Skip to content
Snippets Groups Projects
  1. Jul 12, 2022
    • Michal Arbet's avatar
      Add api_workers for each service to defaults · 3e8db91a
      Michal Arbet authored
      Render {{ openstack_service_workers }} for workers
      of each openstack service is not enough. There are
      several services which has to have more workers because
      there are more requests sent to them.
      
      This patch is just adding default value for workers for
      each service and sets {{ openstack_service_workers }} as
      default, so value can be overrided in hostvars per server.
      Nothing changed for normal user.
      
      Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
      3e8db91a
  2. Jan 27, 2021
    • Doug Szumski's avatar
      Fix Barbican API log config · 1ff4e58d
      Doug Szumski authored
      There are a few issues fixed here:
      
      - The Barbican API service doesn't set a log file, so all the Barbican API
        service logs go to loadwsgi.py.log by default.
      - The logs in loadwsgi.py.log are not ingested properly by Fluentd.
      - uWSGI logs go to barbican-api.log. This would normally be used as the log
        file for the Barbican API service logs.
      
      This patch makes the following changes to address the above issues:
      
      - All uWSGI logs (from the Emperor and Vassals) go to barbican_api_uwsgi_access.log
        Although these logs aren't strictly all access logs, this follows the existing
        pattern for WSGI logs.
      - The Barbican API service logs are written to barbican-api.log instead of
        loadwsgi.py.log. This follows the pattern used by other OpenStack services.
      - Fluentd is configured to parse the Barbican API service logs as it would with
        other OpenStack Python services.
      
      Change-Id: I6d03fa8c81c52b6f061514a836bbd15bb6639aaf
      Closes-Bug: #1891343
      1ff4e58d
  3. Jun 04, 2020
  4. May 13, 2020
    • James Kirsch's avatar
      Add support for encrypting Barbican API · 2e08ffd6
      James Kirsch authored
      This patch introduces an optional backend encryption for the Barbican
      API service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Barbican service.
      
      Change-Id: I62a43b36ebe4a03230bf944980b45e4b6938871b
      Partially-Implements: blueprint add-ssl-internal-network
      2e08ffd6
  5. Oct 16, 2019
    • Radosław Piliszek's avatar
      Implement IPv6 support in the control plane · bc053c09
      Radosław Piliszek authored
      Introduce kolla_address filter.
      Introduce put_address_in_context filter.
      
      Add AF config to vars.
      
      Address contexts:
      - raw (default): <ADDR>
      - memcache: inet6:[<ADDR>]
      - url: [<ADDR>]
      
      Other changes:
      
      globals.yml - mention just IP in comment
      
      prechecks/port_checks (api_intf) - kolla_address handles validation
      
      3x interface conditional (swift configs: replication/storage)
      
      2x interface variable definition with hostname
      (haproxy listens; api intf)
      
      1x interface variable definition with hostname with bifrost exclusion
      (baremetal pre-install /etc/hosts; api intf)
      
      neutron's ml2 'overlay_ip_version' set to 6 for IPv6 on tunnel network
      
      basic multinode source CI job for IPv6
      
      prechecks for rabbitmq and qdrouterd use proper NSS database now
      
      MariaDB Galera Cluster WSREP SST mariabackup workaround
      (socat and IPv6)
      
      Ceph naming workaround in CI
      TODO: probably needs documenting
      
      RabbitMQ IPv6-only proto_dist
      
      Ceph ms switch to IPv6 mode
      
      Remove neutron-server ml2_type_vxlan/vxlan_group setting
      as it is not used (let's avoid any confusion)
      and could break setups without proper multicast routing
      if it started working (also IPv4-only)
      
      haproxy upgrade checks for slaves based on ipv6 addresses
      
      TODO:
      
      ovs-dpdk grabs ipv4 network address (w/ prefix len / submask)
      not supported, invalid by default because neutron_external has no address
      No idea whether ovs-dpdk works at all atm.
      
      ml2 for xenapi
      Xen is not supported too well.
      This would require working with XenAPI facts.
      
      rp_filter setting
      This would require meddling with ip6tables (there is no sysctl param).
      By default nothing is dropped.
      Unlikely we really need it.
      
      ironic dnsmasq is configured IPv4-only
      dnsmasq needs DHCPv6 options and testing in vivo.
      
      KNOWN ISSUES (beyond us):
      
      One cannot use IPv6 address to reference the image for docker like we
      currently do, see: https://github.com/moby/moby/issues/39033
      (docker_registry; docker API 400 - invalid reference format)
      workaround: use hostname/FQDN
      
      RabbitMQ may fail to bind to IPv6 if hostname resolves also to IPv4.
      This is due to old RabbitMQ versions available in images.
      IPv4 is preferred by default and may fail in the IPv6-only scenario.
      This should be no problem in real life as IPv6-only is indeed IPv6-only.
      Also, when new RabbitMQ (3.7.16/3.8+) makes it into images, this will
      no longer be relevant as we supply all the necessary config.
      See: https://github.com/rabbitmq/rabbitmq-server/pull/1982
      
      For reliable runs, at least Ansible 2.8 is required (2.8.5 confirmed
      to work well). Older Ansible versions are known to miss IPv6 addresses
      in interface facts. This may affect redeploys, reconfigures and
      upgrades which run after VIP address is assigned.
      See: https://github.com/ansible/ansible/issues/63227
      
      Bifrost Train does not support IPv6 deployments.
      See: https://storyboard.openstack.org/#!/story/2006689
      
      
      
      Change-Id: Ia34e6916ea4f99e9522cd2ddde03a0a4776f7e2c
      Implements: blueprint ipv6-control-plane
      Signed-off-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      bc053c09
  6. Mar 06, 2019
    • Jim Rollenhagen's avatar
      Allow barbican services to use independent hostnames · 857871df
      Jim Rollenhagen authored
      This allows barbican service endpoints to use custom hostnames, and adds the
      following variables:
      
      * barbican_internal_fqdn
      * barbican_external_fqdn
      
      These default to the old values of kolla_internal_fqdn or
      kolla_external_fqdn.
      
      This also adds a barbican_api_listen_port option, which defaults to
      barbican_api_port for backward compatibility.
      
      This option allow the user to differentiate between the port the
      service listens on, and the port the service is reachable on. This is
      useful for external load balancers which live on the same host as the
      service itself.
      
      Change-Id: I1807a9c8b64d737d0e278bb3e925fecb4fadfb08
      Implements: blueprint service-hostnames
      857871df
  7. May 23, 2017
  8. Oct 11, 2016
Loading