Skip to content
Snippets Groups Projects
  1. Jun 08, 2020
  2. Jun 05, 2020
  3. Jun 04, 2020
  4. Jun 02, 2020
  5. May 28, 2020
  6. May 24, 2020
  7. May 23, 2020
    • Doug Szumski's avatar
      Switch to Monasca API for logs · b39a0f80
      Doug Szumski authored
      The Monasca Log API has been removed and in this change we switch
      to using the unified API. If dedicated log APIs are required then
      this can be supported through configuration. Out of the box the
      Monasca API is used for both logs and metrics which is envisaged to
      work for most use cases.
      
      In order to use the unified API for logs, we need to disable the
      legacy Kafka client. We also rename the Monasca API config file
      to remove a warning about using the old style name.
      
      Depends-On: https://review.opendev.org/#/c/728638
      Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
      b39a0f80
    • xiaojueguan's avatar
      Remove post_config from the Kibana role · fbc47e60
      xiaojueguan authored
      
      Since at least Stein, there is no visible effect from these tasks.
      The Kibana dashboard seems to be working exactly the same,
      greeting user on the first use with "please configure my index".
      I tested on both Ubuntu and CentOS.
      In new E*K stack (Ussuri+, CentOS8+) it even causes play errors.
      
      Co-authored-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      Change-Id: Iafc6986cce9cbaa0ea9e219ca85d7d01a61308cf
      Closes-Bug: #1799689
      fbc47e60
  8. May 21, 2020
  9. May 20, 2020
  10. May 18, 2020
  11. May 17, 2020
    • Michal Nasiadka's avatar
      CI: Add ansible-lint to tox · d8f31e0a
      Michal Nasiadka authored
      * Reworked tox pep8 into linters job, that runs:
        - pep8
        - bandit
        - bashate
        - doc8
        - yamllint
        - ansible-lint (validate-all-files.py + ansible-lint)
      
      * Skip E701 - missing galaxy_info in meta and E602 see [1].
      * Skip E301 and E503 - followup later in a separate change
      * Added ansible-role-jobs to zuul.d/project.yaml which will run
        openstack-tox-linters job in check queue
      * Fixed remaining style issue
      * Made tox and docs reference the new env for linters
      * Dropped pype environment (not supported)
      
      [1]: https://github.com/ansible/ansible-lint/issues/457
      
      Change-Id: I494b4b151804aac8173120e6c6e42bc2fdb00234
      d8f31e0a
    • gugug's avatar
      Enable W503 for flake8 check · 22f7aecb
      gugug authored
      W503 and W504 are incompatible and we need to choose one of them.
      Existing codes follows W503, so we disable W504.
      
      Change-Id: Ic745e956dd332eb0fa49b93c1e6acb12f8a7f26c
      22f7aecb
    • xiaojueguan's avatar
      make murano work with endpoints with non-public CA · 1f3cb24a
      xiaojueguan authored
      Change-Id: Ic0d0543b6ad93743eae2a144e8a3b07de54e6d96
      Closes-Bug: #1878344
      1f3cb24a
  12. May 15, 2020
    • Will Szumski's avatar
      Improve fernet_token_expiry precheck · 810acea6
      Will Szumski authored
      The pre-check was broken, see bug report for details.
      
      Change-Id: I089f1e288bae6c093be66181c81a4373a6ef3de4
      Closes-Bug: #1856021
      810acea6
    • Michal Nasiadka's avatar
      Fix deprecation warnings in fluentd · 3611f053
      Michal Nasiadka authored
      Change-Id: I812665059783617d581d748e619b29426f89b353
      3611f053
    • Jeffrey Zhang's avatar
      Configure RabbitMQ user tags in nova-cell role · 869e3f21
      Jeffrey Zhang authored
      The RabbitMQ 'openstack' user has the 'administrator' tag assigned via
      the RabbitMQ definitions.json file.
      
      Since the Train release, the nova-cell role also configures the RabbitMQ
      user, but omits the tag. This causes the tag to be removed from the
      user, which prevents it from accessing the management UI and API.
      
      This change adds support for configuring user tags to the
      service-rabbitmq role, and sets the administrator tag by default.
      
      Change-Id: I7a5d6fe324dd133e0929804d431583e5b5c1853d
      Closes-Bug: #1875786
      869e3f21
    • Doug Szumski's avatar
      Fix registration of Monasca Grafana datasource · 776253c4
      Doug Szumski authored
      The refactor in change I500cc8800c412bc0e95edb15babad5c1189e6ee4
      broke the task `Enable Monasca Grafana datasource for control
      plane organisation`. This change fixes the brackets.
      
      Change-Id: I9167a312be107fbfddfd07740f67845c2eaafc3d
      Closes-Bug: 1878878
      776253c4
  13. May 14, 2020
  14. May 13, 2020
    • James Kirsch's avatar
      Add support for encrypting Barbican API · 2e08ffd6
      James Kirsch authored
      This patch introduces an optional backend encryption for the Barbican
      API service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Barbican service.
      
      Change-Id: I62a43b36ebe4a03230bf944980b45e4b6938871b
      Partially-Implements: blueprint add-ssl-internal-network
      2e08ffd6
  15. May 12, 2020
  16. May 11, 2020
    • Will Szumski's avatar
      Add extras directory to prometheus config · d05578f5
      Will Szumski authored
      This provides a generic mechanism to include extra files
      that you can reference in prometheus.yml, for example:
      
      scrape_targets:
        - job_name: ipmi
          params:
            module: default
          scrape_interval: 1m
          scrape_timeout: 30s
          metrics_path: /ipmi
          scheme: http
          file_sd_configs:
          - files:
            - /etc/prometheus/extras/file_sd/ipmi-exporter-targets.yml
            refresh_interval: 5m
      
      Change-Id: Ie2f085204b71725b901a179ee51541f1f383c6fa
      Related: blueprint custom-prometheus-targets
      d05578f5
    • Will Szumski's avatar
      Support customizing prometheus.cfg files · 956a29f8
      Will Szumski authored
      This provides a mechanism to scrape targets defined outside of kolla-ansible.
      
      Depends-On: https://review.opendev.org/#/c/685671/
      Change-Id: I0950341b147bb374b4128f09f807ef5a756f5dfa
      Related: blueprint custom-prometheus-targets
      956a29f8
    • Will Szumski's avatar
      Add extend_lists option to merge_yaml · 69a6acf7
      Will Szumski authored
      This allows you to extend lists in yaml config. This is useful, for
      example, in prometheus.yml, where it would be nice to be able to
      extend the scrape_configs to include exporters that aren't packaged
      with kolla-ansible. This would provide a mechanism to do so.
      
      Change-Id: I7a10e363f42e8ffaae3c0d2c2a758853e2cab7e1
      Related: blueprint custom-prometheus-targets
      69a6acf7
    • Mark Goddard's avatar
      Fixes Gnocchi & external Ceph integration · 82c5c1c7
      Mark Goddard authored
      The removal of Kolla Ceph deploy [1] broke gnocchi & external Ceph
      integration - the variable gnocchi_pool_name is referenced in the config
      template, but should now be ceph_gnocchi_pool_name.
      
      This change fixes the issue.
      
      Reported by Nick Wilson.
      
      [1] https://review.opendev.org/#/c/704309/12/ansible/roles/gnocchi/defaults/main.yml
      
      Change-Id: I7089781c0c4d7bce8a44cb8b1fca847dd0b7efd1
      Closes-Bug: #1877974
      82c5c1c7
  17. May 08, 2020
  18. May 06, 2020
    • Radosław Piliszek's avatar
      Make nova perms consistent between applications · 93c9ad89
      Radosław Piliszek authored
      Nova cells support introduced a slight regression that triggers
      odd behaviour when we tried switching to Apache (httpd) [1].
      Bootstrap no longer applied permissions recursively to all log
      files, creating a discrepancy between normal and bootstrap runs
      and also Nova and other services such as Cinder (regarding
      bootstrap logging).
      
      This patch fixes it.
      
      Backport to Train.
      
      Not creating reno nor a bug record because it does not affect
      any current standard usage in any currently known way.
      
      Note this only really hides (standardizes?) the global issue that
      we don't control file permissions on newly created files too well.
      
      [1] https://review.opendev.org/724793
      
      Change-Id: I35e9924ccede5edd2e1307043379aba944725143
      Needed-By: https://review.opendev.org/724793
      93c9ad89
  19. May 05, 2020
    • generalfuzz's avatar
      Use FQDN to communicate with Kibana and Elasticsearch · f165b81e
      generalfuzz authored
      Switch URL composition from using VIP to FQDN to connect with Kibana and
      Elasticsearch services.
      
      Change-Id: I5d559ead1d6d5e928e76bb685e0f730868fd7b89
      Closes-Bug: #1862419
      f165b81e
    • Mark Goddard's avatar
      Use FQDN for elasticsearch · a87780cb
      Mark Goddard authored
      This was addressed in I21689e22870c2f6206e37c60a3c33e19140f77ff but
      accidentally reverted in I4f74bfe07d4b7ca18953b11e767cf0bb94dfd67e.
      
      Change-Id: Id5fc458b0ca54bddfe9a43cb315dbcfeb2142395
      a87780cb
  20. May 01, 2020
    • Radosław Piliszek's avatar
      OVN IPv6 · 7d73246f
      Radosław Piliszek authored
      Fixes:
      - SB/NB DB address format (single host) for SB/NB DB daemon
      - SB/NB DB address format (all hosts) for Neutron / northd /
        ovn-ovs bootstrap
      - OVN tests
      
      Change-Id: I539773c48f89b731d068280c228ce11782bf5788
      Closes-Bug: #1875222
      7d73246f
  21. Apr 30, 2020
    • James Kirsch's avatar
      Add support for encrypting Horizon and Placement API · e3d5a91a
      James Kirsch authored
      This patch introduces an optional backend encryption for Horizon and
      Placement services. When used in conjunction with enabling TLS for
      service API endpoints, network communcation will be encrypted end to
      end, from client through HAProxy to the Horizon and Placement services.
      
      Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d
      Partially-Implements: blueprint add-ssl-internal-network
      e3d5a91a
    • James Kirsch's avatar
      Add support for encrypting Glance api · f87814f7
      James Kirsch authored
      Add TLS support for Glance api using HAProxy to perform TLS termination.
      
      Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809
      Partially-Implements: blueprint add-ssl-internal-network
      f87814f7
    • Hongbin Lu's avatar
      Zun: Add zun-cni-daemon to compute node · 91678f67
      Hongbin Lu authored
      Zun has a new component "zun-cni-daemon" which should be
      deployed in every compute nodes. It is basically an implementation
      of CNI (Container Network Interface) that performs the neutron
      port binding.
      
      If users is using the capsule (pod) API, the recommended deployment
      option is using "cri" as capsule driver. This is basically to use
      a CRI runtime (i.e. CRI plugin for containerd) for supporting
      capsules (pods). A CRI runtime needs a CNI plugin which is what
      the "zun-cni-daemon" provides.
      
      The configuration is based on the Zun installation guide [1].
      It consits of the following steps:
      * Configure the containerd daemon in the host. The "zun-compute"
        container will use grpc to communicate with this service.
      * Install the "zun-cni" binary at host. The containerd process
        will invoke this binary to call the CNI plugin.
      * Run a "zun-cni-daemon" container. The "zun-cni" binary will
        communicate with this container via HTTP.
      
      Relevant patches:
      Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime
      Install guide: https://review.opendev.org/#/c/707948/
      Devstack plugin: https://review.opendev.org/#/c/705338/
      Kolla image: https://review.opendev.org/#/c/708273/
      
      [1] https://docs.openstack.org/zun/latest/install/index.html
      
      Depends-On: https://review.opendev.org/#/c/721044/
      Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
      91678f67
  22. Apr 29, 2020
  23. Apr 28, 2020
Loading