Skip to content
Snippets Groups Projects
  1. Mar 07, 2021
  2. Mar 04, 2021
    • Doug Szumski's avatar
      Support bypassing Monasca Log API for control plane logs · ca1a80ab
      Doug Szumski authored
      This change allows a user to forward control plane logs
      directly to Elasticsearch from Fluentd, rather than via
      the Monasca Log API when Monasca is enabled. The Monasca
      Log API can continue to handle tenant logs.
      
      For many use cases this is simpler, reduces resource
      consumption and helps to decouple control plane logging
      services from tenant logging services.
      
      It may not always be desired, so is optional and off by
      default.
      
      Change-Id: I195e8e4b73ca8f573737355908eb30a3ef13b0d6
      ca1a80ab
    • Doug Szumski's avatar
      Support disabling Monasca alerting pipeline · 44409784
      Doug Szumski authored
      The Monasca alerting pipeline provides multi-tenancy alerts and
      notifications. It runs as an Apache Storm topology and generally
      places a significant memory and CPU burden on monitoring hosts,
      particularly when there are lot of metrics. This is fine if the
      alerting service is in use, but sometimes it is not. For example
      you may use Prometheus for monitoring the control plane, and
      wish to offer tenants a monitoring service via Monasca without
      alerting and notification functionality. In this case it makes
      sense to disable this part of the Monasca pipeline and this patch
      adds support for that.
      
      If the service is ever re-enabled, all alerts and notifications
      should spawn back automatically since they are persisted in the
      central mysql database cluster.
      
      Change-Id: I84aa04125c621712f805f41c8efbc92c8e156db9
      44409784
  3. Mar 03, 2021
    • Doug Szumski's avatar
      Disable Monasca Log Metrics service by default · a52d6612
      Doug Szumski authored
      The Log Metrics service is an admin only service. We now have
      support in Fluentd via the Prometheus plugin to create metrics
      from logs. These metrics can be scraped into Monasca or Prometheus.
      It therefore makes sense to deprecate this service, starting by
      disabling it by default, and then removing it in the Xena release.
      This should improve the stability of the Monasca metrics pipeline
      by ensuring that all metrics pass via the Monasca API for
      validation, and ensure that metrics generated from logs are
      available to both Prometheus and Monasca users by default.
      
      Change-Id: I704feb4434c1eece3eb00c19dc5f934fd4bc27b4
      a52d6612
    • Doug Szumski's avatar
      Remove Monasca Log Transformer · 0743a9bf
      Doug Szumski authored
      Historically Monasca Log Transformer has been for log
      standardisation and processing. For example, logs from different
      sources may use slightly different error levels such as WARN, 5,
      or WARNING. Monasca Log Transformer is a place where these could
      be 'squashed' into a single error level to simplify log searches
      based on labels such as these.
      
      However, in Kolla Ansible, we do this processing in Fluentd so
      that the simpler Fluentd -> Elastic -> Kibana pipeline also
      benefits. This helps to avoid spreading out log parsing
      configuration over many services, with the Fluentd Monasca output
      plugin being yet another potential place for processing (which
      should be avoided). It therefore makes sense to remove this
      service entirely, and squash any existing configuration which
      can't be moved to Fluentd into the Log Perister service. I.e.
      by removing this pipeline, we don't loose any functionality,
      we encourage log processing to take place in Fluentd, or at least
      outside of Monasca, and we make significant gains in efficiency
      by removing a topic from Kafka which contains a copy of all logs
      in transit.
      
      Finally, users forwarding logs from outside the control plane,
      eg. from tenant instances, should be encouraged to process the
      logs at the point of sending using whichever framework they are
      forwarding them with. This makes sense, because all Logstash
      configuration in Monasca is only accessible by control plane
      admins. A user can't typically do any processing inside Monasca,
      with or without this change.
      
      Change-Id: I65c76d0d1cd488725e4233b7e75a11d03866095c
      0743a9bf
  4. Feb 16, 2021
  5. Feb 15, 2021
    • Pedro Henrique's avatar
      Add support to OpenID Connect Authentication flow · f3fbe837
      Pedro Henrique authored
      
      This pull request adds support for the OpenID Connect authentication
      flow in Keystone and enables both ID and access token authentication
      flows. The ID token configuration is designed to allow users to
      authenticate via Horizon using an identity federation; whereas the
      Access token is used to allow users to authenticate in the OpenStack CLI
      using a federated user.
      
      Without this PR, if one wants to configure OpenStack to use identity
      federation, he/she needs to do a lot of configurations in the keystone,
      Horizon, and register quite a good number of different parameters using
      the CLI such as mappings, identity providers, federated protocols, and
      so on. Therefore, with this PR, we propose a method for operators to
      introduce/present the IdP's metadata to Kolla-ansible, and based on the
      presented metadata, Kolla-ansible takes care of all of the
      configurations to prepare OpenStack to work in a federated environment.
      
      Implements: blueprint add-openid-support
      Co-Authored-By: default avatarJason Anderson <jasonanderson@uchicago.edu>
      Change-Id: I0203a3470d7f8f2a54d5e126d947f540d93b8210
      f3fbe837
  6. Feb 03, 2021
  7. Jan 27, 2021
    • Piotr Parczewski's avatar
      [docs] Unify project's naming convention · 5db72659
      Piotr Parczewski authored
      There are inconsitencies across the documentation and the source code files
      when it comes to project's name (Kolla Ansible vs. Kolla-Ansible). This
      commit aims at unifying it so that the naming becomes consistent everywhere.
      
      Change-Id: I903b2e08f5458b1a1abc4af3abefe20b66c23a54
      5db72659
  8. Jan 18, 2021
  9. Jan 12, 2021
  10. Dec 28, 2020
    • Sergei Chekanov's avatar
      Fix Ceph links · e71894b2
      Sergei Chekanov authored
      and drop the reference to ceph-deploy (seems abandoned).
      
      Change-Id: I763317a6f8207357991c23fa5a2fc8cc6f8a17f4
      e71894b2
  11. Dec 16, 2020
  12. Nov 23, 2020
    • Mark Goddard's avatar
      docs: Add magnum guide · 9c8dd724
      Mark Goddard authored
      Currently just covers deployment of Magnum. Usage information may be
      added in future.
      
      Change-Id: I3c1594c73be8e6805f80d51aad2343c084650bc2
      9c8dd724
  13. Nov 20, 2020
    • Mark Goddard's avatar
      docs: improve external Ceph docs · 8e47f6b8
      Mark Goddard authored
      * make each section independent
      * move enable flags to specific sections
      * move inventory changes to Cinder section
      * move Nova config that is actually for Cinder volumes to Cinder section
      * add an introduction about each integration
      
      Change-Id: Ie8d82010bf8d5b8af2c039f285744e5ae67316dc
      8e47f6b8
  14. Oct 27, 2020
  15. Oct 26, 2020
  16. Oct 24, 2020
    • linpeiwen's avatar
      Add support for GlusterFS NFS Manila backend · f01492b1
      linpeiwen authored
      Follows existing backends patterns to add support for the GlusterFS
      NFS driver.
      NFS server type used by the GlusterFS backend, Gluster or Ganesha,
      currently supports Gluster.
      The GlusterFS NFS driver needs to install the glusterfs-fuse package
      in the kolla images manila share container in advance, which has been merged
      in https://review.opendev.org/747510
      
      Change-Id: I7fdb121b5bf9850d62246a24f9b17d226028c2ca
      f01492b1
  17. Oct 14, 2020
    • zhoulinhui's avatar
      Revert VMware deprecation · b6846d6e
      zhoulinhui authored
      Nova has reversed their deprecation of the VMware driver, and the Kolla
      community has shown an interest in it.
      
      Change-Id: I82f1074da56ed16c08317d1f92ed7f0a6f4a149a
      b6846d6e
  18. Sep 17, 2020
    • Bharat Kunwar's avatar
      Support neutron_sriov_physnet_mappings to support multiple devices · c24a280b
      Bharat Kunwar authored
      Change-Id: Ifcedcc72307732393a92a702a7567addc043b5b2
      c24a280b
    • Mark Goddard's avatar
      Support TLS encryption of RabbitMQ client-server traffic · 761ea9a3
      Mark Goddard authored
      This change adds support for encryption of communication between
      OpenStack services and RabbitMQ. Server certificates are supported, but
      currently client certificates are not.
      
      The kolla-ansible certificates command has been updated to support
      generating certificates for RabbitMQ for development and testing.
      
      RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when
      The Zuul 'tls_enabled' variable is true.
      
      Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5
      Implements: blueprint message-queue-ssl-support
      761ea9a3
  19. Sep 02, 2020
  20. Aug 28, 2020
  21. Aug 13, 2020
  22. Aug 06, 2020
  23. Jul 30, 2020
  24. Jul 27, 2020
  25. Jul 07, 2020
  26. Jun 29, 2020
  27. Jun 22, 2020
    • Mark Goddard's avatar
      octavia: Add documentation · 543eb4bd
      Mark Goddard authored
      Covers manual registration of resources.
      
      Change-Id: Idbee6ea1dba911cda38a0df307ed94e4ef98900d
      Closes-Bug: #1877417
      543eb4bd
  28. Jun 09, 2020
  29. May 22, 2020
    • Raimund Hook's avatar
      Add First login steps back into Kibana doc · 30dedef0
      Raimund Hook authored
      Kolla-ansible version 4.0.0 contained the steps to follow when logging
      in to Kibana for the first time.
      
      These got deleted when the process was seemingly automated, but the
      relevant machinery no longer works. See [1] as well.
      
      Backport to Ussuri, Train, Stein (possibly more).
      
      [1] https://review.opendev.org/726289
      
      Change-Id: If65622dc78e7f8fd16e37ee31bc9f34eb9267549
      30dedef0
  30. May 11, 2020
    • Will Szumski's avatar
      Add extras directory to prometheus config · d05578f5
      Will Szumski authored
      This provides a generic mechanism to include extra files
      that you can reference in prometheus.yml, for example:
      
      scrape_targets:
        - job_name: ipmi
          params:
            module: default
          scrape_interval: 1m
          scrape_timeout: 30s
          metrics_path: /ipmi
          scheme: http
          file_sd_configs:
          - files:
            - /etc/prometheus/extras/file_sd/ipmi-exporter-targets.yml
            refresh_interval: 5m
      
      Change-Id: Ie2f085204b71725b901a179ee51541f1f383c6fa
      Related: blueprint custom-prometheus-targets
      d05578f5
    • Will Szumski's avatar
      Support customizing prometheus.cfg files · 956a29f8
      Will Szumski authored
      This provides a mechanism to scrape targets defined outside of kolla-ansible.
      
      Depends-On: https://review.opendev.org/#/c/685671/
      Change-Id: I0950341b147bb374b4128f09f807ef5a756f5dfa
      Related: blueprint custom-prometheus-targets
      956a29f8
  31. Apr 30, 2020
  32. Apr 24, 2020
  33. Apr 23, 2020
  34. Apr 13, 2020
    • Radosław Piliszek's avatar
      Fix Designate not to use etcd coordination backend · 3c234603
      Radosław Piliszek authored
      etcd via tooz does not support group membership required by
      Designate coordination.
      The best k-a can do is not to configure etcd in Designate.
      
      Change-Id: I2f64f928e730355142ac369d8868cf9f65ca357e
      Closes-bug: #1872205
      Related-bug: #1840070
      3c234603
Loading