Skip to content
Snippets Groups Projects
  1. Nov 28, 2024
  2. Oct 25, 2024
  3. Oct 17, 2024
  4. Sep 18, 2024
  5. Sep 13, 2024
    • Roman Krček's avatar
      Refactor nova upgrade task · 41448f20
      Roman Krček authored
      
      This is a prerequisite for patchset #924651
      
      Nova runs checks before upgrading. A new nova_upgrade_checks container
      is started for that purpose. This container uses the new nova-api
      image, but the old config.json file. The image expects CA certificates
      in a certain location, but due to the old config.json file, they will
      not be present. This results in the container not trusting keystone SSL
      certificate and the upgrade fails, since it can't connect. Moving the
      config section before the checks ensures that the new container has
      all the certificates it needs to connect to Keystone.
      
      Also nova_enable_rolling_upgrade is no longed used, so there was no
      point in keeping upgrade tasks split.
      
      Change-Id: I44bf48fb86f639d7f0acb786392573ebfed7ee97
      Signed-off-by: default avatarRoman Krček <roman.krcek@tietoevry.com>
      41448f20
  6. Aug 27, 2024
  7. Aug 20, 2024
  8. May 16, 2024
  9. Apr 29, 2024
  10. Apr 25, 2024
  11. Apr 24, 2024
  12. Apr 22, 2024
  13. Apr 05, 2024
  14. Mar 19, 2024
  15. Mar 11, 2024
  16. Jan 29, 2024
    • Alex-Welsh's avatar
      Update keystone service user passwords · ffd6e3bf
      Alex-Welsh authored
      Service user passwords will now be updated in keystone if services are
      reconfigured with new passwords set in config. This behaviour can be
      overridden.
      
      Closes-Bug: #2045990
      Change-Id: I91671dda2242255e789b521d19348b0cccec266f
      ffd6e3bf
  17. Jan 05, 2024
    • Dawud's avatar
      Enable HAProxy Prometheus metrics endpoint · 140722f7
      Dawud authored
      
      HAProxy exposes a Prometheus metrics endpoint, it just needs to be
      enabled. Enable this and remove configuration for
      prometheus-haproxy-exporter. Remaining prometheus-haproxy-exporter
      containers will automatically be removed.
      
      Change-Id: If6e75691d2a996b06a9b95cb0aae772db54389fb
      Co-Authored-By: default avatarMatt Anson <matta@stackhpc.com>
      140722f7
  18. Dec 05, 2023
    • Mark Goddard's avatar
      Support Ansible max_fail_percentage · af6e1ca4
      Mark Goddard authored
      This allows us to continue execution until a certain proportion of hosts
      to fail. This can be useful at scale, where failures are common, and
      restarting a deployment is time-consuming.
      
      The default max failure percentage is 100, keeping the default
      behaviour. A global max failure percentage may be set via
      kolla_max_fail_percentage, and individual services may define a max
      failure percentage via <service>_max_fail_percentage.
      
      Note that all hosts in the inventory must be reachable for fact
      gathering, even those not included in a --limit.
      
      Closes-Bug: #1833737
      Change-Id: I808474a75c0f0e8b539dc0421374b06cea44be4f
      af6e1ca4
  19. Nov 28, 2023
    • Jan Gutter's avatar
      etcd: Add support for more scenarios · ed3b27cc
      Jan Gutter authored
      This commit addresses a few shortcomings in the etcd service:
        * Adding or removing etcd nodes required manual intervention.
      
        * The etcd service would have brief outages during upgrades or
          reconfigures because restarts weren't always serialised.
      
      This makes the etcd service follow a similar pattern to mariadb:
        * There is now a distiction between bootstrapping the cluster
          and adding / removing another member.
      
        * This more closely follows etcd's upstream bootstrapping
          guidelines.
      
        * The etcd role now serialises restarts internally so the
          kolla_serial pattern is no longer appropriate (or necessary).
      
      This does not remove the need for manual intervention in all
      failure modes: the documentation has been updated to address the
      most common issues.
      
      Note that there's repetition in the container specifications: this
      is somewhat deliberate. In a future cleanup, it's intended to reduce
      the duplication.
      
      Change-Id: I39829ba0c5894f8e549f9b83b416e6db4fafd96f
      ed3b27cc
  20. Nov 15, 2023
  21. Nov 07, 2023
  22. Oct 25, 2023
  23. Oct 20, 2023
  24. Aug 30, 2023
  25. Jun 14, 2023
    • Michal Arbet's avatar
      Add support for multiple ceph files · fdf2385f
      Michal Arbet authored
      This patch is adding a feature for an option to copy different
      ceph configuration files and corresponding keyrings for cinder,
      glance, manila, gnocchi and nova services.
      
      This is especially useful when the deployment uses availability
      zones as below example.
      
        - Individual compute can read/write to individual ceph
          cluster in same AZ.
        - Cinder can write to several ceph clusters in several AZs.
        - Glance can use multistore and upload images to
          several ceph clusters in several AZs at once.
      
      Change-Id: Ie4d8ab5a3df748137835cae1c943b9180cd10eb1
      fdf2385f
  26. Jan 31, 2023
  27. Jan 05, 2023
  28. Dec 08, 2022
  29. Dec 01, 2022
  30. Nov 11, 2022
    • Doug Szumski's avatar
      Remove support for deploying OpenStack Monasca · adb8f89a
      Doug Szumski authored
      Kolla Ansible is switching to OpenSearch and is dropping support for
      deploying ElasticSearch. This is because the final OSS release of
      ElasticSearch has exceeded its end of life.
      
      Monasca is affected because it uses both Logstash and ElasticSearch.
      Whilst it may continue to work with OpenSearch, Logstash remains an
      issue.
      
      In the absence of any renewed interest in the project, we remove
      support for deploying it. This helps to reduce the complexity
      of log processing configuration in Kolla Ansible, freeing up
      development time.
      
      Change-Id: I6fc7842bcda18e417a3fd21c11e28979a470f1cf
      adb8f89a
  31. Nov 07, 2022
    • Simon Dodsley's avatar
      Add NVMe-RoCE Cinder driver support for Pure Storage · 716899ff
      Simon Dodsley authored
      From OpenStack Zed the Pure Storage Cinder driver supports
      NVMe-RoCE as a dataplane protocol. This patch adds support
      for this new driver type.
      
      Also amend a couple of documentation formatting typos.
      
      Change-Id: Ic1eed7d19e9b583e22419625c92ac3507ea4614d
      716899ff
  32. Oct 28, 2022
Loading