- May 06, 2021
-
-
Michał Nasiadka authored
Co-Authored-By:
Bartosz Bezak <bartosz@stackhpc.com> Change-Id: I4fc2cb451589dfec82c343868667020f8dcee901
-
- May 05, 2021
-
-
Radosław Piliszek authored
Per [1]. [1] http://eavesdrop.openstack.org/meetings/kolla/2021/kolla.2021-04-28-15.00.html Change-Id: Ie109d15db1e26e20b78efdb4ab0653d24054820f
-
- Apr 27, 2021
-
-
Radosław Piliszek authored
As agreed during IRC meeting. [1] [1] http://eavesdrop.openstack.org/meetings/kolla/2021/kolla.2021-04-07-15.00.html Change-Id: Ibffa019e2106784e97f5c482106bb5082f788752
-
- Apr 24, 2021
-
-
Michał Nasiadka authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/772479 Change-Id: I7ae919875fb9dea756ca26d90dc1af791ac766ce
-
Radosław Piliszek authored
Followup on I91e5c1840ace8f567daf462c4eb3ec1f0c503823 When+run_once do not play nicely. [1] The general workaround is to use include_tasks. [2] However, it is very unlikely user wishes to run this role without having any pacemaker nodes so the simplification that we use throughout the Kolla Ansible code should be enough. [1] https://github.com/ansible/ansible/issues/11496 [2] https://github.com/ansible/ansible/issues/11496#issuecomment-412936547 Change-Id: Ifaf64e3d9d89b2ec36a883fb7458556745b64802
-
- Apr 21, 2021
-
-
Mark Goddard authored
If docker_configure_for_zun is set to true, then Zun-specific configuration for Docker is applied to all nodes. It should only be applied based on the relevant inventory groups. In some cases this can cause Docker to fail to start. See https://storyboard.openstack.org/#!/story/2008544 for details. This change applies the configuration based on the zun-compute and zun-cni-daemon groups. It also modifies the expression to not assume that these groups exist in the inventory. Change-Id: I0141abf0dd83e3a567ea6dcca945f86db129becf Closes-Bug: #1914378 Story: 2008544 Task: 41645 Co-Authored-By:
Buddhika Sanjeewa <bsanjeewa@kln.ac.lk>
-
- Apr 15, 2021
-
-
Michał Nasiadka authored
Change-Id: I14376dac46809f8bb466ec41f279be8d323d459d
-
- Apr 14, 2021
-
-
Michal Arbet authored
- Replace hardcoded haproxy monitor user with variable. - Rename mariadb_backup variable to mariadb_backup_possible. - Drop creation of monitor user in handlers as this is now handled in register.yml for good reason. Change-Id: I255a79d36ae18ca42d0befd00b235ca509197db3
-
Michał Nasiadka authored
Change-Id: Id16ec7d7b57630ae20430675c4a196e63ca8d4a5
-
- Apr 12, 2021
-
-
Michał Nasiadka authored
Change-Id: I1010ee42aaf1c650d9e3b5332ebf828646a6badf
-
- Apr 08, 2021
-
-
Mark Goddard authored
Change-Id: I3f43df7766c57622ab8d01a759fbeeef0a0c2b93 Implements: blueprint masakari-hostmonitor Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
Gaëtan Trellu authored
Adds HAcluster Ansible role. This role contains High Availability clustering solution composed of Corosync, Pacemaker and Pacemaker Remote. HAcluster is added as a helper role for Masakari which requires it for its host monitoring, allowing to provide HA to instances on a failed compute host. Kolla hacluster images merged in [1]. [1] https://review.opendev.org/#/c/668765/ Change-Id: I91e5c1840ace8f567daf462c4eb3ec1f0c503823 Implements: blueprint ansible-pacemaker-support Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Co-Authored-By:
Mark Goddard <mark@stackhpc.com>
-
- Apr 07, 2021
-
-
Michal Arbet authored
Kolla-ansible is currently installing mariadb cluster on hosts defined in group['mariadb'] and render haproxy configuration for this hosts. This is not enough if user want to have several service databases in several mariadb clusters (shards). Spread service databases to multiple clusters (shards) is usefull especially for databases with high load (neutron,nova). How it works ? It works exactly same as now, but group reference 'mariadb' is now used as group where all mariadb clusters (shards) are located, and mariadb clusters are installed to dynamic groups created by group_by and host variable 'mariadb_shard_id'. It also adding special user 'shard_X' which will be used for creating users and databases, but only if haproxy is not used as load-balance solution. This patch will not affect user which has all databases on same db cluster on hosts in group 'mariadb', host variable 'mariadb_shard_id' is set to 0 if not defined. Mariadb's task in loadbalancer.yml (haproxy) is configuring mariadb default shard hosts as haproxy backends. If mariadb role is used to install several clusters (shards), only default one is loadbalanced via haproxy. Mariadb's backup is working only for default shard (cluster) when using haproxy as mariadb loadbalancer, if proxysql is used, all shards are backuped. After this patch will be merged, there will be way for proxysql patches which will implement L7 SQL balancing based on users and schemas. Example of inventory: [mariadb] server1 server2 server3 mariadb_shard_id=1 server4 mariadb_shard_id=1 server5 mariadb_shard_id=2 server6 mariadb_shard_id=3 Extra: wait_for_loadbalancer is removed instead of modified as its role is served by check already. The relevant refactor is applied as well. Change-Id: I933067f22ecabc03247ea42baf04f19100dffd08 Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
Mark Goddard authored
* Don't generate masakari.conf for instance monitor * Don't generate masakari-monitors.conf for API or engine * Use a consistent name for dimensions - masakari_instancemonitor_dimensions * Fix source code paths in dev mode Change-Id: I551f93c9bf1ad6712b53c316074ae1df84e4352b
-
- Apr 06, 2021
-
-
Radosław Piliszek authored
We can't check this with timedatectl as it is not aware of any "non-native" NTP daemon. This could be a warning-level message but we don't have such messages from the prechecks. Closes-Bug: #1922721 Change-Id: I6db37576118cf5cff4ba7a63e179f0ab37467d22
-
Radosław Piliszek authored
Per [1]. [1] http://lists.openstack.org/pipermail/openstack-discuss/2021-February/020707.html Change-Id: Id6f3cd158bf5d01750971249b11364b6a8631789 Closes-Bug: #1885689
-
- Mar 30, 2021
-
-
Michał Nasiadka authored
After WSGI implementation the permissions were not fixed. Depends-On: https://review.opendev.org/c/openstack/kolla/+/783845 Change-Id: I908efe29dcd16c10b0bc88582d8dfb23ba573a35
-
- Mar 26, 2021
-
-
Michal Nasiadka authored
Change-Id: I947c2940518c0f4872acaa977edeaca370dc9a96
-
wuchunyang authored
host -> host_ip[0] Remove deprecated configuration notification_topics. WARNING oslo_config.cfg [-] Deprecated: Option "notification_topics" from group "DEFAULT" is deprecated. Use option "topics" from group "oslo_messaging_notifications". [0]https://docs.openstack.org/cyborg/latest/configuration/sample-config.html Change-Id: Ia5d53fb60d34c1509c6cdb905cbd0a93dd1c8b3d
-
- Mar 25, 2021
-
-
Michal Nasiadka authored
Co-Authored-By:
Bartosz Bezak <bartosz@stackhpc.com> Depends-On: https://review.opendev.org/c/openstack/kolla/+/782906 Change-Id: I73cd776772a45c9ffcb045f4d0eff8f4bdc997f1
-
Michał Nasiadka authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/782815 Change-Id: I5230f017f1fa99629b81d944ba245c5778411b1f
-
Martin Chlumsky authored
This change also adds support for Octavia backend TLS. Closes-Bug: #1874228 Depends-On: https://review.opendev.org/c/openstack/kolla/+/779892 Change-Id: I5ff84aec4cdbc15f6a797391815243821dbdbd67
-
- Mar 24, 2021
-
-
Michal Nasiadka authored
For using 3rd party Octavia providers (such as OVN provider) an octavia-driver-agent container must be running to expose those providers to use. OVN CI job has been extended with deploying Octavia and testing OVN Load Balancer. Closes-Bug: #1903506 Depends-On: https://review.opendev.org/c/openstack/kolla/+/771191 Change-Id: Ibafa8b7307981f2a51e630cc113d18af6162171c
-
- Mar 23, 2021
-
-
Pierre Riteau authored
This follows the pattern used in other roles. Change-Id: Ie5e2ea2cab853b4f389c944863d9d2df542856ad
-
- Mar 16, 2021
-
-
Bartosz Bezak authored
Allow users to import custom grafana dashboards. Dashboards as JSON files should be placed into "{{ node_custom_config }}/grafana/dashboards/" folder. Change-Id: Id0f83b8d08541b3b74649f097b10c9450201b426
-
Doug Szumski authored
ELK 7 requires some minor changes from the existing ELK 6 config. Depends-On: Icfa3db5788b25f70ee75411dbaf20d8d4a6a734b Change-Id: I9815d202a77da0477aea43d714a5def8a24724fa
-
- Mar 15, 2021
-
-
zhubingbing authored
The rabbitmq_prometheus plugin is available in RabbitMQ 3.8. https://www.rabbitmq.com/prometheus.html Implements: blueprint rabbitmq-prometheus Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I4d69a93a6c70db8d40626042cdbe773747b238ae
-
- Mar 13, 2021
-
-
Michal Arbet authored
This trivial patch is just turning off ansible changed report for group_by tasks as it could be confusing for user. Change-Id: I7512af573782359a6f01290a55291ac7eb0de867
-
LinPeiWen authored
This change enables the use of Docker healthchecks for haproxy services. Implements: blueprint container-health-check Change-Id: I4b486e9c78e9a01a0f5983b83aca00ea3a001dcc
-
- Mar 11, 2021
-
-
Mark Goddard authored
In I165199fc98fb98f227f2a20284e1bab03ef65b5b and Ic745300b27e50132d80d03787fa4abfada2d0173 we provided flags to disable Docker's control of iptables and bridge networking respectively. The original behaviour was maintained for backwards compatibility, to allow the patches to be backported. This patch changes the default behaviour to disable the manipulation of iptables and disabling bridge networking. Related-Bug: #1849275 Related-Bug: #1848249 Change-Id: I4e8206f13a847ff79e06c36d22068597458b6c3d
-
Dincer Celik authored
Docker is using 172.17.0.0/16 by default for bridge networking on docker0, and this might cause routing problems for operator networks. This change introduces docker_disable_default_network to disable the bridge networking by putting "bridge: none"[1] to daemon.json Bridge networking does not work without iptables, so we set the default for docker_disable_default_network to docker_disable_default_iptables_rules. For better defaults, this feature will be enabled by default in Wallaby. [1] https://docs.docker.com/engine/reference/commandline/dockerd/ Change-Id: Ic745300b27e50132d80d03787fa4abfada2d0173 Closes-Bug: #1848249 Related-Bug: #1849275
-
LinPeiWen authored
This change enables the use of Docker healthchecks for elasticsearch services. Implements: blueprint container-health-check Change-Id: Ib50d56cc206a80b20a4f96e95bcdd8d11269234f
-
LinPeiWen authored
This change enables the use of Docker healthchecks for kibana services. Implements: blueprint container-health-check Change-Id: If7525e193c245435410b4071aed6d3b566424219
-
- Mar 10, 2021
-
-
Michał Nasiadka authored
In order to disable libvirt debug in CI (which takes vast amount of storage) this change introduces nova_libvirt_logging_debug and disables that in CI. Change-Id: I90bfd1b300ad3202ea4d139fda6d6beb44c5820f
-
Maksim Malchuk authored
According the documentation [1] there need to configure auth_uri in the [filter:s3token] section instead of www_authenticate_uri which cause an error 'swift.common.wsgi.ConfigFileError: Invalid auth_uri; must include scheme and host' during start the swift-proxy-server container. 1. https://docs.openstack.org/swift/ussuri/middleware.html#s3-token-middleware Change-Id: I6b8f5807ebb746428a501dca13eae30763dede8d Closes-Bug: 1862765 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
wuchunyang authored
Cinder api v2 support removed in wallaby. refer to http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018697.html Change-Id: I120101d6c30f9169f4c3811357b5ed06496c90ff
-
- Mar 09, 2021
-
-
wuchunyang authored
use User and Group in octavia-interface service. this way looks more graceful this change also fix the octavia-interface does not restart when the octavia-interface.service changed. Change-Id: I9d253d7519b1774985d165a080047fdbecd321b4
-
- Mar 08, 2021
-
-
LinPeiWen authored
This change enables the use of Docker healthchecks for vitrage services. Implements: blueprint container-health-check Change-Id: Icd2a8471a08b737352cfe941b5d38b02ed3b19fe
-
LinPeiWen authored
This change enables the use of Docker healthchecks for aodh services. Implements: blueprint container-health-check Change-Id: Ic477ac77f7ea5c50de473382fb1ec63d78043267
-
LinPeiWen authored
This change enables the use of Docker healthchecks for gnocchi services. Implements: blueprint container-health-check Change-Id: Ib1eb766d061c376c0bdd693dd6ea1e5b3e3fc02a
-