- Mar 30, 2022
-
-
Michal Nasiadka authored
This key can be used by users in networking-generic-switch scenario instead of adding cleartext password in ml2_conf.ini. Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
-
- Mar 24, 2022
-
-
Zuul authored
-
Zuul authored
-
Michał Nasiadka authored
In most real world deployments, there will be multiple backend DNS servers, allow to specify all of them for the pool configuration. Change-Id: Ic9737d0446a807891b429f080ae1bf048a3c8e4a
-
- Mar 23, 2022
-
-
Zuul authored
-
Zuul authored
-
Michal Nasiadka authored
In Xena [1] we removed Monasca Grafana service, but some components were left to support cleanup operations. [1]: https://review.opendev.org/c/openstack/kolla-ansible/+/788228 Change-Id: Iccc7bc3628bb7cbab1ac28f41c7b7dc7695894c6
-
- Mar 22, 2022
-
-
Zuul authored
-
Zuul authored
-
Daniel Meyerholt authored
The backend external tasks which utilize an existing bind9 installation require appropriate permissions to be able to copy rndc config and key. Closes-Bug: #1912063 Change-Id: Ie50228a26d635e3db82e41ec266ab820bf58938e Signed-off-by:
Daniel Meyerholt <dxm523@gmail.com>
-
- Mar 21, 2022
-
-
Radosław Piliszek authored
Like other containers. This ensures that upgrade already updates PXE components and no additional deploy/reconfigure is needed. Closes-Bug: #1963752 Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
-
Juan Pablo Suazo authored
This commit adds support for pushing Ceilometer metrics to Prometheus instead of Gnocchi or alongside it. Closes-Bug: #1964135 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: I9fd32f63913a534c59e2d17703702074eea5dd76
-
Mark Goddard authored
Change Ia1239069ccee39416b20959cbabad962c56693cf added support for running a libvirt daemon on the host, rather than using the nova_libvirt container. It did not cover migration of existing hosts from using a container to using a host daemon. This change adds a kolla-ansible nova-libvirt-cleanup command which may be used to clean up the nova_libvirt container, volumes and related items on hosts, once it has been disabled. The playbook assumes that compute hosts have been emptied of VMs before it runs. A future extension could support migration of existing VMs, but this is currently out of scope. Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
-
Mark Goddard authored
In some cases it may be desirable to run the libvirt daemon on the host. For example, when mixing host and container OS distributions or versions. This change makes it possible to disable the nova_libvirt container, by setting enable_nova_libvirt_container to false. The default values of some Docker mounts and other paths have been updated to point to default host directories rather than Docker volumes when using a host libvirt daemon. This change does not handle migration of existing systems from using a nova_libvirt container to libvirt on the host. Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504 Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
-
- Mar 19, 2022
-
-
Zuul authored
-
- Mar 18, 2022
-
-
Imran Hussain authored
Consistently use template instead of copy. This has the added advantage of allowing variables inside ceph conf files and keyrings. Closes-Bug: 1959565 Signed-off-by:
Imran Hussain <ih@imranh.co.uk> Change-Id: Ibd0ff2641a54267ff06d3c89a26915a455dff1c1
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
- Mar 17, 2022
-
-
jinyuanliu authored
This project [1] can provide a one-stop solution to log collection, cleaning, indexing, analysis, alarm, visualization, report generation and other needs, which involves helping operator or maintainer to quickly solve retrieve problems, grasp the operational health of the platform, and improve the level of platform management. [1] https://wiki.openstack.org/wiki/Venus Change-Id: If3562bbed6181002b76831bab54f863041c5a885
-
- Mar 16, 2022
-
-
Zuul authored
-
Radosław Piliszek authored
Venus is a new service for log processing. This patch adds a CI scenario which tests Venus deployment. Depends-On: https://review.opendev.org/c/openstack/kolla/+/793795 Depends-On: https://review.opendev.org/c/openstack/kolla-ansible/+/793897 Co-Authored-By:
jinyuanliu <liujinyuan@inspur.com> Change-Id: I0c7ba9e1ae23623b690a213c91ab3a12524d73f8
-
Maksim Malchuk authored
ansible-lint 6.0.0 introduced requirement to use FQCNs Change-Id: I3f27c6bcdd200252ebb089f6377294f7e3a911a0 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Mar 12, 2022
-
-
Zuul authored
-
- Mar 11, 2022
-
-
Zuul authored
-
- Mar 10, 2022
-
-
Mark Goddard authored
In Kolla Ansible OpenStack deployments, by default, libvirt is configured to allow read-write access via an unauthenticated, unencrypted TCP connection, using the internal API network. This is to facilitate migration between hosts. By default, Kolla Ansible does not use encryption for services on the internal network (and did not support it until Ussuri). However, most other services on the internal network are at least authenticated (usually via passwords), ensuring that they cannot be used by anyone with access to the network, unless they have credentials. The main issue here is the lack of authentication. Any client with access to the internal network is able to connect to the libvirt TCP port and make arbitrary changes to the hypervisor. This could include starting a VM, modifying an existing VM, etc. Given the flexibility of the domain options, it could be seen as equivalent to having root access to the hypervisor. Kolla Ansible supports libvirt TLS [1] since the Train release, using client and server certificates for mutual authentication and encryption. However, this feature is not enabled by default, and requires certificates to be generated for each compute host. This change adds support for libvirt SASL authentication, and enables it by default. This provides base level of security. Deployments requiring further security should use libvirt TLS. [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021 Closes-Bug: #1964013 Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
-
Adrian Andreias authored
Closes-Bug: #1880290 Change-Id: If9e66c505ab1672ae6b7639872a626ad5a9408ab
-
Zuul authored
-
- Mar 09, 2022
-
-
Zuul authored
-
- Mar 08, 2022
-
-
Zuul authored
-
Zuul authored
-
Nathan Taylor authored
Add "enable_prometheus_etcd_integration" configuration parameter which can be used to configure Prometheus to scrape etcd metrics endpoints. The default value of "enable_prometheus_etcd_integration" is set to the combined values of "enable_prometheus" and "enable_etcd". Change-Id: I7a0b802c5687e2d508e06baf55e355d9761e806f
-
- Mar 07, 2022
-
-
Zuul authored
-
Mark Goddard authored
While I8bb398e299aa68147004723a18d3a1ec459011e5 stopped setting the net.ipv4.ip_forward sysctl, this change explicitly removes the option from the Kolla sysctl config file. In the absence of another source for this sysctl, it should revert to the default of 0 after the next reboot. A deployer looking to more aggressively change the value may set neutron_l3_agent_host_ipv4_ip_forward to 0. Any deployments still relying on the previous value may set neutron_l3_agent_host_ipv4_ip_forward to 1. Related-Bug: #1945453 Change-Id: I9b39307ad8d6c51e215fe3d3bc56aab998d218ec
-
Radosław Piliszek authored
Since [1] we are not running keepalived directly on CI network, and are therefore safeguarded against such collisions. [1] 8e406291 Change-Id: Ie25b2d6d48f10c6b295795b3c82c1f8a213f2a8c
-
Radosław Piliszek authored
In Ironic jobs with Tenks, we saw issues with IPMI commands failing, resuling in job failures: Error setting Chassis Boot Parameter 5 A metal3.io commit [1] was found that fixes the issue by moving IPMI retries from ironic to ipmitool, which has a side-effect of increasing the timeout. This change applies the same configuration. This change has been adapted from an analogous change in kayobe-config-dev. [2] [1] https://github.com/metal3-io/ironic-image/commit/6bc1499d8bb04c2c859b970b3739c3a8ed66ae2a [2] Ib4fce74cebebe85c31049eafe2eeb6b28dfab041 Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I552417b9da03b8dfc9406e0ff644092579bc7122
-
- Mar 05, 2022
-
-
Mark Goddard authored
Installs Tenks [1] and uses it to create virtual machines to pose as bare metal compute nodes. The nodes are registered in Ironic, and used to provision instances. [1] https://docs.openstack.org/tenks/latest/ Depends-On: https://review.opendev.org/c/openstack/tenks/+/830182 Depends-On: https://review.opendev.org/c/openstack/tenks/+/830675 Depends-On: https://review.opendev.org/c/openstack/kolla-ansible/+/831055 Change-Id: Idfb8fbb50dc7442225967b2a2ec38ae7114f3c11 Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Mar 04, 2022
-
-
Radosław Piliszek authored
Ironic is dropping default_boot_option and the new default has been around for quite a while now so let's remove this old scary comment. Change-Id: I80d645cb97251ac63e04d7ec1c87d4600d17d4ee
-
Radosław Piliszek authored
Since I30c2ad2bf2957ac544942aefae8898cdc8a61ec6 this container is always enabled and thus the port should always be checked. Change-Id: I94a70d89123611899872061bd69593280d0a68c4
-
Radosław Piliszek authored
Set kernel_append_params instead. Change-Id: I4fb42d376636dc363cd86950ed37de4a3d28df73
-