Skip to content
Snippets Groups Projects
  1. Apr 08, 2021
  2. Apr 06, 2021
  3. Apr 02, 2021
  4. Mar 24, 2021
  5. Mar 10, 2021
    • Michał Nasiadka's avatar
      Introduce nova_libvirt_logging_debug · eabdf1e9
      Michał Nasiadka authored
      In order to disable libvirt debug in CI (which takes vast amount of storage)
      this change introduces nova_libvirt_logging_debug and disables that in CI.
      
      Change-Id: I90bfd1b300ad3202ea4d139fda6d6beb44c5820f
      eabdf1e9
  6. Mar 04, 2021
  7. Mar 03, 2021
  8. Mar 02, 2021
  9. Feb 24, 2021
  10. Feb 16, 2021
  11. Jan 19, 2021
    • Doug Szumski's avatar
      CI: Add monasca scenario · 47fee115
      Doug Szumski authored
      
      Adds the following new Zuul job for testing deployment of Monasca and
      associated services:
      
      * kolla-ansible-centos8-source-monasca
      
      All core OpenStack services except for Keystone are disabled to ensure
      enough memory is available.
      
      A follow up patch will replace the basic tests here with Tempest.
      
      Co-Authored-By: default avatarDoug Szumski <doug@stackhpc.com>
      
      Change-Id: I5d33fd3d7b69798ba0aa23509f7b809065f61c19
      47fee115
  12. Dec 22, 2020
  13. Dec 16, 2020
  14. Nov 30, 2020
  15. Nov 19, 2020
  16. Nov 10, 2020
  17. Nov 04, 2020
  18. Oct 07, 2020
    • Mark Goddard's avatar
      CI: enable designate in magnum CI job · c2987d65
      Mark Goddard authored
      Follows designate guide, adding a default zone for fixed and
      floating IPs, then boots an instance and verifies that its
      name resolves.
      
      Change-Id: Ifbfdab425e2c8a36a8f3ab8539f70dca4cce2abc
      c2987d65
  19. Sep 17, 2020
    • Mark Goddard's avatar
      CI: add magnum scenario, also covering octavia · d2326712
      Mark Goddard authored
      Adds a new Zuul job, kolla-ansible-centos8-source-magnum, for testing
      deployment of Magnum, Octavia and associated services.
      
      Change-Id: I61b293ba6bb52064ea98a73e2dff0023fa01a2a2
      d2326712
    • Mark Goddard's avatar
      Support TLS encryption of RabbitMQ client-server traffic · 761ea9a3
      Mark Goddard authored
      This change adds support for encryption of communication between
      OpenStack services and RabbitMQ. Server certificates are supported, but
      currently client certificates are not.
      
      The kolla-ansible certificates command has been updated to support
      generating certificates for RabbitMQ for development and testing.
      
      RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when
      The Zuul 'tls_enabled' variable is true.
      
      Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5
      Implements: blueprint message-queue-ssl-support
      761ea9a3
  20. Aug 13, 2020
  21. Aug 07, 2020
  22. Jul 27, 2020
  23. Jul 15, 2020
  24. Jul 10, 2020
    • Mark Goddard's avatar
      CI: add prometheus-efk scenario · f44876c4
      Mark Goddard authored
      Tests prometheus, grafana, and centralised logging.
      
      The tests could be improved in future by querying logs in elasticsearch,
      and metrics in prometheus.
      
      Change-Id: Iabad035d583d291169f23be3d71931cb260e87ae
      f44876c4
  25. Jul 07, 2020
    • Mark Goddard's avatar
      Performance: Run common role in a separate play · 56ae2db7
      Mark Goddard authored
      The common role was previously added as a dependency to all other roles.
      It would set a fact after running on a host to avoid running twice. This
      had the nice effect that deploying any service would automatically pull
      in the common services for that host. When using tags, any services with
      matching tags would also run the common role. This could be both
      surprising and sometimes useful.
      
      When using Ansible at large scale, there is a penalty associated with
      executing a task against a large number of hosts, even if it is skipped.
      The common role introduces some overhead, just in determining that it
      has already run.
      
      This change extracts the common role into a separate play, and removes
      the dependency on it from all other roles. New groups have been added
      for cron, fluentd, and kolla-toolbox, similar to other services. This
      changes the behaviour in the following ways:
      
      * The common role is now run for all hosts at the beginning, rather than
        prior to their first enabled service
      * Hosts must be in the necessary group for each of the common services
        in order to have that service deployed. This is mostly to avoid
        deploying on localhost or the deployment host
      * If tags are specified for another service e.g. nova, the common role
        will *not* automatically run for matching hosts. The common tag must
        be specified explicitly
      
      The last of these is probably the largest behaviour change. While it
      would be possible to determine which hosts should automatically run the
      common role, it would be quite complex, and would introduce some
      overhead that would probably negate the benefit of splitting out the
      common role.
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: I6a4676bf6efeebc61383ec7a406db07c7a868b2a
      56ae2db7
  26. Jun 20, 2020
  27. Jun 19, 2020
  28. Jun 16, 2020
  29. Jun 15, 2020
    • James Kirsch's avatar
      Generate Root CA for Self-Signed Certificates · a982d3ac
      James Kirsch authored
      Update the certificate generation task to create a root CA for the
      self-signed certificates. The internal and external facing certificates
      are then generated using the root CA.
      
      Updated openstack_cacert to use system CA trust store in CI tests
      certificate by default.
      
      Change-Id: I6c2adff7d0128146cf086103ff6060b0dcefa37b
      Partially-Implements: blueprint add-ssl-internal-network
      a982d3ac
  30. Jun 14, 2020
    • Radosław Piliszek's avatar
      CI: Add Ubuntu KVM job · 88e7f800
      Radosław Piliszek authored
      This also uses the recommended machinery to set qemu instead
      of relying on config file override so that we test what we
      really want to test.
      
      Change-Id: I560e4f9d0a69c347e6aaf3b970331157c1a56f18
      88e7f800
  31. May 30, 2020
  32. May 23, 2020
    • Doug Szumski's avatar
      Switch to Monasca API for logs · b39a0f80
      Doug Szumski authored
      The Monasca Log API has been removed and in this change we switch
      to using the unified API. If dedicated log APIs are required then
      this can be supported through configuration. Out of the box the
      Monasca API is used for both logs and metrics which is envisaged to
      work for most use cases.
      
      In order to use the unified API for logs, we need to disable the
      legacy Kafka client. We also rename the Monasca API config file
      to remove a warning about using the old style name.
      
      Depends-On: https://review.opendev.org/#/c/728638
      Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
      b39a0f80
  33. Apr 30, 2020
  34. Apr 20, 2020
    • Mark Goddard's avatar
      Remove support for Python 2 on the host · 284f4928
      Mark Goddard authored
      Drops support for creating Python 2 virtualenvs in bootstrap-servers,
      and looking for a python2 interpreter in the kolla-ansible script.
      
      Also forces the use of Python 3 as the remote interpreter in CI on
      Debian and Ubuntu hosts, since they typically symlink the unversioned
      interpreter to python2.7.
      
      Change-Id: Id0e977de381e7faafed738674a140ba36184727e
      Partially-Implements: blueprint drop-py2-support
      284f4928
  35. Apr 16, 2020
  36. Apr 10, 2020
  37. Apr 09, 2020
    • James Kirsch's avatar
      Add support for encrypting backend Keystone HAProxy traffic · b475643c
      James Kirsch authored
      This patch introduces an optional backend encryption for Keystone
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Keystone service.
      
      Change-Id: I6351147ddaff8b2ae629179a9bc3bae2ebac9519
      Partially-Implements: blueprint add-ssl-internal-network
      b475643c
Loading