- Sep 22, 2020
-
-
Pierre Riteau authored
When the internal VIP is moved in the event of a failure of the active controller, OpenStack services can become unresponsive as they try to talk with MariaDB using connections from the SQLAlchemy pool. It has been argued that OpenStack doesn't really need to use connection pooling with MariaDB [1]. This commit reduces the use of connection pooling via two configuration options: - max_pool_size is set to 1 to allow only a single connection in the pool (it is not possible to disable connection pooling entirely via oslo.db, and max_pool_size = 0 means unlimited pool size) - lower connection_recycle_time from the default of one hour to 10 seconds, which means the single connection in the pool will be recreated regularly These settings have shown better reactivity of the system in the event of a failover. [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html Change-Id: Ib6a62d4428db9b95569314084090472870417f3d Closes-Bug: #1896635
-
- Sep 21, 2020
-
-
Zuul authored
-
- Sep 18, 2020
-
-
wu.chunyang authored
replace harcode 'internal' with {{ openstack_interface }} Change-Id: I885622967ffde2a7a1a08fedbde2eb0e4e330e22
-
Michal Nasiadka authored
Change-Id: Iabc0115d3476a626df134cc70cb473bf6e72487e Closes-Bug: #1890439
-
zhoulinhui authored
tox command install dependencies from the ``requirements.txt``, ``test-requirements.txt`` and ``doc/requirements.txt`` files Change-Id: I21ee208d2484615ee3f9d9eca7602275382c920b
-
- Sep 17, 2020
-
-
zhoulinhui authored
It should been done in https://review.opendev.org/#/c/752436/ but missing Change-Id: Iae22e8d8133afecd7e897f82ca58afd6ea33e1c0
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
Bharat Kunwar authored
Change-Id: Ifcedcc72307732393a92a702a7567addc043b5b2
-
wu.chunyang authored
in 'victoria' cycle, we should test py38 by default. Change-Id: Ic0bfb7f6a8b2123f609e0be0be9945bbf4d73520
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
Michal Nasiadka authored
Since change [1] merged we have two mariadb images (mariadb and mariadb-server) Let's use mariadb-server in kolla-ansible, so we can deprecate mariadb image. [1]: https://review.opendev.org/#/c/710217/ Change-Id: I4ae2ccaaba8fb516f469f4ce8628e8c61de03f0d
-
wu.chunyang authored
replace 'openstack aggregate create' command with ansible os_nova_host_aggregate module and remove TODO Change-Id: I727f9e4acc9e22f59735c65190ac38cc75e5f781
-
- Sep 14, 2020
-
-
Zuul authored
-
- Sep 12, 2020
-
-
Radosław Piliszek authored
If we don't set it, then Zun chooses one randomly (the first one from Neutron). This may break if it is a network that is not available on target hosts, e.g. external via L3 agent router. Since capsules do not support nets yet [1], this patch ensures desired network creation order in init-runonce instead. [1] https://bugs.launchpad.net/zun/+bug/1895263 Change-Id: Iaa113dcfb826164a2772d2c91d34ec0236be0817
-
- Sep 10, 2020
-
-
Pierre Riteau authored
This reverts commit 316b0496, because ironic-inspector is not ready to use WSGI. It would need to be split into two separate containers, one running ironic-inspector-api-wsgi and another running ironic-inspector-conductor. Change-Id: I7e6c59dc8ad4fdee0cc6d96313fe66bc1d001bf7
-
Radosław Piliszek authored
Per the recent Kayobe brekage due to TLS support in Ironic [1], let's test Ironic Inspector API as well. [1] https://review.opendev.org/750804 Change-Id: I7ccf0c4286f8907bc2fa2eabc41ec2876c9815a9
-
Pierre Riteau authored
Change-Id: Ia4626479e092be8b033bcd4e75e78a33167423d3
-
zhoulinhui authored
requirements.txt is unnecessary when run tox -e releasenotes, releasenotes relative stuffs is in doc/requirements.txt, this ps to remove the requirements.txt from tox.ini and reuse [docs] deps Change-Id: Ia6c51f9ffe1257f16e9bd55fe21cc832b634cbf3
-
Radosław Piliszek authored
The Kolla-Ansible part. This switches Kolla-Ansible to use the kolla-build-config role instead of generating config locally. Depends-On: https://review.opendev.org/607159 Change-Id: I859acbe4f84ccbdc53764574a58e6f0fab4094a3
-
Radosław Piliszek authored
Change-Id: I5609812d4f92d88b04bc887886d1ba08893505d9 Story: 2007865 Task: 40199 Closes-Bug: #1886298
-
- Sep 09, 2020
- Sep 08, 2020
-
-
Zuul authored
-
Zuul authored
-
Radosław Piliszek authored
This is confusing as it is not meant to be used by users. Also, various tools show duplicated matches due to both locations containing the exact same content. Change-Id: I2debe121f64954e57788270d3258775f29f1cbb0
-
- Sep 07, 2020
-
-
Zuul authored
-
Michal Nasiadka authored
As per [1] and [2] - it solves a problem, where neutron-ovn-metadata-agent will spawn high number of workers (defaults to half number of CPUs). [1]: http://lists.openstack.org/pipermail/openstack-discuss/2020-September/016960.html [2]: https://bugs.launchpad.net/neutron/+bug/1893656 Change-Id: Id69f9399fe76ff7c4e2e17b5ab5ec7df1a01c5c9
-
- Sep 03, 2020
-
-
likui authored
The Python 2.7 Support has been dropped since Ussuri. Change-Id: I9927a83748a4b13c57bcadd081c60ea9609ced55
-
- Sep 02, 2020
-
-
Zuul authored
-
Mark Goddard authored
The variable was documented as database_username, but should be database_user. Change-Id: Ia1fd8f9a9336c26520041fa2138c763a8c382bca
-
- Sep 01, 2020
-
-
Pierre Riteau authored
The Prometheus OpenStack exporter was needlessly configured to use the prometheus Docker volume and change permissions of /data, which does not exist in the container image. This must have been copy-pasted from existing Prometheus code. Change-Id: I96017c17e68ca7a00a2d5ac41f2f43ef87694514
-
- Aug 31, 2020
-
-
Zuul authored
-
- Aug 29, 2020
-
-
James Kirsch authored
This patch introduces an optional backend encryption for the Ironic API and Ironic Inspector service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Ironic service. Change-Id: I3e82c8ec112e53f907e89fea0c8c849072dcf957 Partially-Implements: blueprint add-ssl-internal-network Depends-On: https://review.opendev.org/#/c/742776/
-
- Aug 28, 2020
-
-
Mark Goddard authored
Including tasks has a performance penalty when compared with importing tasks. If the include has a condition associated with it, then the overhead of the include may be lower than the overhead of skipping all imported tasks. In the case of the register.yml and bootstrap.yml includes, all of the tasks in the included file use run_once: True. The run_once flag improves performance at scale drastically, so importing these tasks unconditionally will have a lower overhead than a conditional include task. It therefore makes sense to switch to use import_tasks there. See [1] for benchmarks of run_once. [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/run-once.md Change-Id: Ic67631ca3ea3fb2081a6f8978e85b1522522d40d Partially-Implements: blueprint performance-improvements
-
Mark Goddard authored
Including tasks has a performance penalty when compared with importing tasks. The nova-cell role uses include_tasks twice when generating certificates and keys for libvirt TLS. While a dynamic include makes sense here for a non-default feature, we can use one include rather than two with the same effect. Since this task runs against compute nodes the overhead is significant. See [1] for benchmarks of include_tasks and import_tasks. [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/include-and-import.md Partially-Implements: blueprint performance-improvements Change-Id: Ic687d2f7d4625aede386e576ebb174da72142756
-