Skip to content
Snippets Groups Projects
  1. Dec 06, 2017
  2. Nov 17, 2017
    • Andreas Jaeger's avatar
      Remove setting of version/release from releasenotes · 0ac3afe5
      Andreas Jaeger authored
      Release notes are version independent, so remove version/release
      values. We've found that projects now require the service package
      to be installed in order to build release notes, and this is entirely
      due to the current convention of pulling in the version information.
      
      Release notes should not need installation in order to build, so this
      unnecessary version setting needs to be removed.
      
      This is needed for new release notes publishing, see
      I56909152975f731a9d2c21b2825b972195e48ee8 and the discussion starting
      at
      http://lists.openstack.org/pipermail/openstack-dev/2017-November/124480.html
      .
      
      Change-Id: I72537ef7a9c56221fb13d11b4fc5aef9c7446601
      0ac3afe5
  3. Nov 16, 2017
  4. Oct 31, 2017
    • Duong Ha-Quang's avatar
      Specify 'become' for only necessary tasks (default roles) · 2d3866c6
      Duong Ha-Quang authored
      Add become to only neccesary tasks in roles:
      - glance
      - heat
      - horizon
      - keystone
      - neutron
      - nova
      - openvswitch
      
      Gate is also updated to use 'become' feature
      
      Change-Id: I2f3f27306e9f384148e1ad4d54d8da2ebef34d00
      Partial-Implements: blueprint ansible-specific-task-become
      2d3866c6
  5. Oct 17, 2017
    • Mark Goddard's avatar
      Add support for --skip-tags argument · c3e91725
      Mark Goddard authored
      This allows for skipping tasks which match the provided tags, using
      the ansible-playbook argument of the same name.
      
      This can be useful in combination with --tags, to skip reconfiguration
      of the common tasks:
      
      kolla-ansible reconfigure --tags nova --skip-tags common
      
      Change-Id: I766552f7ae4099da3d174759f4a609ffe8b4d89f
      c3e91725
  6. Oct 10, 2017
  7. Oct 05, 2017
    • James McCarthy's avatar
      Update container_proxy with configurable proxy settings · 9369ad12
      James McCarthy authored
      For a deployment behind a firewall/proxy server some additional
      environment settings should be passed along, for containers
      such as magnum
      
      This commit adds three new properties;
       container_http_proxy
       container_https_proxy
       container_no_proxy
      
      In particular, the user will want to set container_http_proxy
      and container_https_proxy properties with the proxy server
      details.
      
      Closes-Bug: #1628335
      Change-Id: I0950a0467b4b68c38b13875eaf9cd433e64363cf
      9369ad12
  8. Sep 25, 2017
    • Pierre Hanselmann's avatar
      Horizon multidomain flag · bd186a2e
      Pierre Hanselmann authored
      Added horizon_keystone_multidomain flag. It can be now overriden
      in globals.yml. Default set to False.
      
      Change-Id: I6f8f261cf4b9779e57c2443ac219cdddb1731f52
      bd186a2e
    • Duong Ha-Quang's avatar
      Specify 'become' to necessary tasks (general roles) · 26b2c2d9
      Duong Ha-Quang authored
      Add config_owner_user and config_owner_group to group_vars/all,
      which is user and group of Kolla configuration files in /etc/kolla.
      
      Add become to post-deploy playbook.
      
      Add become to only neccesary tasks in roles:
      - certificate
      - common
      - destroy
      - haproxy
      - mariadb
      - memcached
      - rabbitmq
      
      Change-Id: I2aba745a6e3928c52642f64551470fd08cbfd058
      Partial-Implements: blueprint ansible-specific-task-become
      26b2c2d9
  9. Sep 21, 2017
  10. Sep 19, 2017
  11. Sep 18, 2017
    • James McCarthy's avatar
      Update designate to allow use of external bind9 dns servers. · d4f8b413
      James McCarthy authored
      kolla designate DNSaaS makes use of containerised bind9 servers
      as it's default designate_backend. These can be disabled by
      setting designate_backend to "no". default: "bind9"
      
      This commit adds two new properties:
      1) designate_backend_external
       which can be enabled by setting it to 'bind9'. default: "no"
      and
      2) designate_backend_external_bind9_nameservers, which can
       accept a csv list of all the external server addresses.
       (default: "")
      
      The following attributes should either be set:
      'internal' (the default)
       designate_backend: "bind9"
       designate_backend_external: "no"
       (designate_backend_external_bind9_nameservers is ignored)
      or
       'external'
       designate_backend: "no"
       designate_backend_external: "bind9"
       (designate_backend_external_bind9_nameservers must be populated)
      
      Configuration override files to align with external bind9
      dns servers must be supplied manually,
       /etc/kolla/config/designate/rndc.key
       /etc/kolla/config/designate/rndc.conf
      
      Change-Id: I8dbe6fd4fe7820b9143604d89e8399b07e07c3fd
      d4f8b413
  12. Sep 13, 2017
    • Mark Goddard's avatar
      Support configuration of custom fluentd outputs · fb465146
      Mark Goddard authored
      In some scenarios it may be useful to configure custom fluentd outputs
      to forward logs to a logging service other than elasticsearch.
      
      This change supports configuration of fluentd outputs by placing
      output configuration files in /etc/kolla/config/fluentd/output/*.conf.
      
      Change-Id: I3c0b271d88dbb307ba3a23546e29c72e8baeca55
      Implements: blueprint fluentd-custom-outputs
      fb465146
    • Bertrand Lallau's avatar
      Simplify Openstack services configuration possibilities · a3dfdfc0
      Bertrand Lallau authored
      Actually Openstack services configuration can be overriden using many
      files:
      - /etc/kolla/config/<< service name >>/<< config file >>
      - /etc/kolla/config/<< service name >>/<<host>>/<< config file >>
      - /etc/kolla/config/global.conf
      - /etc/kolla/config/database.conf
      - /etc/kolla/config/messaging.conf
      
      Only per-service configuration is actually documented here:
      https://github.com/openstack/kolla-ansible/blob/master/doc/advanced-configuration.rst#L164
      
      Allowing to globally modify service configuration can be perform too,
      but it can be done in 3 different manners, all not documented:
      - /etc/kolla/config/global.conf
      - /etc/kolla/config/database.conf
      - /etc/kolla/config/messaging.conf
      
      database.conf and messaging.conf seems redundant with global.conf.
      In order to simplify codebase it seems logical to remove them.
      
      Documentation has been added for overriding configuration globally and
      release note has been added too.
      
      Closes-Bug: #1682479
      Change-Id: I5d922dfc0d938173bad34ac64e490b78db1b7e31
      a3dfdfc0
  13. Sep 12, 2017
  14. Sep 05, 2017
  15. Aug 23, 2017
  16. Aug 21, 2017
    • Eduardo Gonzalez's avatar
      Fix missing tacker-conductor service · ecc02217
      Eduardo Gonzalez authored
      Tacker has included a new conductor service
      to manage mistral workflows for VIM monitoring.
      
      Without conductor, Tacker cannot create VIMs.
      
      This change reworks tacker to include tacker-conductor
      service.
      
      Depends-On: I52778e86e4f2c297ead8d4b09983e5e38ca88c70
      Closes-Bug: #1710874
      Change-Id: I6901e919887551bedc9dba8983ac904e8c48c9ce
      ecc02217
  17. Aug 17, 2017
    • Paul Bourke's avatar
      Add dev mode for glance · dbe7b591
      Paul Bourke authored
      Allows users to develop on Glance using Kolla.
      
      Change-Id: I2c7c97ddf84ca19505cf01adaf982c6a3f70d7d0
      Partially-Implements: blueprint mount-sources
      dbe7b591
    • guochao's avatar
      Add Swift backend support to Glance · d3e07342
      guochao authored
      Support setting Swift as Glance storage backend.
      
      Change-Id: Idddbf2ce741e0486d60e1de88c77a7f0332a5a2b
      d3e07342
  18. Aug 09, 2017
    • Sean Mooney's avatar
      introduce playbook to ovs with dpdk · 781d8465
      Sean Mooney authored
      - This change creates a new role to
        support deploying ovs with dpdk.
      - This change introduces an enable_ovs_dpdk
        variable to enable ovs with dpdk as part of
        the deploy action.
      - This change extends the ovs-dpdkctl.sh tool
        to correctly deploy ovs-dpdk on Ubuntu and CentOS
        hosts.
      - This change extends the cleanup-host tool
        to correctly uninstall ovs-dpdkctl.sh tool and its
        systemd files if present on the host.
      - This change automatically configures userspace
        kernel drivers.
      
      partial-implementes: bp/ovs-dpdk
      Change-Id: I55858d81df437e8258705b75426f61ab9b907c7d
      781d8465
  19. Aug 03, 2017
  20. Jul 27, 2017
  21. Jul 26, 2017
    • Jeffrey Zhang's avatar
      Support multi local chrony servers · 72ee7dac
      Jeffrey Zhang authored
      In the old implementation, if there is no external ntp server, only one
      local chrony server is supported. If multi chrony-server is configured,
      chrony client can not sync with them.
      
      In the new implementation
      * use VIP to connect chrony-server, which ensure multi local chrony
        servers are supported.
      * chrony servers depend on VIP. So chrony-server group should be
        the same with haproxy group.
      * prevent chrony client sync from itself.
      * Change owner to chrony:kolla for chrony log folder
      * fix keysfile path
      * use chrony user for centos and ubuntu image
      * fix permission issue for /var/lib/chrony folder
      
      Closes-Bug: #1705200
      Change-Id: I6e85fda9824b5ddc7a96895425c5932a3566c27e
      72ee7dac
  22. Jul 21, 2017
  23. Jul 17, 2017
    • Jeffrey Zhang's avatar
      Remove ceilometer-api and ceilometer-collector services · ddad15c0
      Jeffrey Zhang authored
      * remove ceilometer-api and ceilometer-collector service
      * use ceilometer-notification to publish message to proper backend
      * remove useless ceilometer_database_type and ceilometer_event_type
        variables
      * sync event_definitions.yaml, event_pipeline.yaml and pipeline.yaml
        file with upstream
      
      Change-Id: Ib39053cb5f70bd11ee61d3f26d5b28accecd7190
      ddad15c0
  24. Jul 10, 2017
    • Andrew Smith's avatar
      Add qdrouterd role for messaging infrastructure component · eeb535aa
      Andrew Smith authored
      Adding the role needed to run the qdrouterd as an infrastructure
      component which provides a messaging backend for the
      oslo.messaging AMQP 1.0 driver. The qdrouterd will provide direct
      messaging capabilities for the RPC messaging pattern in support
      of hybrid messaging deployments.
      
      Implements: blueprint qdrouterd-role
      Change-Id: I74c654b3c70f61f81c2c7efa87f076a62a4a2dd8
      eeb535aa
    • jimmygc's avatar
      Add ceph rgw object store support into trove · 69d9343f
      jimmygc authored
      Ceph rgw can be used as object store instead of Swift.
      This patch enable trove to use ceph rgw as object store.
      
      Change-Id: I50b878078b7c62c1034a102d064dfa90a1357ee8
      69d9343f
  25. Jul 06, 2017
    • Eduardo Gonzalez's avatar
      Migrate cinder-api under apache · d708e956
      Eduardo Gonzalez authored
      Cinder ubuntu binary was already migrated under apache.
      This change migrates rest of the distros/install types to
      be executed under an apache process.
      
      Change-Id: I8544eec5bfebf771d758f13abf4dfbc802f5d24f
      d708e956
  26. Jul 04, 2017
  27. Jul 02, 2017
  28. Jun 27, 2017
    • Vladislav Belogrudov's avatar
      Add flag to allow provider networks · f6eefdf3
      Vladislav Belogrudov authored
      In case of provider networks we need to configure external bridge
      on compute nodes, like it is done in DVR. The only way to tell
      if provider networks are to be used is a new flag.
      
      Change-Id: I1aef197ee2b84e28f2131f058e6995551f873fe1
      Closes-Bug: #1694726
      f6eefdf3
  29. Jun 21, 2017
    • Mark Goddard's avatar
      Barbican simple_crypto plugin broken - invalid key · 2e435906
      Mark Goddard authored
      
      When using the simple_crypto plugin, barbican expects the
      [simple_crypto_plugin] kek config value to be a base64-encoded 32 byte
      value. However, kolla-ansible is providing a standard autogenerated
      password.
      
      There are two relevant variables in kolla-ansible -
      barbican_crypto_password (a standard password) and barbican_crypto_key
      (a HMAC-SHA256 key). There is no use of barbican_crypto_key other than
      when it is generated. barbican_crypto_password is used to set the
      [simple_crypto_plugin] kek config value but causes an error when the
      simple_crypto plugin is used as the value is not in the expected format.
      Using barbican_crypto_key instead resolves the error. Clearly there is a
      naming issue here and we should be using barbican_crypto_key instead of
      barbican_crypto_password.
      
      This change removes the barbican_crypto_password variable and uses
      barbican_crypto_key instead.
      
      Change-Id: I63e2b381c260265e5901ee88ca0a649d96952bda
      Closes-Bug: #1699014
      Related-Bug: #1683216
      Co-Authored-By: default avatarStig Telfer <stig@stackhpc.com>
      2e435906
    • Vladislav Belogrudov's avatar
      Add possibility to configure tenant network types and type drivers · 296ddbeb
      Vladislav Belogrudov authored
      This patch add configuration options for tenant network types and type
      drivers. Both lists are checked so that tenant types are listed in
      drivers. For ironic 'flat' driver is mandatory and is added explicitly
      into ironic prechecks.
      
      Change-Id: Ie5775001165412910a258cbed2d2ebbb8ebbd879
      Closes-Bug: #1694725
      296ddbeb
    • Eduardo Gonzalez's avatar
      Move mDNS to network nodes · 1f1d91b9
      Eduardo Gonzalez authored
      mDNS publish DNS services to designate service customers.
      Only network node should be reachable by public networks.
      
      Change-Id: Id2947df89d2d831d67e006a581ac88b4ecf8ce04
      Closes-Bug: #1693918
      1f1d91b9
  30. Jun 19, 2017
    • Eduardo Gonzalez's avatar
      Enable port_security by default · 112d6326
      Eduardo Gonzalez authored
      Neutron recommend as good practice to enable port_security
      extension by default. Current networks will remain using
      security groups, but will allow users to disable port_security
      in their port or networks.
      An example use case is nfv.
      
      Change-Id: I69f2e3567fd00695cf1c4bcc9177c2b88e33c3ab
      112d6326
  31. Jun 15, 2017
  32. Jun 12, 2017
Loading