- Sep 20, 2016
-
-
Christian Berendt authored
TrivialFix Change-Id: If63053d707e0e6642883745c702d13b63093131a
-
- Sep 14, 2016
-
-
Eduardo Gonzalez authored
Change-Id: Ic941a396b5cd9abfb5e9941218e91b784f8bba0a Implements: bp senlin-container
-
- Sep 13, 2016
-
-
Mick Thompson authored
Useful for upgrade etc., which is preferablly done serially. Example usage: tools/kolla-ansible deploy OR tools/kolla-ansible upgrade Closes-Bug: #1576708 DocImpact Change-Id: I34b2e16f8ce53e472a4682a4738c4ac0f5abf00c
-
zhubingbing authored
Partially-Implements: blueprint barbican-ansible Change-Id: Id6be35b1d0527d5c38d4ea8576b233ebcc404718
-
- Sep 08, 2016
-
-
Bartłomiej Daca authored
Manila endpoints (internal and external) should be created in haproxy configuration just like other services. Change-Id: I5dbc6ca94a118b9655e1c5a87b0a5163153ab5af Closes-Bug: #1621556
-
- Sep 07, 2016
-
-
zhubingbing authored
Change-Id: I75b58248bfc4e86cace75faa82526d55a9ebbdbf Partially-Implements: blueprint sahara-role
-
Christian Berendt authored
Co-Authored-By:
zhubingbing <zhubingbing10@gmail.com> Change-Id: Id83c852e32c3dd583e6128e888ac511634e8eabb Partially-Implements: blueprint cloudkitty
-
- Sep 06, 2016
-
-
zhubingbing authored
Partially-Implements: blueprint ansible-gnocchi Change-Id: I8dd0460bd21ac0a233fab0142ec7b6079459bdc2
-
- Aug 25, 2016
-
-
Paul Bourke authored
This ensures that the same client IP address will always reach the same server as long as no server goes down or up. [0] Prevents a situation where during Murano package upload - we end up having zip file on one control node but the import continues on another and ends up failing. [0] http://cbonte.github.io/haproxy-dconv/configuration-1.7.html#4-balance TrivialFix Co-Authored-By:
Vladislav Belogrudov <vladislav.belogrudov@oracle.com> Change-Id: I5f90d2757f31e8b24459a585153d5aa7fe6ad90a
-
- Aug 18, 2016
-
-
Duong Ha-Quang authored
Migrate to full variable syntax in with_ loop instead of bare variables for: - cinder - haproxy - ironic - magnum - mistral - mongodb - murano - swift - watcher TrivialFix Change-Id: I3ef2e79053cf609aaa710e43ffd0adbc5a97565b
-
- Aug 03, 2016
-
-
Christian Berendt authored
This changed introduces 4 new parameters to be able to use an existing elasticsearch service for central logging. * elasticsearch_address - address of elasticsearch server * elasticsearch_protocol - protocol (HTTP/HTTPS) used by elasticsearch server * enable_elasticsearch - deploy elasticsearch container * enable_kibana - deploy kibana container Closes-bug: #1584861 Change-Id: Ia1ff9ae8b6d9929c3826da02693d1e2fc9ea2522
-
- Jul 22, 2016
-
-
Dave Walker (Daviey) authored
Previous work on Watcher added the Docker images, this change adds the ansible configuration. There is support for HA, via haproxy to balance across the Watcher API hosts. There is also a hook into nova.conf to conditionally add Nova compute Host metrics via Ceilometer if Watcher is enabled. This defaults to enabled false. Change-Id: I8763528bb6ff12943b810212c71396d2d7cf6836 Partial-bug: #1598929 Partially-implements: bp watcher Signed-off-by:
Dave Walker (Daviey) <email@daviey.com>
-
- Jul 19, 2016
-
-
Dennis Mueller authored
Added pipeline.yaml, event_pipeline.yaml and event_definitions.yaml based on sample files in OpenStack documentation Edited haproxy.cfg for ceilometer support Edited ceilometer-base dockerfile for missing dependency Change-Id: I6ade05255e7e1aa7dbcffd026fad5869036d0d32 Closes-Bug: #1604004
-
- Jul 02, 2016
-
-
Jeffrey Zhang authored
The haproxy failed when there is one stand alone network node Closes-Bug: #1598339 Change-Id: I3390ee37eb51c292fc5149fc22b4f6a6f07da688
-
- Jun 27, 2016
-
-
Dipa Thakkar authored
The forwardfor option cannot be used in certain modes such as TCP. To resolve that create a special default section for MariaDB Change-Id: I743bbbfb732b04f115d1a878a0dfc22e29d2623d Closes-Bug: #1549746
-
- Jun 16, 2016
-
-
Christian Berendt authored
The Nova EC2 API is disabled by default, the default value of the enabled_apis parameter in nova.conf is "osapi_compute, metadata" The EC2 API is marked as deprecated and will be removed from Nova in the future. Change-Id: I6b9d66017e066cde5749be45b367194d2192ead3 Closes-bug: #1586605
-
- May 13, 2016
-
-
Waldemar Znoinski authored
This change makes each step of the kolla deployment aware of the port database was configured to listen on. It defaults mariadb_port to database_port. Change-Id: I8e85d5732015afc0a5481cb33e0b629fdfa84a1b Closes-Bug: #1576151 DocImpact
-
- May 06, 2016
-
-
Michal Rostecki authored
It's impossible to drop root for the HAProxy container. But HAProxy provides a possibility to use a chroot jail. When attaching to the HAProxy container, we see that the root directory is changed: $ sudo docker exec -ti haproxy bash (haproxy)[root@operator /]# ls -di / 259 / Co-Authored-By:
Vikram Hosakote <vhosakot@cisco.com> Closes-Bug: #1552289 Change-Id: I9d55e9b741b8560cac53dc8b837a24a3029a4dc0
-
- May 03, 2016
-
-
Jeffrey Zhang authored
Closes-Bug: #1577148 Change-Id: I636cefc63cf532434a41af3898b63dffa711e280
-
- Apr 15, 2016
-
-
Dave McCowan authored
Use HAProxy to terminate a TLS connection on port 5601 for the Kibana dashboard when TLS is enabled for Kolla. x-forwarded-for and x-forwarded-proto headers are set to give Kibana the info it needs to write returned URLs. Change-Id: I03a2dd3a8e2513d38281b30bf4bae6449fec0316 Closes-bug: #1566117
-
- Apr 01, 2016
-
-
Carlos Cesario authored
To be kolla deploy multiple clouds, we need to be able to configure virtual_router_id other wise haproxy will fail setup the VIP for the second cloud. Partially-Implements: blueprint multiple-cloud Closes-Bug: #1564547 Change-Id: I9eb27dd6fba61205841eadafc96601e235d2fe6d
-
Dave McCowan authored
When a node uses two physical interfaces for its two VIPs, these physical interfaces should be tied together, so both VIPs will be taken out of scheduling if either one fails. Without this change, if a request comes into one interface that needs access to the second interface to process the request, the original request unnecessarily fails. Repeating this results in a black hole where a failing server keeps getting new requests. Change-Id: Ic51e6584c1fbda3eb7821cb47f759c77e562cc65 Closes-Bug: #1550455
-
- Mar 31, 2016
-
-
Jeffrey Zhang authored
Closes-Bug: #1564440 Change-Id: I8b9ff303d131fab18e51e9f99c64f4e4004f41b4
-
- Mar 30, 2016
-
-
Jeffrey Zhang authored
haproxy-system-wrapper is a solution for systemd from upstream. it can handle the reload graceful. Change-Id: I6a3d141af065e429bd1be1b7252f5c6df1fda3bb Closes-Bug: #1559238
-
- Mar 24, 2016
-
-
akwasniewska authored
Change-Id: Ib501571dd34cb68924775ce738499d63df5718dd Closes-Bug: 1556487
-
- Mar 19, 2016
-
-
SamYaple authored
These values are optional only when the services are not enabled. If the file does not exist we should not warn, but rather inform. Ceph-mon is an exception here since its bootstrap process means the files may or may not exist initially. TrivialFix Change-Id: Ic02bece76d480e99deecf612036f37abb5604135
-
- Mar 17, 2016
-
-
MD NADEEM authored
Add reconfiguration for haproxy Co-Authored-By:
Jeffrey Zhang <jeffrey.zhang@99cloud.net> Closes-Bug: #1553528 Change-Id: Ibe9266dfac8e79c5aa56a17eb908ff12cd81cc05
-
- Mar 15, 2016
-
-
SamYaple authored
sysctl was improperly set in the contaienr itself which is not correct TrivialFix Change-Id: If2ffca6d2a40e86db4af2f103a27b280bc5fa2ff
-
- Mar 14, 2016
-
-
SamYaple authored
Without this option the vip will always bounce to the highest priority node that is up. So if you reboot the highest priority node the vip will fail to the second highest. When the highest priority node recovers it will claim the vip again leaving you will two fail overs rather than one. TrivialFix Change-Id: I4a3c6c10eee391cdbdd80c44a71a9fafd1069944
-
SamYaple authored
haproxy 1.6+ does not allow the formatting that was used for stats listener. We need to adjust it to the correct syntax TrivialFix Change-Id: I5f0111c756d40a0cf7385e6963ebbb57adb36b35
-
- Mar 09, 2016
-
-
Éric Lemoine authored
Kibana is a tool for operators. It should not be accessible though the external VIP. Closes-Bug: #1554977 Change-Id: I1dc101de18e4e01ebde9d317ab7e3193e307a14e
-
- Mar 08, 2016
-
-
Dave McCowan authored
When configured with a separate external VIP, glance registry should listen on only the internal VIP. TrivialFix Change-Id: Ie186f2ea391b53b9ea0cb230c573c9e09efd44b2
-
- Mar 05, 2016
-
-
Éric Lemoine authored
This patch includes changes relative to integrating Heka with Elasticsearch and Kibana. The main change is the addition of an Heka ElasticSearchOutput plugin to make Heka send the logs it collects to Elasticsearch. Since Logstash is not used the enable_elk deploy variable is renamed to enable_central_logging. If enable_central_logging is false then Elasticsearch and Kibana are not started, and Heka won't attempt to send logs to Elasticsearch. By default enable_central_logging is set to false. If enable_central_logging is set to true after deployment then the Heka container needs to be recreated (for Heka to get the new configuration). The Kibana configuration used property names that are deprecated in Kibana 4.2. This is changed to use non-deprecated property names. Previously logs read from files and from Syslog had a different Type in Heka. This is changed to always use "log" for the Type. In this way just one index instead of two is used in Elasticsearch, making things easier to the user on the visualization side. The HAProxy configuration is changed to add entries for Kibana. Kibana server is now accessible via the internal VIP, and also via the external VIP if there's one configured. The HAProxy configuration is changed to add an entry for Elasticsearch. So Elasticsearch is now accessible via the internal VIP. Heka uses that channel for communicating with Elasticsearch. Note that currently the Heka logs include "Plugin elasticsearch_output" errors when Heka starts. This occurs when Heka starts processing logs while Elasticsearch is not yet started. These are transient errors that go away when Elasticsearch is ready. And with buffering enabled on the ElasticSearchOuput plugin logs will be buffered and then retransmitted when Elasticsearch is ready. Change-Id: I6ff7a4f0ad04c4c666e174693a35ff49914280bb Implements: blueprint central-logging-service
-
- Mar 04, 2016
-
-
SamYaple authored
Ubuntu did not have mod_headers enabled by default Remove unused variable and adjust 'when' conditional positioning TrivialFix Change-Id: I82b8724526c24f4481a80165520d624f6a02c336
-
Jeffrey Zhang authored
TrivialFix Closes-Bug: #1551314 Change-Id: Id85859500aec283703b6b6714abf213a42286182
-
- Mar 03, 2016
-
-
Dave McCowan authored
TLS can be used to encrypt and authenticate the connection with OpenStack endpoints. This patch provides the necessary parameters and changes the resulting service configurations to enable TLS for the Kolla deployed OpenStack cloud. The new input parameters are: kolla_enable_tls_external: "yes" or "no" (default is "no") kolla_external_fqdn_cert: "/etc/kolla/certificates/haproxy.pem" kolla_external_fqdn_cacert: "/etc/kolla/certificates/haproxy-ca.crt" Implements: blueprint kolla-ssl Change-Id: I48ef8a781c3035d58817f9bf6f36d59a488bab41
-
- Feb 26, 2016
-
-
SamYaple authored
Due to poor planning on our variable names we have a situation where we have "internal_address" which must be a VIP, but "external_address" which should be a DNS name. Now with two vips "external_vip_address" is a new variable. This corrects that issue by deprecating kolla_internal_address and replacing it with 4 nicely named variables. kolla_internal_vip_address kolla_internal_fqdn kolla_external_vip_address kolla_external_fqdn The default behaviour will remain the same, and the way the variable inheritance is setup the kolla_internal_address variable can still be set in globals.yml and propogate out to these 4 new variables like it normally would, but all reference to kolla_internal_address has been completely removed. Change-Id: I4556dcdbf4d91a8d2751981ef9c64bad44a719e5 Partially-Implements: blueprint ssl-kolla
-
- Feb 25, 2016
-
-
Michal (inc0) Jastrzebski authored
This is single task to upgrade both haproxy and keepalived. It stops slave nodes of keepalived and upgrades them separately to avoid VIP migration and allow nearly no-downtime upgrade Change-Id: I06124635a3f3553a4e8e91013cefbf897dd7179f Implements: blueprint upgrade-haproxy Implements: blueprint upgrade-keepalived Partially-implements: blueprint upgrade-kolla
-
Jeffrey Zhang authored
DocImpact Partially-implements: bp kolla-reconfig Change-Id: I9738e80960bcfbef18d1ef1b7942f81c45684e85
-
- Feb 24, 2016
-
-
Dave McCowan authored
HAProxy: change to use option forwardfor to pass origin IP address to backend via X-Forwarded-For header Keystone: Apache does the audit logs for keystone. Change the LogFormat to display the passed address instead of the connection address which is that of the load balancer. Nova, Cinder, Glance: these services can make use of the address passed in X-Forwarded-For. With this setting the API logs for these services include the client IP address. Change-Id: Ia861ecc11a7c7d463d0366586926d1a842853f69 Closes-Bug: #1548935
-