- Apr 08, 2021
-
-
Gaëtan Trellu authored
Adds HAcluster Ansible role. This role contains High Availability clustering solution composed of Corosync, Pacemaker and Pacemaker Remote. HAcluster is added as a helper role for Masakari which requires it for its host monitoring, allowing to provide HA to instances on a failed compute host. Kolla hacluster images merged in [1]. [1] https://review.opendev.org/#/c/668765/ Change-Id: I91e5c1840ace8f567daf462c4eb3ec1f0c503823 Implements: blueprint ansible-pacemaker-support Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Co-Authored-By:
Mark Goddard <mark@stackhpc.com>
-
- Mar 25, 2021
-
-
Martin Chlumsky authored
This change also adds support for Octavia backend TLS. Closes-Bug: #1874228 Depends-On: https://review.opendev.org/c/openstack/kolla/+/779892 Change-Id: I5ff84aec4cdbc15f6a797391815243821dbdbd67
-
- Mar 04, 2021
-
-
Doug Szumski authored
This change allows a user to forward control plane logs directly to Elasticsearch from Fluentd, rather than via the Monasca Log API when Monasca is enabled. The Monasca Log API can continue to handle tenant logs. For many use cases this is simpler, reduces resource consumption and helps to decouple control plane logging services from tenant logging services. It may not always be desired, so is optional and off by default. Change-Id: I195e8e4b73ca8f573737355908eb30a3ef13b0d6
-
- Jan 27, 2021
-
-
Doug Szumski authored
There are a few issues fixed here: - The Barbican API service doesn't set a log file, so all the Barbican API service logs go to loadwsgi.py.log by default. - The logs in loadwsgi.py.log are not ingested properly by Fluentd. - uWSGI logs go to barbican-api.log. This would normally be used as the log file for the Barbican API service logs. This patch makes the following changes to address the above issues: - All uWSGI logs (from the Emperor and Vassals) go to barbican_api_uwsgi_access.log Although these logs aren't strictly all access logs, this follows the existing pattern for WSGI logs. - The Barbican API service logs are written to barbican-api.log instead of loadwsgi.py.log. This follows the pattern used by other OpenStack services. - Fluentd is configured to parse the Barbican API service logs as it would with other OpenStack Python services. Change-Id: I6d03fa8c81c52b6f061514a836bbd15bb6639aaf Closes-Bug: #1891343
-
- Dec 22, 2020
-
-
Kendall Nelson authored
As announced on the openstack-discuss ML[1], Karbor is retiring this cycle (Wallaby). Needed-By: https://review.opendev.org/c/openstack/karbor/+/767032 [1] http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018643.html Change-Id: I222cf302e507f6a9de0347c79ec536aa7be22bb6
-
- Dec 16, 2020
-
-
Ghanshyam Mann authored
Searchlight project is retiring in Wallaby cycle[1]. This commit removes the ansible roles of Searchlight project before its code is removed. Needed-By: https://review.opendev.org/c/openstack/searchlight/+/764526 [1] http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018637.html Change-Id: I85aab66376ea4f1376c2705066ba3c7e5645644f
-
Ghanshyam Mann authored
Qinling project is retiring in Wallaby cycle[1]. This commit removes the ansible roles of Qinling project before its code is removed. Needed-By: https://review.opendev.org/c/openstack/qinling/+/764521 [1] http://lists.openstack.org/pipermail/openstack-discuss/2020-November/018638.html Change-Id: I6543bacff638b1649511f7e779807954c34ef570
-
- Oct 12, 2020
-
-
James Kirsch authored
Add TLS support for backend Neutron API Server communication using HAProxy to perform TLS termination. When used in conjunction with enabling TLS for service API endpoints, network communication will be encrypted end to end, from client through HAProxy to the Neutron service. Change-Id: Ib333a1f1bd12491df72a9e52d961161210e2d330 Partially-Implements: blueprint add-ssl-internal-network
-
- Sep 18, 2020
-
-
Michal Nasiadka authored
Change-Id: Iabc0115d3476a626df134cc70cb473bf6e72487e Closes-Bug: #1890439
-
- Aug 19, 2020
-
-
Rafael Weingärtner authored
The goal for this push request is to normalize the construction and use of internal, external, and admin URLs. While extending Kolla-ansible to enable a more flexible method to manage external URLs, we noticed that the same URL was constructed multiple times in different parts of the code. This can make it difficult for people that want to work with these URLs and create inconsistencies in a large code base with time. Therefore, we are proposing here the use of "single Kolla-ansible variable" per endpoint URL, which facilitates for people that are interested in overriding/extending these URLs. As an example, we extended Kolla-ansible to facilitate the "override" of public (external) URLs with the following standard "<component/serviceName>.<companyBaseUrl>". Therefore, the "NAT/redirect" in the SSL termination system (HAproxy, HTTPD or some other) is done via the service name, and not by the port. This allows operators to easily and automatically create more friendly URL names. To develop this feature, we first applied this patch that we are sending now to the community. We did that to reduce the surface of changes in Kolla-ansible. Another example is the integration of Kolla-ansible and Consul, which we also implemented internally, and also requires URLs changes. Therefore, this PR is essential to reduce code duplicity, and to facility users/developers to work/customize the services URLs. Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93 Signed-off-by:
Rafael Weingärtner <rafael@apache.org>
-
- Aug 06, 2020
-
-
Kien Nguyen authored
Change-Id: Ib08544a265fe1e0d599a6243cb9d38ed9a7769e1
-
- Jul 28, 2020
-
-
Mark Goddard authored
Currently we generate multiple fluentd configuration files for inputs, filters, formatters and outputs. These are then included from the main td-agent.conf configuration file. With a large number of hosts, this can take a long time to template. Benchmarking of templating is available at [1]. This change switches to a single fluentd configuration file, with the include done locally. For the default template files included with Kolla Ansible we use Jinja includes, but this does not work with templates in a different directory. We therefore use the Ansible template lookup plugin, which has a slightly higher overhead than a jinja include, but far lower than generating multiple templates. This should drastically improve the performance of this task. [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/template.md Partially-Implements: blueprint performance-improvements Change-Id: Ia8623be0aa861fea3e54d2c9e1c971dfd8e3afa9
-
Mark Goddard authored
Currently we generate a logrotate configuration file for each enabled service. These are then included from a logrotate.d directory. With a large number of hosts, this can take a long time to template. Benchmarking of templating is available at [1]. This change switches to a single logrotate configuration file for all services, with the include done locally using jinja. This should drastically improve the performance of this task. [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/template.md Partially-Implements: blueprint performance-improvements Change-Id: I39cfa70bef6560f615cad516c43aaef6a523b964
-
- Jul 27, 2020
-
-
Michal Nasiadka authored
fluentd logs currently to stdout, which is known to produce big docker logs in /var/lib/docker. This change makes fluentd to log to /var/log/kolla/fluentd. Closes-Bug: #1888852 Change-Id: I8fe0e54cb764a26d26c6196cef68aadc6fd57b90
-
- Jul 21, 2020
-
-
Pierre Riteau authored
A "@type copy" statement is already present at the beginning of each match element, so extra "type copy" are not needed. They are causing the following warnings in fluentd logs: [warn]: parameter 'type' in <match syslog.local0.**> [warn]: parameter 'type' in <match syslog.local1.**> This commit also harmonizes indentation of the Monasca config block. Change-Id: I779c2b942d007acbdd43d999f2fc0cdc131d431f Related-Bug: #1885873
-
- Jul 02, 2020
-
-
Justinas Balciunas authored
Time format in Ruby Time.strptime is not accepting padding flags, therefore we need to remove them for the Fluentd to be able to parse MariaDB xinetd logs properly. Change-Id: Iabfa9afdcad505106a5580eb2d058273ee5f7c1f Closes-Bug: #1886002
-
Stig Telfer authored
In Fluentd v0.12, both the in memory and file buffer chunk size default to 8MB. In v1.0 the file buffer defaults to 256MB. This can exceed the Monasca Log or Unified API maximum chunk size which is set to 10MB. This can result in logs being rejected and filling the local buffer on disk. Change-Id: I9c495773db726a3c5cd94b819dff4141737a1d6e Closes-Bug: #1885885 Co-Authored-By:
Sebastian Luna Valero <sebastian.luna.valero@gmail.com>
-
- Jul 01, 2020
-
-
Stig Telfer authored
Resolve trivial syntax error in Fluentd output config for Monasca. Change-Id: I20b37bb83a76bfabb1126925a1b4f1f59767b7a3 Co-Authored-By:
Sebastian Luna Valero <sebastian.luna.valero@gmail.com> Closes-Bug: #1885873
-
- Jun 25, 2020
-
-
Mark Goddard authored
Currently there is no way to configure a CA certificate bundle file for fluentd to Elasticsearch communication. This change adds a new variable, 'fluentd_elasticsearch_cacert' with a default value set to the value of 'openstack_cacert. Closes-Bug: #1885109 Change-Id: I5bbf55a4dd4ccce9fa2635cee720139c088268e3
-
- Jun 20, 2020
-
-
gugug authored
more info: https://review.opendev.org/#/c/721733/ Depends-On: I561ead226f714d98c8e06e6027715a64c3a8e47e Depends-On: I21c9ab9820f78cf76adf11c5f0591c60f76372a8 Change-Id: Ic740d090211ee331b374a6dac69dfde466df7200 Co-Authored-By:
jacky06 <zhang.min@99cloud.net>
-
- Jun 19, 2020
-
-
gugug authored
more info: https://opendev.org/openstack/kolla-ansible/commit/a6c97d7284c7de437ebfc9f8ee289244f29e65d7 Change-Id: I778d472cc7f6ca19852482a3e309d793973d75a6 Co-Authored-By:
jacky06 <zhang.min@99cloud.net>
-
- Jun 16, 2020
-
-
James Kirsch authored
Replaced "kolla_external_fqdn_cacert" and "kolla_internal_fqdn_cacert" with "kolla_admin_openrc_cacert". OS_CACERT is now set to the value of "kolla_admin_openrc_cacert" in the generated admin-openrc.sh file. Change-Id: If195d5402579cee9a14b91f63f5fde84eb84cccf Partially-Implements: blueprint add-ssl-internal-network Depends-On: https://review.opendev.org/#/c/731344/
-
- May 23, 2020
-
-
Doug Szumski authored
The Monasca Log API has been removed and in this change we switch to using the unified API. If dedicated log APIs are required then this can be supported through configuration. Out of the box the Monasca API is used for both logs and metrics which is envisaged to work for most use cases. In order to use the unified API for logs, we need to disable the legacy Kafka client. We also rename the Monasca API config file to remove a warning about using the old style name. Depends-On: https://review.opendev.org/#/c/728638 Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
-
- May 20, 2020
-
-
Michal Nasiadka authored
Depends-On: https://review.opendev.org/710217/ Change-Id: I85652f23e487c40192106d23f2cdd45a3077deca
-
- May 15, 2020
-
-
Michal Nasiadka authored
Change-Id: I812665059783617d581d748e619b29426f89b353
-
- Apr 30, 2020
-
-
James Kirsch authored
Add TLS support for Glance api using HAProxy to perform TLS termination. Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809 Partially-Implements: blueprint add-ssl-internal-network
-
Hongbin Lu authored
Zun has a new component "zun-cni-daemon" which should be deployed in every compute nodes. It is basically an implementation of CNI (Container Network Interface) that performs the neutron port binding. If users is using the capsule (pod) API, the recommended deployment option is using "cri" as capsule driver. This is basically to use a CRI runtime (i.e. CRI plugin for containerd) for supporting capsules (pods). A CRI runtime needs a CNI plugin which is what the "zun-cni-daemon" provides. The configuration is based on the Zun installation guide [1]. It consits of the following steps: * Configure the containerd daemon in the host. The "zun-compute" container will use grpc to communicate with this service. * Install the "zun-cni" binary at host. The containerd process will invoke this binary to call the CNI plugin. * Run a "zun-cni-daemon" container. The "zun-cni" binary will communicate with this container via HTTP. Relevant patches: Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime Install guide: https://review.opendev.org/#/c/707948/ Devstack plugin: https://review.opendev.org/#/c/705338/ Kolla image: https://review.opendev.org/#/c/708273/ [1] https://docs.openstack.org/zun/latest/install/index.html Depends-On: https://review.opendev.org/#/c/721044/ Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
-
- Apr 17, 2020
-
-
Q.hongtao authored
Kolla Ansible was missing vitrage-persistor service required by Vitrage for data storage. Depends on fixing availability of Kolla image. Change-Id: I8158ba66b8b624f6bcb89da9c990a30a68b7187b Depends-On: Id5e143636f9a81e7294b775f3d8b9134bee58054 Closes-Bug: #1869319
-
- Apr 10, 2020
-
-
Xing Zhang authored
mistralclient osc plugin does not support cacert and insecure [1] mistralclient interface support fixed in [2] [1] https://bugs.launchpad.net/python-mistralclient/+bug/1715091 [2] https://review.opendev.org/#/q/topic:bug/1854339 Change-Id: I44726b12358bc3c5898ba952371fb838693aca2c
-
- Mar 18, 2020
-
-
Radosław Piliszek authored
Fluentd cannot accept empty 'path' parameter. I refactored the service list following the general pattern we have. Change-Id: I83d820efcc7e86bac9f8bda26a8f8bece72159e6 Closes-bug: #1867953
-
- Mar 17, 2020
-
-
Doug Szumski authored
Currently, config folders lack the execute bit so Fluentd cannot read the config and just does nothing when it starts up. This change explicitly sets the execute bit on folders which need it, rather than doing it in a more generic way which is more risky from a security perspective. Change-Id: Ia840f4b67043df4eaa654f47673dcdc973f13d9c Closes-Bug: #1867754
-
- Mar 10, 2020
-
-
Will Szumski authored
I didn't use a for loop as the logic for omitting the comma for the final element dirties the logic. Change-Id: Id29d5deebcc5126d69a1bd8395e0df989f2081f0
-
Will Szumski authored
We already only include .conf files in fluent.conf: (fluentd)[fluentd@cpu-e-1041 /etc/fluentd]$ cat fluent.conf @include input/*.conf @include filter/*.conf @include format/*.conf @include output/*.conf so this change should not cause ill effect. This works because of the merge option in config files: merge: merges the source directory into the target directory instead of replacing it. Boolean, defaults to false. see https://docs.openstack.org/kolla/latest/admin/kolla_api.html#kolla-api-external-config Change-Id: I28f63ec81f1ea5bc4a213d053bfb2c04388d5925 Closes-Bug: #1862211
-
- Mar 02, 2020
-
-
Zhuo Zhen authored
The logrotate rotation interval and count are not configurable. Currently, the configuration is a "default" that keeps 6 weeks of logs. Change-Id: I4f55ee2a98f7861cb8de2724f5edc32da6d2f9ee
-
- Feb 11, 2020
-
-
Michal Nasiadka authored
Kolla-Ansible Ceph deployment mechanism has been deprecated in Train [1]. This change removes the Ansible code and associated CI jobs. [1]: https://review.opendev.org/669214 Change-Id: Ie2167f02ad2f525d3b0f553e2c047516acf55bc2
-
- Feb 04, 2020
-
-
Doug Szumski authored
By default a retry limit of 17 exists. When the limit is reached buffered logs are discarded. To avoid this, we disable the retry limit. The risk of bringing down the host by filling the Fluent data docker volume is managed by the maximum buffer size which is 2GB by default. In summary, after this change, the net behaviour is that Fluentd should buffer up to a maximum of 2GB of logs locally, and attept to post them to the Monasca Log API at intervals not exceeding 30 minutes. Closes-Bug: #1855702 Change-Id: I0d5a3dab29635c00411f4f51e5a0721726df2abd
-
Doug Szumski authored
This enables buffering to file, rather than memory for Monasca logs. A dedicated docker volume is used for the file buffer. If a post to the Monasca Log API fails, retries will be made using an exponential backoff algorithm with a maximum retry interval of 30mins. The maximum interval is set relatively low to try and reduce the risk of large buffers accumulating, and therefore the risk of overloading the Monasca Log API. Closes-Bug: #1855700 Change-Id: Ib5286e9dbaf2bc92d2f4960b2131223ab5dbdbec
-
- Dec 18, 2019
-
-
yj.bai authored
deploy rabbitmq cluster by train with ipv6 report: unable to connect to epmd (port 4369) on control-1: address (cannot connect to host/port) Closes-Bug: #1856725 Change-Id: I36ebb4e196ece8a304269e8c85e39dda72faae50 Signed-off-by:
yj.bai <bai.yongjun@99cloud.net>
-
- Dec 09, 2019
-
-
Mark Goddard authored
WSGI log files use a different input configuration than OpenStack log files. Currently this depends on log files matching either *-access.log or *-error.log. Some services use *_access.log or *_error.log, so are not parsed correctly. This change modifies the fluentd configuration to accept an underscore or hyphen for WSGI log file names. Change-Id: I566d6cac0b6749054fd5422ec8f36f99dacb1db7 Closes-Bug: #1720371
-
Krzysztof Klimonda authored
Enable reconnect_on_error option so that ES plugin re-establishes a new session to the ES cluster on errors. Also, enable buffering to the file, so that the buffer survives container restarts. Co-Authored-By:
Michal Nasiadka <mnasiadka@gmail.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Co-Authored-By:
Doug Szumski <doug@stackhpc.com> Closes-Bug: #1830724 Change-Id: Ia40685b9d4fc02194e03c8791ddeb3d29d7f07f6
-