Skip to content
Snippets Groups Projects
  1. Jun 16, 2020
  2. Jun 15, 2020
    • James Kirsch's avatar
      Generate Root CA for Self-Signed Certificates · a982d3ac
      James Kirsch authored
      Update the certificate generation task to create a root CA for the
      self-signed certificates. The internal and external facing certificates
      are then generated using the root CA.
      
      Updated openstack_cacert to use system CA trust store in CI tests
      certificate by default.
      
      Change-Id: I6c2adff7d0128146cf086103ff6060b0dcefa37b
      Partially-Implements: blueprint add-ssl-internal-network
      a982d3ac
  3. Jun 02, 2020
  4. May 29, 2020
  5. May 23, 2020
    • Doug Szumski's avatar
      Switch to Monasca API for logs · b39a0f80
      Doug Szumski authored
      The Monasca Log API has been removed and in this change we switch
      to using the unified API. If dedicated log APIs are required then
      this can be supported through configuration. Out of the box the
      Monasca API is used for both logs and metrics which is envisaged to
      work for most use cases.
      
      In order to use the unified API for logs, we need to disable the
      legacy Kafka client. We also rename the Monasca API config file
      to remove a warning about using the old style name.
      
      Depends-On: https://review.opendev.org/#/c/728638
      Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
      b39a0f80
    • xiaojueguan's avatar
      Remove post_config from the Kibana role · fbc47e60
      xiaojueguan authored
      
      Since at least Stein, there is no visible effect from these tasks.
      The Kibana dashboard seems to be working exactly the same,
      greeting user on the first use with "please configure my index".
      I tested on both Ubuntu and CentOS.
      In new E*K stack (Ussuri+, CentOS8+) it even causes play errors.
      
      Co-authored-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      Change-Id: Iafc6986cce9cbaa0ea9e219ca85d7d01a61308cf
      Closes-Bug: #1799689
      fbc47e60
  6. May 21, 2020
  7. May 20, 2020
  8. May 19, 2020
  9. May 15, 2020
    • Will Szumski's avatar
      Improve fernet_token_expiry precheck · 810acea6
      Will Szumski authored
      The pre-check was broken, see bug report for details.
      
      Change-Id: I089f1e288bae6c093be66181c81a4373a6ef3de4
      Closes-Bug: #1856021
      810acea6
    • Jeffrey Zhang's avatar
      Configure RabbitMQ user tags in nova-cell role · 869e3f21
      Jeffrey Zhang authored
      The RabbitMQ 'openstack' user has the 'administrator' tag assigned via
      the RabbitMQ definitions.json file.
      
      Since the Train release, the nova-cell role also configures the RabbitMQ
      user, but omits the tag. This causes the tag to be removed from the
      user, which prevents it from accessing the management UI and API.
      
      This change adds support for configuring user tags to the
      service-rabbitmq role, and sets the administrator tag by default.
      
      Change-Id: I7a5d6fe324dd133e0929804d431583e5b5c1853d
      Closes-Bug: #1875786
      869e3f21
  10. May 13, 2020
    • James Kirsch's avatar
      Add support for encrypting Barbican API · 2e08ffd6
      James Kirsch authored
      This patch introduces an optional backend encryption for the Barbican
      API service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Barbican service.
      
      Change-Id: I62a43b36ebe4a03230bf944980b45e4b6938871b
      Partially-Implements: blueprint add-ssl-internal-network
      2e08ffd6
  11. May 11, 2020
    • Will Szumski's avatar
      Add extras directory to prometheus config · d05578f5
      Will Szumski authored
      This provides a generic mechanism to include extra files
      that you can reference in prometheus.yml, for example:
      
      scrape_targets:
        - job_name: ipmi
          params:
            module: default
          scrape_interval: 1m
          scrape_timeout: 30s
          metrics_path: /ipmi
          scheme: http
          file_sd_configs:
          - files:
            - /etc/prometheus/extras/file_sd/ipmi-exporter-targets.yml
            refresh_interval: 5m
      
      Change-Id: Ie2f085204b71725b901a179ee51541f1f383c6fa
      Related: blueprint custom-prometheus-targets
      d05578f5
    • Will Szumski's avatar
      Support customizing prometheus.cfg files · 956a29f8
      Will Szumski authored
      This provides a mechanism to scrape targets defined outside of kolla-ansible.
      
      Depends-On: https://review.opendev.org/#/c/685671/
      Change-Id: I0950341b147bb374b4128f09f807ef5a756f5dfa
      Related: blueprint custom-prometheus-targets
      956a29f8
  12. May 05, 2020
  13. Apr 30, 2020
    • James Kirsch's avatar
      Add support for encrypting Horizon and Placement API · e3d5a91a
      James Kirsch authored
      This patch introduces an optional backend encryption for Horizon and
      Placement services. When used in conjunction with enabling TLS for
      service API endpoints, network communcation will be encrypted end to
      end, from client through HAProxy to the Horizon and Placement services.
      
      Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d
      Partially-Implements: blueprint add-ssl-internal-network
      e3d5a91a
    • James Kirsch's avatar
      Add support for encrypting Glance api · f87814f7
      James Kirsch authored
      Add TLS support for Glance api using HAProxy to perform TLS termination.
      
      Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809
      Partially-Implements: blueprint add-ssl-internal-network
      f87814f7
    • Hongbin Lu's avatar
      Zun: Add zun-cni-daemon to compute node · 91678f67
      Hongbin Lu authored
      Zun has a new component "zun-cni-daemon" which should be
      deployed in every compute nodes. It is basically an implementation
      of CNI (Container Network Interface) that performs the neutron
      port binding.
      
      If users is using the capsule (pod) API, the recommended deployment
      option is using "cri" as capsule driver. This is basically to use
      a CRI runtime (i.e. CRI plugin for containerd) for supporting
      capsules (pods). A CRI runtime needs a CNI plugin which is what
      the "zun-cni-daemon" provides.
      
      The configuration is based on the Zun installation guide [1].
      It consits of the following steps:
      * Configure the containerd daemon in the host. The "zun-compute"
        container will use grpc to communicate with this service.
      * Install the "zun-cni" binary at host. The containerd process
        will invoke this binary to call the CNI plugin.
      * Run a "zun-cni-daemon" container. The "zun-cni" binary will
        communicate with this container via HTTP.
      
      Relevant patches:
      Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime
      Install guide: https://review.opendev.org/#/c/707948/
      Devstack plugin: https://review.opendev.org/#/c/705338/
      Kolla image: https://review.opendev.org/#/c/708273/
      
      [1] https://docs.openstack.org/zun/latest/install/index.html
      
      Depends-On: https://review.opendev.org/#/c/721044/
      Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
      91678f67
  14. Apr 29, 2020
  15. Apr 28, 2020
  16. Apr 27, 2020
    • Radosław Piliszek's avatar
      Check that used Ansible can see Kolla Ansible · 32fc2599
      Radosław Piliszek authored
      Fix-feature following up on the original check [1] to make it
      test the correct interpreter.
      
      Additionally, this change removes last, unneeded call to
      random python - getting script directory is perfectly
      doable in bash.
      
      All checks are done from Python, not Ansible, due to its
      performance. Python version feels snappy (0.2 s to check),
      compared to sluggish Ansible (2.0 s to check).
      What is more, relying on Ansible would require hacky solutions
      to e.g. prevent custom config from interfering with it.
      We might be willing to steer Ansible from Python in the future
      anyhow.
      
      [1] Icf0399d21b3fde8d530d73e6e7ee4a57665da276
      
      Change-Id: Ib8f2e6b6672e7c06aa94bc226c4d72640d25d8c2
      Closes-Bug: #1856346
      32fc2599
    • Christian Berendt's avatar
      Deprecate rabbitmq_hipe_compile · 19564b15
      Christian Berendt authored
      Erlang 22.x dropped support for HiPE so use of "rabbitmq_hipe_compile"
      is deprecated.
      
      Change-Id: I8e0173c7aa6204e5b4c60dafbb8b464482cae90b
      19564b15
    • ramboman's avatar
      [octavia] Adds region_name if enable_barbican · 6c372312
      ramboman authored
      Adds necessary "region_name" to octavia.conf when
      "enable_barbican" is set to "true".
      
      Closes-Bug: #1867926
      
      Change-Id: Ida61cef4b9c9622a5e925bac4583fba281469a39
      6c372312
  17. Apr 26, 2020
    • Radosław Piliszek's avatar
      Fix haproxy restarting twice per Ansible run · 04effaa9
      Radosław Piliszek authored
      Since haproxy is orchestrated via site.yml in a single play,
      it does not need flushing handlers as handlers run will
      happen at the end of this play.
      
      Change-Id: Ia3743575da707325be93c39b4a2bcae9211cacb2
      Related-Bug: #1864810
      Closes-Bug: #1875228
      04effaa9
  18. Apr 24, 2020
    • Nick Jones's avatar
      [skydive] fix: Use Keystone backend to authenticate API users · 7e5aa637
      Nick Jones authored
      Update Skydive Analyzer's configuration to use Keystone as its backend
      for authenticating users.  Any user with a role in the project defined
      by the variable skydive_admin_tenant_name will be able to access
      Skydive.
      
      Change-Id: I64c811d5eb72c7406fd52b649fa00edaf2d0c07b
      Closes-Bug: 1870903
      7e5aa637
    • Mark Goddard's avatar
      Add docs and release note for CentOS 8 · 8cf8ab4e
      Mark Goddard authored
      Adds a support matrix page to documentation.
      
      Change-Id: Ia783f7c42219617cde2accd3f1db013c9bda7679
      8cf8ab4e
    • James Kirsch's avatar
      Add support for encrypting heat api · ff842922
      James Kirsch authored
      This patch introduces an optional backend encryption for Heat
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Heat service.
      
      Change-Id: Ic12f7574135dcaed2a462e902c775a55176ff03b
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/722028/
      ff842922
  19. Apr 22, 2020
  20. Apr 21, 2020
  21. Apr 20, 2020
  22. Apr 17, 2020
  23. Apr 16, 2020
    • Michal Nasiadka's avatar
      OVN: Followup changes · ca380e6d
      Michal Nasiadka authored
      Followup of last reviews from [1].
      
      [1]: https://review.opendev.org/#/c/696841
      
      Change-Id: I7085093b20e8848e09dc521ae9fbf120e909470d
      ca380e6d
    • zhangmeng's avatar
      Add support for encrypting cinder api. · c8ada707
      zhangmeng authored
      Change-Id: I4673f436d8943e6fce7e579446c27ec8215b7346
      c8ada707
    • Jason Anderson's avatar
      [horizon] Move 'balance' HAProxy keyword · 5c760df3
      Jason Anderson authored
      The "balance" keyword is not valid in a frontend section. From the
      HAProxy documentation[1]:
      
      balance <algorithm> [ <arguments> ]
      balance url_param <param> [check_post [<max_wait>]]
        Define the load balancing algorithm to be used in a backend.
        May be used in sections :   defaults | frontend | listen | backend
                                       yes   |    no    |   yes  |   yes
      
      When running HAProxy using the "split" template style, where a
      frontend/backend pair are used instead of one listen section, HAProxy
      will emit warnings for the Horizon config due to this.
      
      [1]: https://www.haproxy.org/download/1.5/doc/configuration.txt
      
      Closes-Bug: #1872540
      Change-Id: I91cee275d91a51944298618493f4ea0cd80282cc
      5c760df3
    • lixuehai's avatar
      Fix Octavia CA cert paths · ea4505f1
      lixuehai authored
      This fixes Octavia in scenarios requiring providing
      CA cert (self-signed, internally-signed).
      
      Change-Id: I60b7ec85f4fd8bbacf5df0ab7ed9a00658c91871
      Closes-Bug: #1872404
      ea4505f1
  24. Apr 15, 2020
Loading