Skip to content
Snippets Groups Projects
  1. Nov 11, 2022
    • Doug Szumski's avatar
      Remove support for deploying OpenStack Monasca · adb8f89a
      Doug Szumski authored
      Kolla Ansible is switching to OpenSearch and is dropping support for
      deploying ElasticSearch. This is because the final OSS release of
      ElasticSearch has exceeded its end of life.
      
      Monasca is affected because it uses both Logstash and ElasticSearch.
      Whilst it may continue to work with OpenSearch, Logstash remains an
      issue.
      
      In the absence of any renewed interest in the project, we remove
      support for deploying it. This helps to reduce the complexity
      of log processing configuration in Kolla Ansible, freeing up
      development time.
      
      Change-Id: I6fc7842bcda18e417a3fd21c11e28979a470f1cf
      adb8f89a
  2. Oct 18, 2022
    • Marcin Juszkiewicz's avatar
      Update RHEL family information · 33d37575
      Marcin Juszkiewicz authored
      Some time ago we dropped RHEL as one of possible options. During 'Zed'
      cycle we added Rocky Linux 9 as alternative to CentOS Stream 9.
      
      This change updates some mentions of both.
      
      Change-Id: I9ed93efcb7d1ff97b1c7d8342db8252aba2a9887
      33d37575
  3. Oct 07, 2022
  4. Oct 03, 2022
    • Jakub Darmach's avatar
      Keystone OIDC JWKS fix · 98929761
      Jakub Darmach authored
      JWT failed to validate on auth-oidc endpoint used by openstack cli
      with "could not find key with kid: XX" error. To fix this we need
      to use jwks provided in "jwks_uri" by OIDC metadata endpoint.
      
      Missing "ServerName" directive from vhost config causes redirection
      to fail in some cases when external tls is enabled.
      
        - added "keystone_federation_oidc_jwks_uri" variable
        - added "OIDCOAuthVerifyJwksUri" to keystone vhost config
        - added "ServerName" to keystone vhost config
        - jinja templating additional whitespace trimmed to
          correct end result indentation and empty newlines
      
      Closes-bug: 1990375
      Change-Id: I4f5c1bd8be8e23cf6299ca4bdfd79e9d98c9a9eb
      Unverified
      98929761
  5. Aug 26, 2022
  6. Aug 25, 2022
  7. Aug 22, 2022
  8. Aug 17, 2022
    • Will Szumski's avatar
      Introduce variables for cinder backend names · 0fe8010c
      Will Szumski authored
      This allows you to use a more descriptive name if you desire.
      For example, when using cinder with multiple ceph backends, rbd-1,
      doesn't convey much information. You could include location, disk
      technology, etc. in the name.
      
      Change-Id: Icfdc2e5726fec8b645d6c2c63391a13c31f2ce9a
      0fe8010c
  9. Jul 27, 2022
    • k-s-dean's avatar
      adds firewalld configuration based on enabled services · 8553e52a
      k-s-dean authored
      This change introduces automated configuration of firewalld and adds
      a new filter for extracting services from the project_services dict.
      the filter selects any enabled services and their haproxy element
      and returns them so they can be iterated over.
      This commit also enables automated configuration of firewalld from enabled
      openstack services and adds them to the defined zone and reloads the
      system firewall.
      
      Change-Id: Iea3680142711873984efff2b701347b6a56dd355
      8553e52a
  10. Jul 08, 2022
  11. Jul 07, 2022
  12. Jun 20, 2022
  13. May 25, 2022
  14. May 17, 2022
  15. May 13, 2022
    • Simon Dodsley's avatar
      Add support for Pure Storage FlashArray backend to Cinder · f088b799
      Simon Dodsley authored
      Add an enable_cinder_backend_pure_iscsi and
      enable_cinder_backend_pure_fc options to etc/kolla/globals.yml
      to enable use of the FlashArray backend.
      Update the documentation to include a section on configuring
      Cinder with the FlashArray.
      
      Implements: blueprint pure-cinder-driver
      Change-Id: I464733f1322237321ed1ffff8636cf30bd1cbb38
      f088b799
  16. May 02, 2022
    • Pierre Riteau's avatar
      Fix typos in docs · 555cd39f
      Pierre Riteau authored
      This is a follow up to I7e5c1e20c7b66b64cbd333f669ef8d8da60daaa8.
      
      Change-Id: I11a86f59c1fb9cddde3370b544ee7bf4e8ae4fb4
      555cd39f
  17. Apr 23, 2022
  18. Apr 20, 2022
  19. Apr 13, 2022
    • Maksim Malchuk's avatar
      Multiple DHCP ranges for Ironic Inspector · 762aecbf
      Maksim Malchuk authored
      
      Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the
      configuration of the corresponding 'dhcp-range' and 'dhcp-option'
      blocks in Ironic Inspector dnsmasq for multiple ranges.
      
      The old parameters 'ironic_dnsmasq_dhcp_range' and
      'ironic_dnsmasq_default_gateway' used for the only range are now
      removed.
      
      This change implements the same solution used in the TripleO several
      years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d
      
      Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649
      fix for lease time.
      The value can be changed globally or per range.
      
      Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      Co-Authored-By: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      762aecbf
  20. Apr 11, 2022
  21. Apr 06, 2022
  22. Mar 30, 2022
    • Michal Nasiadka's avatar
      neutron: add ssh key · 7fcf3ca3
      Michal Nasiadka authored
      This key can be used by users in networking-generic-switch
      scenario instead of adding cleartext password in ml2_conf.ini.
      
      Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
      7fcf3ca3
  23. Mar 29, 2022
    • Mark Goddard's avatar
      nova: improve compute service registration failure handling · f1d3ff11
      Mark Goddard authored
      If any nova compute service fails to register itself, Kolla Ansible will
      fail the host that queries the Nova API. This is the first compute host
      in the inventory, and fails in the task:
      
          Waiting for nova-compute services to register themselves
      
      Other hosts continue, often leading to further errors later on. Clearly
      this is not idea.
      
      This change modifies the behaviour to query the compute service list
      until all expected hosts are present, but does not fail the querying
      host if they are not. A new task is added that executes for all hosts,
      and fails only those hosts that have not registered successfully.
      
      Alternatively, to fail all hosts in a cell when any compute service
      fails to register, set nova_compute_registration_fatal to true.
      
      Change-Id: I12c1928cf1f1fb9e28f1741e7fe4968004ea1816
      Closes-Bug: #1940119
      f1d3ff11
  24. Mar 24, 2022
  25. Mar 21, 2022
    • Mark Goddard's avatar
      libvirt: add nova-libvirt-cleanup command · 80b311be
      Mark Goddard authored
      Change Ia1239069ccee39416b20959cbabad962c56693cf added support for
      running a libvirt daemon on the host, rather than using the nova_libvirt
      container. It did not cover migration of existing hosts from using a
      container to using a host daemon.
      
      This change adds a kolla-ansible nova-libvirt-cleanup command which may
      be used to clean up the nova_libvirt container, volumes and related
      items on hosts, once it has been disabled.
      
      The playbook assumes that compute hosts have been emptied of VMs before
      it runs. A future extension could support migration of existing VMs, but
      this is currently out of scope.
      
      Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
      80b311be
    • Mark Goddard's avatar
      libvirt: make it possible to run libvirt on the host · 4e41acd8
      Mark Goddard authored
      In some cases it may be desirable to run the libvirt daemon on the host.
      For example, when mixing host and container OS distributions or
      versions.
      
      This change makes it possible to disable the nova_libvirt container, by
      setting enable_nova_libvirt_container to false. The default values of
      some Docker mounts and other paths have been updated to point to default
      host directories rather than Docker volumes when using a host libvirt
      daemon.
      
      This change does not handle migration of existing systems from using
      a nova_libvirt container to libvirt on the host.
      
      Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504
      
      Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
      4e41acd8
  26. Mar 10, 2022
    • Mark Goddard's avatar
      libvirt: support SASL authentication · d2d4b53d
      Mark Goddard authored
      In Kolla Ansible OpenStack deployments, by default, libvirt is
      configured to allow read-write access via an unauthenticated,
      unencrypted TCP connection, using the internal API network.  This is to
      facilitate migration between hosts.
      
      By default, Kolla Ansible does not use encryption for services on the
      internal network (and did not support it until Ussuri). However, most
      other services on the internal network are at least authenticated
      (usually via passwords), ensuring that they cannot be used by anyone
      with access to the network, unless they have credentials.
      
      The main issue here is the lack of authentication. Any client with
      access to the internal network is able to connect to the libvirt TCP
      port and make arbitrary changes to the hypervisor. This could include
      starting a VM, modifying an existing VM, etc. Given the flexibility of
      the domain options, it could be seen as equivalent to having root access
      to the hypervisor.
      
      Kolla Ansible supports libvirt TLS [1] since the Train release, using
      client and server certificates for mutual authentication and encryption.
      However, this feature is not enabled by default, and requires
      certificates to be generated for each compute host.
      
      This change adds support for libvirt SASL authentication, and enables it
      by default. This provides base level of security. Deployments requiring
      further security should use libvirt TLS.
      
      [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021
      Closes-Bug: #1964013
      Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
      d2d4b53d
  27. Feb 25, 2022
    • Radosław Piliszek's avatar
      Enable Ironic iPXE support by default · baeca81a
      Radosław Piliszek authored
      Ironic has changed the default PXE to be iPXE (as opposed to plain
      PXE) in Yoga. Kolla Ansible supports either one or the other and
      we tend to stick to upstream defaults so this change enables
      iPXE instead of plain PXE - by default - the users are allowed
      to change back and they need to take one other action so it is
      good to remind them via upgrade notes either way.
      
      Change-Id: If14ec83670d2212906c6e22c7013c475f3c4748a
      baeca81a
  28. Feb 18, 2022
    • alecorps's avatar
      Add support for VMware First Class Disk (FCD) · 812e03f7
      alecorps authored
      An FCD, also known as an Improved Virtual Disk (IVD) or
      Managed Virtual Disk, is a named virtual disk independent of
      a virtual machine. Using FCDs for Cinder volumes eliminates
      the need for shadow virtual machines.
      This patch adds Kolla support.
      
      Change-Id: Ic0b66269e6d32762e786c95cf6da78cb201d2765
      812e03f7
  29. Feb 17, 2022
    • Alban Lecorps's avatar
      Add support for VMware NSXP · 458c8b13
      Alban Lecorps authored
      NSXP is the OpenStack support for the NSX Policy platform.
      This is supported from neutron in the Stein version. This patch
      adds Kolla support
      
      This adds a new neutron_plugin_agent type 'vmware_nsxp'. The plugin
      does not run any neutron agents.
      
      Change-Id: I9e9d8f07e586bdc143d293e572031368af7f3fca
      458c8b13
  30. Feb 14, 2022
  31. Feb 11, 2022
  32. Feb 02, 2022
    • Buddhika Sanjeewa's avatar
      Deploy Zun with Cinder Ceph support · eb7e0f6f
      Buddhika Sanjeewa authored
      Enables zun to access cinder volumes when cinder is configured to use
      external ceph.
      Copies ceph config file and ceph cinder keyring to /etc/ceph in
      zun_compute container.
      
      Closes-Bug: 1848934
      Change-Id: Ie56868d5e9ed37a9274b8cbe65895f3634b895c8
      eb7e0f6f
  33. Jan 31, 2022
  34. Jan 20, 2022
  35. Jan 09, 2022
    • Stig Telfer's avatar
      OpenID Connect certifiate file is optional · 78f29fdc
      Stig Telfer authored
      Some ID provider configurations do not require a certificate file.
      Change the logic to allow this, and update documentation accordingly.
      
      Change-Id: I2c34a6b5894402bbebeb3fb96768789bc3c7fe84
      78f29fdc
  36. Dec 23, 2021
Loading