- Jun 16, 2020
-
-
James Kirsch authored
Replaced "kolla_external_fqdn_cacert" and "kolla_internal_fqdn_cacert" with "kolla_admin_openrc_cacert". OS_CACERT is now set to the value of "kolla_admin_openrc_cacert" in the generated admin-openrc.sh file. Change-Id: If195d5402579cee9a14b91f63f5fde84eb84cccf Partially-Implements: blueprint add-ssl-internal-network Depends-On: https://review.opendev.org/#/c/731344/
-
- Jun 15, 2020
-
-
James Kirsch authored
Update the certificate generation task to create a root CA for the self-signed certificates. The internal and external facing certificates are then generated using the root CA. Updated openstack_cacert to use system CA trust store in CI tests certificate by default. Change-Id: I6c2adff7d0128146cf086103ff6060b0dcefa37b Partially-Implements: blueprint add-ssl-internal-network
-
- Jun 02, 2020
-
-
Jeffrey Zhang authored
normally, api_interface is treated as internal and security network plane, use it as default migration_interface is more meaningful. Change-Id: Ib9f4bcc19147a49dc09bd905dcd06be165a91b5e
-
- May 29, 2020
-
-
gugug authored
The congress project is no longer maintained. This has been retired since Victoria[1] and has not been used by other OpenStack services since. [1]: http://lists.openstack.org/pipermail/openstack-discuss/2020-April/014292.html Depends-On: I21c9ab9820f78cf76adf11c5f0591c60f76372a8 Change-Id: I561ead226f714d98c8e06e6027715a64c3a8e47e
-
- May 23, 2020
-
-
Doug Szumski authored
The Monasca Log API has been removed and in this change we switch to using the unified API. If dedicated log APIs are required then this can be supported through configuration. Out of the box the Monasca API is used for both logs and metrics which is envisaged to work for most use cases. In order to use the unified API for logs, we need to disable the legacy Kafka client. We also rename the Monasca API config file to remove a warning about using the old style name. Depends-On: https://review.opendev.org/#/c/728638 Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
-
xiaojueguan authored
Since at least Stein, there is no visible effect from these tasks. The Kibana dashboard seems to be working exactly the same, greeting user on the first use with "please configure my index". I tested on both Ubuntu and CentOS. In new E*K stack (Ussuri+, CentOS8+) it even causes play errors. Co-authored-by:
Radosław Piliszek <radoslaw.piliszek@gmail.com> Change-Id: Iafc6986cce9cbaa0ea9e219ca85d7d01a61308cf Closes-Bug: #1799689
-
- May 21, 2020
-
-
xiaojueguan authored
you might refer to: https://github.com/gophercloud/utils/blob/b0167b94122ca14ce50258a760b4e9b22788f0d7/openstack/clientconfig/results.go#L41 Change-Id: Ia326360c412aad9ca4d1735cc6486aa2fce22c1a Closes-Bug: #1850812
-
- May 20, 2020
-
-
Michal Nasiadka authored
Depends-On: https://review.opendev.org/710217/ Change-Id: I85652f23e487c40192106d23f2cdd45a3077deca
-
Mark Goddard authored
Change-Id: I64d0f5e58058f3d39551e578b79027abded31174
-
- May 19, 2020
-
-
Mark Goddard authored
Change-Id: If3129b569248eb548fcb987f30d318f59144faa7
-
- May 15, 2020
-
-
Will Szumski authored
The pre-check was broken, see bug report for details. Change-Id: I089f1e288bae6c093be66181c81a4373a6ef3de4 Closes-Bug: #1856021
-
Jeffrey Zhang authored
The RabbitMQ 'openstack' user has the 'administrator' tag assigned via the RabbitMQ definitions.json file. Since the Train release, the nova-cell role also configures the RabbitMQ user, but omits the tag. This causes the tag to be removed from the user, which prevents it from accessing the management UI and API. This change adds support for configuring user tags to the service-rabbitmq role, and sets the administrator tag by default. Change-Id: I7a5d6fe324dd133e0929804d431583e5b5c1853d Closes-Bug: #1875786
-
- May 13, 2020
-
-
James Kirsch authored
This patch introduces an optional backend encryption for the Barbican API service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Barbican service. Change-Id: I62a43b36ebe4a03230bf944980b45e4b6938871b Partially-Implements: blueprint add-ssl-internal-network
-
- May 11, 2020
-
-
Will Szumski authored
This provides a generic mechanism to include extra files that you can reference in prometheus.yml, for example: scrape_targets: - job_name: ipmi params: module: default scrape_interval: 1m scrape_timeout: 30s metrics_path: /ipmi scheme: http file_sd_configs: - files: - /etc/prometheus/extras/file_sd/ipmi-exporter-targets.yml refresh_interval: 5m Change-Id: Ie2f085204b71725b901a179ee51541f1f383c6fa Related: blueprint custom-prometheus-targets
-
Will Szumski authored
This provides a mechanism to scrape targets defined outside of kolla-ansible. Depends-On: https://review.opendev.org/#/c/685671/ Change-Id: I0950341b147bb374b4128f09f807ef5a756f5dfa Related: blueprint custom-prometheus-targets
-
- May 05, 2020
-
-
Pierre Riteau authored
This note refers to configuration changes done in I626dc7afe9eabfbeb6c08137a3e6bbeebde2b332. Change-Id: I75a37b9d3b28964f353977baa3a9f49fc424d866 Closes-Bug: #1876985
-
- Apr 30, 2020
-
-
James Kirsch authored
This patch introduces an optional backend encryption for Horizon and Placement services. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Horizon and Placement services. Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d Partially-Implements: blueprint add-ssl-internal-network
-
James Kirsch authored
Add TLS support for Glance api using HAProxy to perform TLS termination. Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809 Partially-Implements: blueprint add-ssl-internal-network
-
Hongbin Lu authored
Zun has a new component "zun-cni-daemon" which should be deployed in every compute nodes. It is basically an implementation of CNI (Container Network Interface) that performs the neutron port binding. If users is using the capsule (pod) API, the recommended deployment option is using "cri" as capsule driver. This is basically to use a CRI runtime (i.e. CRI plugin for containerd) for supporting capsules (pods). A CRI runtime needs a CNI plugin which is what the "zun-cni-daemon" provides. The configuration is based on the Zun installation guide [1]. It consits of the following steps: * Configure the containerd daemon in the host. The "zun-compute" container will use grpc to communicate with this service. * Install the "zun-cni" binary at host. The containerd process will invoke this binary to call the CNI plugin. * Run a "zun-cni-daemon" container. The "zun-cni" binary will communicate with this container via HTTP. Relevant patches: Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime Install guide: https://review.opendev.org/#/c/707948/ Devstack plugin: https://review.opendev.org/#/c/705338/ Kolla image: https://review.opendev.org/#/c/708273/ [1] https://docs.openstack.org/zun/latest/install/index.html Depends-On: https://review.opendev.org/#/c/721044/ Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
-
- Apr 29, 2020
-
-
Noboru Iwamatsu authored
This patch updates the octavia controller deployment to use the latest octavia certificate configuration guide [1]. The dual CA changes were introduced in Train. [1] https://docs.openstack.org/octavia/latest/admin/guides/certificates.html Change-Id: If89ec0d631568db70690f1a69d00115c59abe678 Closes-Bug: #1862133
-
- Apr 28, 2020
-
-
Marcin Juszkiewicz authored
Change-Id: I18f8855a758703968aba032add68add24b31f673 Closes-bug: #1875588
-
Xing Zhang authored
The octavia service communicates to the barbican service with public endpoint_type by default[1], it should use internal like other services. [1] https://github.com/openstack/octavia/blob/0056b5175f89070164849501ec6d960549b95e34/octavia/common/config.py#L533-L537 Closes-Bug: #1875618 Change-Id: I90d2b0aeac090a3e2366341e260232fc1f0d6492
-
- Apr 27, 2020
-
-
Radosław Piliszek authored
Fix-feature following up on the original check [1] to make it test the correct interpreter. Additionally, this change removes last, unneeded call to random python - getting script directory is perfectly doable in bash. All checks are done from Python, not Ansible, due to its performance. Python version feels snappy (0.2 s to check), compared to sluggish Ansible (2.0 s to check). What is more, relying on Ansible would require hacky solutions to e.g. prevent custom config from interfering with it. We might be willing to steer Ansible from Python in the future anyhow. [1] Icf0399d21b3fde8d530d73e6e7ee4a57665da276 Change-Id: Ib8f2e6b6672e7c06aa94bc226c4d72640d25d8c2 Closes-Bug: #1856346
-
Christian Berendt authored
Erlang 22.x dropped support for HiPE so use of "rabbitmq_hipe_compile" is deprecated. Change-Id: I8e0173c7aa6204e5b4c60dafbb8b464482cae90b
-
ramboman authored
Adds necessary "region_name" to octavia.conf when "enable_barbican" is set to "true". Closes-Bug: #1867926 Change-Id: Ida61cef4b9c9622a5e925bac4583fba281469a39
-
- Apr 26, 2020
-
-
Radosław Piliszek authored
Since haproxy is orchestrated via site.yml in a single play, it does not need flushing handlers as handlers run will happen at the end of this play. Change-Id: Ia3743575da707325be93c39b4a2bcae9211cacb2 Related-Bug: #1864810 Closes-Bug: #1875228
-
- Apr 24, 2020
-
-
Nick Jones authored
Update Skydive Analyzer's configuration to use Keystone as its backend for authenticating users. Any user with a role in the project defined by the variable skydive_admin_tenant_name will be able to access Skydive. Change-Id: I64c811d5eb72c7406fd52b649fa00edaf2d0c07b Closes-Bug: 1870903
-
Mark Goddard authored
Adds a support matrix page to documentation. Change-Id: Ia783f7c42219617cde2accd3f1db013c9bda7679
-
James Kirsch authored
This patch introduces an optional backend encryption for Heat service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Heat service. Change-Id: Ic12f7574135dcaed2a462e902c775a55176ff03b Partially-Implements: blueprint add-ssl-internal-network Depends-On: https://review.opendev.org/722028/
-
- Apr 22, 2020
-
-
ya.wang authored
Add privileged capability to cyborg agent. Change-Id: Id237df1acb1b44c4e6442b39838058be1a95fcc6 Closes-bug: #1873715
-
- Apr 21, 2020
-
-
Jeffrey Zhang authored
Closes-Bug: 1873753 Change-Id: Ibf75b3fd3090d47b50c71d17f6c12177d16442ab
-
ya.wang authored
Change-Id: Id0f5809b50d0f6a0c96704e8f855d18f16f8de56 Closes-bug: #1874028
-
- Apr 20, 2020
-
-
ya.wang authored
Add placement auth configuration into cyborg conf. Closes-bug: #1873717 Change-Id: I476a878549507c5d46efef4f8639f57d89737e75
-
- Apr 17, 2020
-
-
Q.hongtao authored
Kolla Ansible was missing vitrage-persistor service required by Vitrage for data storage. Depends on fixing availability of Kolla image. Change-Id: I8158ba66b8b624f6bcb89da9c990a30a68b7187b Depends-On: Id5e143636f9a81e7294b775f3d8b9134bee58054 Closes-Bug: #1869319
-
Xing Zhang authored
It is unnecessary to add octavia user into admin project. Octavia project does not require this action. Like other projects, octavia user in service project with admin role is enough. [1] https://docs.openstack.org/octavia/latest/install/install-ubuntu.html [2] https://docs.openstack.org/octavia/latest/contributor/guides/dev-quick-start.html#production-deployment-walkthrough [3] https://github.com/openstack/octavia/blob/master/devstack/plugin.sh Closes-Bug: #1873176 Change-Id: I35d35177aaabfc6f0abc533a1f756b363bd02308
-
- Apr 16, 2020
-
-
Michal Nasiadka authored
Followup of last reviews from [1]. [1]: https://review.opendev.org/#/c/696841 Change-Id: I7085093b20e8848e09dc521ae9fbf120e909470d
-
zhangmeng authored
Change-Id: I4673f436d8943e6fce7e579446c27ec8215b7346
-
Jason Anderson authored
The "balance" keyword is not valid in a frontend section. From the HAProxy documentation[1]: balance <algorithm> [ <arguments> ] balance url_param <param> [check_post [<max_wait>]] Define the load balancing algorithm to be used in a backend. May be used in sections : defaults | frontend | listen | backend yes | no | yes | yes When running HAProxy using the "split" template style, where a frontend/backend pair are used instead of one listen section, HAProxy will emit warnings for the Horizon config due to this. [1]: https://www.haproxy.org/download/1.5/doc/configuration.txt Closes-Bug: #1872540 Change-Id: I91cee275d91a51944298618493f4ea0cd80282cc
-
lixuehai authored
This fixes Octavia in scenarios requiring providing CA cert (self-signed, internally-signed). Change-Id: I60b7ec85f4fd8bbacf5df0ab7ed9a00658c91871 Closes-Bug: #1872404
-
- Apr 15, 2020
-
-
Scott Solkhon authored
Change-Id: I22a995195a1d12bb759cba9777527c23475124f2
-