Skip to content
Snippets Groups Projects
  1. Jan 21, 2025
  2. Sep 23, 2024
  3. Aug 23, 2024
  4. Aug 12, 2024
  5. Mar 25, 2024
  6. Feb 15, 2024
  7. Jan 31, 2024
  8. Jan 04, 2024
  9. Nov 30, 2023
  10. Nov 29, 2023
  11. Aug 30, 2023
  12. Jun 22, 2023
    • yann.degat's avatar
      Use better default bind address for ironic-tftp · 81948f5b
      yann.degat authored
      ironic tftp service binds on 0.0.0.0. This may be
      an issue in some setup. This patch propose a better
      default, such as using the same listen address as
      the dnsmasq service
      
      Closes-Bug: #2024664
      
      Change-Id: I0401bfc03cd31d72c5a2ae0a111889d5c29a8aa2
      81948f5b
  13. Mar 02, 2023
  14. Feb 14, 2023
  15. Jan 13, 2023
    • Matt Crees's avatar
      Add a flag to handle RabbitMQ high availability · 09df6fc1
      Matt Crees authored
      A combination of durable queues and classic queue mirroring can be used
      to provide high availability of RabbitMQ. However, these options should
      only be used together, otherwise the system will become unstable. Using
      the flag ``om_enable_rabbitmq_high_availability`` will either enable
      both options at once, or neither of them.
      
      There are some queues that should not be mirrored:
      * ``reply`` queues (these have a single consumer and TTL policy)
      * ``fanout`` queues (these have a TTL policy)
      * ``amq`` queues (these are auto-delete queues, with a single consumer)
      An exclusionary pattern is used in the classic mirroring policy. This
      pattern is ``^(?!(amq\\.)|(.*_fanout_)|(reply_)).*``
      
      Change-Id: I51c8023b260eb40b2eaa91bd276b46890c215c25
      09df6fc1
  16. Jan 05, 2023
  17. Oct 31, 2022
  18. Sep 30, 2022
    • Pierre Riteau's avatar
      Remove dhcp-sequential-ip in ironic dnsmasq config · 9ce47b2f
      Pierre Riteau authored
      With this option enabled, dnsmasq can offer the same IP address to
      multiple hosts when their requests are close to each other. Remove this
      option in order to use the built-in hashing mechanism which will
      allocate random IP addresses, which should be less likely to conflict.
      
      Closes-Bug: #1991390
      Change-Id: I09a9fa2d0c54635b899ad7906cc2e2e4580ef5ad
      9ce47b2f
  19. Sep 28, 2022
  20. Aug 26, 2022
  21. Jul 12, 2022
    • Michal Arbet's avatar
      Add api_workers for each service to defaults · 3e8db91a
      Michal Arbet authored
      Render {{ openstack_service_workers }} for workers
      of each openstack service is not enough. There are
      several services which has to have more workers because
      there are more requests sent to them.
      
      This patch is just adding default value for workers for
      each service and sets {{ openstack_service_workers }} as
      default, so value can be overrided in hostvars per server.
      Nothing changed for normal user.
      
      Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
      3e8db91a
    • Christian Berendt's avatar
      Set the ironic notification level · ced1e3b6
      Christian Berendt authored
      To use notifications with ironic, the notification_level
      option in the [DEFAULT] section of the configuration file
      must be set, we use ``info`` as a reasonable level.
      
      Closes-Bug: #1969826
      
      Change-Id: I38bb1e5404e917c788689a3181741022f875da06
      ced1e3b6
  22. Jul 06, 2022
  23. Jun 24, 2022
    • Christian Berendt's avatar
      Add ironic_http_interface parameters · 4de34266
      Christian Berendt authored
      With the ironic_http_interface/ironic_http_interface_address
      parameters it is possible to set the addresses for the
      ironic_http service.
      
      Change-Id: I72c257ebedf283cdef1b98485a576631e2190657
      4de34266
  24. Jun 09, 2022
    • Will Szumski's avatar
      Add keystone_authtoken.service_type · 49006e56
      Will Szumski authored
      Fixes an issue where access rules failed to validate:
      
          Cannot validate request with restricted access rules. Set
          service_type in [keystone_authtoken] to allow access rule validation
      
      I've used the values from the endpoint. This was mostly a straight
      forward copy and paste, except:
      
      - versioned endpoints e.g cinderv3 where I stripped the version
      - monasca has multiple endpoints associated with a single service. For
        this, I concatenated logging and monitoring to be logging-monitoring.
      
      Closes-Bug: #1965111
      Change-Id: Ic4b3ab60abad8c3dd96cd4923a67f2a8f9d195d7
      49006e56
  25. May 28, 2022
    • Radosław Piliszek's avatar
      Do not use keystone_admin_url et al · 7ca9349b
      Radosław Piliszek authored
      Following up on [1].
      The 3 variables are only introducing noise after we removed
      the reliance on Keystone's admin port.
      
      [1] I5099b08953789b280c915a6b7a22bdd4e3404076
      
      Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
      7ca9349b
  26. Apr 21, 2022
  27. Apr 13, 2022
    • Maksim Malchuk's avatar
      Multiple DHCP ranges for Ironic Inspector · 762aecbf
      Maksim Malchuk authored
      
      Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the
      configuration of the corresponding 'dhcp-range' and 'dhcp-option'
      blocks in Ironic Inspector dnsmasq for multiple ranges.
      
      The old parameters 'ironic_dnsmasq_dhcp_range' and
      'ironic_dnsmasq_default_gateway' used for the only range are now
      removed.
      
      This change implements the same solution used in the TripleO several
      years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d
      
      Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649
      fix for lease time.
      The value can be changed globally or per range.
      
      Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      Co-Authored-By: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      762aecbf
  28. Apr 06, 2022
  29. Apr 05, 2022
  30. Mar 04, 2022
  31. Feb 10, 2022
    • Mark Goddard's avatar
      ironic: sync default inspection UEFI iPXE bootloader with Ironic · 556d9799
      Mark Goddard authored
      The bootloader used to boot Ironic nodes in UEFI boot mode during
      inspection when iPXE is enabled has been changed from ipxe.efi to
      snponly.efi. This is in line with the default UEFI iPXE bootloader used
      in Ironic since the Xena release. The bootloader may be changed via
      ironic_dnsmasq_uefi_ipxe_boot_file.
      
      Note that snponly.efi was not available via in the ironic-pxe image
      prior to I79e78dca550262fc86b092a036f9ea96b214ab48.
      
      Related-Bug: #1959203
      
      Change-Id: I879db340769cc1b076e77313dff15876e27fcac4
      556d9799
  32. Dec 22, 2021
  33. Oct 12, 2021
    • Maksim Malchuk's avatar
      Update dnsmasq logging · d559e2c3
      Maksim Malchuk authored
      
      This change adds the dnsmasq.log for the ironic-dnsmasq container and
      also enables more verbose logging when debug logging enabled.
      This can be triggered globbaly via 'openstack_logging_debug' or per
      service via 'ironic_logging_debug' or 'neutron_logging_debug'.
      
      Change-Id: I0e6b089beb88827effbcc365625eb2df902f5470
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      d559e2c3
  34. Sep 28, 2021
    • Niklas Hagman's avatar
      Transition Keystone admin user to system scope · 2e933dce
      Niklas Hagman authored
      A system-scoped token implies the user has authorization to act on the
      deployment system. These tokens are useful for interacting with
      resources that affect the deployment as a whole, or exposes resources
      that may otherwise violate project or domain isolation.
      
      Since Queens, the keystone-manage bootstrap command assigns the admin
      role to the admin user with system scope, as well as in the admin
      project. This patch transitions the Keystone admin user from
      authenticating using project scoped tokens to system scoped tokens.
      This is a necessary step towards being able to enable the updated oslo
      policies in services that allow finer grained access to system-level
      resources and APIs.
      
      An etherpad with discussion about the transition to the new oslo
      service policies is:
      
      https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible
      
      
      
      Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585
      Signed-off-by: default avatarNiklas Hagman <ubuntu@post.blinkiz.com>
      2e933dce
  35. Aug 10, 2021
    • Mark Goddard's avatar
      ironic: Follow up for ironic_enable_keystone_integration · 46df30d8
      Mark Goddard authored
      Follow up for I0c7e9a28876a1d4278fb2ed8555c2b08472864b9 which added a
      ironic_enable_keystone_integration variable to support Ironic in
      multi-region environments. This change skips Keystone service
      registration based on ironic_enable_keystone_integration rather than
      enable_keystone. It also updates the ironic-inspector.conf template to
      use the new variable.
      
      Change-Id: I2ecba4999e194766258ac5beed62877d43829313
      46df30d8
Loading