Skip to content
Snippets Groups Projects
  1. Apr 06, 2022
  2. Mar 30, 2022
    • Michal Nasiadka's avatar
      neutron: add ssh key · 7fcf3ca3
      Michal Nasiadka authored
      This key can be used by users in networking-generic-switch
      scenario instead of adding cleartext password in ml2_conf.ini.
      
      Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
      7fcf3ca3
  3. Mar 24, 2022
  4. Mar 17, 2022
    • jinyuanliu's avatar
      ADD venus for kolla-ansible · 3ccb176f
      jinyuanliu authored
      This project [1] can provide a one-stop solution to log collection,
      cleaning, indexing, analysis, alarm, visualization, report generation
      and other needs, which involves helping operator or maintainer to
      quickly solve retrieve problems, grasp the operational health of the
      platform, and improve the level of platform management.
      
      [1] https://wiki.openstack.org/wiki/Venus
      
      Change-Id: If3562bbed6181002b76831bab54f863041c5a885
      3ccb176f
  5. Mar 10, 2022
    • Mark Goddard's avatar
      libvirt: support SASL authentication · d2d4b53d
      Mark Goddard authored
      In Kolla Ansible OpenStack deployments, by default, libvirt is
      configured to allow read-write access via an unauthenticated,
      unencrypted TCP connection, using the internal API network.  This is to
      facilitate migration between hosts.
      
      By default, Kolla Ansible does not use encryption for services on the
      internal network (and did not support it until Ussuri). However, most
      other services on the internal network are at least authenticated
      (usually via passwords), ensuring that they cannot be used by anyone
      with access to the network, unless they have credentials.
      
      The main issue here is the lack of authentication. Any client with
      access to the internal network is able to connect to the libvirt TCP
      port and make arbitrary changes to the hypervisor. This could include
      starting a VM, modifying an existing VM, etc. Given the flexibility of
      the domain options, it could be seen as equivalent to having root access
      to the hypervisor.
      
      Kolla Ansible supports libvirt TLS [1] since the Train release, using
      client and server certificates for mutual authentication and encryption.
      However, this feature is not enabled by default, and requires
      certificates to be generated for each compute host.
      
      This change adds support for libvirt SASL authentication, and enables it
      by default. This provides base level of security. Deployments requiring
      further security should use libvirt TLS.
      
      [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021
      Closes-Bug: #1964013
      Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
      d2d4b53d
  6. Mar 08, 2022
    • Nathan Taylor's avatar
      Adds etcd endpoints as a Prometheus scrape target · 0f2794a0
      Nathan Taylor authored
      Add "enable_prometheus_etcd_integration" configuration parameter which
      can be used to configure Prometheus to scrape etcd metrics endpoints.
      The default value of "enable_prometheus_etcd_integration" is set to
      the combined values of "enable_prometheus" and "enable_etcd".
      
      Change-Id: I7a0b802c5687e2d508e06baf55e355d9761e806f
      0f2794a0
  7. Feb 25, 2022
    • Radosław Piliszek's avatar
      Enable Ironic iPXE support by default · baeca81a
      Radosław Piliszek authored
      Ironic has changed the default PXE to be iPXE (as opposed to plain
      PXE) in Yoga. Kolla Ansible supports either one or the other and
      we tend to stick to upstream defaults so this change enables
      iPXE instead of plain PXE - by default - the users are allowed
      to change back and they need to take one other action so it is
      good to remind them via upgrade notes either way.
      
      Change-Id: If14ec83670d2212906c6e22c7013c475f3c4748a
      baeca81a
  8. Feb 18, 2022
    • alecorps's avatar
      Add support for VMware First Class Disk (FCD) · 812e03f7
      alecorps authored
      An FCD, also known as an Improved Virtual Disk (IVD) or
      Managed Virtual Disk, is a named virtual disk independent of
      a virtual machine. Using FCDs for Cinder volumes eliminates
      the need for shadow virtual machines.
      This patch adds Kolla support.
      
      Change-Id: Ic0b66269e6d32762e786c95cf6da78cb201d2765
      812e03f7
    • Pierre Riteau's avatar
      Allow to define extra parameters for Prometheus exporters · dcba8297
      Pierre Riteau authored
      The following variables are added:
      
      * prometheus_blackbox_exporter_cmdline_extras
      * prometheus_elasticsearch_exporter_cmdline_extras
      * prometheus_haproxy_exporter_cmdline_extras
      * prometheus_memcached_exporter_cmdline_extras
      * prometheus_mysqld_exporter_cmdline_extras
      * prometheus_node_exporter_cmdline_extras
      * prometheus_openstack_exporter_cmdline_extras
      
      Change-Id: I5da2031b9367115384045775c515628e2acb1aa4
      dcba8297
  9. Feb 17, 2022
    • Alban Lecorps's avatar
      Add support for VMware NSXP · 458c8b13
      Alban Lecorps authored
      NSXP is the OpenStack support for the NSX Policy platform.
      This is supported from neutron in the Stein version. This patch
      adds Kolla support
      
      This adds a new neutron_plugin_agent type 'vmware_nsxp'. The plugin
      does not run any neutron agents.
      
      Change-Id: I9e9d8f07e586bdc143d293e572031368af7f3fca
      458c8b13
  10. Jan 25, 2022
  11. Jan 05, 2022
  12. Dec 23, 2021
  13. Dec 21, 2021
    • Radosław Piliszek's avatar
      Drop vmtp · 0cbdedd0
      Radosław Piliszek authored
      Details in the attached reno.
      
      Change-Id: I438a453ca522493524fdb9760c1edb330916084b
      0cbdedd0
  14. Nov 15, 2021
  15. Oct 12, 2021
  16. Sep 30, 2021
  17. Aug 20, 2021
  18. Aug 17, 2021
    • Skylar Kelty's avatar
      Update Manila deploy steps for Wallaby · 8d5dde37
      Skylar Kelty authored
      Manila has changed from using subfolders to subvolumes.
      We need a bit of a tidy up to prevent deploy errors.
      This change also adds the ability to specify the ceph FS
      Manila uses instead of relying on the default "first found".
      
      Closes-Bug: #1938285
      Closes-Bug: #1935784
      Change-Id: I1d0d34919fbbe74a4022cd496bf84b8b764b5e0f
      Unverified
      8d5dde37
  19. Aug 09, 2021
  20. Aug 05, 2021
  21. Jul 28, 2021
    • Radosław Piliszek's avatar
      Use more RMQ flags for less busy wait · d7cdad53
      Radosław Piliszek authored
      As mentioned in the Iced014acee7e590c10848e73feca166f48b622dc
      commit message, in Ussuri+ we can use ``+sbwtdcpu none
      +sbwtdio none`` as well. This is due to relying on RMQ-provided
      erlang in version 23.x.
      
      This change adds the extra arguments by default.
      It should be backported down to Ussuri before we do a release with
      Iced014acee7e590c10848e73feca166f48b622dc.
      
      Change-Id: I32e247a6cb34d7f6763b544f247fd408dce2b3a2
      d7cdad53
  22. Jul 08, 2021
    • Piotr Parczewski's avatar
      Reduce container metrics cardinality · c2ae21fd
      Piotr Parczewski authored
      Adds support for passing extra runtime options to cAdvisor.
      By default new options disable exporting rarely useful metrics
      and labels by cAdvisor. This helps reducing the load on Prometheus
      and cAdvisor itself.
      
      Change-Id: I81f3845d6cd03a70a0c8569f8d0ea421027df083
      c2ae21fd
  23. Jul 07, 2021
    • wu.chunyang's avatar
      Remove tempest role · 52619984
      wu.chunyang authored
      Remove tempest role as planned
      
      Change-Id: If3cf073e88c83f670c867a49afe48845f9e81008
      52619984
  24. Jul 02, 2021
    • Rafael Weingärtner's avatar
      Make setup module arguments configurable · 15f2fdcd
      Rafael Weingärtner authored
      
      Ansible facts can have a large impact on the performance of the Ansible
      control host. This patch introduces some control over which facts are
      gathered (kolla_ansible_setup_gather_subset) and which facts are stored
      (kolla_ansible_setup_filter). By default we do not change the default
      values of these arguments to the setup module. The flexibility of these
      arguments is limited, but they do provide enough for a large performance
      improvement in a typical moderate to large OpenStack cloud.
      
      In particular, the large complex dict fact for each interface has a
      large effect, and on an OpenStack controller or hypervisor there may be
      many virtual interfaces. We can use the kolla_ansible_setup_filter
      variable to help:
      
          kolla_ansible_setup_filter: 'ansible_[!qt]*'
      
      This causes Ansible to collect but not store facts matching that
      pattern, which includes the virtual interface facts. Currently we are
      not referencing other facts matching the pattern within Kolla Ansible.
      Note that including the 'ansible_' prefix causes meta facts module_setup
      and gather_subset to be filtered, but this seems to be the only way to
      get a good match on the interface facts. To work around this, we use
      ansible_facts rather than module_setup to detect whether facts exist in
      the cache.
      
      The exact improvement will vary, but has been reported to be as large as
      18x on systems with many virtual interfaces.
      
      For reference, here are some other tunings tried:
      
      * Increased the number of forks (great speedup depending of the size of
        the deployment)
      * Use `strategy = mitogen_linear` (cut processing time in half)
      * Ansible caching (little speed up)
      * SSH tunning (little speed up)
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      Closes-Bug: #1921538
      Change-Id: Iae8ca4aae945892f1dc65e1b10381d2e26e88805
      15f2fdcd
  25. Jun 21, 2021
  26. Jun 20, 2021
    • Radosław Piliszek's avatar
      Revert "Reduce container metrics cardinality" · 640dbb03
      Radosław Piliszek authored
      This reverts commit c6259158.
      
      Reason for revert: cAdvisor fails with:
      
      invalid value "percpu,referenced_memory,cpu_topology,resctrl,udp,advtcp,sched,hugetlb,memory_numa,tcp,process" for flag -disable_metrics: unsupported metric "referenced_memory" specified in disable_metrics
      
      Change-Id: I1a0eea5c20f95f38c707401b56b7d2454484377d
      640dbb03
  27. Jun 16, 2021
    • Piotr Parczewski's avatar
      Reduce container metrics cardinality · c6259158
      Piotr Parczewski authored
      Adds support for passing extra runtime options to cAdvisor.
      By default new options disable exporting rarely useful metrics
      and labels by cAdvisor. This helps reducing the load on Prometheus
      and cAdvisor itself.
      
      Change-Id: Id0144e8fa518e3236cb94ba2e3961fb455d36443
      c6259158
    • wu.chunyang's avatar
      Remove rally deployment · 30091096
      wu.chunyang authored
      Remove rally role as planned
      
      Change-Id: Ic898efe42b21b01c45d4621af2cf90ecd7afc398
      30091096
  28. Jun 11, 2021
    • Matthias Runge's avatar
      Remove support for panko · ccf8cc5d
      Matthias Runge authored
      the project is deprecated and in the process of being removed
      from OpenStack upstream.
      
      Change-Id: I9d5ebed293a5fb25f4cd7daa473df152440e8b50
      ccf8cc5d
  29. Jun 07, 2021
    • John Garbutt's avatar
      Reduce RabbitMQ busy waiting, lowering CPU load · 70f6f8e4
      John Garbutt authored
      On machines with many cores, we were seeing excessive CPU load on systems
      that were not very busy. With the following Erlang VM argument we saw
      RabbitMQ CPU usage drop from about 150% to around 20%, on a system with
      40 hyperthreads.
      
          +S 2:2
      
      By default RabbitMQ starts N schedulers where N is the number of CPU
      cores, including hyper-threaded cores. This is fine when you assume all
      your CPUs are dedicated to RabbitMQ. Its not a good idea in a typical
      Kolla Ansible setup. Here we go for two scheduler threads.
      More details can be found here:
      https://www.rabbitmq.com/runtime.html#scheduling
      and here:
      https://erlang.org/doc/man/erl.html#emulator-flags
      
          +sbwt none
      
      This stops busy waiting of the scheduler, for more details see:
      https://www.rabbitmq.com/runtime.html#busy-waiting
      Newer versions of rabbit may need additional flags:
      "+sbwt none +sbwtdcpu none +sbwtdio none"
      But this patch should be back portable to older versions of RabbitMQ
      used in Train and Stein.
      
      Note that information on this tuning was found by looking at data from:
      rabbitmq-diagnostics runtime_thread_stats
      More details on that can be found here:
      https://www.rabbitmq.com/runtime.html#thread-stats
      
      Related-Bug: #1846467
      
      Change-Id: Iced014acee7e590c10848e73feca166f48b622dc
      70f6f8e4
  30. May 11, 2021
  31. Apr 27, 2021
    • Doug Szumski's avatar
      Remove Monasca Grafana service · 82cf40ed
      Doug Szumski authored
      In the Xena cycle it was decided to remove the Monasca
      Grafana fork due to lack of maintenance. This commit removes
      the service and provides a limited workaround using the
      Monasca Grafana datasource with vanilla Grafana.
      
      Depends-On: I9db7ec2df050fa20317d84f6cea40d1f5fd42e60
      Change-Id: I4917ece1951084f6665722ba9a91d47764d3709a
      82cf40ed
  32. Apr 08, 2021
  33. Apr 06, 2021
  34. Mar 24, 2021
  35. Mar 04, 2021
    • Doug Szumski's avatar
      Add variable for changing Apache HTTP timeout · 647ff667
      Doug Szumski authored
      In services which use the Apache HTTP server to service HTTP requests,
      there exists a TimeOut directive [1] which defaults to 60 seconds. APIs
      which come under heavy load, such as Cinder, can sometimes exceed this
      which results in a HTTP 504 Gateway timeout, or similar. However, the
      request can still be serviced without error. For example, if Nova calls
      the Cinder API to detach a volume, and this operation takes longer
      than the shortest of the two timeouts, Nova will emit a stack trace
      with a 504 Gateway timeout. At some time later, the request to detach
      the volume will succeed. The Nova and Cinder DBs then become
      out-of-sync with each other, and frequently DB surgery is required.
      
      Although strictly this category of bugs should be fixed in OpenStack
      services, it is not realistic to expect this to happen in the short
      term. Therefore, this change makes it easier to set the Apache HTTP
      timeout via a new variable.
      
      An example of a related bug is here:
      
      https://bugs.launchpad.net/nova/+bug/1888665
      
      Whilst this timeout can currently be set by overriding the WSGI
      config for individual services, this change makes it much easier.
      
      Change-Id: Ie452516655cbd40d63bdad3635fd66693e40ce34
      Closes-Bug: #1917648
      647ff667
Loading