Skip to content
Snippets Groups Projects
  1. Jan 28, 2020
    • James Kirsch's avatar
      Copy CA into containers. · 511ba9f6
      James Kirsch authored
      When kolla_copy_ca_into_containers is set to "yes", the Certificate
      Authority in /etc/kolla/certificates will be copied into service
      containers to enable trust for that CA. This is especially useful when
      the CA is self signed, and would not be trusted by default.
      
      Partially-Implements: blueprint custom-cacerts
      
      Change-Id: I4368f8994147580460ebe7533850cf63a419d0b4
      511ba9f6
  2. Jan 27, 2020
  3. Jan 24, 2020
  4. Jan 22, 2020
    • Michal Nasiadka's avatar
      External Ceph: keys as variables · 1f929336
      Michal Nasiadka authored
      Introduce user modifiable variables instead of fixed-names
      of Ceph keyring files for external Ceph functionality.
      
      Change-Id: I1a33b3f9d6eca5babf53b91187461e43aef865ce
      1f929336
  5. Jan 09, 2020
  6. Jan 06, 2020
  7. Jan 04, 2020
  8. Dec 20, 2019
  9. Dec 09, 2019
  10. Nov 27, 2019
  11. Nov 25, 2019
  12. Nov 18, 2019
    • Michal Nasiadka's avatar
      Remove OpenDaylight role · eec6831f
      Michal Nasiadka authored
      Opendaylight support has been deprecated in Train - time to remove it.
      
      Change-Id: I3a61bfbcbf366c327ea3e25d2424bc3fedca29f0
      eec6831f
  13. Nov 01, 2019
  14. Oct 25, 2019
  15. Oct 23, 2019
  16. Oct 22, 2019
  17. Oct 21, 2019
  18. Oct 20, 2019
  19. Oct 17, 2019
  20. Oct 16, 2019
    • Radosław Piliszek's avatar
      Implement IPv6 support in the control plane · bc053c09
      Radosław Piliszek authored
      Introduce kolla_address filter.
      Introduce put_address_in_context filter.
      
      Add AF config to vars.
      
      Address contexts:
      - raw (default): <ADDR>
      - memcache: inet6:[<ADDR>]
      - url: [<ADDR>]
      
      Other changes:
      
      globals.yml - mention just IP in comment
      
      prechecks/port_checks (api_intf) - kolla_address handles validation
      
      3x interface conditional (swift configs: replication/storage)
      
      2x interface variable definition with hostname
      (haproxy listens; api intf)
      
      1x interface variable definition with hostname with bifrost exclusion
      (baremetal pre-install /etc/hosts; api intf)
      
      neutron's ml2 'overlay_ip_version' set to 6 for IPv6 on tunnel network
      
      basic multinode source CI job for IPv6
      
      prechecks for rabbitmq and qdrouterd use proper NSS database now
      
      MariaDB Galera Cluster WSREP SST mariabackup workaround
      (socat and IPv6)
      
      Ceph naming workaround in CI
      TODO: probably needs documenting
      
      RabbitMQ IPv6-only proto_dist
      
      Ceph ms switch to IPv6 mode
      
      Remove neutron-server ml2_type_vxlan/vxlan_group setting
      as it is not used (let's avoid any confusion)
      and could break setups without proper multicast routing
      if it started working (also IPv4-only)
      
      haproxy upgrade checks for slaves based on ipv6 addresses
      
      TODO:
      
      ovs-dpdk grabs ipv4 network address (w/ prefix len / submask)
      not supported, invalid by default because neutron_external has no address
      No idea whether ovs-dpdk works at all atm.
      
      ml2 for xenapi
      Xen is not supported too well.
      This would require working with XenAPI facts.
      
      rp_filter setting
      This would require meddling with ip6tables (there is no sysctl param).
      By default nothing is dropped.
      Unlikely we really need it.
      
      ironic dnsmasq is configured IPv4-only
      dnsmasq needs DHCPv6 options and testing in vivo.
      
      KNOWN ISSUES (beyond us):
      
      One cannot use IPv6 address to reference the image for docker like we
      currently do, see: https://github.com/moby/moby/issues/39033
      (docker_registry; docker API 400 - invalid reference format)
      workaround: use hostname/FQDN
      
      RabbitMQ may fail to bind to IPv6 if hostname resolves also to IPv4.
      This is due to old RabbitMQ versions available in images.
      IPv4 is preferred by default and may fail in the IPv6-only scenario.
      This should be no problem in real life as IPv6-only is indeed IPv6-only.
      Also, when new RabbitMQ (3.7.16/3.8+) makes it into images, this will
      no longer be relevant as we supply all the necessary config.
      See: https://github.com/rabbitmq/rabbitmq-server/pull/1982
      
      For reliable runs, at least Ansible 2.8 is required (2.8.5 confirmed
      to work well). Older Ansible versions are known to miss IPv6 addresses
      in interface facts. This may affect redeploys, reconfigures and
      upgrades which run after VIP address is assigned.
      See: https://github.com/ansible/ansible/issues/63227
      
      Bifrost Train does not support IPv6 deployments.
      See: https://storyboard.openstack.org/#!/story/2006689
      
      
      
      Change-Id: Ia34e6916ea4f99e9522cd2ddde03a0a4776f7e2c
      Implements: blueprint ipv6-control-plane
      Signed-off-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      bc053c09
  21. Oct 14, 2019
  22. Oct 08, 2019
    • Mark Goddard's avatar
      Docs: improve Nova documentation · e91186c6
      Mark Goddard authored
      Adds a top-level guide for Nova, with links off to the various virt
      driver guides.
      
      Generalises the libvirt TLS guide into a libvirt guide, and adds info on
      hardware virtualisation and qemu vs. kvm.
      
      Adds information on configuring consoles.
      
      Change-Id: I36beaaee313bdbc4bcf8cc15c41dda245a5a81ba
      e91186c6
  23. Sep 30, 2019
    • Pierre Riteau's avatar
      Update mention of Kayobe in documentation · 46a5d871
      Pierre Riteau authored
      Change-Id: I95116bd2f33dfc2db9f8f913b6995113a8cb2dbf
      46a5d871
    • Joseph M's avatar
      [designate] Add coordination backend for designate workers · 9cae6083
      Joseph M authored
      Add coordination backend configuration to designate.conf which is
      required in multinode environments. Fixes warning from designate:
      
      WARNING designate.coordination [-] No coordination backend configured,
      assuming we are the only worker. Please configure a coordination backend
      
      Change-Id: I23c4d2de7e3f9368795c423000a4f9a6c3a431e2
      Closes-Bug: #1843842
      Related-Bug: #1840070
      9cae6083
  24. Sep 26, 2019
  25. Sep 24, 2019
  26. Sep 19, 2019
    • Kris Lindgren's avatar
      Add support for libvirt+tls · f8cfccb9
      Kris Lindgren authored
      To securely support live migration between computenodes we should enable
      tls, with cert auth, instead of TCP with no auth support.
      
      Implements: blueprint libvirt-tls
      
      Change-Id: I22ea6233933c840b853fdcc8e03400b2bf577271
      f8cfccb9
  27. Sep 18, 2019
  28. Sep 17, 2019
  29. Sep 16, 2019
    • Mark Goddard's avatar
      Add custom filters for checking services · af2e7fd7
      Mark Goddard authored
      These filters can be used to capture a lot of the logic that we
      currently have in 'when' statements, about which services are enabled
      for a particular host.
      
      In order to use these filters, it is necessary to install the
      kolla_ansible python module, and not just the dependencies listed in
      requirements.txt. The CI test and quickstart install from source
      documentation has been updated accordingly.
      
      Ansible is not currently in OpenStack global requirements, so for unit
      tests we avoid a direct dependency on Ansible and provide fakes where
      necessary.
      
      Change-Id: Ib91cac3c28e2b5a834c9746b1d2236a309529556
      af2e7fd7
  30. Sep 12, 2019
    • Scott Solkhon's avatar
      Enable Swift Recon · d463d3f7
      Scott Solkhon authored
      
      This commit adds the necessary configuration to the Swift account,
      container and object configuration files to enable the Swift recon
      cli.
      
      In order to give the object server on each Swift host access to the
      recon files, a Docker volume is mounted into each container which
      generates them. The volume is then mounted read only into the object
      server container. Note that multiple containers append to the same
      file. This should not be a problem since Swift uses a lock when
      appending.
      
      Change-Id: I343d8f45a78ebc3c11ed0c68fe8bec24f9ea7929
      Co-authored-by: default avatarDoug Szumski <doug@stackhpc.com>
      d463d3f7
  31. Sep 11, 2019
  32. Sep 10, 2019
    • Hongbin Lu's avatar
      Configure Zun for Placement (Train+) · 0f5e0658
      Hongbin Lu authored
      After the integration with placement [1], we need to configure how
      zun-compute is going to work with nova-compute.
      
      * If zun-compute and nova-compute run on the same compute node,
        we need to set 'host_shared_with_nova' as true so that Zun
        will use the resource provider (compute node) created by nova.
        In this mode, containers and VMs could claim allocations against
        the same resource provider.
      * If zun-compute runs on a node without nova-compute, no extra
        configuration is needed. By default, each zun-compute will create
        a resource provider in placement to represent the compute node
        it manages.
      
      [1] https://blueprints.launchpad.net/zun/+spec/use-placement-resource-management
      
      Change-Id: I2d85911c4504e541d2994ce3d48e2fbb1090b813
      0f5e0658
  33. Sep 05, 2019
  34. Aug 23, 2019
  35. Aug 22, 2019
    • Krzysztof Klimonda's avatar
      Implement TLS encryption for internal endpoints · b0ecd8b6
      Krzysztof Klimonda authored
      This review is the first one in a series of patches and it introduces an
      optional encryption for internal openstack endpoints, implementing part
      of the add-ssl-internal-network spec.
      
      Change-Id: I6589751626486279bf24725f22e71da8cd7f0a43
      b0ecd8b6
Loading