- Jan 08, 2025
-
-
Michal Nasiadka authored
It's needed to be configured on environments like our CI, because of low cpu/network resources proxysql marks healthy nodes as OFFLINE_HARD Change-Id: I6d1e9e77abc48d82ffd6ade33997c83bb601b0eb (cherry picked from commit 1fbb299d)
-
- Dec 30, 2024
-
-
Michal Nasiadka authored
Add global_request_id according to oslo.log defaults [1], also support lines like: 2024-12-23 20:48:29.905 2 ERROR oslo_service.periodic_task ['Traceback (most recent call last):\\n' [1]: https://docs.openstack.org/oslo.log/latest/configuration/#DEFAULT.logging_context_format_string Closes-Bug: #2044370 Change-Id: I80c3e20de0b7503de6331b55879e85892323b3d6 (cherry picked from commit 5a3fb2b4)
-
- Dec 18, 2024
-
-
Pierre Riteau authored
It can be useful to run Ironic commands on the public API if access to the internal API is not possible. Related-Bug: #2051837 Change-Id: Ice0eb62f2bb26ca6e3ac8d02c6ea787b60408a86 (cherry picked from commit 1916b3c2)
-
- Dec 12, 2024
-
-
Michal Nasiadka authored
It has been added in magnum-cluster-api driver in v0.15.0 [1]: https://github.com/vexxhost/magnum-cluster-api/commit/2a53f3e340524deee3ddbf08b41071fba070d7d3#diff-50c86b7ed8ac2cf95bd48334961bf0530cdc77b5a56f852c5c61b89d735fd711R53 Closes-Bug: #2047360 Change-Id: Ib02389c03ab8f61fdd3827cb30fcc18f3dc952a9 (cherry picked from commit 99e61073)
-
- Dec 02, 2024
-
-
Pierre Riteau authored
Change-Id: If982d397e7c8ed8ac36f6274cbb3438cb04075b3 Closes-Bug: #2087537 (cherry picked from commit 51fb7f92)
-
- Nov 28, 2024
-
-
Piotr Milewski authored
Change-Id: I701aca07eb8b3fd82f14a7f70a2fd96633389231
-
- Nov 26, 2024
-
-
Christian Schilling authored
Change from file to template Closes-Bug: #2089229 Change-Id: I7cbc6a94608baf4f04ef231cc88397fc5dcf0a9b (cherry picked from commit f30dd3e5)
-
Bartosz Bezak authored
Change-Id: I0e07271312bbed49be7a986a2beda04f316dfc8f (cherry picked from commit b5d594d3)
-
- Nov 04, 2024
-
-
Matt Crees authored
Closes-Bug: #2086171 Change-Id: I4001ddad198dcf40f71e9196e126cc78a19d1437 (cherry picked from commit fa54e69e)
-
- Nov 01, 2024
-
-
Roman Krček authored
One task in destroy role was missing arguments that were supplied by the old bash CLI but not supplied by the new python CLI. Closes-Bug: #2086187 Change-Id: I6ced070ca10b63c4d27ac76c1e82dc4312c1b165 Signed-off-by:
Roman Krček <roman.krcek@tietoevry.com> (cherry picked from commit a1eec249)
-
- Oct 31, 2024
-
-
Matt Crees authored
As version-check.yml is added to deploy.yml, we must make sure the tasks are only run when the rabbitmq container exists. Change-Id: Iaa31bae739110094affb5e402ed9ac40b153ac3d (cherry picked from commit f5ad7829)
-
- Oct 26, 2024
-
-
Matus Jenca authored
This patch enables internal TLS database connection for Keystone. Change-Id: I816d051e933a560629d9b9c95362f668abe4ade7
-
- Oct 25, 2024
-
-
Matus Jenca authored
This patch ads an ability to receive TLS connections to ProxySQL. Certificates and variable lookups are added in order for TLS to be enabled by <project_name>_database_internal_tls_enable. Note that in order for this to work, mysql connection strings need to have TLS enabled, which can be added in separate per-service patches Change-Id: I2c06ce5e138f52259c1725dae37f25c1b00d1e6b
-
Michal Nasiadka authored
Change-Id: I33a3ec11b0cdef94b08cd7551008284755824cb7
-
Michal Nasiadka authored
It has been removed in I23867aa98f68298beb5db4558c66c1ffd4e7d6f1 Change-Id: I12d287b9f7f1e5ddf754b7f2ca1dee39778e710e
-
Matus Jenca authored
This commit adds TLS connection between ProxySQL and MariaDB. Frontend TLS ( between services and ProxySQL) will be added in another commit. Parialy Implements: mariadb-ssl-support Change-Id: I154cbb096469c5515c9d8156c2c1c5dd07b95849 Signed-off-by:
Matus Jenca <matus.jenca@dnation.cloud>
-
Michal Arbet authored
The MySQL monitor user privileges were updated to include the REPLICATION CLIENT privilege in addition to USAGE in order to align with ProxySQL documentation [1]. This change ensures that the monitor user can check replication lag, as previously only the USAGE privilege was granted, which was sufficient for basic connection and read-only checks but not for replication monitoring. [1] https://proxysql.com/documentation/backend-monitoring/ Change-Id: I4172cf1d49e9f988cbf2bbe3c3f6835f0de4944d
-
- Oct 17, 2024
-
-
Michal Arbet authored
The backup user was missing the necessary CREATE privilege for the mariadb_backup_history table within the mysql schema, causing backups to fail when attempting to create this table. This patch addresses the issue by granting the backup user the required CREATE permission specifically for the mariadb_backup_history table. With this change, the backup process can now complete successfully without manual intervention for user permissions. Closes-Bug: #2061889 Change-Id: Ic92c8959972329adbd4b89c521aa87678f25b4e4
-
jayjahns authored
In 2023.1, mariadb was at version 10.6, which meant that the PERCONA_SCHEMA.xtrabackup_history table was used to log historicals for backups. Starting in 2023.2 onwards, mariadb is at version 10.11, and the default table used is now mysql.mariadb_backup_history. Because the mysql database already exists, there is no reason to try and create it. Instead, we just need to update the defaults and ensure the permissions get added to the correct database. Related-Bug: #2061889 Change-Id: If146d8f896c70374884807d42ca0e12df3276d48
-
Michal Arbet authored
It's been some time since ProxySQL has been with us in Kolla. Let's switch the load balancer for MariaDB connections from HAProxy to ProxySQL. Depends-On: https://review.opendev.org/c/openstack/kolla/+/928956 Change-Id: I42ba4fb83b5bb31058e888f0d39d47c27b844de5
-
Michal Arbet authored
In single-node clusters, ProxySQL shuns the server on MySQL errors, causing failures during upgrades or container restarts. This change increases the timeout to 10 seconds, allowing the backend time to recover and preventing immediate errors in CI environments. Change-Id: I70becdc3fcb4ca8f7ae31d26097d95bdc6dd67eb
-
- Oct 16, 2024
-
-
Michal Nasiadka authored
Change-Id: Ie2b0b2d5fca7b9d7c613a67a134c4650de2a5af6
-
- Oct 15, 2024
-
-
Jan Horstmann authored
Add missing logrotate config for redis. Closes-Bug: 2084523 Change-Id: Ic631a9c87f7be30f7694706928d9ede62015ed6d Signed-off-by:
Jan Horstmann <horstmann@osism.tech>
-
- Oct 14, 2024
-
-
Jakub Darmach authored
ubuntu-ceph is broken for now due to [1], also there are no download.ceph.com packages for Noble - so we're using Ubuntu provided ones from proposed - because current version in regular repos is built from git sha instead of a release and is not suitable for running outside of Ceph upstream CI. [1]: https://tracker.ceph.com/issues/66389 Depends-On: https://review.opendev.org/c/openstack/kolla/+/907589 Change-Id: I384068572d8a1a495c60b401dc4144a0a80802f1
-
Rafal Lewandowski authored
Closes-Bug: #2084128 Change-Id: I3b44c8f4ff3c55023d8bab4e9a88a86ca72cae5d
-
- Oct 08, 2024
-
-
Michal Nasiadka authored
Since [1] Neutron puts requested-chassis entry with a name taken from the agent, which results in FQDN-based name on FQDN-based deployments. It does not match what we set in hostname in OVS. [1]: I4e3c001dd3bb37b86fda8b9495a3c5178c3e736d Closes-Bug: #2080552 Change-Id: I3ae03aa2e09bc445f0f5a95a43bf210f06685cc1
-
- Sep 29, 2024
-
-
Michal Arbet authored
This patch fixes an issue where backend related certificates are attempted to be copied when ``kolla_copy_ca_into_containers`` is enabled but ``kolla_enable_tls_backend`` is disabled. The fix consists of these specific tasks now being limited by the condition ``kolla_enable_tls_backend`` Closes-Bug: #2080381 Change-Id: I7ccae4c501ce332519edef336bcceefae9f9568b
-
- Sep 23, 2024
-
-
Michal Arbet authored
This update enhances the monitoring of the databasecluster in ProxySQL. The default monitoring intervals were insufficient for reliably detecting failures in the Galera cluster environment. A detailed configuration for monitoring intervals has been introduced, providing better control over how quickly and accurately ProxySQL can identify issues. - Variables such as `mariadb_monitor_connect_interval`, `mariadb_monitor_galera_healthcheck_interval, and `mariadb_monitor_ping_interval` significantly reduce the time between connection checks. - Timeouts like `mariadb_monitor_galera_healthcheck_timeout` and `mariadb_monitor_ping_timeout` allow faster failure detection, while `mariadb_monitor_galera_healthcheck_max_timeout_count` sets the maximum number of allowed timeouts before marking a node as down. Calculation: - Galera healthcheck: 4 seconds (interval) + 1 second (timeout) + 4 seconds (interval) + 1 second (timeout) = 10 seconds. - Ping healthcheck: 3 seconds (interval) + 2 seconds (timeout) + 3 seconds (interval) + 2 seconds (timeout) = 10 seconds. Both the health check and ping check mechanisms will detect a node failure within a maximum of 10 seconds. Both processes (health check and ping) operate independently, and failure in either mechanism will mark the node as failed. Health Check Failure Detection: Up to 10 seconds. Ping Failure Detection: Up to 10 seconds. Connect Attempts: ProxySQL also tries to connect every 2 seconds, which helps monitor connectivity. These changes ensure that ProxySQL can detect issues in 10 seconds as haproxy, significantly reducing downtime compared to default settings. This adjustment enables faster and more reliable monitoring, improving system stability and reducing potential downtime in production environments. Change-Id: Ic28801519cdb35ed2387a1468b9df661847a5476
-
Michal Arbet authored
The ProxySQL startup script was incorrectly using the `--reload` flag, which only reloads/merges the configuration without initializing the database from the config file [1]. This change corrects it to use the `--initial` flag, ensuring that the database is always reloaded from the configuration at startup. [1] https://proxysql.com/documentation/configuring-proxysql/#initialstartup Change-Id: I9cc721555a6d19409b6ac24432b6b34a83efc42c
-
Maksim Malchuk authored
Followup on Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a. This change adds the ability to provide the NTP (time source) server for multiple DHCP ranges in the Ironic Inspector DHCP server. Change-Id: I4bbfef3a391b8582ae73cbe06138715b43584dec Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Sep 21, 2024
-
-
Maksim Malchuk authored
This change adds the ability to configure Huawei backends in Cinder as described in [1] by adding the additional configuration XML files to the cinder-volume containers. However, this change does not provide the default configuration options for the cinder.conf due to the wide range of Huawei hardware that is supported. Operators may also wish to configure multiple backends, so they should use the standard method of overriding backend sections to use these XML files, as described in [2]. 1. https://docs.openstack.org/cinder/latest/configuration/block-storage/drivers/huawei-storage-driver.html 2. https://docs.openstack.org/kolla-ansible/latest/admin/advanced-configuration.html#openstack-service-configuration-in-kolla Implements: blueprint cinder-huawei-backend Co-Authored-By:
Juan Pablo Suazo <jsuazo@whitestack.com> Co-Authored-By:
Maksim Malchuk <maksim.malchuk@gmail.com> Change-Id: Ic8624b2e956b1f48f5fb96d6d8a0150b67236d20 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Sep 20, 2024
-
-
Michal Arbet authored
This patch resolves an issue where ProxySQL could not bind due to incorrectly formatted IPv6 addresses in the `mysql_ifaces` configuration. The kolla's `put_address_in_context` filter is now used, ensuring the addresses are properly enclosed in square brackets for correct binding. Closes-Bug: #2081106 Change-Id: Ic166b8d9a500023c8d23ec9fee03b28b268b26e7
-
Piotr Milewski authored
Closes-Bug: #2081149 Change-Id: I9969492571e5e9864d4acb95b1af172264cfbd66
-
- Sep 19, 2024
-
-
Michal Arbet authored
This patch adds missing ironic_database_shard_id which is used by proxysql-config role to generate proxysql configuration. Change-Id: I11ddfe73c79cc59a97d119091c8b9a3f5eda001d
-
Michal Arbet authored
This patch removes the hardcoded `distro_python_version` mapping and usage from the configuration and templates, aligning with the dynamic Python version detection introduced in the dependent patch below. The changes simplify the kolla-ansible roles by using general `python3` paths, ensuring compatibility across distributions without requiring version-specific handling. Template files for Horizon, Ironic, Skyline, and others have been updated to reflect this, improving maintainability and reducing complexity. Depends-On: https://review.opendev.org/c/openstack/kolla/+/926744 Change-Id: I85431b058b4184d96600cf17aaf8de871a018d61
-
- Sep 17, 2024
-
-
Michal Arbet authored
This trivial fix simply consists of adding the forgotten action after the kolla-ansible was reworked in review [1]. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/911417 Closes-Bug: #2080408 Change-Id: I26b5db3a3eeebd758ad05d9cb9aa689a68e1816f
-
Michal Arbet authored
From version 2.1, ProxySQL has a built-in ProxySQL Prometheus exporter. This patch adds an option to easily enable this exporter [1]. [1] https://proxysql.com/documentation/prometheus-exporter Change-Id: I8776cdc0a6ec9e4e35a2424dd0984488514a711f
-
- Sep 16, 2024
-
-
Michal Arbet authored
This patch fix issue when inventory file is deleted by kolla-ansible -i /etc/kolla/inventory destroy call. Now, inventories are available in tools/cleanup-host so we can ignore their removal. Closes-Bug: #2052706 Change-Id: If89e94356de515b40ca4e8c023979cd498146303
-
- Sep 13, 2024
-
-
Will Szumski authored
When using dnsmasq as a DHCP server, unless you use the noping option (and that is not recommended), the NET_RAW capabilty is required so that dnsmasq can send ICMP packets. These are used to check an address is not currently in use[1]. Docker enables this capability by default. Podman runs containers with a minimal set of capabilities[3]. [1] https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2019q1/012840.html [2] https://docs.docker.com/engine/containers/run/#runtime-privilege-and-linux-capabilities [3] https://github.com/rhatdan/common/blob/f39f2a3f8c7680b9e456b9d235570e511807d6c6/docs/containers.conf.5.md?plain=1#L84-L101 Closes-Bug: #2055282 Change-Id: Ib3a1313df680d91c7f008063937ca7d37e82f690
-
Michal Arbet authored
The --reload parameter ensures that any changes in the proxysql configuration file are applied to the already existing internal proxysql database. Change-Id: I9215d6cef3795030676c44a8184d99ba46dcb60c
-