Skip to content
Snippets Groups Projects
  1. Sep 26, 2022
  2. Sep 21, 2022
  3. Aug 26, 2022
  4. Aug 09, 2022
  5. Jul 25, 2022
    • Michal Nasiadka's avatar
      Fix var-spacing · dcf5a8b6
      Michal Nasiadka authored
      ansible-lint introduced var-spacing - let's fix our code.
      
      Change-Id: I0d8aaf3c522a5a6a5495032f6dbed8a2be0251f0
      dcf5a8b6
  6. Jul 12, 2022
    • Michal Arbet's avatar
      Add api_workers for each service to defaults · 3e8db91a
      Michal Arbet authored
      Render {{ openstack_service_workers }} for workers
      of each openstack service is not enough. There are
      several services which has to have more workers because
      there are more requests sent to them.
      
      This patch is just adding default value for workers for
      each service and sets {{ openstack_service_workers }} as
      default, so value can be overrided in hostvars per server.
      Nothing changed for normal user.
      
      Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
      3e8db91a
    • Christian Berendt's avatar
      Set the ironic notification level · ced1e3b6
      Christian Berendt authored
      To use notifications with ironic, the notification_level
      option in the [DEFAULT] section of the configuration file
      must be set, we use ``info`` as a reasonable level.
      
      Closes-Bug: #1969826
      
      Change-Id: I38bb1e5404e917c788689a3181741022f875da06
      ced1e3b6
  7. Jul 06, 2022
  8. Jun 24, 2022
    • Christian Berendt's avatar
      Add ironic_http_interface parameters · 4de34266
      Christian Berendt authored
      With the ironic_http_interface/ironic_http_interface_address
      parameters it is possible to set the addresses for the
      ironic_http service.
      
      Change-Id: I72c257ebedf283cdef1b98485a576631e2190657
      4de34266
  9. Jun 09, 2022
    • Will Szumski's avatar
      Add keystone_authtoken.service_type · 49006e56
      Will Szumski authored
      Fixes an issue where access rules failed to validate:
      
          Cannot validate request with restricted access rules. Set
          service_type in [keystone_authtoken] to allow access rule validation
      
      I've used the values from the endpoint. This was mostly a straight
      forward copy and paste, except:
      
      - versioned endpoints e.g cinderv3 where I stripped the version
      - monasca has multiple endpoints associated with a single service. For
        this, I concatenated logging and monitoring to be logging-monitoring.
      
      Closes-Bug: #1965111
      Change-Id: Ic4b3ab60abad8c3dd96cd4923a67f2a8f9d195d7
      49006e56
  10. May 28, 2022
    • Radosław Piliszek's avatar
      Do not use keystone_admin_url et al · 7ca9349b
      Radosław Piliszek authored
      Following up on [1].
      The 3 variables are only introducing noise after we removed
      the reliance on Keystone's admin port.
      
      [1] I5099b08953789b280c915a6b7a22bdd4e3404076
      
      Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
      7ca9349b
  11. May 23, 2022
  12. Apr 21, 2022
  13. Apr 20, 2022
  14. Apr 13, 2022
    • Maksim Malchuk's avatar
      Multiple DHCP ranges for Ironic Inspector · 762aecbf
      Maksim Malchuk authored
      
      Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the
      configuration of the corresponding 'dhcp-range' and 'dhcp-option'
      blocks in Ironic Inspector dnsmasq for multiple ranges.
      
      The old parameters 'ironic_dnsmasq_dhcp_range' and
      'ironic_dnsmasq_default_gateway' used for the only range are now
      removed.
      
      This change implements the same solution used in the TripleO several
      years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d
      
      Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649
      fix for lease time.
      The value can be changed globally or per range.
      
      Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      Co-Authored-By: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      762aecbf
  15. Apr 06, 2022
  16. Apr 05, 2022
  17. Mar 21, 2022
    • Radosław Piliszek's avatar
      Ironic: rebootstrap ironic-pxe on upgrade · 1db06b32
      Radosław Piliszek authored
      Like other containers.
      
      This ensures that upgrade already updates PXE components and no
      additional deploy/reconfigure is needed.
      
      Closes-Bug: #1963752
      Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
      1db06b32
  18. Mar 04, 2022
  19. Feb 10, 2022
    • Mark Goddard's avatar
      ironic: sync default inspection UEFI iPXE bootloader with Ironic · 556d9799
      Mark Goddard authored
      The bootloader used to boot Ironic nodes in UEFI boot mode during
      inspection when iPXE is enabled has been changed from ipxe.efi to
      snponly.efi. This is in line with the default UEFI iPXE bootloader used
      in Ironic since the Xena release. The bootloader may be changed via
      ironic_dnsmasq_uefi_ipxe_boot_file.
      
      Note that snponly.efi was not available via in the ironic-pxe image
      prior to I79e78dca550262fc86b092a036f9ea96b214ab48.
      
      Related-Bug: #1959203
      
      Change-Id: I879db340769cc1b076e77313dff15876e27fcac4
      556d9799
  20. Dec 31, 2021
    • Pierre Riteau's avatar
      Move project_name and kolla_role_name to role vars · 56fc74f2
      Pierre Riteau authored
      Role vars have a higher precedence than role defaults. This allows to
      import default vars from another role via vars_files without overriding
      project_name (see related bug for details).
      
      Change-Id: I3d919736e53d6f3e1a70d1267cf42c8d2c0ad221
      Related-Bug: #1951785
      56fc74f2
  21. Dec 22, 2021
  22. Dec 21, 2021
    • Dr. Jens Harbott's avatar
      Stop creating non-keystone admin endpoints · 479a7870
      Dr. Jens Harbott authored
      
      The admin interface for endpoints never had any real use, the
      functionality was the same as for the public or internal endpoints,
      except for Keystone. Even for Keystone with API v3 it would no longer
      really be needed, but it is still being required by some libraries that
      cannot be changed in order to stay backwards compatible.
      
      Signed-off-by: default avatarDr. Jens Harbott <harbott@osism.tech>
      Change-Id: Icf3bf08deab2c445361f0a0124d87ad8b0e4e9d9
      479a7870
  23. Oct 12, 2021
    • Maksim Malchuk's avatar
      Update dnsmasq logging · d559e2c3
      Maksim Malchuk authored
      
      This change adds the dnsmasq.log for the ironic-dnsmasq container and
      also enables more verbose logging when debug logging enabled.
      This can be triggered globbaly via 'openstack_logging_debug' or per
      service via 'ironic_logging_debug' or 'neutron_logging_debug'.
      
      Change-Id: I0e6b089beb88827effbcc365625eb2df902f5470
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      d559e2c3
  24. Sep 28, 2021
    • Niklas Hagman's avatar
      Transition Keystone admin user to system scope · 2e933dce
      Niklas Hagman authored
      A system-scoped token implies the user has authorization to act on the
      deployment system. These tokens are useful for interacting with
      resources that affect the deployment as a whole, or exposes resources
      that may otherwise violate project or domain isolation.
      
      Since Queens, the keystone-manage bootstrap command assigns the admin
      role to the admin user with system scope, as well as in the admin
      project. This patch transitions the Keystone admin user from
      authenticating using project scoped tokens to system scoped tokens.
      This is a necessary step towards being able to enable the updated oslo
      policies in services that allow finer grained access to system-level
      resources and APIs.
      
      An etherpad with discussion about the transition to the new oslo
      service policies is:
      
      https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible
      
      
      
      Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585
      Signed-off-by: default avatarNiklas Hagman <ubuntu@post.blinkiz.com>
      2e933dce
  25. Aug 10, 2021
    • Radosław Piliszek's avatar
      Refactor and optimise image pulling · 9ff2ecb0
      Radosław Piliszek authored
      We get a nice optimisation by using a filtered loop instead
      of task skipping per service with 'when'.
      
      Partially-Implements: blueprint performance-improvements
      Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
      9ff2ecb0
    • Mark Goddard's avatar
      ironic: Follow up for ironic_enable_keystone_integration · 46df30d8
      Mark Goddard authored
      Follow up for I0c7e9a28876a1d4278fb2ed8555c2b08472864b9 which added a
      ironic_enable_keystone_integration variable to support Ironic in
      multi-region environments. This change skips Keystone service
      registration based on ironic_enable_keystone_integration rather than
      enable_keystone. It also updates the ironic-inspector.conf template to
      use the new variable.
      
      Change-Id: I2ecba4999e194766258ac5beed62877d43829313
      46df30d8
  26. Aug 06, 2021
    • Ilya Popov's avatar
      Extra var ironic_enable_keystone_integration added. · da4fd2d6
      Ilya Popov authored
      Basically, there are three main installation scenario:
      
      Scenario 1:
      Ironic installation together with other openstack services
      including keystone. In this case variable enable_keystone
      is set to true and keystone service will be installed
      together with ironic installation. It is possible realise this
      scenario, no fix needed
      
      Scenario 2:
      Ironic installation with connection to already installed
      keystone. In this scenario we have to set enable_keystone
      to “No” to prevent from new keystone service installation
      during the ironic installation process. But in other hand,
      we need to have correct sections in ironic.conf to provide
      all information needed to connect to existing keystone.
      But all sections for keystone are added to ironic.conf only
      if enable_keystone var is set to “Yes”. It isn’t possible
      to realise this scenario. Proposed fix provide support for
      this scenario, where multiple regions share the same
      keystone service.
      
      Scenario 3:
      No keystone integration. Ironic don't connect to Keystone.
      It is possible realise this scenario, no fix needed
      
      Proposed solution also keep the default behaviour: if no
      enable_keystone_integration is manually defined by default
      it takes value of enable_keystone variable and all behaviour
      is the same. But if we don't want to install keystone and
      want to connect to existing one at the same time, it will be
      possible to set enable_keystone var to “No”
      (preventing keystone from installation) and at the same
      time set ironic_enable_keystone_integration to Yes to allow
      needed section appear in ironic.conf through templating.
      
      Change-Id: I0c7e9a28876a1d4278fb2ed8555c2b08472864b9
      da4fd2d6
  27. Jul 22, 2021
    • Mark Goddard's avatar
      ironic: always enable conductor HTTP server · 411668ea
      Mark Goddard authored
      In the Xena release, Ironic removed the iSCSI driver [1]. The
      recommended driver is direct, which uses HTTP to transfer the disk
      image. This requires an HTTP server, and the simplest option is to use
      the one currently deployed when enable_ironic_ipxe is set to true. For
      this reason, this patch always enables the HTTP server running on the
      conductor.
      
      iPXE is still enabled separately, since it cannot currently be used at
      the same time as PXE.
      
      [1] https://review.opendev.org/c/openstack/ironic/+/789382
      
      Change-Id: I30c2ad2bf2957ac544942aefae8898cdc8a61ec6
      411668ea
  28. Jul 21, 2021
    • Mark Goddard's avatar
      Fix ironic_ipxe healthcheck on Debian/Ubuntu · aa28675c
      Mark Goddard authored
      The healthcheck checks for a process called httpd, but these distros
      call it apache2.  This results in the ironic_ipxe container being marked
      as unhealthy.
      
      This change fixes the issue by making the process name distro dependent.
      
      Change-Id: I0b0126e3071146e7f8593ba970ecbed65b36fcfa
      Closes-Bug: #1937037
      aa28675c
  29. Jun 23, 2021
    • Mark Goddard's avatar
      Use ansible_facts to reference facts · ade5bfa3
      Mark Goddard authored
      By default, Ansible injects a variable for every fact, prefixed with
      ansible_. This can result in a large number of variables for each host,
      which at scale can incur a performance penalty. Ansible provides a
      configuration option [0] that can be set to False to prevent this
      injection of facts. In this case, facts should be referenced via
      ansible_facts.<fact>.
      
      This change updates all references to Ansible facts within Kolla Ansible
      from using individual fact variables to using the items in the
      ansible_facts dictionary. This allows users to disable fact variable
      injection in their Ansible configuration, which may provide some
      performance improvement.
      
      This change disables fact variable injection in the ansible
      configuration used in CI, to catch any attempts to use the injected
      variables.
      
      [0] https://docs.ansible.com/ansible/latest/reference_appendices/config.html#inject-facts-as-vars
      
      Change-Id: I7e9d5c9b8b9164d4aee3abb4e37c8f28d98ff5d1
      Partially-Implements: blueprint performance-improvements
      ade5bfa3
  30. Jun 22, 2021
  31. Mar 08, 2021
    • LinPeiWen's avatar
      Use Docker healthchecks for ironic services · cb537eb8
      LinPeiWen authored
      This change enables the use of Docker healthchecks for ironic services.
      Implements: blueprint container-health-check
      
      Change-Id: If0a11db5470899c3a0e69ca94fdd0903daadcf8b
      cb537eb8
  32. Mar 04, 2021
    • Doug Szumski's avatar
      Add variable for changing Apache HTTP timeout · 647ff667
      Doug Szumski authored
      In services which use the Apache HTTP server to service HTTP requests,
      there exists a TimeOut directive [1] which defaults to 60 seconds. APIs
      which come under heavy load, such as Cinder, can sometimes exceed this
      which results in a HTTP 504 Gateway timeout, or similar. However, the
      request can still be serviced without error. For example, if Nova calls
      the Cinder API to detach a volume, and this operation takes longer
      than the shortest of the two timeouts, Nova will emit a stack trace
      with a 504 Gateway timeout. At some time later, the request to detach
      the volume will succeed. The Nova and Cinder DBs then become
      out-of-sync with each other, and frequently DB surgery is required.
      
      Although strictly this category of bugs should be fixed in OpenStack
      services, it is not realistic to expect this to happen in the short
      term. Therefore, this change makes it easier to set the Apache HTTP
      timeout via a new variable.
      
      An example of a related bug is here:
      
      https://bugs.launchpad.net/nova/+bug/1888665
      
      Whilst this timeout can currently be set by overriding the WSGI
      config for individual services, this change makes it much easier.
      
      Change-Id: Ie452516655cbd40d63bdad3635fd66693e40ce34
      Closes-Bug: #1917648
      647ff667
Loading