- Oct 12, 2021
-
-
Maksim Malchuk authored
This change adds the dnsmasq.log for the ironic-dnsmasq container and also enables more verbose logging when debug logging enabled. This can be triggered globbaly via 'openstack_logging_debug' or per service via 'ironic_logging_debug' or 'neutron_logging_debug'. Change-Id: I0e6b089beb88827effbcc365625eb2df902f5470 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Oct 11, 2021
-
-
Maksim Malchuk authored
The section [ovs] is needed only for ovs/ovn configurations. TrivialFix Change-Id: If9015b8f53c04cf3257331449ebd50163fabcab0 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
Michal Arbet authored
Weight for haproxy backend was merged in [1] with tiny bug, there is need to convert to int to check conditional <= 256. Otherwise, it's not working as expected. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/775627 Change-Id: Icb6f5147ebd2a0be52ba4ef6ba4a00bbd0242d3d
-
- Oct 07, 2021
-
-
Michal Arbet authored
Change-Id: I86aeafccd2a2bff1d89a40785e1a6715097bb849
-
Radosław Piliszek authored
"BINLOG MONITOR" and "SLAVE MONITOR" replace "REPLICATION CLIENT" (which is now an alias for "BINLOG MONITOR"). The validation in Ansible MySQL collection is too simple to understand aliases and breaks. Hence, let's use the canonical names and adapt per service according to its needs. Change-Id: I1175e4846384accd19942620dc155d0c5728e64b
-
- Oct 06, 2021
-
-
Marcin Juszkiewicz authored
We do not need anymore as APT already knows how to do HTTPS. Change-Id: I0b89b17ea2443e4578906afe4b518477462f981f
-
- Oct 04, 2021
-
-
Christian Berendt authored
Change-Id: I6da412d6d3e7d067c8d903ee884711ac509d24aa
-
- Oct 01, 2021
-
-
Radosław Piliszek authored
Nor set related sysctls. More details in the reno. Change-Id: I898548ecc6df3caa094c3222159b7ba1e16dc211 Closes-Bug: #1945789
-
Mark Goddard authored
Updates the default value of 'monasca_ntp_server' from 'external_ntp_servers[0]' to '0.pool.ntp.org'. This is due to the removal of the 'external_ntp_servers' variable as part of the removal of Chrony deployment. Change-Id: I2e7538a2e95c7b8e9280eb051ee634b4313db129
-
- Sep 30, 2021
-
-
wu.chunyang authored
chrony is not supported in Xena cycle, remove it from kolla Moved tasks from chrony role to chrony-cleanup.yml playbook to avoid a vestigial chrony role. Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I5a730d55afb49d517c85aeb9208188c81e2c84cf
-
Mark Goddard authored
* Register Swift-compatible endpoints in Keystone * Load balance across RadosGW API servers using HAProxy The support is exercised in the cephadm CI jobs, but since RGW is not currently enabled via cephadm, it is not yet tested. https://docs.ceph.com/en/latest/radosgw/keystone/ Implements: blueprint ceph-rgw Change-Id: I891c3ed4ed93512607afe65a42dd99596fd4dbf9
-
- Sep 29, 2021
-
-
Radosław Piliszek authored
To prevent a security issue. More details in the reno. Change-Id: I8bb398e299aa68147004723a18d3a1ec459011e5 Closes-Bug: #1945453
-
- Sep 28, 2021
-
-
Niklas Hagman authored
A system-scoped token implies the user has authorization to act on the deployment system. These tokens are useful for interacting with resources that affect the deployment as a whole, or exposes resources that may otherwise violate project or domain isolation. Since Queens, the keystone-manage bootstrap command assigns the admin role to the admin user with system scope, as well as in the admin project. This patch transitions the Keystone admin user from authenticating using project scoped tokens to system scoped tokens. This is a necessary step towards being able to enable the updated oslo policies in services that allow finer grained access to system-level resources and APIs. An etherpad with discussion about the transition to the new oslo service policies is: https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585 Signed-off-by:
Niklas Hagman <ubuntu@post.blinkiz.com>
-
- Sep 27, 2021
-
-
Radosław Piliszek authored
Closes-Bug: #1945070 Change-Id: I1b2a82b57cb9884b6c3c3ad07f6449ae29042a3d
-
- Sep 26, 2021
-
-
Michal Arbet authored
This patch adding option to control weight of haproxy backends per service via host variable. Example: [control] server1 haproxy_nova_api_weight=10 server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10 server3 haproxy_keystone_admin_weight=50 If weight is not defined, everything is working as before. Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
-
- Sep 23, 2021
-
-
Michał Nasiadka authored
This change bumps up max supported Ansible version to 4.x (ansible-core 2.11.x) and minimum to 2.10. Change-Id: I8b9212934dfab3831986e8db55671baee32f4bbd
-
- Sep 22, 2021
-
-
Piotr Parczewski authored
Change-Id: I16fdb2f93ddb656eeacd3f2b84190f9bdcfaa21c
-
- Sep 21, 2021
-
-
Mark Goddard authored
This allows one variable to specify the tag for all MariaDB images. Change-Id: I164cdd41787f8bd52d8e08cb380d42625a8bbd84 TrivialFix
-
- Sep 20, 2021
-
-
Radosław Piliszek authored
Closes-Bug: #1944114 Change-Id: Idd525fda7ff94f70794f4c582cd74470c7f40fae
-
- Sep 16, 2021
-
-
Michal Arbet authored
Haproxy was renamed in [1]. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/770618 Change-Id: Ib2d7f0774fede570a8c4c315d83afd420c31da0b
-
- Sep 13, 2021
-
-
Bernd Mueller authored
Signed-off-by:
Bernd Mueller <mueller@b1-systems.de> Change-Id: Idb8a82acbd8193fd3fe71c080a1c57e8614d89ec
-
- Sep 10, 2021
-
-
Pierre Riteau authored
When running kolla-ansible upgrade with a host limit that does not include controllers, the neutron upgrade fails. Change-Id: I7125a6ef1f180db6997026ff27e84feb04ee239d Closes-Bug: #1939691
-
- Sep 07, 2021
-
-
Michał Nasiadka authored
Currently only operations done with default kolla_toolbox user are logged to /var/log/kolla/ansible.log. In order to fix logging, permissions to ansible.log must allow writing for other users in kolla group - and then a separate patch will follow to make custom ansible.cfg file usable by other toolbox users. Partial-Bug: #1942846 Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
-
- Sep 03, 2021
-
-
Radosław Piliszek authored
This is required for libvirtd with cgroupsv2 (Debian Bullseye and soon others). Otherwise, device attachments simply fail. The warning message suggests filtering will be disabled but it actually just fails the action entirely. Change-Id: Id1fbd49a31a6e6e51b667f646278b93897c05b21 Closes-Bug: #1941940
-
- Aug 30, 2021
-
-
Radosław Piliszek authored
It was removed in [1] as part of cgroupsv2 cleanup. However, the testing did not catch the fact that the legacy cgroups behaviour was actually still breaking despite latest Docker and setting to use host's cgroups namespace. [1] 286a03ba Closes-Bug: #1941706 Change-Id: I629bb9e70a3fd6bd1e26b2ca22ffcff5e9e8c731
-
- Aug 20, 2021
-
-
Radosław Piliszek authored
to behave like it is most commonly expected - query Nova in the same region. Closes-Bug: #1939291 Change-Id: I584a83d352c747a799b5dab1d3b8159ba3805454
-
- Aug 19, 2021
-
-
Michal Arbet authored
For now role haproxy is maintaining haproxy and keepalived. In follow-up changes there is also proxysql added. This patch is *only* renaming/moving stuff to more prominent role loadbalancer, and moving also specific templates to subdirectory. This was done only to better diff in follow-up changes. Change-Id: I1d39d5bcaefc4016983bf267a2736b742cc3a555
-
Radosław Piliszek authored
Sometimes, the registries may intermittently fail to deliver the images. This is often seen in the CI, though it also happens with production deployments, even those with internal registries and/or registry mirrors - due to sheer load when trying to pull the images from many hosts. This patchs adds two new vars to control retry behaviour. The default has been set to make users happier by default. :-) Change-Id: I81ad7d8642654f8474f11084c6934aab40243d35
-
Radosław Piliszek authored
It seems to have been mistakenly introduced by de00bf49 "Simplify handler conditionals" Change-Id: I65b6e322fa11a870f32099bbfd62150cbea4feb5
-
- Aug 18, 2021
-
-
Marc 'risson' Schmitt authored
Signed-off-by:
Marc 'risson' Schmitt <marc.schmitt@risson.space> Closes-Bug: #1940286 Change-Id: I647f8615e9fd0cc0db7c737ce4afbd1bdd0d40d4
-
- Aug 17, 2021
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for keystone-fernet container. It checks if "key 0" has right permissions, and if rsync is able to distribute keys to other keystones. Implements: blueprint container-health-check Change-Id: I17bea723d4109e869cd05d211f6f8e4653f46e17
-
- Aug 16, 2021
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for nova-spicehtml5proxy service. Implements: blueprint container-health-check Change-Id: I584c588c20781e6c6567429811aecf97967baea3
-
- Aug 13, 2021
-
-
Jan Horstmann authored
Certain overrides for rabbitmq may need to be set for `rabbitmqctl` in kolla-toolbox aswell. This commit allows to override `rabbitmq-env.conf` and `erl_inetrc` in kolla-toolbox. Change-Id: Idef6adcf9700f75a2db503444a8de093ee21a9c5
-
Radosław Piliszek authored
Closes-Bug: #1939883 Change-Id: Ica311acba445cccac1d20757ced6f15a064ebcaa
-
- Aug 12, 2021
-
-
Michał Nasiadka authored
Change-Id: I2fe738249018e25e79fd726bc931be6b7bd91934
-
Michal Arbet authored
Kolla-ansible upgrade task is calling different handlers as deploy task and these handlers are missing healthcheck key. This patch is fixing this. Closes-Bug: #1939679 Change-Id: Id83d20bfd89c27ccf70a3a79938f428cdb5d40fc
-
Pierre Riteau authored
CentOS binary packages for Xena have moved Neutron's api-paste.ini file to /etc/neutron [1]. Ubuntu packages already provide this file at this location. Source images should also have api-paste.ini installed there. [1] https://review.rdoproject.org/r/c/openstack/neutron-distgit/+/34845 Depends-On: https://review.opendev.org/c/openstack/kolla/+/804269 Change-Id: Ideb0247578afb8cc36bb6ac26d8ef7fda494bee3
-
- Aug 10, 2021
-
-
Radosław Piliszek authored
We get a nice optimisation by using a filtered loop instead of task skipping per service with 'when'. Partially-Implements: blueprint performance-improvements Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
-
Mark Goddard authored
Follow up for I0c7e9a28876a1d4278fb2ed8555c2b08472864b9 which added a ironic_enable_keystone_integration variable to support Ironic in multi-region environments. This change skips Keystone service registration based on ironic_enable_keystone_integration rather than enable_keystone. It also updates the ironic-inspector.conf template to use the new variable. Change-Id: I2ecba4999e194766258ac5beed62877d43829313
-
- Aug 09, 2021
-
-
Doug Szumski authored
This patch adds support for integrating Prometheus with Fluentd. This can be used to extract useful information about the status of Fluentd, such as output buffer capacity and logging rate, and also to extract metrics from logs via custom Fluentd configuration. More information can be found here in [1]. [1] https://docs.fluentd.org/monitoring-fluentd/monitoring-prometheus Change-Id: I233d6dd744848ef1f1589a462dbf272ed0f3aaae
-