- Apr 08, 2024
-
-
Roman Krček authored
This new role will handle setting sysctl values. It also handles cases when IPv6 setting is changed, but IPv6 is not enabled on the system by skipping those settings. This is an augmentation of previous patch: Icccfc1c509179c3cfd59650b7917a637f9af9646 Related-bug: #1906306 Change-Id: I5d6cda3307b3d2f27c1b2995f28772523b203fe7 Signed-off-by:
Roman Krček <roman.krcek@tietoevry.com>
-
- Mar 19, 2024
-
-
Michal Arbet authored
This patch fixes ovs-dpdk script as options in DPDK changed and PCI whitelist config changed from '-w' to '-a' as per [1]. [1] https://github.com/DPDK/dpdk/commit/db27370b57202632ad8830352c1c0ee2dde4542f Closes-Bug: #2058372 Change-Id: Iae812a4a255c13a42b2d6a691e265922d220f4c8
-
- Mar 15, 2024
-
-
Christian Berendt authored
Closes-Bug: #2058046 Change-Id: I9304f3546b20c0406e195163dccb1433fe802204
-
- Mar 14, 2024
-
-
Michal Nasiadka authored
Change-Id: Iab40eb92c7e4a9092471bef9d4477a4fa34f1c85
-
- Mar 13, 2024
-
-
Roman Krček authored
This way the playbooks won't try to set ipv6 systemctl options unless ipv6 is available on the system. Closes-bug: #1906306 Change-Id: Icccfc1c509179c3cfd59650b7917a637f9af9646
-
- Mar 12, 2024
-
-
German Espinoza authored
This patch fixes ovs-dpdk images pull by adding the variable kolla_role_name to the ovs-dpdk vars, so services-image-pull can work correctly. Closes-Bug: #2041864 Change-Id: I2e799290a57ebfacbc0ff9a0b1ca3dc956c513df Signed-off-by:
German Espinoza <gespinoza@whitestack.com>
-
- Mar 11, 2024
-
-
Uwe Jäger authored
Change-Id: I0a086c59076120aa53e6a05526dbab88e393c1c7
-
Michal Arbet authored
This patch fixes the creation of the openvswitch bridge by fixing an ansible task that was rewritten to use an ansible module, but unfortunately, its loop was implemented incorrectly. Closes-Bug: #2056332 Change-Id: Ia55a36c0f9b122b72d757ca973e7d8f76ae84344
-
Michal Arbet authored
Tooz 6.0.1 includes commit [1], which introduced parsing the username from the Redis connection URL. As a result, services started authenticating as admin which, by the way, was incorrect even before, as either a created user or the default one should have been used. The reason it worked before is simply because the username 'admin' wasn't parsed anywhere. This patch fixes the user being used and sets the correct 'default' one. [1] https://review.opendev.org/c/openstack/tooz/+/907656 Closes-Bug: #2056667 Depends-On: https://review.opendev.org/c/openstack/kolla/+/911703 Change-Id: I5568dba15fa98e009ad4a9e41756aba0fa659371
-
- Mar 05, 2024
-
-
Uwe Jäger authored
Change-Id: I84cc5ce25da2fcfe4f284d8b3197f40d3a6d7ce1
-
- Mar 01, 2024
-
-
Pierre Riteau authored
Change-Id: I2f6cd19b7f4d3954bf9de17e6095d39545fe05d3
-
Michal Nasiadka authored
Folowup for missing release note, see [1]. [1]: https://review.opendev.org/q/Ic121bf9f90c9865cd4d08890c80247570ef310ae Change-Id: Ia65e4e28d8a8dfdf439adbdd5a2516b6c064109a
-
- Feb 28, 2024
-
-
Will Szumski authored
This is useful for backwards compatability. Depends-On: https://review.opendev.org/c/openstack/kolla/+/909865 Change-Id: Ib2936580db5e7ab3479722bc353c39063010b5f2
-
Mark Goddard authored
These were omitted from I387c9d8f5c01baf6054381834ecf4e554d0fff35 and I387c9d8f5c01baf6054381834ecf4e554d0fff35. Closes-Bug: #2041855 Change-Id: I25e5450d1caeebd9c900c190fc0079988f1ca574
-
- Feb 15, 2024
-
-
Bartosz Bezak authored
Add the service role to ironic service users. Ironic recently enforced new policy validation as part of the RBAC efforts. [1][2] Service user support was also added to Ironic. [3] Admin role needs to stay as not all services added service role support. [4][5] [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://opendev.org/openstack/governance/src/commit/e2a47de10a689a78c31765fd1b020f17c0d3109c/goals/selected/consistent-and-secure-rbac.rst#phase-2 [3] https://review.opendev.org/c/openstack/ironic/+/907148 [4] https://review.opendev.org/q/topic:bp%252Fpolicy-service-role-default [5] https://review.opendev.org/q/topic:%22New-Location-Apis%22 Related-Bug: #2051837 Change-Id: I048402c2247188cf57f35437f557f84ac25d4ff2
-
Bartosz Bezak authored
Ironic recently started to enforce new policies and scope [1]. And Ironic is one of the sole openstack project which need system scope for some admin related api calls [2]. However Ironic also started to allow project-scope behaviour for service role with setting ``rbac_service_role_elevated_access``[3] [4]. This change enables this setting to get similar behaviour of service role as other openstack projects. [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://opendev.org/openstack/governance/src/commit/e2a47de10a689a78c31765fd1b020f17c0d3109c/goals/selected/consistent-and-secure-rbac.rst?display=source#L261 [3] https://review.opendev.org/c/openstack/ironic/+/907148 [4] https://opendev.org/openstack/ironic/src/commit/8ec56066223301230ac0ed0f0c471a10d366b474/releasenotes/notes/service-project-service-role-fix-e4d1a8c23856926a.yaml Related-Bug: #2051837 Change-Id: If8d7cf1663145d0398a2e936486e2b316d4df5e0
-
- Feb 12, 2024
-
-
Dawud authored
Fixes not being able to add additional plugins at build time due to the `grafana` volume being mounted over the existing `/var/lib/grafana` directory. This is fixed by copying the dashboards into the container from an existing bind mount instead of using the ``grafana`` volume. This however leaves behind the volume which should be removed with `docker volume rm grafana` or by setting `grafana_remove_old_volume` to `True`. Closes-Bug: #2039498 Change-Id: Ibcffa5d8922c470f655f447558d4a9c73b1ba361
-
- Feb 07, 2024
-
-
Michal Arbet authored
This patch implements horizon's preferred way how to configure itself described in docs [1], [1] https://docs.openstack.org/horizon/latest/configuration/settings.html Depends-On: https://review.opendev.org/c/openstack/kolla/+/906339 Change-Id: I60ab4634bf4333c47d00b12fc4ec00570062bd18
-
- Feb 06, 2024
-
-
Michal Arbet authored
This patch adds check_mode: false to tasks in restart_services.yml which just checking some WSREP status and if port is UP. Closes-Bug: #2052501 Change-Id: I92a591900d85138a87991a18dd4339efd053ef1b
-
- Feb 05, 2024
-
-
OpenStack Release Bot authored
Update the yoga release notes configuration to build from unmaintained/yoga. Change-Id: I3ebb137938de8f9333c89173974656712e89c17f
-
- Jan 30, 2024
-
-
Grzegorz Koper authored
Closes-Bug: #2049607 Change-Id: I14ae2be2e19ad06e3190e2e948bac7ce77e80d4b
-
Michal Arbet authored
This patch basically does a simple thing, on the basis of a variable neutron_dns_integration it enables/disables DNS integration. There is also precheck added which checks whether dns_domain in neutron.conf has a non-default value if DNS integration is enabled as this is requirement. [1] https://docs.openstack.org/neutron/latest/admin/config-dns-int.html [2] https://docs.openstack.org/neutron/latest/admin/config-dns-int-ext-serv.html#config-dns-int-ext-serv Closes-Bug: #2049503 Change-Id: I90f0f8dcec6fa0112179f050d96e9d9db5956cf8
-
Michal Arbet authored
This patch disables periodic compute.instance.exists notifications when designate is enabled. Related-Bug: #2049503 Change-Id: I39fe2db9182de23c1df814d911eec15e86317702
-
- Jan 29, 2024
-
-
Alex-Welsh authored
Service user passwords will now be updated in keystone if services are reconfigured with new passwords set in config. This behaviour can be overridden. Closes-Bug: #2045990 Change-Id: I91671dda2242255e789b521d19348b0cccec266f
-
- Jan 22, 2024
-
- Jan 17, 2024
-
-
Piotr Parczewski authored
Enables modifying the interval and sets the recommended default value. [1] https://docs.ceph.com/en/latest/mgr/prometheus/#configuration Change-Id: I4b91d184485aa52b3c06011f9dbb6b34bcad3ca8
-
Matt Crees authored
Shard allocation is disabled at the start of the OpenSearch upgrade task. This is set as a transient setting, meaning it will be removed once the containers are restarted. However, if there is not change in the OpenSearch container it will not be restarted so the cluster is left in a broken state: unable to allocate shards. This patch moves the pre-upgrade tasks to within the handlers, so shard allocation and the flush are only performed when the OpenSearch container is going to be restarted. Closes-Bug: #2049512 Change-Id: Ia03ba23bfbde7d50a88dc16e4f117dec3c98a448
-
- Jan 11, 2024
-
-
wu.chunyang authored
This change fixes the trove failed to discover swift endpoint by adding service_credentials in guest-agent.conf Closes-Bug: #2048829 Change-Id: I185484d2a0d0a2d4016df6acf8a6b0a7f934c237
-
wu.chunyang authored
This change fixes the trove guest instance failed to connect to RabbitMQ by adding durable queues support to oslo_messaging_rabbit section in guest-agent.conf. Partial-Bug: #2048822 Change-Id: I8efc3c92e861816385e6cda3b231a950a06bf57d
-
- Jan 08, 2024
-
-
Pierre Riteau authored
The addition of an instance resize operation [1] to CI testing is triggering a failure in kolla-ansible-debian-ovn jobs, which are using a nodeset with multiple nodes: oslo_concurrency.processutils.ProcessExecutionError: Unexpected error while running command. Command: scp -r /var/lib/nova/instances/8ca2c7e8-acae-404c-af7d-6cac38e354b8_resize/disk 192.0.2.2:/var/lib/nova/instances/8ca2c7e8-acae-404c-af7d-6cac38e354b8/disk Exit code: 255 Stdout: '' Stderr: "Warning: Permanently added '[192.0.2.2]:8022' (ED25519) to the list of known hosts.\r\nsubsystem request failed on channel 0\r\nscp: Connection closed\r\n" This is not seen on Ubuntu Jammy, which uses OpenSSH 8.9, while Debian Bookworm uses OpenSSH 9.2. This is likely related to this change in OpenSSH 9.0 [2]: This release switches scp(1) from using the legacy scp/rcp protocol to using the SFTP protocol by default. Configure sftp subsystem like on RHEL9 derivatives. Even though it is not yet required for Ubuntu, we also configure it so we are ready for the Noble release. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/904249 [2] https://www.openssh.com/txt/release-9.0 Closes-Bug: #2048700 Change-Id: I9f1129136d7664d5cc3b57ae5f7e8d05c499a2a5
-
Michal Arbet authored
This patch sets URL to glance worker. If this is set, other glance workers will know how to contact this one directly if needed. For image import, a single worker stages the image and other workers need to be able to proxy the import request to the right one. With current setup glance image import just not working. Closes-Bug: #2048525 Change-Id: I4246dc8a80038358cd5b6e44e991b3e2ed72be0e
-
- Jan 05, 2024
-
-
Mark Goddard authored
The prometheus_cadvisor container has high CPU usage. On various production systems I checked it sits around 13-16% on controllers, averaged over the prometheus 1m scrape interval. When viewed with top we can see it is a bit spikey and can jump over 100%. There are various bugs about this, but I found https://github.com/google/cadvisor/issues/2523 which suggests reducing the per-container housekeeping interval. This defaults to 1s, which provides far greater granularity than we need with the default prometheus scrape interval of 60s. Reducing the housekeeping interval to 60s on a production controller reduced the CPU usage from 13% to 3.5% average. This still seems high, but is more reasonable. Change-Id: I89c62a45b1f358aafadcc0317ce882f4609543e7 Closes-Bug: #2048223
-
Dawud authored
HAProxy exposes a Prometheus metrics endpoint, it just needs to be enabled. Enable this and remove configuration for prometheus-haproxy-exporter. Remaining prometheus-haproxy-exporter containers will automatically be removed. Change-Id: If6e75691d2a996b06a9b95cb0aae772db54389fb Co-Authored-By:
Matt Anson <matta@stackhpc.com>
-
Michal Arbet authored
Some containers exiting with 143 instead of 0, but this is still OK. This patch just allows ExitCode 143 (SIGTERM) as fix. Details in bugreport. Services which exited with 143 (SIGTERM): kolla-cron-container.service kolla-designate_producer-container.service kolla-keystone_fernet-container.service kolla-letsencrypt_lego-container.service kolla-magnum_api-container.service kolla-mariadb_clustercheck-container.service kolla-neutron_l3_agent-container.service kolla-openvswitch_db-container.service kolla-openvswitch_vswitchd-container.service kolla-proxysql-container.service Partial-Bug: #2048130 Change-Id: Ia8c85d03404cfb368e4013066c67acd2a2f68deb
-
- Dec 21, 2023
-
-
Doug Szumski authored
We previously used ElasticSearch Curator for managing log retention. Now that we have moved to OpenSearch, we can use the Index State Management (ISM) plugin which is bundled with OpenSearch. This change adds support for automating the configuration of the ISM plugin via the OpenSearch API. By default, it has similar behaviour to the previous ElasticSearch Curator default policy. Closes-Bug: #2047037 Change-Id: I5c6d938f2bc380f1575ee4f16fe17c6dca37dcba
-
- Dec 14, 2023
-
-
Pierre Riteau authored
The wrong process name was being used. Closes-Bug: #2046268 Change-Id: I5a5d4f227205e811732331ee6e020ccea67b6fab
-
- Dec 13, 2023
-
-
Matt Crees authored
Adds a precheck to fail if non-quorum queues are found in RabbitMQ. Currently excludes fanout and reply queues, pending support in oslo.messaging [1]. [1]: https://review.opendev.org/c/openstack/oslo.messaging/+/888479 Closes-Bug: #2045887 Change-Id: Ibafdcd58618d97251a3405ef9332022d4d930e2b
-
- Dec 05, 2023
-
-
Andrey Kurilin authored
Starting with ansible-core 2.13, list concatenation format is changed and does not support concatenation operations outside of the jinja template. The format change: "[1] + {{ [2] }}" -> "{{ [1] + [2] }}" This affects the horizon role that iterates over existing policy files to override and concatenate them into a single variable. Co-Authored-By:
Dr. Jens Harbott <harbott@osism.tech> Closes-Bug: #2045660 Change-Id: I91a2101ff26cb8568f4615b4cdca52dcf09e6978
-
Mark Goddard authored
This allows us to continue execution until a certain proportion of hosts to fail. This can be useful at scale, where failures are common, and restarting a deployment is time-consuming. The default max failure percentage is 100, keeping the default behaviour. A global max failure percentage may be set via kolla_max_fail_percentage, and individual services may define a max failure percentage via <service>_max_fail_percentage. Note that all hosts in the inventory must be reachable for fact gathering, even those not included in a --limit. Closes-Bug: #1833737 Change-Id: I808474a75c0f0e8b539dc0421374b06cea44be4f
-
- Dec 02, 2023
-
-
Maksim Malchuk authored
Followup on Id6eae798784126d4dd53adef15bdce6b47b4601f to fix an issue when a client with provided port set tries to connect 'localhost', so while we switch to TCP/IP we need to explicitly provide the host too. Partial-Bug: #2024554 Change-Id: Ib08c159dadd69a1f44924d658f4afe1e794a18b0 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-