provides a limited workaround using the Monasca Grafana datasource with vanilla Grafana. Depends-On: I9db7ec2df050fa20317d84f6cea40d1f5fd42e60 Change-Id: I4917ece1951084f6665722ba9a91d47764d3709a
-
Doug Szumski authored
Change-Id: I04bafaebba44d162adb908839cdad6f5bb6ee8f7
-
- Apr 21, 2021
-
-
Mark Goddard authored
If docker_configure_for_zun is set to true, then Zun-specific configuration for Docker is applied to all nodes. It should only be applied based on the relevant inventory groups. In some cases this can cause Docker to fail to start. See https://storyboard.openstack.org/#!/story/2008544 for details. This change applies the configuration based on the zun-compute and zun-cni-daemon groups. It also modifies the expression to not assume that these groups exist in the inventory. Change-Id: I0141abf0dd83e3a567ea6dcca945f86db129becf Closes-Bug: #1914378 Story: 2008544 Task: 41645 Co-Authored-By:
Buddhika Sanjeewa <bsanjeewa@kln.ac.lk>
-
- Apr 19, 2021
-
-
Michał Nasiadka authored
Change-Id: Idad2d4f8bf5f54c57d2c5fccbf6eff7d54f040dd
-
- Apr 15, 2021
-
-
Michał Nasiadka authored
Change-Id: I14376dac46809f8bb466ec41f279be8d323d459d
-
- Apr 08, 2021
-
-
Mark Goddard authored
Change-Id: I3f43df7766c57622ab8d01a759fbeeef0a0c2b93 Implements: blueprint masakari-hostmonitor Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
Gaëtan Trellu authored
Adds HAcluster Ansible role. This role contains High Availability clustering solution composed of Corosync, Pacemaker and Pacemaker Remote. HAcluster is added as a helper role for Masakari which requires it for its host monitoring, allowing to provide HA to instances on a failed compute host. Kolla hacluster images merged in [1]. [1] https://review.opendev.org/#/c/668765/ Change-Id: I91e5c1840ace8f567daf462c4eb3ec1f0c503823 Implements: blueprint ansible-pacemaker-support Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Co-Authored-By:
Mark Goddard <mark@stackhpc.com>
-
- Apr 07, 2021
-
-
Michal Arbet authored
Kolla-ansible is currently installing mariadb cluster on hosts defined in group['mariadb'] and render haproxy configuration for this hosts. This is not enough if user want to have several service databases in several mariadb clusters (shards). Spread service databases to multiple clusters (shards) is usefull especially for databases with high load (neutron,nova). How it works ? It works exactly same as now, but group reference 'mariadb' is now used as group where all mariadb clusters (shards) are located, and mariadb clusters are installed to dynamic groups created by group_by and host variable 'mariadb_shard_id'. It also adding special user 'shard_X' which will be used for creating users and databases, but only if haproxy is not used as load-balance solution. This patch will not affect user which has all databases on same db cluster on hosts in group 'mariadb', host variable 'mariadb_shard_id' is set to 0 if not defined. Mariadb's task in loadbalancer.yml (haproxy) is configuring mariadb default shard hosts as haproxy backends. If mariadb role is used to install several clusters (shards), only default one is loadbalanced via haproxy. Mariadb's backup is working only for default shard (cluster) when using haproxy as mariadb loadbalancer, if proxysql is used, all shards are backuped. After this patch will be merged, there will be way for proxysql patches which will implement L7 SQL balancing based on users and schemas. Example of inventory: [mariadb] server1 server2 server3 mariadb_shard_id=1 server4 mariadb_shard_id=1 server5 mariadb_shard_id=2 server6 mariadb_shard_id=3 Extra: wait_for_loadbalancer is removed instead of modified as its role is served by check already. The relevant refactor is applied as well. Change-Id: I933067f22ecabc03247ea42baf04f19100dffd08 Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
Doug Szumski authored
Minor corrections to doc and release note. Change-Id: I8a90cbac0b9a1eaa5f6c02271515f2357547f908
-
Mark Goddard authored
* Don't generate masakari.conf for instance monitor * Don't generate masakari-monitors.conf for API or engine * Use a consistent name for dimensions - masakari_instancemonitor_dimensions * Fix source code paths in dev mode Change-Id: I551f93c9bf1ad6712b53c316074ae1df84e4352b
-
- Apr 06, 2021
-
-
Radosław Piliszek authored
We can't check this with timedatectl as it is not aware of any "non-native" NTP daemon. This could be a warning-level message but we don't have such messages from the prechecks. Closes-Bug: #1922721 Change-Id: I6db37576118cf5cff4ba7a63e179f0ab37467d22
-
Radosław Piliszek authored
Per [1]. [1] http://lists.openstack.org/pipermail/openstack-discuss/2021-February/020707.html Change-Id: Id6f3cd158bf5d01750971249b11364b6a8631789 Closes-Bug: #1885689
-
- Mar 26, 2021
-
-
Michal Nasiadka authored
Change-Id: I947c2940518c0f4872acaa977edeaca370dc9a96
-
wuchunyang authored
host -> host_ip[0] Remove deprecated configuration notification_topics. WARNING oslo_config.cfg [-] Deprecated: Option "notification_topics" from group "DEFAULT" is deprecated. Use option "topics" from group "oslo_messaging_notifications". [0]https://docs.openstack.org/cyborg/latest/configuration/sample-config.html Change-Id: Ia5d53fb60d34c1509c6cdb905cbd0a93dd1c8b3d
-
- Mar 25, 2021
-
-
Martin Chlumsky authored
This change also adds support for Octavia backend TLS. Closes-Bug: #1874228 Depends-On: https://review.opendev.org/c/openstack/kolla/+/779892 Change-Id: I5ff84aec4cdbc15f6a797391815243821dbdbd67
-
- Mar 24, 2021
-
-
Michal Nasiadka authored
For using 3rd party Octavia providers (such as OVN provider) an octavia-driver-agent container must be running to expose those providers to use. OVN CI job has been extended with deploying Octavia and testing OVN Load Balancer. Closes-Bug: #1903506 Depends-On: https://review.opendev.org/c/openstack/kolla/+/771191 Change-Id: Ibafa8b7307981f2a51e630cc113d18af6162171c
-
- Mar 22, 2021
-
-
Piotr Parczewski authored
This commit disables collection of usage data in Kibana by default. User has still an option to enable it via GUI. Reference: [1] [1] https://www.elastic.co/guide/en/kibana/7.x/telemetry-settings-kbn.html Change-Id: Ic3a8bf05a73fb042ae42cbd26ccced60240d8e94
-
- Mar 16, 2021
-
-
Bartosz Bezak authored
Allow users to import custom grafana dashboards. Dashboards as JSON files should be placed into "{{ node_custom_config }}/grafana/dashboards/" folder. Change-Id: Id0f83b8d08541b3b74649f097b10c9450201b426
-
Doug Szumski authored
ELK 7 requires some minor changes from the existing ELK 6 config. Depends-On: Icfa3db5788b25f70ee75411dbaf20d8d4a6a734b Change-Id: I9815d202a77da0477aea43d714a5def8a24724fa
-
- Mar 15, 2021
-
-
zhubingbing authored
The rabbitmq_prometheus plugin is available in RabbitMQ 3.8. https://www.rabbitmq.com/prometheus.html Implements: blueprint rabbitmq-prometheus Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I4d69a93a6c70db8d40626042cdbe773747b238ae
-
- Mar 13, 2021
-
-
LinPeiWen authored
This change enables the use of Docker healthchecks for haproxy services. Implements: blueprint container-health-check Change-Id: I4b486e9c78e9a01a0f5983b83aca00ea3a001dcc
-
- Mar 12, 2021
-
-
LinPeiWen authored
This change enables the use of Docker healthchecks for qdrouterd services. Implements: blueprint container-health-check Change-Id: If689be90690251180972454ed0baee658cc5e895
-
- Mar 11, 2021
-
-
Mark Goddard authored
In I165199fc98fb98f227f2a20284e1bab03ef65b5b and Ic745300b27e50132d80d03787fa4abfada2d0173 we provided flags to disable Docker's control of iptables and bridge networking respectively. The original behaviour was maintained for backwards compatibility, to allow the patches to be backported. This patch changes the default behaviour to disable the manipulation of iptables and disabling bridge networking. Related-Bug: #1849275 Related-Bug: #1848249 Change-Id: I4e8206f13a847ff79e06c36d22068597458b6c3d
-
Dincer Celik authored
Docker is using 172.17.0.0/16 by default for bridge networking on docker0, and this might cause routing problems for operator networks. This change introduces docker_disable_default_network to disable the bridge networking by putting "bridge: none"[1] to daemon.json Bridge networking does not work without iptables, so we set the default for docker_disable_default_network to docker_disable_default_iptables_rules. For better defaults, this feature will be enabled by default in Wallaby. [1] https://docs.docker.com/engine/reference/commandline/dockerd/ Change-Id: Ic745300b27e50132d80d03787fa4abfada2d0173 Closes-Bug: #1848249 Related-Bug: #1849275
-
LinPeiWen authored
This change enables the use of Docker healthchecks for elasticsearch services. Implements: blueprint container-health-check Change-Id: Ib50d56cc206a80b20a4f96e95bcdd8d11269234f
-
LinPeiWen authored
This change enables the use of Docker healthchecks for kibana services. Implements: blueprint container-health-check Change-Id: If7525e193c245435410b4071aed6d3b566424219
-
- Mar 10, 2021
-
-
Maksim Malchuk authored
According the documentation [1] there need to configure auth_uri in the [filter:s3token] section instead of www_authenticate_uri which cause an error 'swift.common.wsgi.ConfigFileError: Invalid auth_uri; must include scheme and host' during start the swift-proxy-server container. 1. https://docs.openstack.org/swift/ussuri/middleware.html#s3-token-middleware Change-Id: I6b8f5807ebb746428a501dca13eae30763dede8d Closes-Bug: 1862765 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
wuchunyang authored
Cinder api v2 support removed in wallaby. refer to http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018697.html Change-Id: I120101d6c30f9169f4c3811357b5ed06496c90ff
-