Skip to content
Snippets Groups Projects
  1. Oct 12, 2021
    • Maksim Malchuk's avatar
      Update dnsmasq logging · d559e2c3
      Maksim Malchuk authored
      
      This change adds the dnsmasq.log for the ironic-dnsmasq container and
      also enables more verbose logging when debug logging enabled.
      This can be triggered globbaly via 'openstack_logging_debug' or per
      service via 'ironic_logging_debug' or 'neutron_logging_debug'.
      
      Change-Id: I0e6b089beb88827effbcc365625eb2df902f5470
      Signed-off-by: default avatarMaksim Malchuk <maksim.malchuk@gmail.com>
      d559e2c3
  2. Sep 30, 2021
  3. Sep 27, 2021
  4. Sep 07, 2021
    • Michał Nasiadka's avatar
      toolbox: Allow different users logging to ansible.log · 24e6a6ce
      Michał Nasiadka authored
      Currently only operations done with default kolla_toolbox user are logged
      to /var/log/kolla/ansible.log.
      
      In order to fix logging, permissions to ansible.log must allow writing
      for other users in kolla group - and then a separate patch will follow
      to make custom ansible.cfg file usable by other toolbox users.
      
      Partial-Bug: #1942846
      Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
      24e6a6ce
  5. Aug 13, 2021
  6. Aug 09, 2021
  7. Jul 07, 2021
    • wu.chunyang's avatar
      Remove tempest role · 52619984
      wu.chunyang authored
      Remove tempest role as planned
      
      Change-Id: If3cf073e88c83f670c867a49afe48845f9e81008
      52619984
  8. Jun 23, 2021
    • Mark Goddard's avatar
      Use ansible_facts to reference facts · ade5bfa3
      Mark Goddard authored
      By default, Ansible injects a variable for every fact, prefixed with
      ansible_. This can result in a large number of variables for each host,
      which at scale can incur a performance penalty. Ansible provides a
      configuration option [0] that can be set to False to prevent this
      injection of facts. In this case, facts should be referenced via
      ansible_facts.<fact>.
      
      This change updates all references to Ansible facts within Kolla Ansible
      from using individual fact variables to using the items in the
      ansible_facts dictionary. This allows users to disable fact variable
      injection in their Ansible configuration, which may provide some
      performance improvement.
      
      This change disables fact variable injection in the ansible
      configuration used in CI, to catch any attempts to use the injected
      variables.
      
      [0] https://docs.ansible.com/ansible/latest/reference_appendices/config.html#inject-facts-as-vars
      
      Change-Id: I7e9d5c9b8b9164d4aee3abb4e37c8f28d98ff5d1
      Partially-Implements: blueprint performance-improvements
      ade5bfa3
  9. Jun 16, 2021
  10. Jun 11, 2021
    • Matthias Runge's avatar
      Remove support for panko · ccf8cc5d
      Matthias Runge authored
      the project is deprecated and in the process of being removed
      from OpenStack upstream.
      
      Change-Id: I9d5ebed293a5fb25f4cd7daa473df152440e8b50
      ccf8cc5d
  11. Jun 07, 2021
    • John Garbutt's avatar
      Robustify fluentd output tag matching · e7ff199d
      John Garbutt authored
      We really want elasticsearch or monasca to catch all logs,
      to providd the required centrailsed logging.
      
      While these appears to make little material difference,
      it should make it harder for logs to not get caught by
      any of the outputs we have configured.
      
      TrivialFix
      
      Change-Id: I3bb74dcdc3cbe78cd1e1657f44e2a0af9d6508ef
      e7ff199d
  12. Jun 04, 2021
  13. Jun 03, 2021
    • John Garbutt's avatar
      Fix parsing of infra.mariadb.xinetd logs · 7f1248fe
      John Garbutt authored
      Currently the logs tagged with infra.mariadb.xinetd flow into
      elasticsearch with no hostname or programname attach, thus making
      navigating the logs very hard.
      
      The quick fix is renaming the tag to infra.mariadb-xinetd, which is just
      enought to ensure the logs are processed correctly with the existing
      filters.
      
      TrivialFix
      
      Change-Id: Icd72206de7c1f701bdf35c8fb3b128ef2dbe29a8
      7f1248fe
    • John Garbutt's avatar
      Stop fluentd deprecation warnings of type vs @type · 0c7ba86e
      John Garbutt authored
      Currently when elasticsearch log output is enabled there are lots
      of warnings going into elasticsearch about type being deprecated
      and needing to move to @type. This change stops those warnings.
      
      TrivialFix
      
      Change-Id: Ideac1925cb764ad0d7d8416f56d5e4a993c6d8b6
      0c7ba86e
  14. May 30, 2021
  15. May 10, 2021
    • John Garbutt's avatar
      Use @type instead of type · fe664774
      John Garbutt authored
      This is a follow up on the change with the following ID:
      
      I337f42e174393f68b43e876ef075a74c887a5314
      
      TrivialFix
      
      Change-Id: Ibb67811d7b086ef9ef4c695ae589171af0c4d657
      fe664774
  16. Apr 08, 2021
  17. Mar 25, 2021
  18. Mar 04, 2021
    • Doug Szumski's avatar
      Support bypassing Monasca Log API for control plane logs · ca1a80ab
      Doug Szumski authored
      This change allows a user to forward control plane logs
      directly to Elasticsearch from Fluentd, rather than via
      the Monasca Log API when Monasca is enabled. The Monasca
      Log API can continue to handle tenant logs.
      
      For many use cases this is simpler, reduces resource
      consumption and helps to decouple control plane logging
      services from tenant logging services.
      
      It may not always be desired, so is optional and off by
      default.
      
      Change-Id: I195e8e4b73ca8f573737355908eb30a3ef13b0d6
      ca1a80ab
  19. Jan 27, 2021
    • Doug Szumski's avatar
      Fix Barbican API log config · 1ff4e58d
      Doug Szumski authored
      There are a few issues fixed here:
      
      - The Barbican API service doesn't set a log file, so all the Barbican API
        service logs go to loadwsgi.py.log by default.
      - The logs in loadwsgi.py.log are not ingested properly by Fluentd.
      - uWSGI logs go to barbican-api.log. This would normally be used as the log
        file for the Barbican API service logs.
      
      This patch makes the following changes to address the above issues:
      
      - All uWSGI logs (from the Emperor and Vassals) go to barbican_api_uwsgi_access.log
        Although these logs aren't strictly all access logs, this follows the existing
        pattern for WSGI logs.
      - The Barbican API service logs are written to barbican-api.log instead of
        loadwsgi.py.log. This follows the pattern used by other OpenStack services.
      - Fluentd is configured to parse the Barbican API service logs as it would with
        other OpenStack Python services.
      
      Change-Id: I6d03fa8c81c52b6f061514a836bbd15bb6639aaf
      Closes-Bug: #1891343
      1ff4e58d
  20. Dec 22, 2020
  21. Dec 16, 2020
  22. Oct 12, 2020
    • James Kirsch's avatar
      Add support for encrypting backend Neutron API Server · 93ad57f4
      James Kirsch authored
      Add TLS support for backend Neutron API Server communication using
      HAProxy to perform TLS termination. When used in conjunction with
      enabling TLS for service API endpoints, network communication will be
      encrypted end to end, from client through HAProxy to the Neutron
      service.
      
      Change-Id: Ib333a1f1bd12491df72a9e52d961161210e2d330
      Partially-Implements: blueprint add-ssl-internal-network
      93ad57f4
  23. Sep 18, 2020
  24. Aug 19, 2020
    • Rafael Weingärtner's avatar
      Standardize use and construction of endpoint URLs · f425c067
      Rafael Weingärtner authored
      
      The goal for this push request is to normalize the construction and use
       of internal, external, and admin URLs. While extending Kolla-ansible
       to enable a more flexible method to manage external URLs, we noticed
       that the same URL was constructed multiple times in different parts
       of the code. This can make it difficult for people that want to work
       with these URLs and create inconsistencies in a large code base with
       time. Therefore, we are proposing here the use of
       "single Kolla-ansible variable" per endpoint URL, which facilitates
       for people that are interested in overriding/extending these URLs.
      
      As an example, we extended Kolla-ansible to facilitate the "override"
      of public (external) URLs with the following standard
      "<component/serviceName>.<companyBaseUrl>".
      Therefore, the "NAT/redirect" in the SSL termination system (HAproxy,
      HTTPD or some other) is done via the service name, and not by the port.
      This allows operators to easily and automatically create more friendly
       URL names. To develop this feature, we first applied this patch that
       we are sending now to the community. We did that to reduce the surface
        of changes in Kolla-ansible.
      
      Another example is the integration of Kolla-ansible and Consul, which
      we also implemented internally, and also requires URLs changes.
      Therefore, this PR is essential to reduce code duplicity, and to
      facility users/developers to work/customize the services URLs.
      
      Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93
      Signed-off-by: default avatarRafael Weingärtner <rafael@apache.org>
      f425c067
  25. Aug 06, 2020
  26. Jul 28, 2020
    • Mark Goddard's avatar
      Performance: use a single config file for fluentd · 56a07702
      Mark Goddard authored
      Currently we generate multiple fluentd configuration files for inputs,
      filters, formatters and outputs.
      These are then included from the main td-agent.conf configuration file.
      With a large number of hosts, this can take a long time to template.
      
      Benchmarking of templating is available at [1].
      
      This change switches to a single fluentd configuration file, with the
      include done locally. For the default template files included with Kolla
      Ansible we use Jinja includes, but this does not work with templates in
      a different directory. We therefore use the Ansible template lookup
      plugin, which has a slightly higher overhead than a jinja include, but
      far lower than generating multiple templates. This should drastically
      improve the performance of this task.
      
      [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/template.md
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: Ia8623be0aa861fea3e54d2c9e1c971dfd8e3afa9
      56a07702
    • Mark Goddard's avatar
      Performance: use a single config file for logrotate · f329af7d
      Mark Goddard authored
      Currently we generate a logrotate configuration file for each enabled
      service. These are then included from a logrotate.d directory. With a
      large number of hosts, this can take a long time to template.
      
      Benchmarking of templating is available at [1].
      
      This change switches to a single logrotate configuration file for all
      services, with the include done locally using jinja. This should
      drastically improve the performance of this task.
      
      [1] https://github.com/stackhpc/ansible-scaling/blob/master/doc/template.md
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: I39cfa70bef6560f615cad516c43aaef6a523b964
      f329af7d
  27. Jul 27, 2020
    • Michal Nasiadka's avatar
      fluentd: log to a file instead of stdout · 696533f2
      Michal Nasiadka authored
      fluentd logs currently to stdout, which is known to produce big docker logs
      in /var/lib/docker. This change makes fluentd to log to /var/log/kolla/fluentd.
      
      Closes-Bug: #1888852
      Change-Id: I8fe0e54cb764a26d26c6196cef68aadc6fd57b90
      696533f2
  28. Jul 21, 2020
    • Pierre Riteau's avatar
      Fix fluentd warnings caused by "type copy" · 5b057812
      Pierre Riteau authored
      A "@type copy" statement is already present at the beginning of each
      match element, so extra "type copy" are not needed. They are causing the
      following warnings in fluentd logs:
      
      [warn]: parameter 'type' in <match syslog.local0.**>
      [warn]: parameter 'type' in <match syslog.local1.**>
      
      This commit also harmonizes indentation of the Monasca config block.
      
      Change-Id: I779c2b942d007acbdd43d999f2fc0cdc131d431f
      Related-Bug: #1885873
      5b057812
  29. Jul 02, 2020
  30. Jul 01, 2020
  31. Jun 25, 2020
    • Mark Goddard's avatar
      Support CA certificate for fluentd & Elasticsearch · 31f3f848
      Mark Goddard authored
      Currently there is no way to configure a CA certificate bundle file for
      fluentd to Elasticsearch communication. This change adds a new variable,
      'fluentd_elasticsearch_cacert' with a default value set to the value of
      'openstack_cacert.
      
      Closes-Bug: #1885109
      
      Change-Id: I5bbf55a4dd4ccce9fa2635cee720139c088268e3
      31f3f848
  32. Jun 20, 2020
  33. Jun 19, 2020
  34. Jun 16, 2020
  35. May 23, 2020
    • Doug Szumski's avatar
      Switch to Monasca API for logs · b39a0f80
      Doug Szumski authored
      The Monasca Log API has been removed and in this change we switch
      to using the unified API. If dedicated log APIs are required then
      this can be supported through configuration. Out of the box the
      Monasca API is used for both logs and metrics which is envisaged to
      work for most use cases.
      
      In order to use the unified API for logs, we need to disable the
      legacy Kafka client. We also rename the Monasca API config file
      to remove a warning about using the old style name.
      
      Depends-On: https://review.opendev.org/#/c/728638
      Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
      b39a0f80
Loading