Skip to content
Snippets Groups Projects
  1. Aug 29, 2022
    • LinPeiWen's avatar
      keystone: Remove redundant 'when' · aa80f81d
      LinPeiWen authored
      In a multi-controller node, the presence of "run_once: True"
      and "when: inventory_hostname == groups['keystone'][-1]"
      will cause the task to be skipped
      
      Closes-Bug: #1987982
      
      Change-Id: I6a8f4ca285cda0675711b631aeed7ae4c992d879
      aa80f81d
  2. Aug 22, 2022
  3. Aug 12, 2022
  4. Aug 10, 2022
  5. Aug 09, 2022
  6. Aug 08, 2022
    • Monty Taylor's avatar
      Add clouds.yaml file and use it · 73a1812c
      Monty Taylor authored
      clouds.yaml[0] is a richer way to express configuration for OpenStack
      clouds. It's also fully supported by Ansible's OpenStack modules as
      well as python-openstackclient and openstacksdk. It's the future - who
      doesn't like the future?
      
      Write a file using both the public (default) and the internal endpoints
      for the admin user. Also, change all of the examples to reference it
      and to get python-openstackclient to use it too.
      
      [0] https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_config.html
      
      Implements: blueprint use-clouds-yaml
      Change-Id: I557d2e4975c7b3d3c713a556b9ba47af9567ce6e
      73a1812c
  7. Aug 05, 2022
    • Marcin Juszkiewicz's avatar
      loadbalancer: ignore missing keepalived container · f6a1e607
      Marcin Juszkiewicz authored
      During deployment I got this error:
      
      RUNNING HANDLER [loadbalancer : Stop master haproxy container]
      ok: [192.168.66.143]
      
      RUNNING HANDLER [loadbalancer : Stop master proxysql container]
      ok: [192.168.66.143]
      
      RUNNING HANDLER [loadbalancer : Stop master keepalived container]
      fatal: [192.168.66.143]: FAILED! => changed=false
        msg: 'No such container: keepalived to stop'
      
      Looks like we forgot to allow keepalived to not be present.
      
      Change-Id: I720c719a6a6b35c5c2d5b5ee59b48349e58bac82
      f6a1e607
  8. Aug 02, 2022
    • Mark Goddard's avatar
      Persist Bifrost's autogenerated passwords · d95e237f
      Mark Goddard authored
      By default Bifrost generates passwords for use by services, and stores
      them in files in /root/.config/bifrost/ in the container. This directory
      is not persistent, so the passwords are lost if the container is
      recreated. This is generally not a problem, because recreating the
      container is generally done when redeploying Bifrost, and new passwords
      will be generated and written to configuration files. However, if you
      access the Ironic or Inspector APIs outside of the Bifrost playbooks,
      the credentials will have changed.
      
      This change fixes the issue by persisting the credentials directory in a
      Docker volume. Note that applying this change will cause existing
      credentials to be removed.
      
      Closes-Bug: #1983356
      
      Change-Id: I45a899e228b7634ba86fab5822139252c48a7f07
      d95e237f
  9. Jul 29, 2022
    • Mark Goddard's avatar
      haproxy-config: move firewalld reload handler to haproxy role · 492bc744
      Mark Goddard authored
      With the handler in the haproxy-config role, it gets triggered once for
      every service that changes the firewall config. This happens because the
      role is included dynamically. If we move the handler to the haproxy
      role, which is only included once, the handler will trigger at most
      once.
      
      This is a follow up for Iea3680142711873984efff2b701347b6a56dd355.
      
      Change-Id: Iad9ed241026435085bc9a0f5802818010b47830f
      492bc744
    • Mark Goddard's avatar
      haproxy-config: Drop project_name variable · 54391899
      Mark Goddard authored
      This variable shadows the name of the actual project that calls this
      role, so we end up with the following nonsense:
      
        TASK [haproxy-config : Copying over haproxy-config haproxy config]
      
      Change-Id: Id60046e0ddc7ec843f2e4ce7ddee7683470a88b2
      54391899
    • Michal Arbet's avatar
      Add proxysql support for database · de973b81
      Michal Arbet authored
      Kolla environment currently uses haproxy
      to fullfill HA in mariadb. This patch
      is switching haproxy to proxysql if enabled.
      
      This patch is also replacing mariadb's user
      'haproxy' with user 'monitor'. This replacement
      has two reasons:
        - Use better name to "monitor" galera claster
          as there are two services using this user
          (HAProxy, ProxySQL)
        - Set password for monitor user as it's
          always better to use password then not use.
          Previous haproxy user didn't use password
          as it was historically not possible with
          haproxy and mariadb-clustercheck wasn't
          implemented.
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/769385
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/765781
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/850656
      
      Change-Id: I0edae33d982c2e3f3b5f34b3d5ad07a431162844
      de973b81
  10. Jul 28, 2022
  11. Jul 27, 2022
    • Radosław Piliszek's avatar
      Remove RabbitMQ policy removal code · fe522955
      Radosław Piliszek authored
      It is no longer needed per the removed comment.
      
      Change-Id: I8d88c21c7e115b842a56f0ba5c780c3bde593964
      fe522955
    • k-s-dean's avatar
      adds firewalld configuration based on enabled services · 8553e52a
      k-s-dean authored
      This change introduces automated configuration of firewalld and adds
      a new filter for extracting services from the project_services dict.
      the filter selects any enabled services and their haproxy element
      and returns them so they can be iterated over.
      This commit also enables automated configuration of firewalld from enabled
      openstack services and adds them to the defined zone and reloads the
      system firewall.
      
      Change-Id: Iea3680142711873984efff2b701347b6a56dd355
      8553e52a
    • Michal Nasiadka's avatar
      Revert "Allow cinder-backup to be configured to use S3 backend." · b7fe60fc
      Michal Nasiadka authored
      This reverts commit 73fc230f.
      
      Reason for revert: CI jobs failing with "msg": "{{ s3_url }}: 's3_url' is undefined"
      
      Change-Id: Iba7099988cea0c0d8254b9e202309cd9c82a984d
      b7fe60fc
  12. Jul 26, 2022
  13. Jul 25, 2022
    • Michal Nasiadka's avatar
      Fix var-spacing · dcf5a8b6
      Michal Nasiadka authored
      ansible-lint introduced var-spacing - let's fix our code.
      
      Change-Id: I0d8aaf3c522a5a6a5495032f6dbed8a2be0251f0
      dcf5a8b6
  14. Jul 21, 2022
  15. Jul 20, 2022
  16. Jul 19, 2022
  17. Jul 12, 2022
    • Michal Arbet's avatar
      Add api_workers for each service to defaults · 3e8db91a
      Michal Arbet authored
      Render {{ openstack_service_workers }} for workers
      of each openstack service is not enough. There are
      several services which has to have more workers because
      there are more requests sent to them.
      
      This patch is just adding default value for workers for
      each service and sets {{ openstack_service_workers }} as
      default, so value can be overrided in hostvars per server.
      Nothing changed for normal user.
      
      Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
      3e8db91a
    • Christian Berendt's avatar
      Set the ironic notification level · ced1e3b6
      Christian Berendt authored
      To use notifications with ironic, the notification_level
      option in the [DEFAULT] section of the configuration file
      must be set, we use ``info`` as a reasonable level.
      
      Closes-Bug: #1969826
      
      Change-Id: I38bb1e5404e917c788689a3181741022f875da06
      ced1e3b6
  18. Jul 08, 2022
  19. Jul 07, 2022
  20. Jul 06, 2022
  21. Jul 03, 2022
  22. Jun 30, 2022
  23. Jun 27, 2022
  24. Jun 24, 2022
    • Christian Berendt's avatar
      Add ironic_http_interface parameters · 4de34266
      Christian Berendt authored
      With the ironic_http_interface/ironic_http_interface_address
      parameters it is possible to set the addresses for the
      ironic_http service.
      
      Change-Id: I72c257ebedf283cdef1b98485a576631e2190657
      4de34266
  25. Jun 23, 2022
  26. Jun 22, 2022
  27. Jun 21, 2022
    • Michal Arbet's avatar
      Fix nested mounts of /run/openvswitch · 889c0d16
      Michal Arbet authored
      As kolla-toolbox is mounting /run:/run
      there is no need to mount also /run/openvswitch.
      This is causing /run/openvswitch is mounted
      again and again up to 32767 times after kolla-toolbox
      restart.
      
      Closes-Bug: #1979295
      Change-Id: I49b3bde8b2bd61b6c931a81542a0d89f8a303ffc
      889c0d16
  28. Jun 20, 2022
  29. Jun 09, 2022
    • Will Szumski's avatar
      Add keystone_authtoken.service_type · 49006e56
      Will Szumski authored
      Fixes an issue where access rules failed to validate:
      
          Cannot validate request with restricted access rules. Set
          service_type in [keystone_authtoken] to allow access rule validation
      
      I've used the values from the endpoint. This was mostly a straight
      forward copy and paste, except:
      
      - versioned endpoints e.g cinderv3 where I stripped the version
      - monasca has multiple endpoints associated with a single service. For
        this, I concatenated logging and monitoring to be logging-monitoring.
      
      Closes-Bug: #1965111
      Change-Id: Ic4b3ab60abad8c3dd96cd4923a67f2a8f9d195d7
      49006e56
  30. Jun 08, 2022
  31. Jun 02, 2022
    • Michal Arbet's avatar
      Remove nova related config from placement · fe1a8a34
      Michal Arbet authored
      This patch is removing nova configuration
      options, this was probably caused by migration
      from nova-placement to placement.
      
      Change-Id: Ib54b26428b79d5c4f554928b8634a0bb4e884a90
      fe1a8a34
    • Michal Arbet's avatar
      Remove configuration related to api_workers · eafd3a59
      Michal Arbet authored
      This patch is removing api related configuration
      from service's config files as we are using
      apache mod_wsgi and this configuration is not
      used.
      
      Change-Id: I69a1542a6f24214fbf6e703782aefb566de4fb26
      eafd3a59
Loading