Skip to content
Snippets Groups Projects
  1. Jun 16, 2020
    • Xing Zhang's avatar
      Switch octavia to use service project in service_auth · c2037885
      Xing Zhang authored
      Recently a patch [1] was merged to stop adding the octavia user to the
      admin project, and remove it on upgrade. However, the octavia
      configuration was not updated to use the service project, causing load
      balancer creation to fail.
      
      There is also an issue for existing deployments in simply switching to
      the service project. While existing load balancers appear to continue to
      work, creating new load balancers fails due to the security group
      belonging to the admin project. At a minimum, the deployer needs to
      create a security group in the service project, and update
      'octavia_amp_secgroup_list' to match its ID. Ideally the flavor and
      network would also be recreated in the service project, although this
      does not seem to impact operation and will result in downtime for
      existing Amphorae.
      
      This change adds a new variable, 'octavia_service_auth_project', that
      can be used to set the project. The default in Ussuri is 'service',
      switching to the new behaviour. For backports of this patch it should be
      switched to 'admin' to maintain compatibility.
      
      If a deployer sets 'octavia_service_auth_project' to 'admin', the
      octavia user will be assigned the admin role in the admin project, as
      was done previously.
      
      Closes-Bug: #1882643
      Related-Bug: #1873176
      
      [1] https://review.opendev.org/720243/
      
      
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Change-Id: I1efd0154ebaee69373ae5bccd391ee9c68d09b30
      c2037885
  2. May 11, 2020
  3. May 06, 2020
    • Radosław Piliszek's avatar
      Make nova perms consistent between applications · 93c9ad89
      Radosław Piliszek authored
      Nova cells support introduced a slight regression that triggers
      odd behaviour when we tried switching to Apache (httpd) [1].
      Bootstrap no longer applied permissions recursively to all log
      files, creating a discrepancy between normal and bootstrap runs
      and also Nova and other services such as Cinder (regarding
      bootstrap logging).
      
      This patch fixes it.
      
      Backport to Train.
      
      Not creating reno nor a bug record because it does not affect
      any current standard usage in any currently known way.
      
      Note this only really hides (standardizes?) the global issue that
      we don't control file permissions on newly created files too well.
      
      [1] https://review.opendev.org/724793
      
      Change-Id: I35e9924ccede5edd2e1307043379aba944725143
      Needed-By: https://review.opendev.org/724793
      93c9ad89
  4. May 05, 2020
    • generalfuzz's avatar
      Use FQDN to communicate with Kibana and Elasticsearch · f165b81e
      generalfuzz authored
      Switch URL composition from using VIP to FQDN to connect with Kibana and
      Elasticsearch services.
      
      Change-Id: I5d559ead1d6d5e928e76bb685e0f730868fd7b89
      Closes-Bug: #1862419
      f165b81e
    • Mark Goddard's avatar
      Use FQDN for elasticsearch · a87780cb
      Mark Goddard authored
      This was addressed in I21689e22870c2f6206e37c60a3c33e19140f77ff but
      accidentally reverted in I4f74bfe07d4b7ca18953b11e767cf0bb94dfd67e.
      
      Change-Id: Id5fc458b0ca54bddfe9a43cb315dbcfeb2142395
      a87780cb
  5. May 01, 2020
    • Radosław Piliszek's avatar
      OVN IPv6 · 7d73246f
      Radosław Piliszek authored
      Fixes:
      - SB/NB DB address format (single host) for SB/NB DB daemon
      - SB/NB DB address format (all hosts) for Neutron / northd /
        ovn-ovs bootstrap
      - OVN tests
      
      Change-Id: I539773c48f89b731d068280c228ce11782bf5788
      Closes-Bug: #1875222
      7d73246f
  6. Apr 30, 2020
    • James Kirsch's avatar
      Add support for encrypting Horizon and Placement API · e3d5a91a
      James Kirsch authored
      This patch introduces an optional backend encryption for Horizon and
      Placement services. When used in conjunction with enabling TLS for
      service API endpoints, network communcation will be encrypted end to
      end, from client through HAProxy to the Horizon and Placement services.
      
      Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d
      Partially-Implements: blueprint add-ssl-internal-network
      e3d5a91a
    • James Kirsch's avatar
      Add support for encrypting Glance api · f87814f7
      James Kirsch authored
      Add TLS support for Glance api using HAProxy to perform TLS termination.
      
      Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809
      Partially-Implements: blueprint add-ssl-internal-network
      f87814f7
    • Hongbin Lu's avatar
      Zun: Add zun-cni-daemon to compute node · 91678f67
      Hongbin Lu authored
      Zun has a new component "zun-cni-daemon" which should be
      deployed in every compute nodes. It is basically an implementation
      of CNI (Container Network Interface) that performs the neutron
      port binding.
      
      If users is using the capsule (pod) API, the recommended deployment
      option is using "cri" as capsule driver. This is basically to use
      a CRI runtime (i.e. CRI plugin for containerd) for supporting
      capsules (pods). A CRI runtime needs a CNI plugin which is what
      the "zun-cni-daemon" provides.
      
      The configuration is based on the Zun installation guide [1].
      It consits of the following steps:
      * Configure the containerd daemon in the host. The "zun-compute"
        container will use grpc to communicate with this service.
      * Install the "zun-cni" binary at host. The containerd process
        will invoke this binary to call the CNI plugin.
      * Run a "zun-cni-daemon" container. The "zun-cni" binary will
        communicate with this container via HTTP.
      
      Relevant patches:
      Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime
      Install guide: https://review.opendev.org/#/c/707948/
      Devstack plugin: https://review.opendev.org/#/c/705338/
      Kolla image: https://review.opendev.org/#/c/708273/
      
      [1] https://docs.openstack.org/zun/latest/install/index.html
      
      Depends-On: https://review.opendev.org/#/c/721044/
      Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
      91678f67
  7. Apr 29, 2020
  8. Apr 28, 2020
  9. Apr 27, 2020
  10. Apr 26, 2020
    • Radosław Piliszek's avatar
      Fix haproxy restarting twice per Ansible run · 04effaa9
      Radosław Piliszek authored
      Since haproxy is orchestrated via site.yml in a single play,
      it does not need flushing handlers as handlers run will
      happen at the end of this play.
      
      Change-Id: Ia3743575da707325be93c39b4a2bcae9211cacb2
      Related-Bug: #1864810
      Closes-Bug: #1875228
      04effaa9
    • Radosław Piliszek's avatar
      Remove redundant listen on haproxy handler · 98e86ea6
      Radosław Piliszek authored
      Follow-up on [1] "Avoid multiple haproxy restarts after
      reconfiguration".
      
      There is no need to duplicate handler name in listen.
      The issue was because we had two handlers with the same
      name in the same environment.
      This causes Ansible not to mark handler as already run.
      
      [1] https://review.opendev.org/708385
      
      Change-Id: I5425a8037b6860ef71bce59becff8dfe5b601d4c
      Related-Bug: #1864810
      98e86ea6
  11. Apr 24, 2020
    • Nick Jones's avatar
      [skydive] fix: Use Keystone backend to authenticate API users · 7e5aa637
      Nick Jones authored
      Update Skydive Analyzer's configuration to use Keystone as its backend
      for authenticating users.  Any user with a role in the project defined
      by the variable skydive_admin_tenant_name will be able to access
      Skydive.
      
      Change-Id: I64c811d5eb72c7406fd52b649fa00edaf2d0c07b
      Closes-Bug: 1870903
      7e5aa637
    • James Kirsch's avatar
      Add support for encrypting heat api · ff842922
      James Kirsch authored
      This patch introduces an optional backend encryption for Heat
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Heat service.
      
      Change-Id: Ic12f7574135dcaed2a462e902c775a55176ff03b
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/722028/
      ff842922
  12. Apr 22, 2020
  13. Apr 21, 2020
    • Christian Berendt's avatar
      Avoid multiple haproxy restarts after reconfiguration · 1efe0fe3
      Christian Berendt authored
      The haproxy role and the site.yml file calls the
      haproxy-config role to provide configuration for individual
      services.
      
      If the configuration within a service changes, the haproxy
      container is restarted.
      
      If the configuration in n services changes, there will be n
      restarts. This is not necessary, a restart at the end is
      sufficient.
      
      By removing the handler from the haproxy-config role and
      using the listen parameter in the handler of the haproxy role,
      the handler is executed only once.
      
      Change-Id: I535fe67579fb748093bb4b30a6bd31b81e021a1b
      Closes-Bug: #1864810
      1efe0fe3
    • Jeffrey Zhang's avatar
      Manage nova scheduler workers count · 8523ab56
      Jeffrey Zhang authored
      Closes-Bug: 1873753
      Change-Id: Ibf75b3fd3090d47b50c71d17f6c12177d16442ab
      8523ab56
  14. Apr 20, 2020
    • Mark Goddard's avatar
      Remove support for Python 2 on the host · 284f4928
      Mark Goddard authored
      Drops support for creating Python 2 virtualenvs in bootstrap-servers,
      and looking for a python2 interpreter in the kolla-ansible script.
      
      Also forces the use of Python 3 as the remote interpreter in CI on
      Debian and Ubuntu hosts, since they typically symlink the unversioned
      interpreter to python2.7.
      
      Change-Id: Id0e977de381e7faafed738674a140ba36184727e
      Partially-Implements: blueprint drop-py2-support
      284f4928
    • ya.wang's avatar
      Fix that cyborg conductor failed to communicate with placement · 4f1e0553
      ya.wang authored
      Add placement auth configuration into cyborg conf.
      
      Closes-bug: #1873717
      Change-Id: I476a878549507c5d46efef4f8639f57d89737e75
      4f1e0553
  15. Apr 17, 2020
  16. Apr 16, 2020
    • Michal Nasiadka's avatar
      OVN: Followup changes · ca380e6d
      Michal Nasiadka authored
      Followup of last reviews from [1].
      
      [1]: https://review.opendev.org/#/c/696841
      
      Change-Id: I7085093b20e8848e09dc521ae9fbf120e909470d
      ca380e6d
    • Michal Nasiadka's avatar
      Ansible lint: lines longer than 160 chars · d403690b
      Michal Nasiadka authored
      Change-Id: I500cc8800c412bc0e95edb15babad5c1189e6ee4
      d403690b
    • Mark Goddard's avatar
      Fix nova cell message queue URL with separate notification queue · e8ad5f37
      Mark Goddard authored
      If using a separate message queue for nova notifications, i.e.
      nova_cell_notify_transport_url is different from
      nova_cell_rpc_transport_url, then Kolla Ansible will unnecessarily
      update the cell. This should not cause any issues since the URL is taken
      from nova.conf.
      
      This change fixes the comparison to use the correct URL.
      
      Change-Id: I5f0e30957bfd70295f2c22c86349ebbb4c1fb155
      Closes-Bug: #1873255
      e8ad5f37
    • zhangmeng's avatar
      Add support for encrypting cinder api. · c8ada707
      zhangmeng authored
      Change-Id: I4673f436d8943e6fce7e579446c27ec8215b7346
      c8ada707
    • Jason Anderson's avatar
      [horizon] Move 'balance' HAProxy keyword · 5c760df3
      Jason Anderson authored
      The "balance" keyword is not valid in a frontend section. From the
      HAProxy documentation[1]:
      
      balance <algorithm> [ <arguments> ]
      balance url_param <param> [check_post [<max_wait>]]
        Define the load balancing algorithm to be used in a backend.
        May be used in sections :   defaults | frontend | listen | backend
                                       yes   |    no    |   yes  |   yes
      
      When running HAProxy using the "split" template style, where a
      frontend/backend pair are used instead of one listen section, HAProxy
      will emit warnings for the Horizon config due to this.
      
      [1]: https://www.haproxy.org/download/1.5/doc/configuration.txt
      
      Closes-Bug: #1872540
      Change-Id: I91cee275d91a51944298618493f4ea0cd80282cc
      5c760df3
    • lixuehai's avatar
      Fix Octavia CA cert paths · ea4505f1
      lixuehai authored
      This fixes Octavia in scenarios requiring providing
      CA cert (self-signed, internally-signed).
      
      Change-Id: I60b7ec85f4fd8bbacf5df0ab7ed9a00658c91871
      Closes-Bug: #1872404
      ea4505f1
  17. Apr 15, 2020
  18. Apr 14, 2020
    • Mark Goddard's avatar
      Fix nova compute addition with limit · 3af28d21
      Mark Goddard authored
      Deploy a small cloud. Add one host to the compute group in the
      inventory, and scale out:
      
      $ kolla-ansible deploy --limit <new compute host>
      
      The command succeeds, but creating an instance fails with the following:
      
          Host 'compute0' is not mapped to any cell
      
      This happens because we only discover computes on the first host in the
      cell's nova conductor group. If that host is not in the specified limit,
      the discovery will not happen.
      
      This change fixes the issue by running compute discovery when any ironic
      or virtualised compute hosts are in the play batch, and delegating it to
      a conductor.
      
      Change-Id: Ie984806240d147add825ffa8446ae6ff55ca4814
      Closes-Bug: #1869371
      3af28d21
    • Jason Anderson's avatar
      [haproxy-config] Fix missing servers in split cfg · 6d00236e
      Jason Anderson authored
      When using the split config style, all backends would be empty, which
      meant that HAProxy was unable to serve any traffic. This turned out to
      be due to a bad default in the split config template.
      
      Closes-Bug: #1872545
      Change-Id: I952e526e735e1d31445963f04d41d66bbdbfdee4
      Unverified
      6d00236e
    • James Kirsch's avatar
      Refactor copy certificates task · 4d155d69
      James Kirsch authored
      Refactor service configuration to use the copy certificates task. This
      reduces code duplication and simplifies implementing encrypting backend
      HAProxy traffic for individual services.
      
      Change-Id: I0474324b60a5f792ef5210ab336639edf7a8cd9e
      4d155d69
  19. Apr 13, 2020
    • Radosław Piliszek's avatar
      Fix Designate not to use etcd coordination backend · 3c234603
      Radosław Piliszek authored
      etcd via tooz does not support group membership required by
      Designate coordination.
      The best k-a can do is not to configure etcd in Designate.
      
      Change-Id: I2f64f928e730355142ac369d8868cf9f65ca357e
      Closes-bug: #1872205
      Related-bug: #1840070
      3c234603
  20. Apr 11, 2020
    • Rafael Weingärtner's avatar
      Allow operators to use "ceilometer-upgrade" parameters · 6fcccdae
      Rafael Weingärtner authored
      Allow operators to use custom parameters with the ceilometer-upgrade
      command. This is quite useful when using the dynamic pollster subsystem;
      that sub-system provides flexibility to create and edit pollsters configs,
      which affects gnocchi resource-type configurations. However, Ceilometer
      uses default and hard-coded resource-type configurations; if one customizes
      some of its default resource-types, he/she can get into trouble during
      upgrades. Therefore, the only way to work around it is to use the
      "--skip-gnocchi-resource-types" flag. This PR introduces a method for
      operators to execute such customization, and many others if needed.
      
      Depends-On: https://review.opendev.org/#/c/718190/
      Change-Id: I92f0edba92c9e3707d89b3ff4033ac886b29cf6d
      6fcccdae
Loading