Skip to content
Snippets Groups Projects
  1. Sep 14, 2016
  2. Sep 13, 2016
  3. Sep 08, 2016
    • Bartłomiej Daca's avatar
      Adding manila endpoints to HAProxy · d8c70eca
      Bartłomiej Daca authored
      Manila endpoints (internal and external) should be created in
      haproxy configuration just like other services.
      
      Change-Id: I5dbc6ca94a118b9655e1c5a87b0a5163153ab5af
      Closes-Bug: #1621556
      d8c70eca
  4. Sep 07, 2016
  5. Sep 06, 2016
    • zhubingbing's avatar
      Add gnocchi ansible role · 89392f4f
      zhubingbing authored
      Partially-Implements: blueprint ansible-gnocchi
      
      Change-Id: I8dd0460bd21ac0a233fab0142ec7b6079459bdc2
      89392f4f
  6. Aug 25, 2016
  7. Aug 03, 2016
    • Christian Berendt's avatar
      Enable central logging without deploying elasticsearch/kibana · 4cd95dbc
      Christian Berendt authored
      This changed introduces 4 new parameters to be able to use an existing
      elasticsearch service for central logging.
      
      * elasticsearch_address - address of elasticsearch server
      * elasticsearch_protocol - protocol (HTTP/HTTPS) used by elasticsearch server
      * enable_elasticsearch - deploy elasticsearch container
      * enable_kibana - deploy kibana container
      
      Closes-bug: #1584861
      
      Change-Id: Ia1ff9ae8b6d9929c3826da02693d1e2fc9ea2522
      4cd95dbc
  8. Jul 22, 2016
    • Dave Walker (Daviey)'s avatar
      Add Watcher ansible roles and templates · c3a6aa68
      Dave Walker (Daviey) authored
      
      Previous work on Watcher added the Docker images, this
      change adds the ansible configuration.
      
      There is support for HA, via haproxy to balance across the
      Watcher API hosts.
      
      There is also a hook into nova.conf to conditionally add
      Nova compute Host metrics via Ceilometer if Watcher is enabled.
      
      This defaults to enabled false.
      
      Change-Id: I8763528bb6ff12943b810212c71396d2d7cf6836
      Partial-bug: #1598929
      Partially-implements: bp watcher
      Signed-off-by: default avatarDave Walker (Daviey) <email@daviey.com>
      c3a6aa68
  9. Jul 19, 2016
    • Dennis Mueller's avatar
      Add missing configuration files for ceilometer · 30e3d904
      Dennis Mueller authored
      Added pipeline.yaml, event_pipeline.yaml and event_definitions.yaml
      based on sample files in OpenStack documentation
      
      Edited haproxy.cfg for ceilometer support
      
      Edited ceilometer-base dockerfile for missing dependency
      
      Change-Id: I6ade05255e7e1aa7dbcffd026fad5869036d0d32
      Closes-Bug: #1604004
      30e3d904
  10. Jun 27, 2016
    • Dipa Thakkar's avatar
      Remove MariaDB warning from HAproxy · e26751b9
      Dipa Thakkar authored
      The forwardfor option cannot be used in certain modes
      such as TCP.  To resolve that create a special default
      section for MariaDB
      
      Change-Id: I743bbbfb732b04f115d1a878a0dfc22e29d2623d
      Closes-Bug: #1549746
      e26751b9
  11. Jun 16, 2016
    • Christian Berendt's avatar
      Remove EC2 API related configurations and tasks · c073b2d8
      Christian Berendt authored
      The Nova EC2 API is disabled by default, the default value
      of the enabled_apis parameter in nova.conf is "osapi_compute, metadata"
      The EC2 API is marked as deprecated and will be removed from Nova in
      the future.
      
      Change-Id: I6b9d66017e066cde5749be45b367194d2192ead3
      Closes-bug: #1586605
      c073b2d8
  12. May 06, 2016
    • Michal Rostecki's avatar
      Run HAProxy in a chroot jail · a5c1aa0b
      Michal Rostecki authored
      
      It's impossible to drop root for the HAProxy container.
      But HAProxy provides a possibility to use a chroot jail.
      
      When attaching to the HAProxy container, we see that
      the root directory is changed:
      
          $ sudo docker exec -ti haproxy bash
          (haproxy)[root@operator /]# ls -di /
          259 /
      
      Co-Authored-By: default avatarVikram Hosakote <vhosakot@cisco.com>
      
      Closes-Bug: #1552289
      
      Change-Id: I9d55e9b741b8560cac53dc8b837a24a3029a4dc0
      a5c1aa0b
  13. Apr 15, 2016
    • Dave McCowan's avatar
      Add TLS to Kibana Web Interface · 4c8227ec
      Dave McCowan authored
      Use HAProxy to terminate a TLS connection on port 5601 for the
      Kibana dashboard when TLS is enabled for Kolla. x-forwarded-for
      and x-forwarded-proto headers are set to give Kibana the info it
      needs to write returned URLs.
      
      Change-Id: I03a2dd3a8e2513d38281b30bf4bae6449fec0316
      Closes-bug: #1566117
      4c8227ec
  14. Apr 01, 2016
    • Carlos Cesario's avatar
      Make keepalived virtual_router_id param configurable · 676998a1
      Carlos Cesario authored
      To be kolla deploy multiple clouds, we need to be able to configure
      virtual_router_id other wise haproxy will fail setup the VIP for the
      second cloud.
      
      Partially-Implements: blueprint multiple-cloud
      Closes-Bug: #1564547
      Change-Id: I9eb27dd6fba61205841eadafc96601e235d2fe6d
      676998a1
    • Dave McCowan's avatar
      When two interfaces are used for two VIPs, tie them together · bbbe8466
      Dave McCowan authored
      When a node uses two physical interfaces for its two VIPs, these
      physical interfaces should be tied together, so both VIPs will
      be taken out of scheduling if either one fails.  Without this change,
      if a request comes into one interface that needs access to the
      second interface to process the request, the original request
      unnecessarily fails.  Repeating this results in a black hole where
      a failing server keeps getting new requests.
      
      Change-Id: Ic51e6584c1fbda3eb7821cb47f759c77e562cc65
      Closes-Bug: #1550455
      bbbe8466
  15. Mar 31, 2016
  16. Mar 30, 2016
  17. Mar 24, 2016
  18. Mar 19, 2016
    • SamYaple's avatar
      Fix 'optional' config.json values · f4175f04
      SamYaple authored
      These values are optional only when the services are not enabled.
      
      If the file does not exist we should not warn, but rather inform.
      
      Ceph-mon is an exception here since its bootstrap process means
      the files may or may not exist initially.
      
      TrivialFix
      
      Change-Id: Ic02bece76d480e99deecf612036f37abb5604135
      f4175f04
  19. Mar 14, 2016
    • SamYaple's avatar
      Use nopreempt for keepalived · 024d7653
      SamYaple authored
      Without this option the vip will always bounce to the highest priority
      node that is up. So if you reboot the highest priority node the vip
      will fail to the second highest. When the highest priority node
      recovers it will claim the vip again leaving you will two fail overs
      rather than one.
      
      TrivialFix
      
      Change-Id: I4a3c6c10eee391cdbdd80c44a71a9fafd1069944
      024d7653
    • SamYaple's avatar
      haproxy formatting was incorrect · 9500bd23
      SamYaple authored
      haproxy 1.6+ does not allow the formatting that was used for stats
      listener. We need to adjust it to the correct syntax
      
      TrivialFix
      
      Change-Id: I5f0111c756d40a0cf7385e6963ebbb57adb36b35
      9500bd23
  20. Mar 09, 2016
  21. Mar 08, 2016
  22. Mar 05, 2016
    • Éric Lemoine's avatar
      Make Heka send logs to Elasticsearch · 491aff0b
      Éric Lemoine authored
      This patch includes changes relative to integrating Heka with
      Elasticsearch and Kibana.
      
      The main change is the addition of an Heka ElasticSearchOutput plugin
      to make Heka send the logs it collects to Elasticsearch.
      
      Since Logstash is not used the enable_elk deploy variable is renamed
      to enable_central_logging.
      
      If enable_central_logging is false then Elasticsearch and Kibana are
      not started, and Heka won't attempt to send logs to Elasticsearch.
      
      By default enable_central_logging is set to false. If
      enable_central_logging is set to true after deployment then the Heka
      container needs to be recreated (for Heka to get the new
      configuration).
      
      The Kibana configuration used property names that are deprecated in
      Kibana 4.2. This is changed to use non-deprecated property names.
      
      Previously logs read from files and from Syslog had a different Type
      in Heka. This is changed to always use "log" for the Type. In this
      way just one index instead of two is used in Elasticsearch, making
      things easier to the user on the visualization side.
      
      The HAProxy configuration is changed to add entries for Kibana.
      Kibana server is now accessible via the internal VIP, and also via
      the external VIP if there's one configured.
      
      The HAProxy configuration is changed to add an entry for
      Elasticsearch. So Elasticsearch is now accessible via the internal
      VIP. Heka uses that channel for communicating with Elasticsearch.
      
      Note that currently the Heka logs include "Plugin
      elasticsearch_output" errors when Heka starts. This occurs when Heka
      starts processing logs while Elasticsearch is not yet started. These
      are transient errors that go away when Elasticsearch is ready. And
      with buffering enabled on the ElasticSearchOuput plugin logs will be
      buffered and then retransmitted when Elasticsearch is ready.
      
      Change-Id: I6ff7a4f0ad04c4c666e174693a35ff49914280bb
      Implements: blueprint central-logging-service
      491aff0b
  23. Mar 04, 2016
  24. Mar 03, 2016
    • Dave McCowan's avatar
      Add TLS protection on external API endpoints · 3daded62
      Dave McCowan authored
      TLS can be used to encrypt and authenticate the connection with
      OpenStack endpoints.  This patch provides the necessary
      parameters and changes the resulting service configurations to
      enable TLS for the Kolla deployed OpenStack cloud.
      
      The new input parameters are:
      
      kolla_enable_tls_external: "yes" or "no" (default is "no")
      kolla_external_fqdn_cert: "/etc/kolla/certificates/haproxy.pem"
      kolla_external_fqdn_cacert: "/etc/kolla/certificates/haproxy-ca.crt"
      
      Implements: blueprint kolla-ssl
      
      Change-Id: I48ef8a781c3035d58817f9bf6f36d59a488bab41
      3daded62
  25. Feb 26, 2016
    • SamYaple's avatar
      Change kolla_internal_address variable · d3cfb205
      SamYaple authored
      Due to poor planning on our variable names we have a situation where
      we have "internal_address" which must be a VIP, but "external_address"
      which should be a DNS name. Now with two vips "external_vip_address"
      is a new variable.
      
      This corrects that issue by deprecating kolla_internal_address and
      replacing it with 4 nicely named variables.
      
      kolla_internal_vip_address
      kolla_internal_fqdn
      kolla_external_vip_address
      kolla_external_fqdn
      
      The default behaviour will remain the same, and the way the variable
      inheritance is setup the kolla_internal_address variable can still be
      set in globals.yml and propogate out to these 4 new variables like it
      normally would, but all reference to kolla_internal_address has been
      completely removed.
      
      Change-Id: I4556dcdbf4d91a8d2751981ef9c64bad44a719e5
      Partially-Implements: blueprint ssl-kolla
      d3cfb205
  26. Feb 24, 2016
    • Dave McCowan's avatar
      Use passed client IP address in various audit logs · b7703395
      Dave McCowan authored
      HAProxy: change to use option forwardfor to pass origin IP address
      to backend via X-Forwarded-For header
      
      Keystone: Apache does the audit logs for keystone.  Change the
      LogFormat to display the passed address instead of the connection
      address which is that of the load balancer.
      
      Nova, Cinder, Glance: these services can make use of the address
      passed in X-Forwarded-For.  With this setting the API logs for
      these services include the client IP address.
      
      Change-Id: Ia861ecc11a7c7d463d0366586926d1a842853f69
      Closes-Bug: #1548935
      b7703395
    • Dave McCowan's avatar
      Implement Option for Two VIPs to separate API traffic · 34c2cb8e
      Dave McCowan authored
      To improve security, operators have asked for two VIPs for
      their cloud.
      
      VIP 1 is the internal VIP that can reach internal and admin endpoints.
      In addition, the internal VIP can also reach other internal services,
      such as the database and message services.
      VIP 2 is the external VIP that can only reach public endpoints.
      
      With one VIP only, all services are reached at the same address.
      
      To add a second VIP, this patch adds two new configuration parameters.
      
      kolla_external_vip_address: is an IPv4 address to use for created VIP
      kolla_external_vip_interface: is the network interface to use for VIP
      In this scenario, the first VIP (the internal VIP), is defined by
      the original parameters (kolla_internal address and network_interface).
      
      When using two VIPs, the existing kolla_external_address parameter
      should be/point to/resolve to the kolla_external_vip_address.
      
      Closes-bug: 1535333
      
      Change-Id: I5bfcefaf7899298455cdade8209c34324aebfecb
      34c2cb8e
  27. Feb 19, 2016
  28. Feb 17, 2016
  29. Jan 27, 2016
  30. Dec 29, 2015
  31. Dec 16, 2015
    • OTSUKA, Yuanying's avatar
      Fix retrieving api_interface · 903c7d4c
      OTSUKA, Yuanying authored
      In heterogeneous environment, api_interfaces are different each other.
      So we should specify it from hostvars.
      
      Implements: bp configure-network-interface
      Change-Id: Id15d70bfb9ebb62a64a3847a6b77407efb171dbe
      903c7d4c
  32. Nov 13, 2015
  33. Nov 06, 2015
    • Sam Yaple's avatar
      Finish implementation of spice · 99932d65
      Sam Yaple authored
      Due bad rebases there is a huge section of the spice patch missing
      from the implementation unfortunately. This patch finishes the rest
      of this patch out properly.
      
      Change-Id: I693c6745e9594fd91eb6453f6de9dfcbd410e89c
      Paritally-Implements: blueprint nova-proxies
      99932d65
  34. Nov 05, 2015
    • Sam Yaple's avatar
      bootstrap takes place on the wrong node · e2bc9dcf
      Sam Yaple authored
      The bootstrap must occur on the nova-api node due to binding in the
      nova-api directory (same goes for all other services)
      
      Closes-Bug: #1513439
      Backport: Liberty
      Change-Id: Iab88b49712828085e4d7e7f85e6d8f0b7999a9bf
      e2bc9dcf
    • Sam Yaple's avatar
      Remove vip for rabbitmq · 347730ce
      Sam Yaple authored
      Adjust all the configs to list all the rabbitmq hosts rather than
      running rabbitmq through the VIP. This is made possible by clusterer
      which has already merged.
      
      Change-Id: I5db48f5f10ec68f4c8863a29bc13984f6845a4f9
      Partially-Implements: blueprint rabbitmq-clusterer
      347730ce
  35. Nov 01, 2015
Loading