Skip to content
Snippets Groups Projects
  1. Jan 21, 2025
  2. Aug 23, 2024
  3. Aug 12, 2024
    • Ivan Halomi's avatar
      Refactor of kolla_container_facts · 4ce47e22
      Ivan Halomi authored
      
      Refactor that prepares kolla_container_facts
      module for introducing more actions that will be moved
      from kolla_container module and kolla_container_volume_facts.
      
      This change is based on a discussion about adding a new action
      to kolla_container module that retrieves all names of the running
      containers. It was agreed that kolla-ansible should follow Ansible's
      direction of splitting modules between action modules and facts
      modules. Because of this, kolla_container_facts needs to be able
      to handle different requests for data about containers or volumes.
      
      Change-Id: Ieaec8f64922e4e5a2199db2d6983518b124cb4aa
      Signed-off-by: default avatarIvan Halomi <ivan.halomi@tietoevry.com>
      4ce47e22
  4. Jun 28, 2024
    • Roman Krček's avatar
      Performance: use filters for service dicts · fb3a8f5f
      Roman Krček authored
      Most roles are not leveraging the jinja filters available.
      According to [1] filtering the list of services makes the execution
      faster than skipping the tasks.
      
      This patchset also includes some cosmetic changes to genconfig.
      Individual services are now also using a jinja filter. This has
      no impact on performance, just makes the tasks look cleaner.
      
      Naming of some vars in genconfig was changed to "service" to make
      the tasks more uniform as some were previously using
      the service name and some were using "service".
      
      Three metrics from the deployment were taken and those were
      - overall deployment time [s]
      - time spent on the specific role [s]
      - CPU usage (measured with perf) [-]
      Overall genconfig time went down on avg. from 209s to 195s
      Time spent on the loadbalancer role went down on avg. from 27s to 23s
      Time spent on the neutron role went down on avg from 102s to 95s
      Time spent on the nova-cell role went down on avg. from 54s to 52s
      Also the average CPUs utilized reported by perf went down
      from 3.31 to 3.15.
      For details of how this was measured see the comments in gerrit.
      
      [1] - https://github.com/stackhpc/ansible-scaling/blob/master/doc/skip.md
      
      
      
      Change-Id: Ib0f00aadb6c7022de6e8b455ac4b9b8cd6be5b1b
      Signed-off-by: default avatarRoman Krček <roman.krcek@tietoevry.com>
      fb3a8f5f
  5. Feb 15, 2024
  6. Jan 04, 2024
  7. Nov 15, 2023
  8. Nov 14, 2023
    • Michal Nasiadka's avatar
      Introduce oneshot docker_restart_policy · cea076f3
      Michal Nasiadka authored
      docker_restart_policy: no causes systemd units to not get created
      and we use it in CI to disable restarts on services.
      
      Introducing oneshot policy to not create systemd unit for oneshot
      containers (those that are running bootstrap tasks, like db
      bootstrap and don't need a systemd unit), but still create systemd
      units for long lived containers but with Restart=No.
      
      Change-Id: I9e0d656f19143ec2fcad7d6d345b2c9387551604
      cea076f3
  9. Sep 28, 2023
  10. Aug 30, 2023
  11. Aug 02, 2023
    • Christian Berendt's avatar
      ironic: add ironic_agent_files_directory parameter · 58b5ca27
      Christian Berendt authored
      With the parameter ironic_agent_files_directory it is possible to provide
      the directory for the ironic-agent.kernel and ironic-agent.initramfs
      files. By default the parameter is set to the value of node_custom_config.
      This corresponds to the existing behaviour.
      
      Change-Id: I53bb0eddc5380713a967356c85897d8df8ce505f
      58b5ca27
  12. Mar 15, 2023
  13. Jan 26, 2023
  14. Jan 12, 2023
    • Mark Goddard's avatar
      Fix prechecks in check mode · 46aeb984
      Mark Goddard authored
      When running in check mode, some prechecks previously failed because
      they use the command module which is silently not run in check mode.
      Other prechecks were not running correctly in check mode due to e.g.
      looking for a string in empty command output or not querying which
      containers are running.
      
      This change fixes these issues.
      
      Closes-Bug: #2002657
      Change-Id: I5219cb42c48d5444943a2d48106dc338aa08fa7c
      46aeb984
  15. Dec 21, 2022
    • Matt Crees's avatar
      Integrate oslo-config-validator · 6c2aace8
      Matt Crees authored
      Regularly, we experience issues in Kolla Ansible deployments because we
      use wrong options in OpenStack configuration files. This is because
      OpenStack services ignore unknown options. We also need to keep on top
      of deprecated options that may be removed in the future. Integrating
      oslo-config-validator into Kolla Ansible will greatly help.
      
      Adds a shared role to run oslo-config-validator on each service. Takes
      into account that services have multiple containers, and these may also
      use multiple config files. Service roles are extended to use this shared
      role. Executed with the new command ``kolla-ansible validate-config``.
      
      Change-Id: Ic10b410fc115646d96d2ce39d9618e7c46cb3fbc
      6c2aace8
  16. Nov 04, 2022
  17. Nov 02, 2022
  18. Oct 28, 2022
  19. Sep 29, 2022
    • Radosław Piliszek's avatar
      [ironic] Remove useless tasks · b95de04f
      Radosław Piliszek authored
      They served us well in Yoga but they are no longer needed in Zed.
      This also avoids the early deletion of the ironic-conductor, making
      it really roll.
      
      Change-Id: I9bc85d894b5bf947ac8fca505df446b99b0bb99b
      b95de04f
  20. Aug 26, 2022
  21. Aug 09, 2022
  22. Jul 25, 2022
    • Michal Nasiadka's avatar
      Fix var-spacing · dcf5a8b6
      Michal Nasiadka authored
      ansible-lint introduced var-spacing - let's fix our code.
      
      Change-Id: I0d8aaf3c522a5a6a5495032f6dbed8a2be0251f0
      dcf5a8b6
  23. Apr 13, 2022
    • Maksim Malchuk's avatar
      Multiple DHCP ranges for Ironic Inspector · 762aecbf
      Maksim Malchuk authored
      
      Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the
      configuration of the corresponding 'dhcp-range' and 'dhcp-option'
      blocks in Ironic Inspector dnsmasq for multiple ranges.
      
      The old parameters 'ironic_dnsmasq_dhcp_range' and
      'ironic_dnsmasq_default_gateway' used for the only range are now
      removed.
      
      This change implements the same solution used in the TripleO several
      years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d
      
      Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649
      fix for lease time.
      The value can be changed globally or per range.
      
      Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      Co-Authored-By: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      762aecbf
  24. Apr 06, 2022
  25. Mar 21, 2022
    • Radosław Piliszek's avatar
      Ironic: rebootstrap ironic-pxe on upgrade · 1db06b32
      Radosław Piliszek authored
      Like other containers.
      
      This ensures that upgrade already updates PXE components and no
      additional deploy/reconfigure is needed.
      
      Closes-Bug: #1963752
      Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
      1db06b32
  26. Mar 04, 2022
  27. Dec 22, 2021
  28. Aug 10, 2021
    • Radosław Piliszek's avatar
      Refactor and optimise image pulling · 9ff2ecb0
      Radosław Piliszek authored
      We get a nice optimisation by using a filtered loop instead
      of task skipping per service with 'when'.
      
      Partially-Implements: blueprint performance-improvements
      Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
      9ff2ecb0
    • Mark Goddard's avatar
      ironic: Follow up for ironic_enable_keystone_integration · 46df30d8
      Mark Goddard authored
      Follow up for I0c7e9a28876a1d4278fb2ed8555c2b08472864b9 which added a
      ironic_enable_keystone_integration variable to support Ironic in
      multi-region environments. This change skips Keystone service
      registration based on ironic_enable_keystone_integration rather than
      enable_keystone. It also updates the ironic-inspector.conf template to
      use the new variable.
      
      Change-Id: I2ecba4999e194766258ac5beed62877d43829313
      46df30d8
  29. Mar 08, 2021
    • LinPeiWen's avatar
      Use Docker healthchecks for ironic services · cb537eb8
      LinPeiWen authored
      This change enables the use of Docker healthchecks for ironic services.
      Implements: blueprint container-health-check
      
      Change-Id: If0a11db5470899c3a0e69ca94fdd0903daadcf8b
      cb537eb8
  30. Dec 14, 2020
    • Mark Goddard's avatar
      Revert "Performance: Use import_tasks in the main plays" · db4fc85c
      Mark Goddard authored
      This reverts commit 9cae59be.
      
      Reason for revert: This patch was found to introduce issues with fluentd customisation. The underlying issue is not currently fully understood, but could be a sign of other obscure issues.
      
      Change-Id: Ia4859c23d85699621a3b734d6cedb70225576dfc
      Closes-Bug: #1906288
      db4fc85c
  31. Oct 27, 2020
    • Radosław Piliszek's avatar
      Do not set 'always' tag where unnecessary · 71e9c603
      Radosław Piliszek authored
      Makes 'import_tasks' not change behaviour compared to
      'include_tasks'.
      
      Change-Id: I600be7c3bd763b3b924bd4a45b4e7b4dca7a33e3
      71e9c603
    • Radosław Piliszek's avatar
      Performance: Use import_tasks in the main plays · 9cae59be
      Radosław Piliszek authored
      Main plays are action-redirect-stubs, ideal for import_tasks.
      
      This avoids 'include' penalty and makes logs/ara look nicer.
      
      Fixes haproxy and rabbitmq not to check the host group as well.
      
      Change-Id: I46136fc40b815e341befff80b54a91ef431eabc0
      Partially-Implements: blueprint performance-improvements
      9cae59be
  32. Oct 12, 2020
    • Radosław Piliszek's avatar
      Performance: optimize genconfig · 3411b9e4
      Radosław Piliszek authored
      Config plays do not need to check containers. This avoids skipping
      tasks during the genconfig action.
      
      Ironic and Glance rolling upgrades are handled specially.
      
      Swift and Bifrost do not use the handlers at all.
      
      Partially-Implements: blueprint performance-improvements
      Change-Id: I140bf71d62e8f0932c96270d1f08940a5ba4542a
      3411b9e4
  33. Sep 24, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 7c2df87d
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Ironic service.
      
      Change-Id: I9edf7545c174ca8839ceaef877bb09f49ef2b451
      Partially-Implements: blueprint add-ssl-internal-network
      7c2df87d
  34. Sep 10, 2020
    • Pierre Riteau's avatar
      Revert "Add support for encrypting Ironic API" · 3d30624c
      Pierre Riteau authored
      This reverts commit 316b0496, because
      ironic-inspector is not ready to use WSGI. It would need to be split
      into two separate containers, one running ironic-inspector-api-wsgi and
      another running ironic-inspector-conductor.
      
      Change-Id: I7e6c59dc8ad4fdee0cc6d96313fe66bc1d001bf7
      3d30624c
  35. Aug 29, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 316b0496
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      and Ironic Inspector service. When used in conjunction with enabling
      TLS for service API endpoints, network communcation will be encrypted
      end to end, from client through HAProxy to the Ironic service.
      
      Change-Id: I3e82c8ec112e53f907e89fea0c8c849072dcf957
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/#/c/742776/
      316b0496
Loading