- Apr 01, 2022
-
-
Pierre Riteau authored
The main venus group should not be in the group providing additional control of service placement. Change-Id: I569254077d5ef9814c99bbcc7fafd7be3bacad67
-
- Mar 30, 2022
-
-
Michal Nasiadka authored
This key can be used by users in networking-generic-switch scenario instead of adding cleartext password in ml2_conf.ini. Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
-
- Mar 28, 2022
-
-
wangxiyuan authored
openEuler is the newest open source operating system, which is quite famous and widely used in China. This patch aims to add the OS support in kolla-ansible for the host OS. bp: support-openeuler-os Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830320 Change-Id: I66dc84f02c324dbc0787ec25d4bd92ada9362e94
-
- Mar 25, 2022
-
-
Juan Pablo Suazo authored
Adds a new configuration file that provides fluentd with an appropiate regex to match with OpenvSwitch logs in both default files. The regex is segmented with variable as to isolate the relevant parts of each log message. Closes-Bug: #1965815 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: Ife83c50c048d517a5c8a5dee588f8f7846fcee00
-
Jan Horstmann authored
This commit changes the indentation scheme used in `ansible/roles/grafana/templates/provisioning.yaml.j2` to the commonly used pattern of two whitespaces. Change-Id: I2f9d34930ed06aa2e63f7cc28bfdda7046fc3e67
-
- Mar 24, 2022
-
-
Sven Kieske authored
this adds back the ability to configure the rabbitmq/erlang kernel network interface which was removed in https://review.opendev.org/#/c/584427/ seemingly by accident. Closes-Bug: 1900160 Change-Id: I6f00396495853e117429c17fadfafe809e322a31
-
Michał Nasiadka authored
Designate sink is an optional service that consumes notifications, users should have an option to disable it when they don't use them. Change-Id: I1d5465d9845aea94cff39ff5158cd8b1dccc4834
-
Michał Nasiadka authored
In most real world deployments, there will be multiple backend DNS servers, allow to specify all of them for the pool configuration. Change-Id: Ic9737d0446a807891b429f080ae1bf048a3c8e4a
-
- Mar 23, 2022
-
-
Michal Nasiadka authored
In Xena [1] we removed Monasca Grafana service, but some components were left to support cleanup operations. [1]: https://review.opendev.org/c/openstack/kolla-ansible/+/788228 Change-Id: Iccc7bc3628bb7cbab1ac28f41c7b7dc7695894c6
-
- Mar 22, 2022
-
-
Will Szumski authored
Change-Id: Ie87a7488dad369464793b47c3d2db67d7dc1694e
-
Daniel Meyerholt authored
The backend external tasks which utilize an existing bind9 installation require appropriate permissions to be able to copy rndc config and key. Closes-Bug: #1912063 Change-Id: Ie50228a26d635e3db82e41ec266ab820bf58938e Signed-off-by:
Daniel Meyerholt <dxm523@gmail.com>
-
- Mar 21, 2022
-
-
Radosław Piliszek authored
Like other containers. This ensures that upgrade already updates PXE components and no additional deploy/reconfigure is needed. Closes-Bug: #1963752 Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
-
Juan Pablo Suazo authored
This commit adds support for pushing Ceilometer metrics to Prometheus instead of Gnocchi or alongside it. Closes-Bug: #1964135 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: I9fd32f63913a534c59e2d17703702074eea5dd76
-
Mark Goddard authored
Change Ia1239069ccee39416b20959cbabad962c56693cf added support for running a libvirt daemon on the host, rather than using the nova_libvirt container. It did not cover migration of existing hosts from using a container to using a host daemon. This change adds a kolla-ansible nova-libvirt-cleanup command which may be used to clean up the nova_libvirt container, volumes and related items on hosts, once it has been disabled. The playbook assumes that compute hosts have been emptied of VMs before it runs. A future extension could support migration of existing VMs, but this is currently out of scope. Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
-
Mark Goddard authored
In some cases it may be desirable to run the libvirt daemon on the host. For example, when mixing host and container OS distributions or versions. This change makes it possible to disable the nova_libvirt container, by setting enable_nova_libvirt_container to false. The default values of some Docker mounts and other paths have been updated to point to default host directories rather than Docker volumes when using a host libvirt daemon. This change does not handle migration of existing systems from using a nova_libvirt container to libvirt on the host. Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504 Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
-
- Mar 18, 2022
-
-
Mark Goddard authored
Follow up to I91d0e23b22319cf3fdb7603f5401d24e3b76a56e, which fixes a conditional corner case when removing the ha-all policy. Change-Id: Iea75551bc6d0da7dd10515dd8bd28c014eed7a5e
-
Imran Hussain authored
Consistently use template instead of copy. This has the added advantage of allowing variables inside ceph conf files and keyrings. Closes-Bug: 1959565 Signed-off-by:
Imran Hussain <ih@imranh.co.uk> Change-Id: Ibd0ff2641a54267ff06d3c89a26915a455dff1c1
-
- Mar 17, 2022
-
-
jinyuanliu authored
This project [1] can provide a one-stop solution to log collection, cleaning, indexing, analysis, alarm, visualization, report generation and other needs, which involves helping operator or maintainer to quickly solve retrieve problems, grasp the operational health of the platform, and improve the level of platform management. [1] https://wiki.openstack.org/wiki/Venus Change-Id: If3562bbed6181002b76831bab54f863041c5a885
-
- Mar 10, 2022
-
-
Mark Goddard authored
In Kolla Ansible OpenStack deployments, by default, libvirt is configured to allow read-write access via an unauthenticated, unencrypted TCP connection, using the internal API network. This is to facilitate migration between hosts. By default, Kolla Ansible does not use encryption for services on the internal network (and did not support it until Ussuri). However, most other services on the internal network are at least authenticated (usually via passwords), ensuring that they cannot be used by anyone with access to the network, unless they have credentials. The main issue here is the lack of authentication. Any client with access to the internal network is able to connect to the libvirt TCP port and make arbitrary changes to the hypervisor. This could include starting a VM, modifying an existing VM, etc. Given the flexibility of the domain options, it could be seen as equivalent to having root access to the hypervisor. Kolla Ansible supports libvirt TLS [1] since the Train release, using client and server certificates for mutual authentication and encryption. However, this feature is not enabled by default, and requires certificates to be generated for each compute host. This change adds support for libvirt SASL authentication, and enables it by default. This provides base level of security. Deployments requiring further security should use libvirt TLS. [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021 Closes-Bug: #1964013 Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
-
- Mar 08, 2022
-
-
Nathan Taylor authored
Add "enable_prometheus_etcd_integration" configuration parameter which can be used to configure Prometheus to scrape etcd metrics endpoints. The default value of "enable_prometheus_etcd_integration" is set to the combined values of "enable_prometheus" and "enable_etcd". Change-Id: I7a0b802c5687e2d508e06baf55e355d9761e806f
-
- Mar 07, 2022
-
-
Mark Goddard authored
While I8bb398e299aa68147004723a18d3a1ec459011e5 stopped setting the net.ipv4.ip_forward sysctl, this change explicitly removes the option from the Kolla sysctl config file. In the absence of another source for this sysctl, it should revert to the default of 0 after the next reboot. A deployer looking to more aggressively change the value may set neutron_l3_agent_host_ipv4_ip_forward to 0. Any deployments still relying on the previous value may set neutron_l3_agent_host_ipv4_ip_forward to 1. Related-Bug: #1945453 Change-Id: I9b39307ad8d6c51e215fe3d3bc56aab998d218ec
-
- Mar 04, 2022
-
-
Radosław Piliszek authored
Ironic is dropping default_boot_option and the new default has been around for quite a while now so let's remove this old scary comment. Change-Id: I80d645cb97251ac63e04d7ec1c87d4600d17d4ee
-
Radosław Piliszek authored
Since I30c2ad2bf2957ac544942aefae8898cdc8a61ec6 this container is always enabled and thus the port should always be checked. Change-Id: I94a70d89123611899872061bd69593280d0a68c4
-
Radosław Piliszek authored
Set kernel_append_params instead. Change-Id: I4fb42d376636dc363cd86950ed37de4a3d28df73
-
- Mar 03, 2022
-
-
Michal Nasiadka authored
Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/831642 Change-Id: I70dcd2d0cade52a23b3e219b7e0aaa31193ec938
-
- Mar 02, 2022
-
-
IDerr authored
Change-Id: I4cf48620f03d67ea4a9ef327afbf3b1ebe28550b Closes-Bug: #1946506
-
- Feb 25, 2022
-
-
Radosław Piliszek authored
Ironic has changed the default PXE to be iPXE (as opposed to plain PXE) in Yoga. Kolla Ansible supports either one or the other and we tend to stick to upstream defaults so this change enables iPXE instead of plain PXE - by default - the users are allowed to change back and they need to take one other action so it is good to remind them via upgrade notes either way. Change-Id: If14ec83670d2212906c6e22c7013c475f3c4748a
-
- Feb 24, 2022
-
-
Juan Pablo Suazo authored
Closes-Bug: #1961795 Change-Id: I5547cce5c389846ed216bb898b78e45b8f231e1e
-
- Feb 23, 2022
-
-
Piotr Parczewski authored
Closes-bug: 1959781 Change-Id: If574d2242aa6a875dcf624d95495e6cec6fefddd
-
- Feb 22, 2022
-
-
Mark Goddard authored
TrivialFix Change-Id: Id85a5d69e1222b616705e24885252425c92af527
-
Pierre Riteau authored
These configuration settings were removed in Grafana 6.2. Instead we can use [remote_cache], but it is not required since it will use database settings by default. Change-Id: I37966027aea9039b2ecba4214444507e9d87f513
-
- Feb 21, 2022
-
-
Doug Szumski authored
When OpenStack is deployed with Kolla-Ansible, by default there are no durable queues or exchanges created by the OpenStack services in RabbitMQ. In Rabbit terminology, not being durable is referred to as `transient`, and this means that the queue is generally held in memory. Whether OpenStack services create durable or transient queues is traditionally controlled by the Oslo Notification config option: `amqp_durable_queues`. In Kolla-Ansible, this remains set to the default of `False` in all services. The only `durable` objects are the `amq*` exchanges which are internal to RabbitMQ. More recently, Oslo Notification has introduced support for Quorum queues [7]. These are a successor to durable classic queues, however it isn't yet clear if they are a good fit for OpenStack in general [8]. For clustered RabbitMQ deployments, Kolla-Ansible configures all queues as `replicated` [1]. Replication occurs over all nodes in the cluster. RabbitMQ refers to this as 'mirroring of classic queues'. In summary, this means that a multi-node Kolla-Ansible deployment will end up with a large number of transient, mirrored queues and exchanges. However, the RabbitMQ documentation warns against this, stating that 'For replicated queues, the only reasonable option is to use durable queues: [2]`. This is discussed further in the following bug report: [3]. Whilst we could try enabling the `amqp_durable_queues` option for each service (this is suggested in [4]), there are a number of complexities with this approach, not limited to: 1) RabbitMQ is planning to remove classic queue mirroring in favor of 'Quorum queues' in a forthcoming release [5]. 2) Durable queues will be written to disk, which may cause performance problems at scale. Note that this includes Quorum queues which are always durable. 3) Potential for race conditions and other complexity discussed recently on the mailing list under: `[ops] [kolla] RabbitMQ High Availability` The remaining option, proposed here, is to use classic non-mirrored queues everywhere, and rely on services to recover if the node hosting a queue or exchange they are using fails. There is some discussion of this approach in [6]. The downside of potential message loss needs to be weighed against the real upsides of increasing the performance of RabbitMQ, and moving to a configuration which is officially supported and hopefully more stable. In the future, we can then consider promoting specific queues to quorum queues, in cases where message loss can result in failure states which are hard to recover from. [1] https://www.rabbitmq.com/ha.html [2] https://www.rabbitmq.com/queues.html [3] https://github.com/rabbitmq/rabbitmq-server/issues/2045 [4] https://wiki.openstack.org/wiki/Large_Scale_Configuration_Rabbit [5] https://blog.rabbitmq.com/posts/2021/08/4.0-deprecation-announcements/ [6] https://fuel-ccp.readthedocs.io/en/latest/design/ref_arch_1000_nodes.html#replication [7] https://bugs.launchpad.net/oslo.messaging/+bug/1942933 [8] https://www.rabbitmq.com/quorum-queues.html#use-cases Partial-Bug: #1954925 Change-Id: I91d0e23b22319cf3fdb7603f5401d24e3b76a56e
-
Pierre Riteau authored
The Prometheus HTTP API is reachable under /api/v1. Without this fix, CloudKitty receives 404 errors from Prometheus. Change-Id: Ie872da5ccddbcb8028b8b57022e2427372ed474e
-
Mark Goddard authored
This change adds an Ansible Galaxy requirements file including the openstack.kolla collection. A new 'kolla-ansible install-deps' command is provided to install the requirements. With the new collection in place, this change also switches to using the baremetal role from the openstack.kolla collection, and removes the baremetal role from this repository. Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/820168 Change-Id: I9708f57b4bb9d64eb4903c253684fe0d9147bd4a
-
- Feb 18, 2022
-
-
Pierre Riteau authored
Without this configuration, all mount points are reporting the same utilisation metrics [1]. With the rslave option, all root mounts from the host are visible in the container, so we can remove the bind mounts for /proc and /sys. [1] https://github.com/prometheus/node_exporter#docker Change-Id: I4087dc81f9d1fa5daa24b9df6daf1f9e1ccd702f Closes-Bug: #1961438
-
alecorps authored
An FCD, also known as an Improved Virtual Disk (IVD) or Managed Virtual Disk, is a named virtual disk independent of a virtual machine. Using FCDs for Cinder volumes eliminates the need for shadow virtual machines. This patch adds Kolla support. Change-Id: Ic0b66269e6d32762e786c95cf6da78cb201d2765
-
Pierre Riteau authored
The following variables are added: * prometheus_blackbox_exporter_cmdline_extras * prometheus_elasticsearch_exporter_cmdline_extras * prometheus_haproxy_exporter_cmdline_extras * prometheus_memcached_exporter_cmdline_extras * prometheus_mysqld_exporter_cmdline_extras * prometheus_node_exporter_cmdline_extras * prometheus_openstack_exporter_cmdline_extras Change-Id: I5da2031b9367115384045775c515628e2acb1aa4
-
- Feb 17, 2022
-
-
Alban Lecorps authored
NSXP is the OpenStack support for the NSX Policy platform. This is supported from neutron in the Stein version. This patch adds Kolla support This adds a new neutron_plugin_agent type 'vmware_nsxp'. The plugin does not run any neutron agents. Change-Id: I9e9d8f07e586bdc143d293e572031368af7f3fca
-
- Feb 15, 2022
-
-
Michal Nasiadka authored
Change-Id: I27b0e42fba93a35c6d878d108bf1e7fdebc9e3db
-
- Feb 14, 2022
-
-
Mark Goddard authored
This module was used in the Ceph deployment support, which was removed long ago. Change-Id: I599ef47199bc68e8f5cf62709157d3f096ac68a9
-