Skip to content
Snippets Groups Projects
  1. Oct 26, 2016
  2. Oct 19, 2016
    • liyingjun's avatar
      Support searchlight ansible role · ec57f589
      liyingjun authored
      Searchlight is an Openstack search and index service, this patch
      implements the ansible role for searchlight.
      
      Implement blueprint: support-searchlight-deployment
      
      Change-Id: Ibf42d5b259a6740d6596041f896e1009657b7388
      ec57f589
  3. Oct 06, 2016
  4. Oct 03, 2016
    • Nikita Gerasimov's avatar
      Change mysql-check in HAProxy to post MySQL 4.1 · cfff7b09
      Nikita Gerasimov authored
      By default HAProxy send pre-4.1 authentication packets which are cause
      warnings on server side. To use modern MySQl authentication mysql-check
      configuration have to include post-41 option.
      
      Change-Id: I88609d3a0cc3ce4a10e64ba65230ba4d97f34419
      Closes-Bug: 1629911
      cfff7b09
  5. Sep 28, 2016
    • Eduardo Gonzalez's avatar
      Fix mistral service · a71874f2
      Eduardo Gonzalez authored
      - Add mistral in HAproxy
      - Set mistral api to bind on api_interface
      - Fix mistral endpoint
      - Add database population on bootstraping
      - Add mistral port prechecks
      
      Change-Id: If1617fb9dcd8b3bbd4f94c68ca87c36e39711016
      Closes-Bug: #1626570
      a71874f2
    • zhubingbing's avatar
      add congress api to haproxy · bcf7afb8
      zhubingbing authored
      TrivialFix
      
      Change-Id: Ie836e1e12a40692b7da3cdd24b0a980ee6081b16
      bcf7afb8
  6. Sep 24, 2016
  7. Sep 21, 2016
  8. Sep 14, 2016
  9. Sep 13, 2016
  10. Sep 08, 2016
    • Bartłomiej Daca's avatar
      Adding manila endpoints to HAProxy · d8c70eca
      Bartłomiej Daca authored
      Manila endpoints (internal and external) should be created in
      haproxy configuration just like other services.
      
      Change-Id: I5dbc6ca94a118b9655e1c5a87b0a5163153ab5af
      Closes-Bug: #1621556
      d8c70eca
  11. Sep 07, 2016
  12. Sep 06, 2016
    • zhubingbing's avatar
      Add gnocchi ansible role · 89392f4f
      zhubingbing authored
      Partially-Implements: blueprint ansible-gnocchi
      
      Change-Id: I8dd0460bd21ac0a233fab0142ec7b6079459bdc2
      89392f4f
  13. Aug 25, 2016
  14. Aug 03, 2016
    • Christian Berendt's avatar
      Enable central logging without deploying elasticsearch/kibana · 4cd95dbc
      Christian Berendt authored
      This changed introduces 4 new parameters to be able to use an existing
      elasticsearch service for central logging.
      
      * elasticsearch_address - address of elasticsearch server
      * elasticsearch_protocol - protocol (HTTP/HTTPS) used by elasticsearch server
      * enable_elasticsearch - deploy elasticsearch container
      * enable_kibana - deploy kibana container
      
      Closes-bug: #1584861
      
      Change-Id: Ia1ff9ae8b6d9929c3826da02693d1e2fc9ea2522
      4cd95dbc
  15. Jul 22, 2016
    • Dave Walker (Daviey)'s avatar
      Add Watcher ansible roles and templates · c3a6aa68
      Dave Walker (Daviey) authored
      
      Previous work on Watcher added the Docker images, this
      change adds the ansible configuration.
      
      There is support for HA, via haproxy to balance across the
      Watcher API hosts.
      
      There is also a hook into nova.conf to conditionally add
      Nova compute Host metrics via Ceilometer if Watcher is enabled.
      
      This defaults to enabled false.
      
      Change-Id: I8763528bb6ff12943b810212c71396d2d7cf6836
      Partial-bug: #1598929
      Partially-implements: bp watcher
      Signed-off-by: default avatarDave Walker (Daviey) <email@daviey.com>
      c3a6aa68
  16. Jul 19, 2016
    • Dennis Mueller's avatar
      Add missing configuration files for ceilometer · 30e3d904
      Dennis Mueller authored
      Added pipeline.yaml, event_pipeline.yaml and event_definitions.yaml
      based on sample files in OpenStack documentation
      
      Edited haproxy.cfg for ceilometer support
      
      Edited ceilometer-base dockerfile for missing dependency
      
      Change-Id: I6ade05255e7e1aa7dbcffd026fad5869036d0d32
      Closes-Bug: #1604004
      30e3d904
  17. Jun 27, 2016
    • Dipa Thakkar's avatar
      Remove MariaDB warning from HAproxy · e26751b9
      Dipa Thakkar authored
      The forwardfor option cannot be used in certain modes
      such as TCP.  To resolve that create a special default
      section for MariaDB
      
      Change-Id: I743bbbfb732b04f115d1a878a0dfc22e29d2623d
      Closes-Bug: #1549746
      e26751b9
  18. Jun 16, 2016
    • Christian Berendt's avatar
      Remove EC2 API related configurations and tasks · c073b2d8
      Christian Berendt authored
      The Nova EC2 API is disabled by default, the default value
      of the enabled_apis parameter in nova.conf is "osapi_compute, metadata"
      The EC2 API is marked as deprecated and will be removed from Nova in
      the future.
      
      Change-Id: I6b9d66017e066cde5749be45b367194d2192ead3
      Closes-bug: #1586605
      c073b2d8
  19. May 06, 2016
    • Michal Rostecki's avatar
      Run HAProxy in a chroot jail · a5c1aa0b
      Michal Rostecki authored
      
      It's impossible to drop root for the HAProxy container.
      But HAProxy provides a possibility to use a chroot jail.
      
      When attaching to the HAProxy container, we see that
      the root directory is changed:
      
          $ sudo docker exec -ti haproxy bash
          (haproxy)[root@operator /]# ls -di /
          259 /
      
      Co-Authored-By: default avatarVikram Hosakote <vhosakot@cisco.com>
      
      Closes-Bug: #1552289
      
      Change-Id: I9d55e9b741b8560cac53dc8b837a24a3029a4dc0
      a5c1aa0b
  20. Apr 15, 2016
    • Dave McCowan's avatar
      Add TLS to Kibana Web Interface · 4c8227ec
      Dave McCowan authored
      Use HAProxy to terminate a TLS connection on port 5601 for the
      Kibana dashboard when TLS is enabled for Kolla. x-forwarded-for
      and x-forwarded-proto headers are set to give Kibana the info it
      needs to write returned URLs.
      
      Change-Id: I03a2dd3a8e2513d38281b30bf4bae6449fec0316
      Closes-bug: #1566117
      4c8227ec
  21. Mar 31, 2016
  22. Mar 24, 2016
  23. Mar 14, 2016
    • SamYaple's avatar
      haproxy formatting was incorrect · 9500bd23
      SamYaple authored
      haproxy 1.6+ does not allow the formatting that was used for stats
      listener. We need to adjust it to the correct syntax
      
      TrivialFix
      
      Change-Id: I5f0111c756d40a0cf7385e6963ebbb57adb36b35
      9500bd23
  24. Mar 09, 2016
  25. Mar 08, 2016
  26. Mar 05, 2016
    • Éric Lemoine's avatar
      Make Heka send logs to Elasticsearch · 491aff0b
      Éric Lemoine authored
      This patch includes changes relative to integrating Heka with
      Elasticsearch and Kibana.
      
      The main change is the addition of an Heka ElasticSearchOutput plugin
      to make Heka send the logs it collects to Elasticsearch.
      
      Since Logstash is not used the enable_elk deploy variable is renamed
      to enable_central_logging.
      
      If enable_central_logging is false then Elasticsearch and Kibana are
      not started, and Heka won't attempt to send logs to Elasticsearch.
      
      By default enable_central_logging is set to false. If
      enable_central_logging is set to true after deployment then the Heka
      container needs to be recreated (for Heka to get the new
      configuration).
      
      The Kibana configuration used property names that are deprecated in
      Kibana 4.2. This is changed to use non-deprecated property names.
      
      Previously logs read from files and from Syslog had a different Type
      in Heka. This is changed to always use "log" for the Type. In this
      way just one index instead of two is used in Elasticsearch, making
      things easier to the user on the visualization side.
      
      The HAProxy configuration is changed to add entries for Kibana.
      Kibana server is now accessible via the internal VIP, and also via
      the external VIP if there's one configured.
      
      The HAProxy configuration is changed to add an entry for
      Elasticsearch. So Elasticsearch is now accessible via the internal
      VIP. Heka uses that channel for communicating with Elasticsearch.
      
      Note that currently the Heka logs include "Plugin
      elasticsearch_output" errors when Heka starts. This occurs when Heka
      starts processing logs while Elasticsearch is not yet started. These
      are transient errors that go away when Elasticsearch is ready. And
      with buffering enabled on the ElasticSearchOuput plugin logs will be
      buffered and then retransmitted when Elasticsearch is ready.
      
      Change-Id: I6ff7a4f0ad04c4c666e174693a35ff49914280bb
      Implements: blueprint central-logging-service
      491aff0b
  27. Mar 03, 2016
    • Dave McCowan's avatar
      Add TLS protection on external API endpoints · 3daded62
      Dave McCowan authored
      TLS can be used to encrypt and authenticate the connection with
      OpenStack endpoints.  This patch provides the necessary
      parameters and changes the resulting service configurations to
      enable TLS for the Kolla deployed OpenStack cloud.
      
      The new input parameters are:
      
      kolla_enable_tls_external: "yes" or "no" (default is "no")
      kolla_external_fqdn_cert: "/etc/kolla/certificates/haproxy.pem"
      kolla_external_fqdn_cacert: "/etc/kolla/certificates/haproxy-ca.crt"
      
      Implements: blueprint kolla-ssl
      
      Change-Id: I48ef8a781c3035d58817f9bf6f36d59a488bab41
      3daded62
  28. Feb 26, 2016
    • SamYaple's avatar
      Change kolla_internal_address variable · d3cfb205
      SamYaple authored
      Due to poor planning on our variable names we have a situation where
      we have "internal_address" which must be a VIP, but "external_address"
      which should be a DNS name. Now with two vips "external_vip_address"
      is a new variable.
      
      This corrects that issue by deprecating kolla_internal_address and
      replacing it with 4 nicely named variables.
      
      kolla_internal_vip_address
      kolla_internal_fqdn
      kolla_external_vip_address
      kolla_external_fqdn
      
      The default behaviour will remain the same, and the way the variable
      inheritance is setup the kolla_internal_address variable can still be
      set in globals.yml and propogate out to these 4 new variables like it
      normally would, but all reference to kolla_internal_address has been
      completely removed.
      
      Change-Id: I4556dcdbf4d91a8d2751981ef9c64bad44a719e5
      Partially-Implements: blueprint ssl-kolla
      d3cfb205
  29. Feb 24, 2016
    • Dave McCowan's avatar
      Use passed client IP address in various audit logs · b7703395
      Dave McCowan authored
      HAProxy: change to use option forwardfor to pass origin IP address
      to backend via X-Forwarded-For header
      
      Keystone: Apache does the audit logs for keystone.  Change the
      LogFormat to display the passed address instead of the connection
      address which is that of the load balancer.
      
      Nova, Cinder, Glance: these services can make use of the address
      passed in X-Forwarded-For.  With this setting the API logs for
      these services include the client IP address.
      
      Change-Id: Ia861ecc11a7c7d463d0366586926d1a842853f69
      Closes-Bug: #1548935
      b7703395
    • Dave McCowan's avatar
      Implement Option for Two VIPs to separate API traffic · 34c2cb8e
      Dave McCowan authored
      To improve security, operators have asked for two VIPs for
      their cloud.
      
      VIP 1 is the internal VIP that can reach internal and admin endpoints.
      In addition, the internal VIP can also reach other internal services,
      such as the database and message services.
      VIP 2 is the external VIP that can only reach public endpoints.
      
      With one VIP only, all services are reached at the same address.
      
      To add a second VIP, this patch adds two new configuration parameters.
      
      kolla_external_vip_address: is an IPv4 address to use for created VIP
      kolla_external_vip_interface: is the network interface to use for VIP
      In this scenario, the first VIP (the internal VIP), is defined by
      the original parameters (kolla_internal address and network_interface).
      
      When using two VIPs, the existing kolla_external_address parameter
      should be/point to/resolve to the kolla_external_vip_address.
      
      Closes-bug: 1535333
      
      Change-Id: I5bfcefaf7899298455cdade8209c34324aebfecb
      34c2cb8e
  30. Feb 19, 2016
  31. Feb 17, 2016
  32. Jan 27, 2016
  33. Dec 29, 2015
  34. Dec 16, 2015
    • OTSUKA, Yuanying's avatar
      Fix retrieving api_interface · 903c7d4c
      OTSUKA, Yuanying authored
      In heterogeneous environment, api_interfaces are different each other.
      So we should specify it from hostvars.
      
      Implements: bp configure-network-interface
      Change-Id: Id15d70bfb9ebb62a64a3847a6b77407efb171dbe
      903c7d4c
  35. Nov 13, 2015
  36. Nov 06, 2015
    • Sam Yaple's avatar
      Finish implementation of spice · 99932d65
      Sam Yaple authored
      Due bad rebases there is a huge section of the spice patch missing
      from the implementation unfortunately. This patch finishes the rest
      of this patch out properly.
      
      Change-Id: I693c6745e9594fd91eb6453f6de9dfcbd410e89c
      Paritally-Implements: blueprint nova-proxies
      99932d65
  37. Nov 05, 2015
    • Sam Yaple's avatar
      bootstrap takes place on the wrong node · e2bc9dcf
      Sam Yaple authored
      The bootstrap must occur on the nova-api node due to binding in the
      nova-api directory (same goes for all other services)
      
      Closes-Bug: #1513439
      Backport: Liberty
      Change-Id: Iab88b49712828085e4d7e7f85e6d8f0b7999a9bf
      e2bc9dcf
Loading