- Jun 16, 2020
-
-
Xing Zhang authored
Recently a patch [1] was merged to stop adding the octavia user to the admin project, and remove it on upgrade. However, the octavia configuration was not updated to use the service project, causing load balancer creation to fail. There is also an issue for existing deployments in simply switching to the service project. While existing load balancers appear to continue to work, creating new load balancers fails due to the security group belonging to the admin project. At a minimum, the deployer needs to create a security group in the service project, and update 'octavia_amp_secgroup_list' to match its ID. Ideally the flavor and network would also be recreated in the service project, although this does not seem to impact operation and will result in downtime for existing Amphorae. This change adds a new variable, 'octavia_service_auth_project', that can be used to set the project. The default in Ussuri is 'service', switching to the new behaviour. For backports of this patch it should be switched to 'admin' to maintain compatibility. If a deployer sets 'octavia_service_auth_project' to 'admin', the octavia user will be assigned the admin role in the admin project, as was done previously. Closes-Bug: #1882643 Related-Bug: #1873176 [1] https://review.opendev.org/720243/ Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I1efd0154ebaee69373ae5bccd391ee9c68d09b30
-
- May 11, 2020
-
-
Mark Goddard authored
The removal of Kolla Ceph deploy [1] broke gnocchi & external Ceph integration - the variable gnocchi_pool_name is referenced in the config template, but should now be ceph_gnocchi_pool_name. This change fixes the issue. Reported by Nick Wilson. [1] https://review.opendev.org/#/c/704309/12/ansible/roles/gnocchi/defaults/main.yml Change-Id: I7089781c0c4d7bce8a44cb8b1fca847dd0b7efd1 Closes-Bug: #1877974
-
- May 06, 2020
-
-
Radosław Piliszek authored
Nova cells support introduced a slight regression that triggers odd behaviour when we tried switching to Apache (httpd) [1]. Bootstrap no longer applied permissions recursively to all log files, creating a discrepancy between normal and bootstrap runs and also Nova and other services such as Cinder (regarding bootstrap logging). This patch fixes it. Backport to Train. Not creating reno nor a bug record because it does not affect any current standard usage in any currently known way. Note this only really hides (standardizes?) the global issue that we don't control file permissions on newly created files too well. [1] https://review.opendev.org/724793 Change-Id: I35e9924ccede5edd2e1307043379aba944725143 Needed-By: https://review.opendev.org/724793
-
- May 05, 2020
-
-
generalfuzz authored
Switch URL composition from using VIP to FQDN to connect with Kibana and Elasticsearch services. Change-Id: I5d559ead1d6d5e928e76bb685e0f730868fd7b89 Closes-Bug: #1862419
-
Mark Goddard authored
This was addressed in I21689e22870c2f6206e37c60a3c33e19140f77ff but accidentally reverted in I4f74bfe07d4b7ca18953b11e767cf0bb94dfd67e. Change-Id: Id5fc458b0ca54bddfe9a43cb315dbcfeb2142395
-
- May 01, 2020
-
-
Radosław Piliszek authored
Fixes: - SB/NB DB address format (single host) for SB/NB DB daemon - SB/NB DB address format (all hosts) for Neutron / northd / ovn-ovs bootstrap - OVN tests Change-Id: I539773c48f89b731d068280c228ce11782bf5788 Closes-Bug: #1875222
-
- Apr 30, 2020
-
-
James Kirsch authored
This patch introduces an optional backend encryption for Horizon and Placement services. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Horizon and Placement services. Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d Partially-Implements: blueprint add-ssl-internal-network
-
James Kirsch authored
Add TLS support for Glance api using HAProxy to perform TLS termination. Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809 Partially-Implements: blueprint add-ssl-internal-network
-
Hongbin Lu authored
Zun has a new component "zun-cni-daemon" which should be deployed in every compute nodes. It is basically an implementation of CNI (Container Network Interface) that performs the neutron port binding. If users is using the capsule (pod) API, the recommended deployment option is using "cri" as capsule driver. This is basically to use a CRI runtime (i.e. CRI plugin for containerd) for supporting capsules (pods). A CRI runtime needs a CNI plugin which is what the "zun-cni-daemon" provides. The configuration is based on the Zun installation guide [1]. It consits of the following steps: * Configure the containerd daemon in the host. The "zun-compute" container will use grpc to communicate with this service. * Install the "zun-cni" binary at host. The containerd process will invoke this binary to call the CNI plugin. * Run a "zun-cni-daemon" container. The "zun-cni" binary will communicate with this container via HTTP. Relevant patches: Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime Install guide: https://review.opendev.org/#/c/707948/ Devstack plugin: https://review.opendev.org/#/c/705338/ Kolla image: https://review.opendev.org/#/c/708273/ [1] https://docs.openstack.org/zun/latest/install/index.html Depends-On: https://review.opendev.org/#/c/721044/ Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
-
- Apr 29, 2020
-
-
Noboru Iwamatsu authored
This patch updates the octavia controller deployment to use the latest octavia certificate configuration guide [1]. The dual CA changes were introduced in Train. [1] https://docs.openstack.org/octavia/latest/admin/guides/certificates.html Change-Id: If89ec0d631568db70690f1a69d00115c59abe678 Closes-Bug: #1862133
-
xiaojueguan authored
Change-Id: Ie3022d1721f43dc84e4228331d0d2f6f3a3c7ebd Closes-Bug: 1875613
-
- Apr 28, 2020
-
-
Marcin Juszkiewicz authored
Change-Id: I18f8855a758703968aba032add68add24b31f673 Closes-bug: #1875588
-
Xing Zhang authored
The octavia service communicates to the barbican service with public endpoint_type by default[1], it should use internal like other services. [1] https://github.com/openstack/octavia/blob/0056b5175f89070164849501ec6d960549b95e34/octavia/common/config.py#L533-L537 Closes-Bug: #1875618 Change-Id: I90d2b0aeac090a3e2366341e260232fc1f0d6492
-
- Apr 27, 2020
-
-
ramboman authored
Adds necessary "region_name" to octavia.conf when "enable_barbican" is set to "true". Closes-Bug: #1867926 Change-Id: Ida61cef4b9c9622a5e925bac4583fba281469a39
-
- Apr 26, 2020
-
-
Radosław Piliszek authored
Since haproxy is orchestrated via site.yml in a single play, it does not need flushing handlers as handlers run will happen at the end of this play. Change-Id: Ia3743575da707325be93c39b4a2bcae9211cacb2 Related-Bug: #1864810 Closes-Bug: #1875228
-
Radosław Piliszek authored
Follow-up on [1] "Avoid multiple haproxy restarts after reconfiguration". There is no need to duplicate handler name in listen. The issue was because we had two handlers with the same name in the same environment. This causes Ansible not to mark handler as already run. [1] https://review.opendev.org/708385 Change-Id: I5425a8037b6860ef71bce59becff8dfe5b601d4c Related-Bug: #1864810
-
- Apr 24, 2020
-
-
Nick Jones authored
Update Skydive Analyzer's configuration to use Keystone as its backend for authenticating users. Any user with a role in the project defined by the variable skydive_admin_tenant_name will be able to access Skydive. Change-Id: I64c811d5eb72c7406fd52b649fa00edaf2d0c07b Closes-Bug: 1870903
-
James Kirsch authored
This patch introduces an optional backend encryption for Heat service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Heat service. Change-Id: Ic12f7574135dcaed2a462e902c775a55176ff03b Partially-Implements: blueprint add-ssl-internal-network Depends-On: https://review.opendev.org/722028/
-
- Apr 22, 2020
-
-
ya.wang authored
Add privileged capability to cyborg agent. Change-Id: Id237df1acb1b44c4e6442b39838058be1a95fcc6 Closes-bug: #1873715
-
Marcin Juszkiewicz authored
Looks like none of supported distros has it so why bother? Change-Id: I3411c00664eac4e5ba9b79bff39f3d8b7514ad24
-
- Apr 21, 2020
-
-
Christian Berendt authored
The haproxy role and the site.yml file calls the haproxy-config role to provide configuration for individual services. If the configuration within a service changes, the haproxy container is restarted. If the configuration in n services changes, there will be n restarts. This is not necessary, a restart at the end is sufficient. By removing the handler from the haproxy-config role and using the listen parameter in the handler of the haproxy role, the handler is executed only once. Change-Id: I535fe67579fb748093bb4b30a6bd31b81e021a1b Closes-Bug: #1864810
-
Jeffrey Zhang authored
Closes-Bug: 1873753 Change-Id: Ibf75b3fd3090d47b50c71d17f6c12177d16442ab
-
- Apr 20, 2020
-
-
Mark Goddard authored
Drops support for creating Python 2 virtualenvs in bootstrap-servers, and looking for a python2 interpreter in the kolla-ansible script. Also forces the use of Python 3 as the remote interpreter in CI on Debian and Ubuntu hosts, since they typically symlink the unversioned interpreter to python2.7. Change-Id: Id0e977de381e7faafed738674a140ba36184727e Partially-Implements: blueprint drop-py2-support
-
ya.wang authored
Add placement auth configuration into cyborg conf. Closes-bug: #1873717 Change-Id: I476a878549507c5d46efef4f8639f57d89737e75
-
- Apr 17, 2020
-
-
Q.hongtao authored
Kolla Ansible was missing vitrage-persistor service required by Vitrage for data storage. Depends on fixing availability of Kolla image. Change-Id: I8158ba66b8b624f6bcb89da9c990a30a68b7187b Depends-On: Id5e143636f9a81e7294b775f3d8b9134bee58054 Closes-Bug: #1869319
-
Radosław Piliszek authored
It was missed in kolla-ceph removal in [1]. [1] 4e6fe7a6 Change-Id: Iacfce48f23dc5887c5f549a70250eee3e4e3f026
-
Xing Zhang authored
It is unnecessary to add octavia user into admin project. Octavia project does not require this action. Like other projects, octavia user in service project with admin role is enough. [1] https://docs.openstack.org/octavia/latest/install/install-ubuntu.html [2] https://docs.openstack.org/octavia/latest/contributor/guides/dev-quick-start.html#production-deployment-walkthrough [3] https://github.com/openstack/octavia/blob/master/devstack/plugin.sh Closes-Bug: #1873176 Change-Id: I35d35177aaabfc6f0abc533a1f756b363bd02308
-
- Apr 16, 2020
-
-
Michal Nasiadka authored
Followup of last reviews from [1]. [1]: https://review.opendev.org/#/c/696841 Change-Id: I7085093b20e8848e09dc521ae9fbf120e909470d
-
Michal Nasiadka authored
Change-Id: I500cc8800c412bc0e95edb15babad5c1189e6ee4
-
Mark Goddard authored
If using a separate message queue for nova notifications, i.e. nova_cell_notify_transport_url is different from nova_cell_rpc_transport_url, then Kolla Ansible will unnecessarily update the cell. This should not cause any issues since the URL is taken from nova.conf. This change fixes the comparison to use the correct URL. Change-Id: I5f0e30957bfd70295f2c22c86349ebbb4c1fb155 Closes-Bug: #1873255
-
zhangmeng authored
Change-Id: I4673f436d8943e6fce7e579446c27ec8215b7346
-
Jason Anderson authored
The "balance" keyword is not valid in a frontend section. From the HAProxy documentation[1]: balance <algorithm> [ <arguments> ] balance url_param <param> [check_post [<max_wait>]] Define the load balancing algorithm to be used in a backend. May be used in sections : defaults | frontend | listen | backend yes | no | yes | yes When running HAProxy using the "split" template style, where a frontend/backend pair are used instead of one listen section, HAProxy will emit warnings for the Horizon config due to this. [1]: https://www.haproxy.org/download/1.5/doc/configuration.txt Closes-Bug: #1872540 Change-Id: I91cee275d91a51944298618493f4ea0cd80282cc
-
lixuehai authored
This fixes Octavia in scenarios requiring providing CA cert (self-signed, internally-signed). Change-Id: I60b7ec85f4fd8bbacf5df0ab7ed9a00658c91871 Closes-Bug: #1872404
-
- Apr 15, 2020
-
-
Michal Nasiadka authored
Change-Id: Ibbb962b035b695eec022566cf9f7d6c200480c45
-
Scott Solkhon authored
Change-Id: I22a995195a1d12bb759cba9777527c23475124f2
-
- Apr 14, 2020
-
-
Mark Goddard authored
Deploy a small cloud. Add one host to the compute group in the inventory, and scale out: $ kolla-ansible deploy --limit <new compute host> The command succeeds, but creating an instance fails with the following: Host 'compute0' is not mapped to any cell This happens because we only discover computes on the first host in the cell's nova conductor group. If that host is not in the specified limit, the discovery will not happen. This change fixes the issue by running compute discovery when any ironic or virtualised compute hosts are in the play batch, and delegating it to a conductor. Change-Id: Ie984806240d147add825ffa8446ae6ff55ca4814 Closes-Bug: #1869371
-
Jason Anderson authored
When using the split config style, all backends would be empty, which meant that HAProxy was unable to serve any traffic. This turned out to be due to a bad default in the split config template. Closes-Bug: #1872545 Change-Id: I952e526e735e1d31445963f04d41d66bbdbfdee4
-
James Kirsch authored
Refactor service configuration to use the copy certificates task. This reduces code duplication and simplifies implementing encrypting backend HAProxy traffic for individual services. Change-Id: I0474324b60a5f792ef5210ab336639edf7a8cd9e
-
- Apr 13, 2020
-
-
Radosław Piliszek authored
etcd via tooz does not support group membership required by Designate coordination. The best k-a can do is not to configure etcd in Designate. Change-Id: I2f64f928e730355142ac369d8868cf9f65ca357e Closes-bug: #1872205 Related-bug: #1840070
-
- Apr 11, 2020
-
-
Rafael Weingärtner authored
Allow operators to use custom parameters with the ceilometer-upgrade command. This is quite useful when using the dynamic pollster subsystem; that sub-system provides flexibility to create and edit pollsters configs, which affects gnocchi resource-type configurations. However, Ceilometer uses default and hard-coded resource-type configurations; if one customizes some of its default resource-types, he/she can get into trouble during upgrades. Therefore, the only way to work around it is to use the "--skip-gnocchi-resource-types" flag. This PR introduces a method for operators to execute such customization, and many others if needed. Depends-On: https://review.opendev.org/#/c/718190/ Change-Id: I92f0edba92c9e3707d89b3ff4033ac886b29cf6d
-