- May 28, 2022
-
-
Radosław Piliszek authored
Following up on [1]. The 3 variables are only introducing noise after we removed the reliance on Keystone's admin port. [1] I5099b08953789b280c915a6b7a22bdd4e3404076 Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
-
- May 26, 2022
-
-
Radosław Piliszek authored
Docs and reno included. Change-Id: I5099b08953789b280c915a6b7a22bdd4e3404076
-
- May 24, 2022
-
-
k-s-dean authored
Closes-Bug: #1975598 Change-Id: If4c85f8e960141d08a89accdc11a3271f31974c1
-
- May 21, 2022
-
-
Mark Goddard authored
Since enabling libvirt SASL authentication, the masakari instance monitor fails to connect to libvirt. We see the following error in logs: libvirt.libvirtError: authentication failed: Failed to start SASL negotiation: -4 (SASL(-4): no mechanism available: No worthy mechs found) This change adds support for SASL authentication in Masakari instance monitor. Depends-On: https://review.opendev.org/c/openstack/kolla/+/834456 Closes-Bug: #1965754 Change-Id: I974046662b383a12ac6281b725523760a96657bd
-
- May 17, 2022
-
-
Ramona Rautenberg authored
In the last PTG it was decided to drop the keystone_token_provider variable, because there is no other option anymore. Signed-off-by:
Ramona Rautenberg <rautenberg@osism.tech> Change-Id: I1ee2c3f9b7dbbbf4633c5874cdbb3c4f8c09e277
-
- May 13, 2022
-
-
Tim Beermann authored
"Smoke tests" for barbican, cinder, glance and keystone have been removed as discussed in PTG April 2022. Signed-off-by:
Tim Beermann <beermann@osism.tech> Change-Id: I613287a31e0ea6aede070e7e9c519ab2f5f182bd
-
Simon Dodsley authored
Add an enable_cinder_backend_pure_iscsi and enable_cinder_backend_pure_fc options to etc/kolla/globals.yml to enable use of the FlashArray backend. Update the documentation to include a section on configuring Cinder with the FlashArray. Implements: blueprint pure-cinder-driver Change-Id: I464733f1322237321ed1ffff8636cf30bd1cbb38
-
- May 12, 2022
-
-
Mathias Fechner authored
The inactivity probe interval of the OpenFlow connection to the OpenvSwitch integration bridge, in seconds. If the value is zero, it disables the connection keepalive fea‐ ture. If the value is nonzero, then it will be forced to a value of at least 5s. The value is set to 60 seconds by default as described in "OVN issues in the field". https://www.openvswitch.org/support/ovscon2019/day1/1436-OVSCON-Nouman.pdf https://www.ovn.org/support/dist-docs/ovn-controller.8.html Change-Id: I7066c3a8b33b482774f310c45142ac2936a5c405
-
k-s-dean authored
Closes-Bug: #1972818 Change-Id: I9e36b9169b6725bf6db953e464fc099087747778
-
- Apr 24, 2022
-
-
Christian Berendt authored
With the parameter bifrost_deploy_verbosity it is possible to set the verbosity of the bootstrap of Bifrost. This makes it possible to reduce verbosity when running /bifrost/playbooks/install.yaml if needed. Change-Id: I5815220f2193a492ae7e1f63443075790ae7aaef
-
- Apr 21, 2022
-
-
Christian Berendt authored
Change-Id: Ide82b7a7fa6752b60f2c9c31cdc4c79183fc62f6
-
- Apr 15, 2022
-
-
Will Szumski authored
This uses the same approach as the mariadb role (and others). Closes-Bug: #1928193 Co-Authored-By:
John Garbutt <johng@stackhpc.com> Change-Id: I79a7a8c80327cfd9ef31d17fe71f450a181a638c
-
- Apr 13, 2022
-
-
Juan Pablo Suazo authored
Adds the ability to configure the Prometheus Pushgateway options alongside the rest of kolla-ansible's configurations. Closes-Bug: #1968597 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: I2d20288267ceda95076229628db10299ddbde31f
-
Maksim Malchuk authored
Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the configuration of the corresponding 'dhcp-range' and 'dhcp-option' blocks in Ironic Inspector dnsmasq for multiple ranges. The old parameters 'ironic_dnsmasq_dhcp_range' and 'ironic_dnsmasq_default_gateway' used for the only range are now removed. This change implements the same solution used in the TripleO several years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649 fix for lease time. The value can be changed globally or per range. Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
Christian Berendt authored
Currently the ovs-dpdkctl.sh file is present in the tools directory and the "Copying ovs-dpdkctl tool" task accesses it. This is bad practice. Files copied from a role should either be referenced by an absolute path or be part of the role itself. This change moves the ovs-dpdkctl.sh file in the files directory of the role. Change-Id: I01459d39207e54f270f32f37b4a5153c5a819347
-
- Apr 07, 2022
-
-
OpenStack Release Bot authored
Add file to the reno documentation build to show release notes for stable/yoga. Use pbr instruction to increment the minor version number automatically so that master versions are higher than the versions on stable/yoga. Sem-Ver: feature Change-Id: I436d3d884c8e7ff64d9c328036b7f55f76585656
-
- Apr 06, 2022
-
-
Radosław Piliszek authored
Change-Id: Icc13e3607c6d1dfa4e12d1ceaf9ea5546a22a12b
-
Radosław Piliszek authored
Change-Id: I2ae1a402e723cd1063618d1b9fb18f6adb27a390
-
Radosław Piliszek authored
Change-Id: I8e4096d7136d0ce9e54f1af0bb9ba110487fb35b
-
Radosław Piliszek authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/832163 Change-Id: Ia2dba1854e925041ae23c731273b810bb2d5ec30
-
- Mar 30, 2022
-
-
Mark Goddard authored
Change-Id: I04d2e83967392f403b1068e0c151b94b685c52e8
-
Michal Nasiadka authored
This key can be used by users in networking-generic-switch scenario instead of adding cleartext password in ml2_conf.ini. Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
-
- Mar 29, 2022
-
-
Mark Goddard authored
If any nova compute service fails to register itself, Kolla Ansible will fail the host that queries the Nova API. This is the first compute host in the inventory, and fails in the task: Waiting for nova-compute services to register themselves Other hosts continue, often leading to further errors later on. Clearly this is not idea. This change modifies the behaviour to query the compute service list until all expected hosts are present, but does not fail the querying host if they are not. A new task is added that executes for all hosts, and fails only those hosts that have not registered successfully. Alternatively, to fail all hosts in a cell when any compute service fails to register, set nova_compute_registration_fatal to true. Change-Id: I12c1928cf1f1fb9e28f1741e7fe4968004ea1816 Closes-Bug: #1940119
-
- Mar 28, 2022
-
-
wangxiyuan authored
openEuler is the newest open source operating system, which is quite famous and widely used in China. This patch aims to add the OS support in kolla-ansible for the host OS. bp: support-openeuler-os Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830320 Change-Id: I66dc84f02c324dbc0787ec25d4bd92ada9362e94
-
- Mar 25, 2022
-
-
Juan Pablo Suazo authored
Adds a new configuration file that provides fluentd with an appropiate regex to match with OpenvSwitch logs in both default files. The regex is segmented with variable as to isolate the relevant parts of each log message. Closes-Bug: #1965815 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: Ife83c50c048d517a5c8a5dee588f8f7846fcee00
-
- Mar 24, 2022
-
-
Sven Kieske authored
this adds back the ability to configure the rabbitmq/erlang kernel network interface which was removed in https://review.opendev.org/#/c/584427/ seemingly by accident. Closes-Bug: 1900160 Change-Id: I6f00396495853e117429c17fadfafe809e322a31
-
Mark Goddard authored
The contextfilter decorator was deprecated in jinja2 3.0.0, and has been dropped in 3.1.0. This results in the following warning, and failed attempts to use filters: [WARNING]: Skipping plugin (filters.py) as it seems to be invalid: module 'jinja2' has no attribute 'contextfilter' This change switches to use the pass_context decorator. The minimum version of Jinja2 is raised to 3 to ensure pass_context is present. Change-Id: I649dd6211d3ae72b9539bc44652ef8cf5d579777
-
Michał Nasiadka authored
Designate sink is an optional service that consumes notifications, users should have an option to disable it when they don't use them. Change-Id: I1d5465d9845aea94cff39ff5158cd8b1dccc4834
-
- Mar 22, 2022
-
-
Will Szumski authored
Change-Id: Ie87a7488dad369464793b47c3d2db67d7dc1694e
-
- Mar 21, 2022
-
-
Radosław Piliszek authored
Like other containers. This ensures that upgrade already updates PXE components and no additional deploy/reconfigure is needed. Closes-Bug: #1963752 Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
-
Juan Pablo Suazo authored
This commit adds support for pushing Ceilometer metrics to Prometheus instead of Gnocchi or alongside it. Closes-Bug: #1964135 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: I9fd32f63913a534c59e2d17703702074eea5dd76
-
Mark Goddard authored
Change Ia1239069ccee39416b20959cbabad962c56693cf added support for running a libvirt daemon on the host, rather than using the nova_libvirt container. It did not cover migration of existing hosts from using a container to using a host daemon. This change adds a kolla-ansible nova-libvirt-cleanup command which may be used to clean up the nova_libvirt container, volumes and related items on hosts, once it has been disabled. The playbook assumes that compute hosts have been emptied of VMs before it runs. A future extension could support migration of existing VMs, but this is currently out of scope. Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
-
Mark Goddard authored
In some cases it may be desirable to run the libvirt daemon on the host. For example, when mixing host and container OS distributions or versions. This change makes it possible to disable the nova_libvirt container, by setting enable_nova_libvirt_container to false. The default values of some Docker mounts and other paths have been updated to point to default host directories rather than Docker volumes when using a host libvirt daemon. This change does not handle migration of existing systems from using a nova_libvirt container to libvirt on the host. Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504 Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
-
- Mar 18, 2022
-
-
Imran Hussain authored
Consistently use template instead of copy. This has the added advantage of allowing variables inside ceph conf files and keyrings. Closes-Bug: 1959565 Signed-off-by:
Imran Hussain <ih@imranh.co.uk> Change-Id: Ibd0ff2641a54267ff06d3c89a26915a455dff1c1
-
- Mar 17, 2022
-
-
jinyuanliu authored
This project [1] can provide a one-stop solution to log collection, cleaning, indexing, analysis, alarm, visualization, report generation and other needs, which involves helping operator or maintainer to quickly solve retrieve problems, grasp the operational health of the platform, and improve the level of platform management. [1] https://wiki.openstack.org/wiki/Venus Change-Id: If3562bbed6181002b76831bab54f863041c5a885
-
- Mar 10, 2022
-
-
Mark Goddard authored
In Kolla Ansible OpenStack deployments, by default, libvirt is configured to allow read-write access via an unauthenticated, unencrypted TCP connection, using the internal API network. This is to facilitate migration between hosts. By default, Kolla Ansible does not use encryption for services on the internal network (and did not support it until Ussuri). However, most other services on the internal network are at least authenticated (usually via passwords), ensuring that they cannot be used by anyone with access to the network, unless they have credentials. The main issue here is the lack of authentication. Any client with access to the internal network is able to connect to the libvirt TCP port and make arbitrary changes to the hypervisor. This could include starting a VM, modifying an existing VM, etc. Given the flexibility of the domain options, it could be seen as equivalent to having root access to the hypervisor. Kolla Ansible supports libvirt TLS [1] since the Train release, using client and server certificates for mutual authentication and encryption. However, this feature is not enabled by default, and requires certificates to be generated for each compute host. This change adds support for libvirt SASL authentication, and enables it by default. This provides base level of security. Deployments requiring further security should use libvirt TLS. [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021 Closes-Bug: #1964013 Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
-
- Mar 08, 2022
-
-
Nathan Taylor authored
Add "enable_prometheus_etcd_integration" configuration parameter which can be used to configure Prometheus to scrape etcd metrics endpoints. The default value of "enable_prometheus_etcd_integration" is set to the combined values of "enable_prometheus" and "enable_etcd". Change-Id: I7a0b802c5687e2d508e06baf55e355d9761e806f
-
- Mar 07, 2022
-
-
Mark Goddard authored
While I8bb398e299aa68147004723a18d3a1ec459011e5 stopped setting the net.ipv4.ip_forward sysctl, this change explicitly removes the option from the Kolla sysctl config file. In the absence of another source for this sysctl, it should revert to the default of 0 after the next reboot. A deployer looking to more aggressively change the value may set neutron_l3_agent_host_ipv4_ip_forward to 0. Any deployments still relying on the previous value may set neutron_l3_agent_host_ipv4_ip_forward to 1. Related-Bug: #1945453 Change-Id: I9b39307ad8d6c51e215fe3d3bc56aab998d218ec
-
- Mar 04, 2022
-
-
Radosław Piliszek authored
Set kernel_append_params instead. Change-Id: I4fb42d376636dc363cd86950ed37de4a3d28df73
-
- Mar 03, 2022
-
-
Michal Nasiadka authored
Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/831642 Change-Id: I70dcd2d0cade52a23b3e219b7e0aaa31193ec938
-