Skip to content
Snippets Groups Projects
  1. Dec 14, 2020
    • Mark Goddard's avatar
      Revert "Performance: Use import_tasks in the main plays" · db4fc85c
      Mark Goddard authored
      This reverts commit 9cae59be.
      
      Reason for revert: This patch was found to introduce issues with fluentd customisation. The underlying issue is not currently fully understood, but could be a sign of other obscure issues.
      
      Change-Id: Ia4859c23d85699621a3b734d6cedb70225576dfc
      Closes-Bug: #1906288
      db4fc85c
  2. Oct 27, 2020
    • Radosław Piliszek's avatar
      Do not set 'always' tag where unnecessary · 71e9c603
      Radosław Piliszek authored
      Makes 'import_tasks' not change behaviour compared to
      'include_tasks'.
      
      Change-Id: I600be7c3bd763b3b924bd4a45b4e7b4dca7a33e3
      71e9c603
    • Radosław Piliszek's avatar
      Performance: Use import_tasks in the main plays · 9cae59be
      Radosław Piliszek authored
      Main plays are action-redirect-stubs, ideal for import_tasks.
      
      This avoids 'include' penalty and makes logs/ara look nicer.
      
      Fixes haproxy and rabbitmq not to check the host group as well.
      
      Change-Id: I46136fc40b815e341befff80b54a91ef431eabc0
      Partially-Implements: blueprint performance-improvements
      9cae59be
  3. Oct 22, 2020
    • Mark Goddard's avatar
      Fix permission denied during Fernet key rotation · b45679f1
      Mark Goddard authored
      During a deploy, if keystone Fernet key rotation happens before the
      keystone container starts, the rotation may fail with 'permission
      denied'. This happens because config.json for Keystone sets the
      permissions for /etc/keystone/fernet-keys.
      
      This change fixes the issue by also setting the permissions for
      /etc/keystone/fernet-keys in config.json for keystone-fernet and
      keystone-ssh.
      
      Change-Id: I561e4171d14dcaad8a2a9a36ccab84a670daa904
      Closes-Bug: #1888512
      b45679f1
    • Mark Goddard's avatar
      Fix keystone-startup.sh - remove Fernet key age check · ba8c27f5
      Mark Goddard authored
      Currently we check the age of the primary Fernet key on Keystone
      startup, and fail if it is older than the rotation interval. While this
      may seem sensible, there are various reasons why the key may be older
      than this:
      
      * if the rotation interval is not a factor of the number of seconds in a
        week, the rotation schedule will be lumpy, with the last rotation
        being up to twice the nominal rotation interval
      * if a keystone host is unavailable at its scheduled rotation time,
        rotation will not happen. This may happen multiple times
      
      We could do several things to avoid this issue:
      
      1. remove the check on the age of the key
      2. multiply the rotation interval by some factor to determine the
         allowed key age
      
      This change goes for the more simple option 1. It also cleans up some
      terminology in the keystone-startup.sh script.
      
      Closes-Bug: #1895723
      
      Change-Id: I2c35f59ae9449cb1646e402e0a9f28ad61f918a8
      ba8c27f5
  4. Oct 19, 2020
  5. Oct 12, 2020
    • Radosław Piliszek's avatar
      Performance: optimize genconfig · 3411b9e4
      Radosław Piliszek authored
      Config plays do not need to check containers. This avoids skipping
      tasks during the genconfig action.
      
      Ironic and Glance rolling upgrades are handled specially.
      
      Swift and Bifrost do not use the handlers at all.
      
      Partially-Implements: blueprint performance-improvements
      Change-Id: I140bf71d62e8f0932c96270d1f08940a5ba4542a
      3411b9e4
  6. Oct 05, 2020
    • Michal Nasiadka's avatar
      Use Docker healthchecks for core services · c52a89ae
      Michal Nasiadka authored
      This change enables the use of Docker healthchecks for core OpenStack
      services.
      Also check-failures.sh has been updated to treat containers with
      unhealthy status as failed.
      
      Implements: blueprint container-health-check
      Change-Id: I79c6b11511ce8af70f77e2f6a490b59b477fefbb
      c52a89ae
  7. Sep 25, 2020
    • Michal Nasiadka's avatar
      Fix keystone-startup.sh · d78673e7
      Michal Nasiadka authored
      keystone-startup.sh is using fernet_token_expiry instead of
      fernet_key_rotation_interval - which effects in restart loop of keystone
      containers - when restarted after 2-3 days.
      
      Closes-Bug: #1895723
      
      Change-Id: Ifff77af3d25d9dc659fff34f2ae3c6f2670df0f4
      d78673e7
  8. Sep 22, 2020
    • Pierre Riteau's avatar
      Reduce the use of SQLAlchemy connection pooling · c8177202
      Pierre Riteau authored
      When the internal VIP is moved in the event of a failure of the active
      controller, OpenStack services can become unresponsive as they try to
      talk with MariaDB using connections from the SQLAlchemy pool.
      
      It has been argued that OpenStack doesn't really need to use connection
      pooling with MariaDB [1]. This commit reduces the use of connection
      pooling via two configuration options:
      
      - max_pool_size is set to 1 to allow only a single connection in the
        pool (it is not possible to disable connection pooling entirely via
        oslo.db, and max_pool_size = 0 means unlimited pool size)
      - lower connection_recycle_time from the default of one hour to 10
        seconds, which means the single connection in the pool will be
        recreated regularly
      
      These settings have shown better reactivity of the system in the event
      of a failover.
      
      [1] http://lists.openstack.org/pipermail/openstack-dev/2015-April/061808.html
      
      Change-Id: Ib6a62d4428db9b95569314084090472870417f3d
      Closes-Bug: #1896635
      c8177202
  9. Sep 17, 2020
    • Mark Goddard's avatar
      Support TLS encryption of RabbitMQ client-server traffic · 761ea9a3
      Mark Goddard authored
      This change adds support for encryption of communication between
      OpenStack services and RabbitMQ. Server certificates are supported, but
      currently client certificates are not.
      
      The kolla-ansible certificates command has been updated to support
      generating certificates for RabbitMQ for development and testing.
      
      RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when
      The Zuul 'tls_enabled' variable is true.
      
      Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5
      Implements: blueprint message-queue-ssl-support
      761ea9a3
  10. Aug 28, 2020
  11. Aug 25, 2020
    • wu.chunyang's avatar
      add region name for tasks · 60dc0128
      wu.chunyang authored
      when use multiple regions, those tasks always get a wrong endpoint.
      
      Change-Id: Ie164687b2ffd80cedf8a00e7f705b73fccd416e2
      60dc0128
  12. Aug 24, 2020
  13. Aug 19, 2020
    • Rafael Weingärtner's avatar
      Standardize use and construction of endpoint URLs · f425c067
      Rafael Weingärtner authored
      
      The goal for this push request is to normalize the construction and use
       of internal, external, and admin URLs. While extending Kolla-ansible
       to enable a more flexible method to manage external URLs, we noticed
       that the same URL was constructed multiple times in different parts
       of the code. This can make it difficult for people that want to work
       with these URLs and create inconsistencies in a large code base with
       time. Therefore, we are proposing here the use of
       "single Kolla-ansible variable" per endpoint URL, which facilitates
       for people that are interested in overriding/extending these URLs.
      
      As an example, we extended Kolla-ansible to facilitate the "override"
      of public (external) URLs with the following standard
      "<component/serviceName>.<companyBaseUrl>".
      Therefore, the "NAT/redirect" in the SSL termination system (HAproxy,
      HTTPD or some other) is done via the service name, and not by the port.
      This allows operators to easily and automatically create more friendly
       URL names. To develop this feature, we first applied this patch that
       we are sending now to the community. We did that to reduce the surface
        of changes in Kolla-ansible.
      
      Another example is the integration of Kolla-ansible and Consul, which
      we also implemented internally, and also requires URLs changes.
      Therefore, this PR is essential to reduce code duplicity, and to
      facility users/developers to work/customize the services URLs.
      
      Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93
      Signed-off-by: default avatarRafael Weingärtner <rafael@apache.org>
      f425c067
  14. Aug 13, 2020
    • Mark Goddard's avatar
      Prevent overwriting existing Keystone Fernet keys · 8389140f
      Mark Goddard authored
      Steps to reproduce:
      
      * Deploy a cloud
      * Add another controller to the inventory
      * Deploy to the new controller using --limit:
      
      kolla-ansible deploy --limit new-controller
      
      Expected results:
      
      The new controller uses the cluster's existing fernet keys.
      
      Actual results:
      
      New fernet keys are generated on the new controller, and pushed out to
      the existing controllers. This invalidates tokens created from those
      keys.
      
      This change prevents the above scenario from happening, by failing the
      deployment if there are no hosts with existing Ferney keys to
      distribute, and not all Keystone hosts are in the target host list.
      
      Closes-Bug: #1891364
      
      Change-Id: If0c0e038b77fc010a3a017f9841a674d53b16457
      8389140f
    • James Kirsch's avatar
      Add Keep Alive Timeout for httpd · 19b028e6
      James Kirsch authored
      This patch introduces a global keep alive timeout value for services
      that leverage httpd + wsgi to handle http/https requests. The default
      value is one minute.
      
      Change-Id: Icf7cb0baf86b428a60a7e9bbed642999711865cd
      Partially-Implements: blueprint add-ssl-internal-network
      19b028e6
  15. Aug 10, 2020
    • Mark Goddard's avatar
      Mount /etc/timezone based on host OS · 146b00ef
      Mark Goddard authored
      Previously we mounted /etc/timezone if the kolla_base_distro is debian
      or ubuntu. This would fail prechecks if debian or ubuntu images were
      deployed on CentOS. While this is not a supported combination, for
      correctness we should fix the condition to reference the host OS rather
      than the container OS, since that is where the /etc/timezone file is
      located.
      
      Change-Id: Ifc252ae793e6974356fcdca810b373f362d24ba5
      Closes-Bug: #1882553
      146b00ef
  16. Aug 06, 2020
  17. Jul 28, 2020
    • Mark Goddard's avatar
      Performance: use import_tasks for check-containers.yml · 9702d4c3
      Mark Goddard authored
      Including tasks has a performance penalty when compared with importing
      tasks. If the include has a condition associated with it, then the
      overhead of the include may be lower than the overhead of skipping all
      imported tasks. In the case of the check-containers.yml include, the
      included file only has a single task, so the overhead of skipping this
      task will not be greater than the overhead of the task import. It
      therefore makes sense to switch to use import_tasks there.
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: I65d911670649960708b9f6a4c110d1a7df1ad8f7
      9702d4c3
  18. Jul 07, 2020
    • Mark Goddard's avatar
      Performance: Run common role in a separate play · 56ae2db7
      Mark Goddard authored
      The common role was previously added as a dependency to all other roles.
      It would set a fact after running on a host to avoid running twice. This
      had the nice effect that deploying any service would automatically pull
      in the common services for that host. When using tags, any services with
      matching tags would also run the common role. This could be both
      surprising and sometimes useful.
      
      When using Ansible at large scale, there is a penalty associated with
      executing a task against a large number of hosts, even if it is skipped.
      The common role introduces some overhead, just in determining that it
      has already run.
      
      This change extracts the common role into a separate play, and removes
      the dependency on it from all other roles. New groups have been added
      for cron, fluentd, and kolla-toolbox, similar to other services. This
      changes the behaviour in the following ways:
      
      * The common role is now run for all hosts at the beginning, rather than
        prior to their first enabled service
      * Hosts must be in the necessary group for each of the common services
        in order to have that service deployed. This is mostly to avoid
        deploying on localhost or the deployment host
      * If tags are specified for another service e.g. nova, the common role
        will *not* automatically run for matching hosts. The common tag must
        be specified explicitly
      
      The last of these is probably the largest behaviour change. While it
      would be possible to determine which hosts should automatically run the
      common role, it would be quite complex, and would introduce some
      overhead that would probably negate the benefit of splitting out the
      common role.
      
      Partially-Implements: blueprint performance-improvements
      
      Change-Id: I6a4676bf6efeebc61383ec7a406db07c7a868b2a
      56ae2db7
  19. Jun 07, 2020
  20. Jun 02, 2020
  21. May 15, 2020
  22. May 14, 2020
    • generalfuzz's avatar
      Fix Keystone Centos 8 mod_ssl · 783bbfdd
      generalfuzz authored
      Keystone was not loading the correct mod_ssl library in centos 8
      deployment.
      
      Change-Id: I604d675ba7ad28922f360fdc729746f99c1507b4
      Partially-Implements: blueprint add-ssl-internal-network
      783bbfdd
  23. Apr 16, 2020
  24. Apr 09, 2020
    • Dincer Celik's avatar
      Introduce /etc/timezone to Debian/Ubuntu containers · 4b5df0d8
      Dincer Celik authored
      Some services look for /etc/timezone on Debian/Ubuntu, so we should
      introduce it to the containers.
      
      In addition, added prechecks for /etc/localtime and /etc/timezone.
      
      Closes-Bug: #1821592
      Change-Id: I9fef14643d1bcc7eee9547eb87fa1fb436d8a6b3
      4b5df0d8
    • James Kirsch's avatar
      Add support for encrypting backend Keystone HAProxy traffic · b475643c
      James Kirsch authored
      This patch introduces an optional backend encryption for Keystone
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Keystone service.
      
      Change-Id: I6351147ddaff8b2ae629179a9bc3bae2ebac9519
      Partially-Implements: blueprint add-ssl-internal-network
      b475643c
  25. Mar 27, 2020
    • linpeiwen's avatar
      keystone roles container name variable · 56591770
      linpeiwen authored
      keystone and keystone_fernet container name variable is fixed
      in some places, but in the defaults directory, keystone
      and keystone_fernet container_name variable is variable.
      If the keystone and keystone_fernet container_name variable is
      changed during deployment, it will not be assigned to keystone
      and keystone_fernet, but a fixed 'keystone' and 'keystone_fernet' name.
      
      Change-Id: Ifc8ac69e6abc4586f0e4fd820b9022aea9f76396
      56591770
  26. Mar 10, 2020
    • yj.bai's avatar
      Add notify restart container when cert changed · d3cc2f67
      yj.bai authored
      
      When change the cert file in /etc/kolla/certificate/.
      The certificate in the container has not changed.
      So I think can use kolla-ansible deploy when certificate is
      changed. restart <container>
      
      Partially-Implements: blueprint custom-cacerts
      
      Change-Id: Iaac6f37e85ffdc0352e8062ae5049cc9a6b3db26
      Signed-off-by: default avataryj.bai <bai.yongjun@99cloud.net>
      d3cc2f67
  27. Mar 06, 2020
  28. Mar 02, 2020
  29. Feb 28, 2020
    • Mark Goddard's avatar
      Add Ansible group check to prechecks · 49fb55f1
      Mark Goddard authored
      We assume that all groups are present in the inventory, and quite obtuse
      errors can result if any are not.
      
      This change adds a precheck that checks for the presence of all expected
      groups in the inventory for each service. It also introduces a common
      service-precheck role that we can use for other common prechecks.
      
      Change-Id: Ia0af1e7df4fff7f07cd6530e5b017db8fba530b3
      Partially-Implements: blueprint improve-prechecks
      49fb55f1
  30. Feb 03, 2020
    • Michal Nasiadka's avatar
      Fix keystone fernet bootstrap · 0799782c
      Michal Nasiadka authored
      There are cases when a multinode deployment ends up in unusable
      keystone public wsgi on some nodes.
      
      The root cause is that keystone public wsgi doesn't find fernet
      keys on startup - and then persists on sending 500 errors to any
      requests - due to a race condition between
      fernet_setup/fernet-push.sh and keystone startup.
      
      Depends-On: https://review.opendev.org/703742/
      Change-Id: I63709c2e3f6a893db82a05640da78f492bf8440f
      Closes-Bug: #1846789
      0799782c
  31. Jan 30, 2020
    • Mark Goddard's avatar
      Python 3: Use distro_python_version for WSGI python_path · c56d273c
      Mark Goddard authored
      Currently the WSGI configuration for binary images uses python2.7
      site-packages in some places. This change uses distro_python_version to
      select the correct python path.
      
      Change-Id: Id5f3f0ede106498b9264942fa0399d7c7862c122
      Partially-Implements: blueprint python-3
      c56d273c
    • Mark Goddard's avatar
      Python 3: Use distro_python_version for dev mode · 5a786436
      Mark Goddard authored
      In dev mode currently the python source is mounted under python2.7
      site-packages. This change fixes this to use the distro_python_version
      variable to ensure dev mode works with Python 3 images.
      
      Change-Id: Ieae3778a02f1b79023b4f1c20eff27b37f481077
      Partially-Implements: blueprint python-3
      5a786436
  32. Jan 28, 2020
    • James Kirsch's avatar
      Copy CA into containers. · 511ba9f6
      James Kirsch authored
      When kolla_copy_ca_into_containers is set to "yes", the Certificate
      Authority in /etc/kolla/certificates will be copied into service
      containers to enable trust for that CA. This is especially useful when
      the CA is self signed, and would not be trusted by default.
      
      Partially-Implements: blueprint custom-cacerts
      
      Change-Id: I4368f8994147580460ebe7533850cf63a419d0b4
      511ba9f6
  33. Jan 13, 2020
  34. Jan 10, 2020
    • Michal Nasiadka's avatar
      Use distro_python_version in fernet-node-sync · 4072a3eb
      Michal Nasiadka authored
      Since Debian and Ubuntu are already on Python3 only and don't have unversioned
      Python binaries (no /usr/bin/python) - we need to call the fetch-fernet-tokens
      script using distro_python_version
      
      Backport: train
      Related-Bug: #1859047
      Change-Id: I42378af9b25f14079fc57b4068ab25d5d4877362
      4072a3eb
Loading