Skip to content
Snippets Groups Projects
  1. Nov 28, 2024
  2. Nov 26, 2024
  3. Oct 25, 2024
    • Matus Jenca's avatar
      Add frontend TLS ability to ProxySQL · d23433ac
      Matus Jenca authored
      This patch ads an ability to receive TLS connections
      to ProxySQL. Certificates and variable lookups are
      added in order for TLS to be enabled by
      <project_name>_database_internal_tls_enable.
      Note that in order for this to work, mysql
      connection strings need to have TLS enabled,
      which can be added in separate per-service patches
      
      Change-Id: I2c06ce5e138f52259c1725dae37f25c1b00d1e6b
      d23433ac
    • Michal Nasiadka's avatar
      cinder: Drop Hitachi HNAS NFS driver support · 5543cb72
      Michal Nasiadka authored
      It has been removed in I23867aa98f68298beb5db4558c66c1ffd4e7d6f1
      
      Change-Id: I12d287b9f7f1e5ddf754b7f2ca1dee39778e710e
      5543cb72
    • Matus Jenca's avatar
      Add backend TLS between MariaDB and ProxySQL · 23413d4e
      Matus Jenca authored
      
      This commit adds TLS connection between ProxySQL and MariaDB.
      Frontend TLS ( between services and ProxySQL) will be
      added in another commit.
      
      Parialy Implements: mariadb-ssl-support
      
      Change-Id: I154cbb096469c5515c9d8156c2c1c5dd07b95849
      Signed-off-by: default avatarMatus Jenca <matus.jenca@dnation.cloud>
      23413d4e
  4. Oct 17, 2024
  5. Oct 16, 2024
  6. Sep 23, 2024
    • Michal Arbet's avatar
      Improvement of ProxySQL Monitoring Configuration · 79897566
      Michal Arbet authored
      This update enhances the monitoring of the databasecluster
      in ProxySQL. The default monitoring intervals were insufficient
      for reliably detecting failures in the Galera cluster environment.
      
      A detailed configuration for monitoring intervals has been
      introduced, providing better control over how quickly and accurately
      ProxySQL can identify issues.
      
        - Variables such as `mariadb_monitor_connect_interval`,
          `mariadb_monitor_galera_healthcheck_interval, and
          `mariadb_monitor_ping_interval` significantly reduce
          the time between connection checks.
      
        - Timeouts like `mariadb_monitor_galera_healthcheck_timeout`
          and `mariadb_monitor_ping_timeout` allow faster failure
          detection, while `mariadb_monitor_galera_healthcheck_max_timeout_count`
          sets the maximum number of allowed timeouts before marking a node as down.
      
      Calculation:
      
       - Galera healthcheck:
      
         4 seconds (interval) + 1 second (timeout) + 4 seconds (interval)
         + 1 second (timeout) = 10 seconds.
      
       - Ping healthcheck:
      
         3 seconds (interval) + 2 seconds (timeout) + 3 seconds (interval)
         + 2 seconds (timeout) = 10 seconds.
      
      Both the health check and ping check mechanisms will detect a node failure
      within a maximum of 10 seconds. Both processes (health check and ping)
      operate independently, and failure in either mechanism will mark the node
      as failed.
      
      Health Check Failure Detection: Up to 10 seconds.
      Ping Failure Detection: Up to 10 seconds.
      Connect Attempts: ProxySQL also tries to connect every 2 seconds, which
      helps monitor connectivity.
      
      These changes ensure that ProxySQL can detect issues in 10 seconds
      as haproxy, significantly reducing downtime compared to default settings.
      This adjustment enables faster and more reliable monitoring, improving system
      stability and reducing potential downtime in production environments.
      
      Change-Id: Ic28801519cdb35ed2387a1468b9df661847a5476
      79897566
  7. Sep 21, 2024
  8. Sep 19, 2024
    • Michal Arbet's avatar
      Standardize python version paths · 91a4d8f7
      Michal Arbet authored
      This patch removes the hardcoded `distro_python_version`
      mapping and usage from the configuration and templates,
      aligning with the dynamic Python version detection
      introduced in the dependent patch below.
      
      The changes simplify the kolla-ansible roles by using
      general `python3` paths, ensuring compatibility across
      distributions without requiring version-specific handling.
      
      Template files for Horizon, Ironic, Skyline, and others
      have been updated to reflect this,
      improving maintainability and reducing complexity.
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/926744
      Change-Id: I85431b058b4184d96600cf17aaf8de871a018d61
      91a4d8f7
  9. Sep 17, 2024
  10. Aug 30, 2024
  11. Aug 27, 2024
  12. Aug 20, 2024
  13. Aug 13, 2024
    • Sven Kieske's avatar
      external/internal vip: use proper ip comparison · a5f0e16c
      Sven Kieske authored
      The variable kolla_same_external_internal_vip in group_vars/all.yml
      was set to true or false depending on the jinja2 equality operator
      - == - which only checks if two objects are the same.
      
      This is problematic because IPs can be the same but have different
      string representations, e.g. leading zeroes in some octets, but still
      repesent the same instance of an IP.
      
      Example: 192.168.1.1 and 192.168.001.001 are the same.
      
      Fix this, by using the ansible.utils.ipaddr() jinja2 filter instead
      to increase robustness.
      
      Closes-Bug: #2076889
      Introduced-By: https://review.opendev.org/c/openstack/kolla/+/285005
      
      
      
      Signed-off-by: default avatarSven Kieske <kieske@osism.tech>
      Change-Id: Ied43b9d0c4b33bb514d367f3f99c2e30e104d139
      a5f0e16c
  14. Aug 12, 2024
  15. Aug 08, 2024
    • Michal Nasiadka's avatar
      Bump codespell pin to <3 · 2a2cb92b
      Michal Nasiadka authored
      Adapt files to match new requirements, add assertIn to whitelist
      
      Change-Id: I516bbbb3a0f194e8fa08d04c0290b586963b8b55
      2a2cb92b
  16. Jul 19, 2024
    • Michal Arbet's avatar
      Add support for docker_image_name_prefix · ae86e3a0
      Michal Arbet authored
      The Kolla project supports building images with
      user-defined prefixes. However, Kolla-ansible is unable
      to use those images for installation.
      
      This patch fixes that issue.
      
      Closes-Bug: #2073541
      Change-Id: Ia8140b289aa76fcd584e0e72686e3786215c5a99
      ae86e3a0
  17. Jun 19, 2024
    • Mark Goddard's avatar
      Add support for customising Neutron physical network names · 64dcfb72
      Mark Goddard authored
      Previously Kolla Ansible hard-coded Neutron physical networks starting
      at physnet1 up to physnetN, matching the number of interfaces in
      neutron_external_interface and bridges in neutron_bridge_name.
      
      Sometimes we may want to customise the physical network names used. This
      may be to allow for not all hosts having access to all physical
      networks, or to use more descriptive names.
      
      For example, in an environment with a separate physical network for
      Ironic provisioning, controllers might have access to two physical
      networks, while compute nodes have access to one.
      
      This change adds a neutron_physical_networks variable, making it
      possible to customise the Neutron physical network names used for the
      OVS, OVN, Linux bridge and OVS DPDK plugins. The default behaviour is
      unchanged.
      
      Change-Id: Ib5b8ea727014964919c6b3bd2352bac4a4ac1787
      64dcfb72
  18. May 16, 2024
  19. Apr 29, 2024
  20. Apr 25, 2024
  21. Apr 24, 2024
  22. Apr 22, 2024
  23. Mar 15, 2024
  24. Mar 11, 2024
  25. Jan 30, 2024
  26. Jan 29, 2024
    • Alex-Welsh's avatar
      Update keystone service user passwords · ffd6e3bf
      Alex-Welsh authored
      Service user passwords will now be updated in keystone if services are
      reconfigured with new passwords set in config. This behaviour can be
      overridden.
      
      Closes-Bug: #2045990
      Change-Id: I91671dda2242255e789b521d19348b0cccec266f
      ffd6e3bf
  27. Jan 24, 2024
  28. Jan 22, 2024
    • Hongbin Lu's avatar
      Zun: remove docker's cluster-store option · a0ca41cd
      Hongbin Lu authored
      * Remove docker's cluster-store option. This option was removed from
        the latest version of docker so we removed it.
      * Switch kuryr's capability_scope from "global" to "local". The "global"
        scope relies on a cluster store but docker no longer supports it.
      
      Change-Id: Ie62396184552938d099223f9d325a41c9a5067c3
      a0ca41cd
  29. Jan 17, 2024
  30. Dec 28, 2023
Loading