- Nov 28, 2024
-
-
Piotr Milewski authored
Change-Id: I701aca07eb8b3fd82f14a7f70a2fd96633389231
-
- Oct 25, 2024
-
-
Michal Nasiadka authored
It has been removed in I23867aa98f68298beb5db4558c66c1ffd4e7d6f1 Change-Id: I12d287b9f7f1e5ddf754b7f2ca1dee39778e710e
-
Matus Jenca authored
This commit adds TLS connection between ProxySQL and MariaDB. Frontend TLS ( between services and ProxySQL) will be added in another commit. Parialy Implements: mariadb-ssl-support Change-Id: I154cbb096469c5515c9d8156c2c1c5dd07b95849 Signed-off-by:
Matus Jenca <matus.jenca@dnation.cloud>
-
- Oct 17, 2024
-
-
Michal Arbet authored
It's been some time since ProxySQL has been with us in Kolla. Let's switch the load balancer for MariaDB connections from HAProxy to ProxySQL. Depends-On: https://review.opendev.org/c/openstack/kolla/+/928956 Change-Id: I42ba4fb83b5bb31058e888f0d39d47c27b844de5
-
- Sep 18, 2024
-
-
Grzegorz Koper authored
Closes-bug: #2077511 Change-Id: Icd15e8d04771cf50bc704f0c40006a8ac0aeb3ef
-
- Sep 13, 2024
-
-
Roman Krček authored
This is a prerequisite for patchset #924651 Nova runs checks before upgrading. A new nova_upgrade_checks container is started for that purpose. This container uses the new nova-api image, but the old config.json file. The image expects CA certificates in a certain location, but due to the old config.json file, they will not be present. This results in the container not trusting keystone SSL certificate and the upgrade fails, since it can't connect. Moving the config section before the checks ensures that the new container has all the certificates it needs to connect to Keystone. Also nova_enable_rolling_upgrade is no longed used, so there was no point in keeping upgrade tasks split. Change-Id: I44bf48fb86f639d7f0acb786392573ebfed7ee97 Signed-off-by:
Roman Krček <roman.krcek@tietoevry.com>
-
- Aug 27, 2024
-
-
Bartosz Bezak authored
The prometheus-msteams project is no longer maintained [1]. As a result support for deploying prometheus-msteams via kolla-ansible has been dropped. Users are encouraged to migrate to the native Prometheus Alertmanager integration with Microsoft Teams [2]. [1] https://github.com/prometheus-msteams/prometheus-msteams/issues/343 [2] https://prometheus.io/docs/alerting/latest/configuration/#msteams_config Change-Id: I93d28ef138b4e784465f3a7eaa11101ea5877050
-
- Aug 20, 2024
-
-
Simon Dodsley authored
From OpenStack 2023.2 (Bobcat) the Pure Storage Cinder driver supports NVMe-TCP as a dataplane protocol. This patch adds support for this new driver type. Change-Id: I3c0ad7652a03388ab2eafa173c644a55b0405cc6
-
- May 16, 2024
-
-
Mark Goddard authored
This reverts commit 5b431f0f. Reason for revert: the any_errors_fatal play parameter is not templated by Ansible (tested up to ansible-core 2.15.9). This behaviour is demonstrated in [1]. This means that "{{ kolla_ansible_setup_any_errors_fatal }}" is always interpreted as 'true', regardless of the value of kolla_ansible_setup_any_errors_fatal. This is particularly bad because the default value of kolla_ansible_setup_any_errors_fatal is false. We now have gather_facts_max_fail_percentage which can be set to 0 to provide the same functionality. [1] https://github.com/markgoddard/ansible-experiments/tree/master/15-fatal-errors Change-Id: I2e0ea49701b5900eae26434bcdb6b1bb44507ee7
-
Pierre Riteau authored
Depends-On: https://review.opendev.org/c/openstack/cloudkitty/+/880739 Change-Id: Ib8d7182cc4b8a0c7d320ba2c51b2157782030317
-
- Apr 29, 2024
-
-
howardlee authored
neutron-fwaas has become active again Depends-On: https://review.opendev.org/c/openstack/kolla/+/914855 Change-Id: Ie5a7b2da9a351e8f47a1ae830bb2fee0a8e35e38
-
- Apr 25, 2024
-
-
Michal Nasiadka authored
It was deprecated in Antelope cycle. Change-Id: I499e69ec6db63e4067e49376e2a1f3e01e48fe62
-
Michal Nasiadka authored
It's inactive and hasn't produced a 2024.1 release [1]. In addition to that, there's a CVE that hasn't really been patched [2]. Also drop outward_rabbitmq that was used only with Murano. [1]: https://governance.openstack.org/tc/reference/emerging-technology-and-inactive-projects.html#current-inactive-projects [2]: https://lists.openstack.org/archives/list/openstack-announce@lists.openstack.org/thread/4FYM6GSIM5WZSJQIG4TT5Q3UBKQIHLWX/ Change-Id: I691205730b0e10a42ce61f3340cc39ee51bd1010
-
- Apr 24, 2024
-
-
Michal Nasiadka authored
It's inactive and hasn't produced a 2024.1 release [1]. [1]: https://governance.openstack.org/tc/reference/emerging-technology-and-inactive-projects.html#current-inactive-projects Change-Id: I217b3633f07e5b2c657e20b19aaa4fbb46535a97
-
Michal Nasiadka authored
It's inactive and hasn't produced a 2024.1 release [1]. [1]: https://governance.openstack.org/tc/reference/emerging-technology-and-inactive-projects.html#current-inactive-projects Change-Id: I888963751b6e1ed080588297c2889e700431516c
-
Michal Nasiadka authored
It's inactive and hasn't produced a 2024.1 release [1]. [1]: https://governance.openstack.org/tc/reference/emerging-technology-and-inactive-projects.html#current-inactive-projects Change-Id: Ic988295bc5b8acb19df008fe0d52a3bcc6de2135
-
Michal Nasiadka authored
It's inactive and hasn't produced a 2024.1 release [1]. There are some efforts to restore Freezer, but let's remove it for now. [1]: https://governance.openstack.org/tc/reference/emerging-technology-and-inactive-projects.html#current-inactive-projects Change-Id: Ie42012af9e5c64bca23a6e6826bfc4651fd194bd
-
- Apr 22, 2024
-
-
Michal Nasiadka authored
Fix existing spelling errors Change-Id: Ie689cf5a344aaa630a4860448b09242333a8e119
-
- Apr 05, 2024
-
-
Winicius Silva authored
The documentation[1] says that ceph_nova_user is the same as ceph_cinder_user, but this it not true. In globals, the variable which refer to nova user on ceph its setted as just "nova", instead of {{ ceph_cinder_user }} [1] https://docs.openstack.org/kolla-ansible/latest/reference/storage/external-ceph-guide.html Closes-Bug: #1954910 Change-Id: I0037b294fa88f129aaa98da426989a8151e6f9ea
-
- Mar 19, 2024
-
-
songwenping authored
Change-Id: I0f35c2ea1400ea25fdb253580c6c1b2e06ae591e
-
- Mar 11, 2024
-
-
Uwe Jäger authored
Change-Id: I0a086c59076120aa53e6a05526dbab88e393c1c7
-
- Jan 29, 2024
-
-
Alex-Welsh authored
Service user passwords will now be updated in keystone if services are reconfigured with new passwords set in config. This behaviour can be overridden. Closes-Bug: #2045990 Change-Id: I91671dda2242255e789b521d19348b0cccec266f
-
- Jan 05, 2024
-
-
Dawud authored
HAProxy exposes a Prometheus metrics endpoint, it just needs to be enabled. Enable this and remove configuration for prometheus-haproxy-exporter. Remaining prometheus-haproxy-exporter containers will automatically be removed. Change-Id: If6e75691d2a996b06a9b95cb0aae772db54389fb Co-Authored-By:
Matt Anson <matta@stackhpc.com>
-
- Dec 05, 2023
-
-
Mark Goddard authored
This allows us to continue execution until a certain proportion of hosts to fail. This can be useful at scale, where failures are common, and restarting a deployment is time-consuming. The default max failure percentage is 100, keeping the default behaviour. A global max failure percentage may be set via kolla_max_fail_percentage, and individual services may define a max failure percentage via <service>_max_fail_percentage. Note that all hosts in the inventory must be reachable for fact gathering, even those not included in a --limit. Closes-Bug: #1833737 Change-Id: I808474a75c0f0e8b539dc0421374b06cea44be4f
-
- Nov 28, 2023
-
-
Jan Gutter authored
This commit addresses a few shortcomings in the etcd service: * Adding or removing etcd nodes required manual intervention. * The etcd service would have brief outages during upgrades or reconfigures because restarts weren't always serialised. This makes the etcd service follow a similar pattern to mariadb: * There is now a distiction between bootstrapping the cluster and adding / removing another member. * This more closely follows etcd's upstream bootstrapping guidelines. * The etcd role now serialises restarts internally so the kolla_serial pattern is no longer appropriate (or necessary). This does not remove the need for manual intervention in all failure modes: the documentation has been updated to address the most common issues. Note that there's repetition in the container specifications: this is somewhat deliberate. In a future cleanup, it's intended to reduce the duplication. Change-Id: I39829ba0c5894f8e549f9b83b416e6db4fafd96f
-
- Nov 15, 2023
-
-
Juan Pablo Suazo authored
Adds configurations and changes tasks to enable the systemd plugin. Additionaly, the plugin is set to read logs from the /var/log/journal directory Implements: enable-fluent-plugin-systemd Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: Ic714a341befa5f906d9c0f78fa86f4c934df87cd
-
- Nov 07, 2023
-
-
Will Szumski authored
This avoids the need to use a proxy, or some other means, to connect to Prometheus. This is disabled by default and can be enabled by setting enable_prometheus_server_external to true. Change-Id: Ia0af044ff436c2a204b357750a16ff49fcdfec45
-
James Kirsch authored
Add support for automatic provisioning and renewal of HTTPS certificates via LetsEncrypt. Spec is available at: https://etherpad.opendev.org/p/kolla-ansible-letsencrypt-https Depends-On: https://review.opendev.org/c/openstack/kolla/+/887347 Co-Authored-By:
Michal Arbet <michal.arbet@ultimum.io> Implements: blueprint letsencrypt-https Change-Id: I35317ea0343f0db74ddc0e587862e95408e9e106
-
Christian Berendt authored
Enable the jobboard feature for the Octavia amphora provider. This requires Redis as a dependency, a precheck is added to ensure proper configuration. https://docs.openstack.org/octavia/latest/install/install-amphorav2.html Change-Id: Iec3c8a4b4e257557dc8ec995c41d0ad7e88e13e2
-
- Oct 25, 2023
-
-
Sergei Raiskii authored
Kolla Ansible should deploy Glance and Cinder Backup with S3 backend support working out-of-the-box. The S3 backend had been re-introduced in Ussuri after being deprecated around the Mitaka timeframe, and having some local object storage options is nice for testing.. Closes-Bug: #1977515 Change-Id: I4ca58382d1ee568bfca2ad108495422163f81260 Co-authored-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Co-authored-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Oct 20, 2023
-
-
Ivan Halomi authored
This change adds basic deployment based on Podman container manager as an alternative to Docker. Signed-off-by:
Ivan Halomi <i.halomi@partner.samsung.com> Signed-off-by:
Martin Hiner <m.hiner@partner.samsung.com> Signed-off-by:
Petr Tuma <p.tuma@partner.samsung.com> Change-Id: I2b52964906ba8b19b8b1098717b9423ab954fa3d Depends-On: Ie4b4c1cf8fe6e7ce41eaa703b423dedcb41e3afc
-
- Aug 30, 2023
-
-
Robin Klostermeyer authored
This commit adds the ironic-prometheus-exporter, following the conventions used by the previously integrated exporters. '[The] Ironic Prometheus Exporter is a Tool to expose hardware sensor data in the Prometheus format through an HTTP endpoint.'[0] Prometheus has been enabled in CI jobs to ensure test coverage. [0] https://opendev.org/openstack/ironic-prometheus-exporter Depends-On: https://review.opendev.org/c/openstack/kolla/+/874415 Change-Id: I6d421effd833d2e0524dd0b81736445c9a730ea9
-
- Jun 14, 2023
-
-
Michal Arbet authored
This patch is adding a feature for an option to copy different ceph configuration files and corresponding keyrings for cinder, glance, manila, gnocchi and nova services. This is especially useful when the deployment uses availability zones as below example. - Individual compute can read/write to individual ceph cluster in same AZ. - Cinder can write to several ceph clusters in several AZs. - Glance can use multistore and upload images to several ceph clusters in several AZs at once. Change-Id: Ie4d8ab5a3df748137835cae1c943b9180cd10eb1
-
- Jan 31, 2023
-
-
yangshaoxue authored
Support to deploy skyline by kolla-ansible. Implements: blueprint skyline Depends-On: https://review.opendev.org/c/openstack/kolla/+/826948 Change-Id: Ice5621491a432ba32138abd6f62d1f815cc219e0
-
- Jan 05, 2023
-
-
Michal Nasiadka authored
Change-Id: I8855bd60c2fd77f33fb55d4123131a94327bd166
-
- Dec 08, 2022
-
-
Michal Nasiadka authored
Their cleanup has been added to monasca cleanup command. Change-Id: I19a846e2683ae70b33ca64d2aba7ac71eb724588
-
- Dec 01, 2022
-
-
Michal Nasiadka authored
This change replaces ElasticSearch with OpenSearch, and Kibana with OpenSearch Dashboards. It migrates the data from ElasticSearch to OpenSearch upon upgrade. No TLS support is in this patch (will be a followup). A replacement for ElasticSearch Curator will be added as a followup. Depends-On: https://review.opendev.org/c/openstack/kolla/+/830373 Co-authored-by:
Doug Szumski <doug@stackhpc.com> Co-authored-by:
Kyle Dean <kyle@stackhpc.com> Change-Id: Iab10ce7ea5d5f21a40b1f99b28e3290b7e9ce895
-
- Nov 11, 2022
-
-
Doug Szumski authored
Kolla Ansible is switching to OpenSearch and is dropping support for deploying ElasticSearch. This is because the final OSS release of ElasticSearch has exceeded its end of life. Monasca is affected because it uses both Logstash and ElasticSearch. Whilst it may continue to work with OpenSearch, Logstash remains an issue. In the absence of any renewed interest in the project, we remove support for deploying it. This helps to reduce the complexity of log processing configuration in Kolla Ansible, freeing up development time. Change-Id: I6fc7842bcda18e417a3fd21c11e28979a470f1cf
-
- Nov 07, 2022
-
-
Simon Dodsley authored
From OpenStack Zed the Pure Storage Cinder driver supports NVMe-RoCE as a dataplane protocol. This patch adds support for this new driver type. Also amend a couple of documentation formatting typos. Change-Id: Ic1eed7d19e9b583e22419625c92ac3507ea4614d
-
- Oct 28, 2022
-
-
Ivan Halomi authored
First part of patchset: https://review.opendev.org/c/openstack/kolla-ansible/+/799229/ in which was suggested to split patch into smaller ones. This implements kolla_container_engine variable in command calls of docker,so later on it can be also used for podman without further change. Signed-off-by:
Ivan Halomi <i.halomi@partner.samsung.com> Change-Id: Ic30b67daa2e215524096ad1f4385c569e3d41b95
-