- Mar 18, 2022
-
-
Mark Goddard authored
Follow up to I91d0e23b22319cf3fdb7603f5401d24e3b76a56e, which fixes a conditional corner case when removing the ha-all policy. Change-Id: Iea75551bc6d0da7dd10515dd8bd28c014eed7a5e
-
- Feb 21, 2022
-
-
Doug Szumski authored
When OpenStack is deployed with Kolla-Ansible, by default there are no durable queues or exchanges created by the OpenStack services in RabbitMQ. In Rabbit terminology, not being durable is referred to as `transient`, and this means that the queue is generally held in memory. Whether OpenStack services create durable or transient queues is traditionally controlled by the Oslo Notification config option: `amqp_durable_queues`. In Kolla-Ansible, this remains set to the default of `False` in all services. The only `durable` objects are the `amq*` exchanges which are internal to RabbitMQ. More recently, Oslo Notification has introduced support for Quorum queues [7]. These are a successor to durable classic queues, however it isn't yet clear if they are a good fit for OpenStack in general [8]. For clustered RabbitMQ deployments, Kolla-Ansible configures all queues as `replicated` [1]. Replication occurs over all nodes in the cluster. RabbitMQ refers to this as 'mirroring of classic queues'. In summary, this means that a multi-node Kolla-Ansible deployment will end up with a large number of transient, mirrored queues and exchanges. However, the RabbitMQ documentation warns against this, stating that 'For replicated queues, the only reasonable option is to use durable queues: [2]`. This is discussed further in the following bug report: [3]. Whilst we could try enabling the `amqp_durable_queues` option for each service (this is suggested in [4]), there are a number of complexities with this approach, not limited to: 1) RabbitMQ is planning to remove classic queue mirroring in favor of 'Quorum queues' in a forthcoming release [5]. 2) Durable queues will be written to disk, which may cause performance problems at scale. Note that this includes Quorum queues which are always durable. 3) Potential for race conditions and other complexity discussed recently on the mailing list under: `[ops] [kolla] RabbitMQ High Availability` The remaining option, proposed here, is to use classic non-mirrored queues everywhere, and rely on services to recover if the node hosting a queue or exchange they are using fails. There is some discussion of this approach in [6]. The downside of potential message loss needs to be weighed against the real upsides of increasing the performance of RabbitMQ, and moving to a configuration which is officially supported and hopefully more stable. In the future, we can then consider promoting specific queues to quorum queues, in cases where message loss can result in failure states which are hard to recover from. [1] https://www.rabbitmq.com/ha.html [2] https://www.rabbitmq.com/queues.html [3] https://github.com/rabbitmq/rabbitmq-server/issues/2045 [4] https://wiki.openstack.org/wiki/Large_Scale_Configuration_Rabbit [5] https://blog.rabbitmq.com/posts/2021/08/4.0-deprecation-announcements/ [6] https://fuel-ccp.readthedocs.io/en/latest/design/ref_arch_1000_nodes.html#replication [7] https://bugs.launchpad.net/oslo.messaging/+bug/1942933 [8] https://www.rabbitmq.com/quorum-queues.html#use-cases Partial-Bug: #1954925 Change-Id: I91d0e23b22319cf3fdb7603f5401d24e3b76a56e
-
- Feb 18, 2022
-
-
Pierre Riteau authored
Without this configuration, all mount points are reporting the same utilisation metrics [1]. With the rslave option, all root mounts from the host are visible in the container, so we can remove the bind mounts for /proc and /sys. [1] https://github.com/prometheus/node_exporter#docker Change-Id: I4087dc81f9d1fa5daa24b9df6daf1f9e1ccd702f Closes-Bug: #1961438
-
alecorps authored
An FCD, also known as an Improved Virtual Disk (IVD) or Managed Virtual Disk, is a named virtual disk independent of a virtual machine. Using FCDs for Cinder volumes eliminates the need for shadow virtual machines. This patch adds Kolla support. Change-Id: Ic0b66269e6d32762e786c95cf6da78cb201d2765
-
Pierre Riteau authored
The following variables are added: * prometheus_blackbox_exporter_cmdline_extras * prometheus_elasticsearch_exporter_cmdline_extras * prometheus_haproxy_exporter_cmdline_extras * prometheus_memcached_exporter_cmdline_extras * prometheus_mysqld_exporter_cmdline_extras * prometheus_node_exporter_cmdline_extras * prometheus_openstack_exporter_cmdline_extras Change-Id: I5da2031b9367115384045775c515628e2acb1aa4
-
- Feb 17, 2022
-
-
Alban Lecorps authored
NSXP is the OpenStack support for the NSX Policy platform. This is supported from neutron in the Stein version. This patch adds Kolla support This adds a new neutron_plugin_agent type 'vmware_nsxp'. The plugin does not run any neutron agents. Change-Id: I9e9d8f07e586bdc143d293e572031368af7f3fca
-
- Feb 15, 2022
-
-
Michal Nasiadka authored
Change-Id: I27b0e42fba93a35c6d878d108bf1e7fdebc9e3db
-
- Feb 11, 2022
-
-
Isaac Prior authored
Change-Id: I5b3ab3ab8153cda283dec772bf1393af0caf4137 Closes-Bug: 1919179
-
Michal Nasiadka authored
Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I75ca59d981bcd2dd51faa296ab0b4223a891f5cb
-
- Feb 10, 2022
-
-
Pierre Riteau authored
Change-Id: I3362bd283eb7fb80f5da70f2a388f89f220617ea Closes-Bug: #1960503
-
- Feb 09, 2022
-
-
Imran Hussain authored
Allow operators to set haproxy socket to admin level. This is done via the flag haproxy_socket_level_admin which is set to "no" by default. Closes-Bug: 1960215 Signed-off-by:
Imran Hussain <ih@imranh.co.uk> Change-Id: Ia0da89288d68f5803ace1934c013053f12343195
-
- Feb 08, 2022
-
-
Mark Goddard authored
The change happened in Train, time to move on. Change-Id: Ie58265284b2e6b4b30b24fc2f22dd4f5eec05d5b
-
Maksim Malchuk authored
The apparmor_parser actually doesn't remove the file or doesn't create the symlink in '/etc/apparmor.d/disable' itself so the next run of the baremetal role will fail with the error "Unable to remove "libvirtd". Even more after reboot, the profile is still active. We need to disable the profile completly ourselves. This change fixes the idempotents of the baremetal role. Closes-Bug: #1960302 Change-Id: I162e417387393e806886b1c9ea8053b89778b4d1 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
Pierre Riteau authored
The default configuration was changed to use the advanced cache pool in keystonemiddleware 9.3.0 (Xena release) [1]. This reverts commit 5a52d8e4 (except the release note). [1] https://review.opendev.org/c/openstack/keystonemiddleware/+/773939 Change-Id: I290d0a81c57c189b6eb62fc3eee3ed19f441671b
-
- Feb 03, 2022
-
-
Mark Goddard authored
Adds support to the 'kolla-ansible certificates' command for generating certificates for libvirt TLS, when libvirt_tls is true. The same certificate and key are used for the libvirt client and server. The certificates use the same root CA as the other generated certificates, and are written to {{ node_custom_config }}/nova/nova-libvirt/, ready to be picked up by nova-libvirt and nova-compute. Change-Id: I1bde9fa018f66037aec82dc74c61ad1f477a7c12
-
- Feb 02, 2022
-
-
Buddhika Sanjeewa authored
Enables zun to access cinder volumes when cinder is configured to use external ceph. Copies ceph config file and ceph cinder keyring to /etc/ceph in zun_compute container. Closes-Bug: 1848934 Change-Id: Ie56868d5e9ed37a9274b8cbe65895f3634b895c8
-
Will Szumski authored
This gets rid of one of the steps in the authentication flow. Closes-Bug: 1930055 Change-Id: I4ed4651b55a912f1d9aec7277bae6bb4776f1e0a
-
- Feb 01, 2022
-
-
Radosław Piliszek authored
This is required to use, e.g., Cinder iSCSI backend with Glance. Closes-Bug: #1959663 Change-Id: I6d5e0e4ab70922a772f3c82e914f9e7d37cf0318
-
- Jan 31, 2022
-
-
Michal Nasiadka authored
Custom themes support for horizon deployment. - horizon role task added for copying theme files - added theme copying into the container in templates - docs and reno updated Change-Id: If9982c8e18be31772cb031ef72b7eebd4d768be5 Co-Authored-By:
Jakub Darmach <jakub@stackhpc.com> Depends-On: https://review.opendev.org/c/openstack/kayobe/+/824565 Depends-On: https://review.opendev.org/c/openstack/kolla/+/826672
-
- Jan 25, 2022
-
-
Kevin Rasmussen authored
This fixes a bug in registering identity providers The bug was caused by a missing `=` in the openstack command Add the missing `=` after `--os-user-domain-name` Closes-Bug: #1959022 Change-Id: I73f80cd2c81a3944de0933e60f5768956a1a3b70
-
Isaac Prior authored
Overrides default fluentd buffer config to stop log files from using datestamped filenames, allowing logrotate to manage them. Closes-Bug: #1940118 Change-Id: I40c4e209470d21e0a02fd447fb628acfdae9fa9d
-
likui authored
The value of node_custom_config should is {{ node_config }}/config, when specified using --configdir Change-Id: I076b7d2c8980ddd3baa28f998f84a6b7005dc352
-
- Jan 21, 2022
-
-
Dr. Jens Harbott authored
There are multiple Neutron extensions that can be used for DNS integration. The "dns" extension has only minimum functionality, for most deployments either "dns_domain_ports" or "subnet_dns_publish_fixed_ip" would be used, with the latter being a superset of the two others [0]. [0] https://docs.openstack.org/neutron/xena/admin/config-dns-int-ext-serv.html#use-case-3-ports-are-published-directly-in-the-external-dns-service Signed-off-by:
Dr. Jens Harbott <harbott@osism.tech> Change-Id: I1056bddfd49265ffe21b4d000898d72bba3ebfad
-
- Jan 20, 2022
-
-
Michal Nasiadka authored
Change-Id: I8bf5453c6943fd2ad8912e5d80af179296ada894
-
- Jan 19, 2022
-
-
likui authored
This change enables the use of Docker healthchecks for ironic-neutron-agent services. Change-Id: I80f8319b2cf2e4ae09904a08532cde5ec0385fa3 Implements: blueprint container-health-check
-
- Jan 18, 2022
-
-
Pierre Riteau authored
There is no explanation for why this option was bumped to 1 MB instead of the upstream default. This has been the case since the original barbican role commit in 2016. Restore upstream default in Yoga. Change-Id: Ib0245f44d2b049f7e2254d8d2ea4b2080a8d62dd
-
Radosław Piliszek authored
In the Yoga cycle we no longer need kolla chrony container removal procedures. Change-Id: I4dc246cf0fd68838470bf9e9bf749fa9be4d6670
-
Pierre Riteau authored
Barbican has recently bumped max_allowed_secret_in_bytes from 10 KB to 20 KB since the original value was too small for some certificates [1]. Remove custom value from the barbican.conf template, which anyway was the same as the default configuration before the recent upstream change. The upstream change was backported to Wallaby and has been proposed to Victoria, Ussuri and Train [2], so this change should be backported too. [1] https://review.opendev.org/c/openstack/barbican/+/783381 [2] https://review.opendev.org/q/I59d11c5c9c32128ab9d71eaecdf46dd2d789a8d1 Change-Id: I83e4cb48192c8024650a8d347363f6babb75ad90 Closes-Bug: #1957795
-
- Jan 17, 2022
-
-
Pierre Riteau authored
They seem to think ping is too dangerous for normal users. Co-Authored-By:
Pierre Riteau <pierre@stackhpc.com> Signed-off-by:
Dr. Jens Harbott <harbott@osism.tech> Depends-On: https://review.opendev.org/c/openstack/kolla-ansible/+/824903 Change-Id: I30c2a7b6850350901b15fe196175508634c8e9a5
-
- Jan 12, 2022
-
-
Buddhika Sanjeewa authored
Access to console of any zun container fails when kolla_enable_tls_external is true. This is due to the protocol of the base_url of the websocket_proxy section in zun.conf is hardcoded to 'ws'. [base_url = ws://<external_fqdn>:<port>] This fix adds a new variable zun_wsproxy_protocol and sets it's value to 'wss' when kolla_enable_tls_external is true or to 'ws' otherwise Then the base url's protocol of the websocket_proxy section in zun.conf is set by zun_wsproxy_protocol [base_url = "{{ zun_wsproxy_protocol }}://<external_fqdn>:<port>"] Closes-Bug: 1957117 Change-Id: Ibd9ca6e40ee8c265775b0657d318aa3f82e4cccb
-
Michal Nasiadka authored
Change-Id: I547ab4b05aa14ed3bbee8be2dc77a6840d4816f6
-
- Jan 11, 2022
-
-
Mark Goddard authored
Move new variables added in I4d694d6224c813285d228d6bc7eece5731db1078 to role defaults. Change-Id: Ie09a2dbae2701cb18fd1eb5bfab76e82f9920fb3
-
- Jan 10, 2022
-
-
Radosław Piliszek authored
This is required as nova_compute tries to reach my_ip of the other node when resizing an instance and my_ip is set to api_interface_address. This potential issue was introduced with [1]. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/569131 Closes-Bug: #1956976 Change-Id: Id57a672c69a2d5aa74e55f252d05bb756bbc945a
-
lixuehai authored
Closes-Bug: #1954723 Change-Id: I6ffc8caae1aef757d37c629fbc05bb129f80147b
-
- Jan 09, 2022
-
-
Stig Telfer authored
Some ID provider configurations do not require a certificate file. Change the logic to allow this, and update documentation accordingly. Change-Id: I2c34a6b5894402bbebeb3fb96768789bc3c7fe84
-
LinPeiWen authored
rabbitmq starting from 3.8.0, built-in Prometheus support, prometheus plugins are enabled by default, when the environment is "enable_prometheus is no", rabbitmq role will disable prometheus plugins Closes-Bug: #1885106 Change-Id: I4d694d6224c813285d228d6bc7eece5731db1078
-
- Jan 07, 2022
-
-
Radosław Piliszek authored
Also bumps the minimum to 4. Change-Id: Ia373f9cc3bb69eba0288bbb3e497e8cadb7cc4d3
-
- Jan 06, 2022
-
-
Martin authored
Moved the DockerWorker class from module file into its separate file in module_utils directory for future extension. Unit tests changed accordingly. Signed-off-by:
Ivan Halomi <ivan.halomi@tietoevry.com> Co-authored-by:
Martin Hiner <martin.hiner@tietoevry.com> Change-Id: Ia2a471a9a2805e13b2c20dbf8a7297c23231aae3
-
- Jan 05, 2022
-
-
Michal Nasiadka authored
We are not using it anywhere (metadata agents are using internal network), so let's disable it by default. Change-Id: If06db5030b0f09e20ef506c3b3ab39c3573b5f3d
-
Angelos Kolaitis authored
Kolla has removed the Volume V2 API by default since OpenStack Wallaby. However, openstack-exporter attempts to use the Volume V2 API by default, resulting in clean installs failing to fetch Cinder metrics in Prometheus. This patch updates the clouds.yml configuration file for openstack-exporter to use the Volume V3 API instead. Closes-Bug: #1938194 Change-Id: Ifbb601be3ef1a1e853d5a7e832adf556c0ae38b9
-