Skip to content
Snippets Groups Projects
  1. Sep 22, 2020
    • Pierre Riteau's avatar
      Reduce the use of SQLAlchemy connection pooling · c8177202
      Pierre Riteau authored
      When the internal VIP is moved in the event of a failure of the active
      controller, OpenStack services can become unresponsive as they try to
      talk with MariaDB using connections from the SQLAlchemy pool.
      
      It has been argued that OpenStack doesn't really need to use connection
      pooling with MariaDB [1]. This commit reduces the use of connection
      pooling via two configuration options:
      
      - max_pool_size is set to 1 to allow only a single connection in the
        pool (it is not possible to disable connection pooling entirely via
        oslo.db, and max_pool_size = 0 means unlimited pool size)
      - lower connection_recycle_time from the default of one hour to 10
        seconds, which means the single connection in the pool will be
        recreated regularly
      
      These settings have shown better reactivity of the system in the event
      of a failover.
      
      [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html
      
      Change-Id: Ib6a62d4428db9b95569314084090472870417f3d
      Closes-Bug: #1896635
      c8177202
  2. Sep 18, 2020
  3. Sep 17, 2020
  4. Sep 10, 2020
    • Pierre Riteau's avatar
      Revert "Add support for encrypting Ironic API" · 3d30624c
      Pierre Riteau authored
      This reverts commit 316b0496, because
      ironic-inspector is not ready to use WSGI. It would need to be split
      into two separate containers, one running ironic-inspector-api-wsgi and
      another running ironic-inspector-conductor.
      
      Change-Id: I7e6c59dc8ad4fdee0cc6d96313fe66bc1d001bf7
      3d30624c
  5. Sep 07, 2020
  6. Sep 01, 2020
    • Pierre Riteau's avatar
      Remove unused configuration for prometheus-openstack-exporter · 295f8d1b
      Pierre Riteau authored
      The Prometheus OpenStack exporter was needlessly configured to use the
      prometheus Docker volume and change permissions of /data, which does
      not exist in the container image.
      
      This must have been copy-pasted from existing Prometheus code.
      
      Change-Id: I96017c17e68ca7a00a2d5ac41f2f43ef87694514
      295f8d1b
  7. Aug 29, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 316b0496
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      and Ironic Inspector service. When used in conjunction with enabling
      TLS for service API endpoints, network communcation will be encrypted
      end to end, from client through HAProxy to the Ironic service.
      
      Change-Id: I3e82c8ec112e53f907e89fea0c8c849072dcf957
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/#/c/742776/
      316b0496
  8. Aug 28, 2020
  9. Aug 25, 2020
    • Mark Goddard's avatar
      Drop support for /etc/modules · 98e8a436
      Mark Goddard authored
      We no longer support any OS distros that use /etc/modules.
      
      Change-Id: Ic41cad64ed0479a0cef7321aeed191fe06a30e8f
      98e8a436
    • wu.chunyang's avatar
      add region name for tasks · 60dc0128
      wu.chunyang authored
      when use multiple regions, those tasks always get a wrong endpoint.
      
      Change-Id: Ie164687b2ffd80cedf8a00e7f705b73fccd416e2
      60dc0128
  10. Aug 24, 2020
  11. Aug 22, 2020
  12. Aug 21, 2020
  13. Aug 19, 2020
    • wu.chunyang's avatar
      remove obsolete configurations · 3c312a4d
      wu.chunyang authored
      remove cluster_interface from project.
      update storage_interface docs.and remove
      storage_interface_address variable
      
      Change-Id: I3f811db988234f94b5ed0cc9d24233f70784f58d
      3c312a4d
    • Pierre Riteau's avatar
      Add workaround for keystonemiddleware/neutron memcached issue · 5a52d8e4
      Pierre Riteau authored
      There is an issue where keystonemiddleware connections to memcached from
      neutron-server grow beyond configured values [1], eventually reaching
      the maximum number of connections accepted by memcached servers. Other
      services do not appear to be affected by this issue.
      
      A workaround is to use the advanced memcached pool. Despite its
      documentation claiming to only work with Python 2, it appears to work
      fine on Python 3.
      
      [1] https://bugs.launchpad.net/keystonemiddleware/+bug/1883659
      
      Change-Id: Ifbbc2022839cbc575848d830600241c61603c80b
      Closes-Bug: #1892210
      5a52d8e4
    • Jegor van Opdorp's avatar
      Add cinder auth config to nova-cell nova.conf.j2 · de16013b
      Jegor van Opdorp authored
      Fixes an issue during deleting evacuated instances with encrypted block
      devices.
      
      Change-Id: I9b9b689ef7e1e41b597e2c5f6b96f3ed011193c5
      Closes-Bug: 1891462
      Related-Bug: 1850279
      de16013b
    • Florian LEDUC's avatar
      Use iSCSI multipath for libvirt · 56710de5
      Florian LEDUC authored
      * Multipath daemon allows to reach block devices
      via multiple paths for better resiliency and performance.
      Multipathd periodically checks the failed iscsi paths
      and maintains a list of valid paths. Libvirt can use more
      than one iSCSI path when option volume_use_multipath is set
      and when multipathd enabled.
      
      Change-Id: I54629656803c4989f7673e8c69d2a820609b5960
      Implements: blueprint nova-libvirt-multipath-iscsi
      56710de5
    • likui's avatar
      Fix ownership and permissions of admin-openrc.sh · 16f97867
      likui authored
      
      Previously the post-deploy.yml playbook was executed with become: true,
      and the admin-openrc.sh file templated without an owner or mode
      specified. This resulted in admin-openrc.sh being owned by root with 644
      permissions.
      
      This change creates the file without become: true, and explicitly sets
      the owner to the user executing Ansible, and the mode to 600.
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Closes-Bug: #1891704
      
      Change-Id: Iadf43383a7f2bf377d4666a55a38d92bd70711aa
      16f97867
    • Rafael Weingärtner's avatar
      Standardize use and construction of endpoint URLs · f425c067
      Rafael Weingärtner authored
      
      The goal for this push request is to normalize the construction and use
       of internal, external, and admin URLs. While extending Kolla-ansible
       to enable a more flexible method to manage external URLs, we noticed
       that the same URL was constructed multiple times in different parts
       of the code. This can make it difficult for people that want to work
       with these URLs and create inconsistencies in a large code base with
       time. Therefore, we are proposing here the use of
       "single Kolla-ansible variable" per endpoint URL, which facilitates
       for people that are interested in overriding/extending these URLs.
      
      As an example, we extended Kolla-ansible to facilitate the "override"
      of public (external) URLs with the following standard
      "<component/serviceName>.<companyBaseUrl>".
      Therefore, the "NAT/redirect" in the SSL termination system (HAproxy,
      HTTPD or some other) is done via the service name, and not by the port.
      This allows operators to easily and automatically create more friendly
       URL names. To develop this feature, we first applied this patch that
       we are sending now to the community. We did that to reduce the surface
        of changes in Kolla-ansible.
      
      Another example is the integration of Kolla-ansible and Consul, which
      we also implemented internally, and also requires URLs changes.
      Therefore, this PR is essential to reduce code duplicity, and to
      facility users/developers to work/customize the services URLs.
      
      Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93
      Signed-off-by: default avatarRafael Weingärtner <rafael@apache.org>
      f425c067
    • Radosław Piliszek's avatar
      Fix tz handling for newly introduced services · 479fb85d
      Radosław Piliszek authored
      We missed to ensure new neutron switch use the new condition for
      timezone file mounting.
      
      Change-Id: I838e526b930d5276d3ce24f5188262af7eb33280
      Closes-Bug: #1882553
      479fb85d
  14. Aug 17, 2020
  15. Aug 15, 2020
    • James Kirsch's avatar
      Add support for encrypting Nova API · d6251506
      James Kirsch authored
      This patch introduces an optional backend encryption for the Nova API
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Nova service.
      
      Change-Id: I48e1540b973016079d5686b328e82239dcffacfd
      Partially-Implements: blueprint add-ssl-internal-network
      d6251506
  16. Aug 13, 2020
    • Bharat Kunwar's avatar
      Deploy neutron-mlnx-agent and neutron-eswitchd containers · 4809462f
      Bharat Kunwar authored
      Change-Id: I173669bdf92b1f2ea98907ba16808ca3c914944c
      4809462f
    • Mark Goddard's avatar
      Prevent overwriting existing Keystone Fernet keys · 8389140f
      Mark Goddard authored
      Steps to reproduce:
      
      * Deploy a cloud
      * Add another controller to the inventory
      * Deploy to the new controller using --limit:
      
      kolla-ansible deploy --limit new-controller
      
      Expected results:
      
      The new controller uses the cluster's existing fernet keys.
      
      Actual results:
      
      New fernet keys are generated on the new controller, and pushed out to
      the existing controllers. This invalidates tokens created from those
      keys.
      
      This change prevents the above scenario from happening, by failing the
      deployment if there are no hosts with existing Ferney keys to
      distribute, and not all Keystone hosts are in the target host list.
      
      Closes-Bug: #1891364
      
      Change-Id: If0c0e038b77fc010a3a017f9841a674d53b16457
      8389140f
    • James Kirsch's avatar
      Add Keep Alive Timeout for httpd · 19b028e6
      James Kirsch authored
      This patch introduces a global keep alive timeout value for services
      that leverage httpd + wsgi to handle http/https requests. The default
      value is one minute.
      
      Change-Id: Icf7cb0baf86b428a60a7e9bbed642999711865cd
      Partially-Implements: blueprint add-ssl-internal-network
      19b028e6
    • Pierre Riteau's avatar
      Synchronize REST_API_REQUIRED_SETTINGS with Horizon · 68a128d7
      Pierre Riteau authored
      Backport to Ussuri unmodified. Backport to Train and Stein without
      DEFAULT_BOOT_SOURCE.
      
      Closes-Bug: #1891024
      
      Change-Id: If8fe490c3f698ab3eb37735fbfcb8ab0d5fa8a06
      68a128d7
Loading