Skip to content
Snippets Groups Projects
  1. May 28, 2022
    • Radosław Piliszek's avatar
      Do not use keystone_admin_url et al · 7ca9349b
      Radosław Piliszek authored
      Following up on [1].
      The 3 variables are only introducing noise after we removed
      the reliance on Keystone's admin port.
      
      [1] I5099b08953789b280c915a6b7a22bdd4e3404076
      
      Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
      7ca9349b
  2. May 26, 2022
  3. May 24, 2022
  4. May 21, 2022
    • Mark Goddard's avatar
      masakari: support libvirt SASL in instance monitor · 5d28a7c8
      Mark Goddard authored
      Since enabling libvirt SASL authentication, the masakari instance
      monitor fails to connect to libvirt. We see the following error in logs:
      
          libvirt.libvirtError: authentication failed: Failed to start SASL
          negotiation: -4 (SASL(-4): no mechanism available: No worthy mechs
          found)
      
      This change adds support for SASL authentication in Masakari instance
      monitor.
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/834456
      Closes-Bug: #1965754
      Change-Id: I974046662b383a12ac6281b725523760a96657bd
      5d28a7c8
  5. May 17, 2022
  6. May 13, 2022
    • Tim Beermann's avatar
      Remove sanity checks · 591f366e
      Tim Beermann authored
      
      "Smoke tests" for barbican, cinder, glance and keystone have been removed as discussed in PTG April 2022.
      
      Signed-off-by: default avatarTim Beermann <beermann@osism.tech>
      Change-Id: I613287a31e0ea6aede070e7e9c519ab2f5f182bd
      591f366e
    • Simon Dodsley's avatar
      Add support for Pure Storage FlashArray backend to Cinder · f088b799
      Simon Dodsley authored
      Add an enable_cinder_backend_pure_iscsi and
      enable_cinder_backend_pure_fc options to etc/kolla/globals.yml
      to enable use of the FlashArray backend.
      Update the documentation to include a section on configuring
      Cinder with the FlashArray.
      
      Implements: blueprint pure-cinder-driver
      Change-Id: I464733f1322237321ed1ffff8636cf30bd1cbb38
      f088b799
  7. May 12, 2022
  8. Apr 24, 2022
    • Christian Berendt's avatar
      [bifrost] add bifrost_deploy_verbosity parameter · ea5b4d7e
      Christian Berendt authored
      With the parameter bifrost_deploy_verbosity it is possible
      to set the verbosity of the bootstrap of Bifrost.
      
      This makes it possible to reduce verbosity when running
      /bifrost/playbooks/install.yaml if needed.
      
      Change-Id: I5815220f2193a492ae7e1f63443075790ae7aaef
      ea5b4d7e
  9. Apr 21, 2022
  10. Apr 15, 2022
  11. Apr 13, 2022
    • Juan Pablo Suazo's avatar
      Configure Prometheus Pushgateway Options · e7fc3bc4
      Juan Pablo Suazo authored
      
      Adds the ability to configure the Prometheus Pushgateway options
      alongside the rest of kolla-ansible's configurations.
      
      Closes-Bug: #1968597
      Signed-off-by: default avatarJuan Pablo Suazo <jsuazo@whitestack.com>
      Change-Id: I2d20288267ceda95076229628db10299ddbde31f
      e7fc3bc4
    • Maksim Malchuk's avatar
      Multiple DHCP ranges for Ironic Inspector · 762aecbf
      Maksim Malchuk authored
      
      Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the
      configuration of the corresponding 'dhcp-range' and 'dhcp-option'
      blocks in Ironic Inspector dnsmasq for multiple ranges.
      
      The old parameters 'ironic_dnsmasq_dhcp_range' and
      'ironic_dnsmasq_default_gateway' used for the only range are now
      removed.
      
      This change implements the same solution used in the TripleO several
      years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d
      
      Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649
      fix for lease time.
      The value can be changed globally or per range.
      
      Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      Co-Authored-By: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      762aecbf
    • Christian Berendt's avatar
      ovs-dpdk: add ovs-dpdkctl.sh to the role itself · 89659b46
      Christian Berendt authored
      Currently the ovs-dpdkctl.sh file is present in the tools
      directory and the "Copying ovs-dpdkctl tool" task accesses it.
      
      This is bad practice. Files copied from a role should either be
      referenced by an absolute path or be part of the role itself.
      
      This change moves the ovs-dpdkctl.sh file in the files
      directory of the role.
      
      Change-Id: I01459d39207e54f270f32f37b4a5153c5a819347
      89659b46
  12. Apr 07, 2022
    • OpenStack Release Bot's avatar
      Update master for stable/yoga · b14ebe01
      OpenStack Release Bot authored
      Add file to the reno documentation build to show release notes for
      stable/yoga.
      
      Use pbr instruction to increment the minor version number
      automatically so that master versions are higher than the versions on
      stable/yoga.
      
      Sem-Ver: feature
      Change-Id: I436d3d884c8e7ff64d9c328036b7f55f76585656
      b14ebe01
  13. Apr 06, 2022
  14. Mar 30, 2022
  15. Mar 29, 2022
    • Mark Goddard's avatar
      nova: improve compute service registration failure handling · f1d3ff11
      Mark Goddard authored
      If any nova compute service fails to register itself, Kolla Ansible will
      fail the host that queries the Nova API. This is the first compute host
      in the inventory, and fails in the task:
      
          Waiting for nova-compute services to register themselves
      
      Other hosts continue, often leading to further errors later on. Clearly
      this is not idea.
      
      This change modifies the behaviour to query the compute service list
      until all expected hosts are present, but does not fail the querying
      host if they are not. A new task is added that executes for all hosts,
      and fails only those hosts that have not registered successfully.
      
      Alternatively, to fail all hosts in a cell when any compute service
      fails to register, set nova_compute_registration_fatal to true.
      
      Change-Id: I12c1928cf1f1fb9e28f1741e7fe4968004ea1816
      Closes-Bug: #1940119
      f1d3ff11
  16. Mar 28, 2022
  17. Mar 25, 2022
  18. Mar 24, 2022
    • Sven Kieske's avatar
      re-add rabbitmq config for clustering interface · 15992524
      Sven Kieske authored
      this adds back the ability to configure
      the rabbitmq/erlang kernel network interface
      which was removed in https://review.opendev.org/#/c/584427/
      seemingly by accident.
      
      Closes-Bug: 1900160
      
      Change-Id: I6f00396495853e117429c17fadfafe809e322a31
      15992524
    • Mark Goddard's avatar
      Use jinja2.pass_context instead of contextfilter · fc2292b2
      Mark Goddard authored
      The contextfilter decorator was deprecated in jinja2 3.0.0, and has been
      dropped in 3.1.0. This results in the following warning, and failed
      attempts to use filters:
      
          [WARNING]: Skipping plugin (filters.py) as it seems to be invalid:
          module 'jinja2' has no attribute 'contextfilter'
      
      This change switches to use the pass_context decorator. The minimum
      version of Jinja2 is raised to 3 to ensure pass_context is present.
      
      Change-Id: I649dd6211d3ae72b9539bc44652ef8cf5d579777
      fc2292b2
    • Michał Nasiadka's avatar
      designate: Allow to disable notifications · a19e1eb4
      Michał Nasiadka authored
      Designate sink is an optional service that consumes notifications,
      users should have an option to disable it when they don't use them.
      
      Change-Id: I1d5465d9845aea94cff39ff5158cd8b1dccc4834
      a19e1eb4
  19. Mar 22, 2022
  20. Mar 21, 2022
    • Radosław Piliszek's avatar
      Ironic: rebootstrap ironic-pxe on upgrade · 1db06b32
      Radosław Piliszek authored
      Like other containers.
      
      This ensures that upgrade already updates PXE components and no
      additional deploy/reconfigure is needed.
      
      Closes-Bug: #1963752
      Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
      1db06b32
    • Juan Pablo Suazo's avatar
      Support Prometheus as metrics database for Ceilometer · 6cf03122
      Juan Pablo Suazo authored
      
      This commit adds support for pushing Ceilometer metrics
      to Prometheus instead of Gnocchi or alongside it.
      
      
      Closes-Bug: #1964135
      Signed-off-by: default avatarJuan Pablo Suazo <jsuazo@whitestack.com>
      Change-Id: I9fd32f63913a534c59e2d17703702074eea5dd76
      6cf03122
    • Mark Goddard's avatar
      libvirt: add nova-libvirt-cleanup command · 80b311be
      Mark Goddard authored
      Change Ia1239069ccee39416b20959cbabad962c56693cf added support for
      running a libvirt daemon on the host, rather than using the nova_libvirt
      container. It did not cover migration of existing hosts from using a
      container to using a host daemon.
      
      This change adds a kolla-ansible nova-libvirt-cleanup command which may
      be used to clean up the nova_libvirt container, volumes and related
      items on hosts, once it has been disabled.
      
      The playbook assumes that compute hosts have been emptied of VMs before
      it runs. A future extension could support migration of existing VMs, but
      this is currently out of scope.
      
      Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
      80b311be
    • Mark Goddard's avatar
      libvirt: make it possible to run libvirt on the host · 4e41acd8
      Mark Goddard authored
      In some cases it may be desirable to run the libvirt daemon on the host.
      For example, when mixing host and container OS distributions or
      versions.
      
      This change makes it possible to disable the nova_libvirt container, by
      setting enable_nova_libvirt_container to false. The default values of
      some Docker mounts and other paths have been updated to point to default
      host directories rather than Docker volumes when using a host libvirt
      daemon.
      
      This change does not handle migration of existing systems from using
      a nova_libvirt container to libvirt on the host.
      
      Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504
      
      Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
      4e41acd8
  21. Mar 18, 2022
  22. Mar 17, 2022
    • jinyuanliu's avatar
      ADD venus for kolla-ansible · 3ccb176f
      jinyuanliu authored
      This project [1] can provide a one-stop solution to log collection,
      cleaning, indexing, analysis, alarm, visualization, report generation
      and other needs, which involves helping operator or maintainer to
      quickly solve retrieve problems, grasp the operational health of the
      platform, and improve the level of platform management.
      
      [1] https://wiki.openstack.org/wiki/Venus
      
      Change-Id: If3562bbed6181002b76831bab54f863041c5a885
      3ccb176f
  23. Mar 10, 2022
    • Mark Goddard's avatar
      libvirt: support SASL authentication · d2d4b53d
      Mark Goddard authored
      In Kolla Ansible OpenStack deployments, by default, libvirt is
      configured to allow read-write access via an unauthenticated,
      unencrypted TCP connection, using the internal API network.  This is to
      facilitate migration between hosts.
      
      By default, Kolla Ansible does not use encryption for services on the
      internal network (and did not support it until Ussuri). However, most
      other services on the internal network are at least authenticated
      (usually via passwords), ensuring that they cannot be used by anyone
      with access to the network, unless they have credentials.
      
      The main issue here is the lack of authentication. Any client with
      access to the internal network is able to connect to the libvirt TCP
      port and make arbitrary changes to the hypervisor. This could include
      starting a VM, modifying an existing VM, etc. Given the flexibility of
      the domain options, it could be seen as equivalent to having root access
      to the hypervisor.
      
      Kolla Ansible supports libvirt TLS [1] since the Train release, using
      client and server certificates for mutual authentication and encryption.
      However, this feature is not enabled by default, and requires
      certificates to be generated for each compute host.
      
      This change adds support for libvirt SASL authentication, and enables it
      by default. This provides base level of security. Deployments requiring
      further security should use libvirt TLS.
      
      [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021
      Closes-Bug: #1964013
      Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
      d2d4b53d
  24. Mar 08, 2022
    • Nathan Taylor's avatar
      Adds etcd endpoints as a Prometheus scrape target · 0f2794a0
      Nathan Taylor authored
      Add "enable_prometheus_etcd_integration" configuration parameter which
      can be used to configure Prometheus to scrape etcd metrics endpoints.
      The default value of "enable_prometheus_etcd_integration" is set to
      the combined values of "enable_prometheus" and "enable_etcd".
      
      Change-Id: I7a0b802c5687e2d508e06baf55e355d9761e806f
      0f2794a0
  25. Mar 07, 2022
    • Mark Goddard's avatar
      Explicitly unset net.ipv4.ip_forward sysctl · caf33be5
      Mark Goddard authored
      While I8bb398e299aa68147004723a18d3a1ec459011e5 stopped setting
      the net.ipv4.ip_forward sysctl, this change explicitly removes the
      option from the Kolla sysctl config file. In the absence of another
      source for this sysctl, it should revert to the default of 0 after the
      next reboot.
      
      A deployer looking to more aggressively change the value may set
      neutron_l3_agent_host_ipv4_ip_forward to 0. Any deployments still
      relying on the previous value may set
      neutron_l3_agent_host_ipv4_ip_forward to 1.
      
      Related-Bug: #1945453
      
      Change-Id: I9b39307ad8d6c51e215fe3d3bc56aab998d218ec
      caf33be5
  26. Mar 04, 2022
  27. Mar 03, 2022
Loading