Skip to content
Snippets Groups Projects
  1. Oct 09, 2020
  2. Oct 08, 2020
  3. Oct 06, 2020
    • nikparasyr's avatar
      Allow overwrite of placement-api wsgi config · fc4327d9
      nikparasyr authored
      Use with_first_found on placement-api-wsgi to allow
      overwrite from users and keep consistency with other
      roles.
      
      Change-Id: I11c84db6df1bb5be61db5b6b0adf8c160a2bd931
      Closes-Bug: #1898766
      fc4327d9
    • Mark Goddard's avatar
      Update ironic iPXE configuration · dd826417
      Mark Goddard authored
      * ipxe_enabled was removed in Ussuri, now there is a separate ipxe boot
        interface.
      * iPXE now has its own set of configuration for the bootfile and config
        template, and the values previously set when iPXE is enabled are now
        the default in ironic. The overrides have been removed, since they
        match the iPXE defaults.
      
      Change-Id: I9d9f030ee4be979d0a849b59e5eb991f2d82f6a4
      dd826417
  4. Oct 05, 2020
  5. Oct 04, 2020
    • Radosław Piliszek's avatar
      Coordinate haproxy and keepalived restarts · c2d0bf30
      Radosław Piliszek authored
      Keepalived and haproxy cooperate to provide control plane HA in
      kolla-ansible deployments.
      Certain care should be exerted to avoid prolonged availability
      loss during reconfigurations and upgrades.
      This patch aims to provide this care.
      There is nothing special about keepalived upgrade compared to
      reconfig, hence it is simplified to run the same code as for
      deploy.
      The broken logic of safe upgrade is replaced by common handler
      code which's goal is to ensure we down current master only after
      we have backups ready.
      
      This change introduces a switch to kolla_docker module that allows
      to ignore missing containers (as they are logically stopped).
      ignore_missing is the switch's name.
      All tests are included.
      
      Change-Id: I22ddec5f7ee4a7d3d502649a158a7e005fe29c48
      c2d0bf30
  6. Oct 02, 2020
    • wu.chunyang's avatar
      Implement automatic deploy of octavia · 4a58f423
      wu.chunyang authored
      
      this patchset has implemented:
        - network (lb-mgmt-net)
        - security groups and rules (used by amphora and health manager)
        - amphora flavor (used by amphora)
        - nova keypair (used by amphora at the time of debugging)
      
      Add a octavia_amp_listen_port variable which used by amphora
      Add amp_image_owner_id in octavia.conf
      
      Implements: blueprint implement-automatic-deploy-of-octavia
      Co-Authored-By: default avatarzhangchun <zhangchun@yovole.com>
      
      Depends-On: https://review.opendev.org/652030
      
      Change-Id: I67009d046925cfc02c1e0073c80085c1471975f6
      4a58f423
  7. Oct 01, 2020
  8. Sep 30, 2020
  9. Sep 28, 2020
  10. Sep 26, 2020
  11. Sep 25, 2020
    • Michal Nasiadka's avatar
      Fix keystone-startup.sh · d78673e7
      Michal Nasiadka authored
      keystone-startup.sh is using fernet_token_expiry instead of
      fernet_key_rotation_interval - which effects in restart loop of keystone
      containers - when restarted after 2-3 days.
      
      Closes-Bug: #1895723
      
      Change-Id: Ifff77af3d25d9dc659fff34f2ae3c6f2670df0f4
      d78673e7
  12. Sep 24, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 7c2df87d
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Ironic service.
      
      Change-Id: I9edf7545c174ca8839ceaef877bb09f49ef2b451
      Partially-Implements: blueprint add-ssl-internal-network
      7c2df87d
  13. Sep 23, 2020
  14. Sep 22, 2020
    • Mark Goddard's avatar
      Fix common role when using external mariadb · 68820133
      Mark Goddard authored
      If the common role is executed against a set of hosts that are not all
      in the fluentd group, the run_once tasks that find customisations may be
      skipped. This causes a later failure when accessing the registered
      variables for those tasks.
      
      This issue was raised on the mailing list:
      http://lists.openstack.org/pipermail/openstack-discuss/2020-September/016932.html
      
      This issue only affects the master branch, due to addition of groups
      for the common role in I6a4676bf6efeebc61383ec7a406db07c7a868b2a.
      
      This change fixes the issue by always running the find tasks, if fluentd
      is enabled.
      
      Change-Id: I559c4b94d18c7f36d43e1d88629ed44668abf859
      68820133
    • Pierre Riteau's avatar
      Reduce the use of SQLAlchemy connection pooling · c8177202
      Pierre Riteau authored
      When the internal VIP is moved in the event of a failure of the active
      controller, OpenStack services can become unresponsive as they try to
      talk with MariaDB using connections from the SQLAlchemy pool.
      
      It has been argued that OpenStack doesn't really need to use connection
      pooling with MariaDB [1]. This commit reduces the use of connection
      pooling via two configuration options:
      
      - max_pool_size is set to 1 to allow only a single connection in the
        pool (it is not possible to disable connection pooling entirely via
        oslo.db, and max_pool_size = 0 means unlimited pool size)
      - lower connection_recycle_time from the default of one hour to 10
        seconds, which means the single connection in the pool will be
        recreated regularly
      
      These settings have shown better reactivity of the system in the event
      of a failover.
      
      [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html
      
      Change-Id: Ib6a62d4428db9b95569314084090472870417f3d
      Closes-Bug: #1896635
      c8177202
    • Radosław Piliszek's avatar
      Add support for with_frontend and with_backend · 3916c156
      Radosław Piliszek authored
      This allows for more config flexibility - e.g. running multiple
      backends with a common frontend.
      
      Note this is a building block for future work on letsencrypt
      validator (which should offer backend and share frontend with
      any service running off 80/443 - which would be only horizon
      in the current default config), as well as any work towards
      single port (that is single frontend) and multiple services
      anchored at paths of it (which is the new recommended default).
      
      Change-Id: Ie088fcf575e4b5e8775f1f89dd705a275725e26d
      Partially-Implements: blueprint letsencrypt-https
      3916c156
    • Radosław Piliszek's avatar
      Change the default haproxy template to split variant · 9451ac61
      Radosław Piliszek authored
      This allows for more config flexibility - e.g. running multiple
      backends with a common frontend.
      It is not possible with the 'listen' approach (which enforces
      frontend).
      Additionally, it does not really make sense to support two ways
      to do the exact same thing as the process is automated and
      'listen' is really meant for humans not willing to write separate
      sections.
      Hence this deprecates 'listen' variant.
      
      At the moment both templates work exactly the same.
      The real flexibility comes in following patches.
      
      Note this is a building block for future work on letsencrypt
      validator (which should offer backend and share frontend with
      any service running off 80/443 - which would be only horizon
      in the current default config), as well as any work towards
      single port (that is single frontend) and multiple services
      anchored at paths of it (which is the new recommended default).
      
      Change-Id: I2362aaa3e8069fe146d42947b8dddf49376174b5
      Partially-Implements: blueprint letsencrypt-https
      9451ac61
    • Radosław Piliszek's avatar
      Fix default mode in haproxy_single_service_split · a45ef7cc
      Radosław Piliszek authored
      haproxy_single_service_listen (the default template) was already fine.
      
      Closes-Bug: #1896591
      TrivialFix
      
      Change-Id: Id68fe19ea87565aa36fb74f2a2ca66cb951169f6
      a45ef7cc
    • Michal Nasiadka's avatar
      Allow setting container_proxy per service · f257e79a
      Michal Nasiadka authored
      Currently there is no option to set container_proxy only for one service
      (e.g. magnum). This change adds this option.
      
      Change-Id: Ia938ee660ebe8ce84321f721b6292b0b58a06e20
      f257e79a
  15. Sep 21, 2020
  16. Sep 18, 2020
  17. Sep 17, 2020
  18. Sep 10, 2020
    • Pierre Riteau's avatar
      Revert "Add support for encrypting Ironic API" · 3d30624c
      Pierre Riteau authored
      This reverts commit 316b0496, because
      ironic-inspector is not ready to use WSGI. It would need to be split
      into two separate containers, one running ironic-inspector-api-wsgi and
      another running ironic-inspector-conductor.
      
      Change-Id: I7e6c59dc8ad4fdee0cc6d96313fe66bc1d001bf7
      3d30624c
  19. Sep 07, 2020
  20. Sep 04, 2020
    • Radosław Piliszek's avatar
      Make no_proxy handling more robust · 2a4fb438
      Radosław Piliszek authored
      This fixes an issue with Bifrost that setting
      kolla_internal_vip_address became mandatory.
      
      Additionally, it does a better job ensuring the syntax is
      correct when any of the entries is missing.
      
      Change-Id: Ie86a345365ca3766aebd8a29ce329b370e61af6c
      Closes-Bug: #1894199
      2a4fb438
  21. Sep 01, 2020
    • Pierre Riteau's avatar
      Remove unused configuration for prometheus-openstack-exporter · 295f8d1b
      Pierre Riteau authored
      The Prometheus OpenStack exporter was needlessly configured to use the
      prometheus Docker volume and change permissions of /data, which does
      not exist in the container image.
      
      This must have been copy-pasted from existing Prometheus code.
      
      Change-Id: I96017c17e68ca7a00a2d5ac41f2f43ef87694514
      295f8d1b
  22. Aug 29, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 316b0496
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      and Ironic Inspector service. When used in conjunction with enabling
      TLS for service API endpoints, network communcation will be encrypted
      end to end, from client through HAProxy to the Ironic service.
      
      Change-Id: I3e82c8ec112e53f907e89fea0c8c849072dcf957
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/#/c/742776/
      316b0496
  23. Aug 28, 2020
    • Mark Goddard's avatar
      Performance: use import_tasks for register and bootstrap · 496904d6
      Mark Goddard authored
      Including tasks has a performance penalty when compared with importing
      tasks. If the include has a condition associated with it, then the
      overhead of the include may be lower than the overhead of skipping all
      imported tasks. In the case of the register.yml and bootstrap.yml
      includes, all of the tasks in the included file use run_once: True.
      The run_once flag improves performance at scale drastically, so
      importing these tasks unconditionally will have a lower overhead than a
      conditional include task.  It therefore makes sense to switch to use
      import_tasks there.
      
      See [1] for benchmarks of run_once.
      
      [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/run-once.md
      
      Change-Id: Ic67631ca3ea3fb2081a6f8978e85b1522522d40d
      Partially-Implements: blueprint performance-improvements
      496904d6
    • Mark Goddard's avatar
      Performance: remove one include_tasks in nova-cell · 3c02c966
      Mark Goddard authored
      Including tasks has a performance penalty when compared with importing
      tasks. The nova-cell role uses include_tasks twice when generating
      certificates and keys for libvirt TLS. While a dynamic include makes
      sense here for a non-default feature, we can use one include rather than
      two with the same effect. Since this task runs against compute nodes the
      overhead is significant.
      
      See [1] for benchmarks of include_tasks and import_tasks.
      
      [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/include-and-import.md
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: Ic687d2f7d4625aede386e576ebb174da72142756
      3c02c966
    • Mark Goddard's avatar
      Performance: replace unconditional include_tasks with import_tasks · b685ac44
      Mark Goddard authored
      Including tasks has a performance penalty when compared with importing
      tasks. If the include has a condition associated with it, then the
      overhead of the include may be lower than the overhead of skipping all
      imported tasks. For unconditionally included tasks, switching to
      import_tasks provides a clear benefit.
      
      Benchmarking of include vs. import is available at [1].
      
      This change switches from include_tasks to import_tasks where there is
      no condition applied to the include.
      
      [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/include-and-import.md#task-include-and-import
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: Ia45af4a198e422773d9f009c7f7b2e32ce9e3b97
      b685ac44
Loading