- Nov 12, 2021
-
-
Michal Arbet authored
This patch adding way to change schedule for logrotate. Depends-On: https://review.opendev.org/c/openstack/kolla/+/813008 Change-Id: I033c51704bfb806f6515db26b8159fae12469ba5
-
- Oct 01, 2021
-
-
Mark Goddard authored
Updates the default value of 'monasca_ntp_server' from 'external_ntp_servers[0]' to '0.pool.ntp.org'. This is due to the removal of the 'external_ntp_servers' variable as part of the removal of Chrony deployment. Change-Id: I2e7538a2e95c7b8e9280eb051ee634b4313db129
-
- Sep 30, 2021
-
-
wu.chunyang authored
chrony is not supported in Xena cycle, remove it from kolla Moved tasks from chrony role to chrony-cleanup.yml playbook to avoid a vestigial chrony role. Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Change-Id: I5a730d55afb49d517c85aeb9208188c81e2c84cf
-
Mark Goddard authored
* Register Swift-compatible endpoints in Keystone * Load balance across RadosGW API servers using HAProxy The support is exercised in the cephadm CI jobs, but since RGW is not currently enabled via cephadm, it is not yet tested. https://docs.ceph.com/en/latest/radosgw/keystone/ Implements: blueprint ceph-rgw Change-Id: I891c3ed4ed93512607afe65a42dd99596fd4dbf9
-
Mark Goddard authored
Source images get the most test coverage, so it makes sense to deploy these by default. Change-Id: I8d0c8750e2c1600e84cc2e677a4eae0e9f502dac
-
- Sep 28, 2021
-
-
Niklas Hagman authored
A system-scoped token implies the user has authorization to act on the deployment system. These tokens are useful for interacting with resources that affect the deployment as a whole, or exposes resources that may otherwise violate project or domain isolation. Since Queens, the keystone-manage bootstrap command assigns the admin role to the admin user with system scope, as well as in the admin project. This patch transitions the Keystone admin user from authenticating using project scoped tokens to system scoped tokens. This is a necessary step towards being able to enable the updated oslo policies in services that allow finer grained access to system-level resources and APIs. An etherpad with discussion about the transition to the new oslo service policies is: https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585 Signed-off-by:
Niklas Hagman <ubuntu@post.blinkiz.com>
-
- Sep 27, 2021
-
-
Radosław Piliszek authored
Closes-Bug: #1945070 Change-Id: I1b2a82b57cb9884b6c3c3ad07f6449ae29042a3d
-
- Sep 26, 2021
-
-
Michal Arbet authored
This patch adding option to control weight of haproxy backends per service via host variable. Example: [control] server1 haproxy_nova_api_weight=10 server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10 server3 haproxy_keystone_admin_weight=50 If weight is not defined, everything is working as before. Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
-
- Sep 23, 2021
-
-
Michał Nasiadka authored
This change bumps up max supported Ansible version to 4.x (ansible-core 2.11.x) and minimum to 2.10. Change-Id: I8b9212934dfab3831986e8db55671baee32f4bbd
-
- Sep 22, 2021
-
-
Piotr Parczewski authored
Change-Id: I16fdb2f93ddb656eeacd3f2b84190f9bdcfaa21c
-
- Sep 21, 2021
-
-
Michal Arbet authored
This patch is adding --check and --diff options to kolla-ansible, which cause that kolla-ansible run will be more verbose and able to run in semi dry-run mode. The --diff option for kolla-ansible can be used alone or with --check. When you run in diff mode, any module that supports diff mode reports the changes made or, if used with --check, the changes that would have been made. Diff mode is most common in modules that manipulate files (for example, the template module) but other modules might also show ‘before and after’ information (for example, the user module). For more information check [1]. [1] https://docs.ansible.com/ansible/latest/user_guide/playbooks_checkmode.html#using-diff-mode Change-Id: Ifb82ea99e5af82540e938eab9e2a442b2820d7df
-
Mark Goddard authored
This allows one variable to specify the tag for all MariaDB images. Change-Id: I164cdd41787f8bd52d8e08cb380d42625a8bbd84 TrivialFix
-
- Sep 20, 2021
-
-
Radosław Piliszek authored
Closes-Bug: #1944114 Change-Id: Idd525fda7ff94f70794f4c582cd74470c7f40fae
-
- Sep 16, 2021
-
-
Radosław Piliszek authored
Docs adapted to match. Removed the unsupported-for-quay option to set up a pull-through cache. Closes-Bug: #1942134 Change-Id: If5a26b1ba4bf35bc29306c24f608396dbf5e3371
-
Michal Arbet authored
Haproxy was renamed in [1]. [1] https://review.opendev.org/c/openstack/kolla-ansible/+/770618 Change-Id: Ib2d7f0774fede570a8c4c315d83afd420c31da0b
-
- Sep 07, 2021
-
-
Michał Nasiadka authored
Currently only operations done with default kolla_toolbox user are logged to /var/log/kolla/ansible.log. In order to fix logging, permissions to ansible.log must allow writing for other users in kolla group - and then a separate patch will follow to make custom ansible.cfg file usable by other toolbox users. Partial-Bug: #1942846 Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
-
- Sep 03, 2021
-
-
Radosław Piliszek authored
This is required for libvirtd with cgroupsv2 (Debian Bullseye and soon others). Otherwise, device attachments simply fail. The warning message suggests filtering will be disabled but it actually just fails the action entirely. Change-Id: Id1fbd49a31a6e6e51b667f646278b93897c05b21 Closes-Bug: #1941940
-
- Sep 02, 2021
-
-
Piotr Parczewski authored
corrected nits from: https://review.opendev.org/c/openstack/kolla-ansible/+/800068 https://review.opendev.org/c/openstack/kolla-ansible/+/803644 Change-Id: Ia30afd795067a36b132a8c75c72dd7c65d624a83
-
- Aug 30, 2021
-
-
Radosław Piliszek authored
It was removed in [1] as part of cgroupsv2 cleanup. However, the testing did not catch the fact that the legacy cgroups behaviour was actually still breaking despite latest Docker and setting to use host's cgroups namespace. [1] 286a03ba Closes-Bug: #1941706 Change-Id: I629bb9e70a3fd6bd1e26b2ca22ffcff5e9e8c731
-
- Aug 25, 2021
-
-
Mark Goddard authored
In some situations it may be helpful to populate the fact cache on demand. The 'kolla-ansible gather-facts' command may be used to do this. One specific case where this may be helpful is when running kolla-ansible with a --limit argument, since in that case hosts that match the limit will gather facts for hosts that fall outside the limit. In the extreme case of a limit that matches only one host, it will serially gather facts for all other hosts. To avoid this issue, run 'kolla-ansible gather-facts' without a limit to populate the fact cache in parallel before running the required command with a limit. Change-Id: I79db9bca23aa1bd45bafa7e7500a90de5a684593
-
- Aug 20, 2021
-
-
Radosław Piliszek authored
to behave like it is most commonly expected - query Nova in the same region. Closes-Bug: #1939291 Change-Id: I584a83d352c747a799b5dab1d3b8159ba3805454
-
Radosław Piliszek authored
To follow best security practices and help fellow operators. More details inline and in the linked bug report. Closes-Bug: #1940547 Change-Id: Ide9e9009a6e272f20a43319f27d257efdf315f68
-
- Aug 19, 2021
-
-
Radosław Piliszek authored
Sometimes, the registries may intermittently fail to deliver the images. This is often seen in the CI, though it also happens with production deployments, even those with internal registries and/or registry mirrors - due to sheer load when trying to pull the images from many hosts. This patchs adds two new vars to control retry behaviour. The default has been set to make users happier by default. :-) Change-Id: I81ad7d8642654f8474f11084c6934aab40243d35
-
- Aug 18, 2021
-
-
Marc 'risson' Schmitt authored
Signed-off-by:
Marc 'risson' Schmitt <marc.schmitt@risson.space> Closes-Bug: #1940286 Change-Id: I647f8615e9fd0cc0db7c737ce4afbd1bdd0d40d4
-
- Aug 17, 2021
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for keystone-fernet container. It checks if "key 0" has right permissions, and if rsync is able to distribute keys to other keystones. Implements: blueprint container-health-check Change-Id: I17bea723d4109e869cd05d211f6f8e4653f46e17
-
- Aug 16, 2021
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for nova-spicehtml5proxy service. Implements: blueprint container-health-check Change-Id: I584c588c20781e6c6567429811aecf97967baea3
-
- Aug 13, 2021
-
-
Jan Horstmann authored
Certain overrides for rabbitmq may need to be set for `rabbitmqctl` in kolla-toolbox aswell. This commit allows to override `rabbitmq-env.conf` and `erl_inetrc` in kolla-toolbox. Change-Id: Idef6adcf9700f75a2db503444a8de093ee21a9c5
-
Radosław Piliszek authored
Closes-Bug: #1939883 Change-Id: Ica311acba445cccac1d20757ced6f15a064ebcaa
-
- Aug 12, 2021
-
-
Michal Arbet authored
Kolla-ansible upgrade task is calling different handlers as deploy task and these handlers are missing healthcheck key. This patch is fixing this. Closes-Bug: #1939679 Change-Id: Id83d20bfd89c27ccf70a3a79938f428cdb5d40fc
-
- Aug 10, 2021
-
-
Radosław Piliszek authored
We get a nice optimisation by using a filtered loop instead of task skipping per service with 'when'. Partially-Implements: blueprint performance-improvements Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
-
- Aug 09, 2021
-
-
Doug Szumski authored
This patch adds support for integrating Prometheus with Fluentd. This can be used to extract useful information about the status of Fluentd, such as output buffer capacity and logging rate, and also to extract metrics from logs via custom Fluentd configuration. More information can be found here in [1]. [1] https://docs.fluentd.org/monitoring-fluentd/monitoring-prometheus Change-Id: I233d6dd744848ef1f1589a462dbf272ed0f3aaae
-
Mark Goddard authored
Change-Id: I0103d7ef55e6aebe043a582d36f1a2efa137f447
-
Mark Goddard authored
Missing comma in config.json template rendered invalid JSON with VMware plugin agent. Closes-Bug: #1939080 Change-Id: I3d0c6421e3da7e1e753b99cf87c32fc238a21523
-
- Aug 06, 2021
-
-
Ilya Popov authored
Basically, there are three main installation scenario: Scenario 1: Ironic installation together with other openstack services including keystone. In this case variable enable_keystone is set to true and keystone service will be installed together with ironic installation. It is possible realise this scenario, no fix needed Scenario 2: Ironic installation with connection to already installed keystone. In this scenario we have to set enable_keystone to “No” to prevent from new keystone service installation during the ironic installation process. But in other hand, we need to have correct sections in ironic.conf to provide all information needed to connect to existing keystone. But all sections for keystone are added to ironic.conf only if enable_keystone var is set to “Yes”. It isn’t possible to realise this scenario. Proposed fix provide support for this scenario, where multiple regions share the same keystone service. Scenario 3: No keystone integration. Ironic don't connect to Keystone. It is possible realise this scenario, no fix needed Proposed solution also keep the default behaviour: if no enable_keystone_integration is manually defined by default it takes value of enable_keystone variable and all behaviour is the same. But if we don't want to install keystone and want to connect to existing one at the same time, it will be possible to set enable_keystone var to “No” (preventing keystone from installation) and at the same time set ironic_enable_keystone_integration to Yes to allow needed section appear in ironic.conf through templating. Change-Id: I0c7e9a28876a1d4278fb2ed8555c2b08472864b9
-
Piotr Parczewski authored
Change-Id: Ib9ea83dd0019a4c4703e673a783c45ab07afe4e7
-
- Aug 05, 2021
-
-
Piotr Parczewski authored
Change-Id: I0d7c7f47e6653cf2903589a9c86798a8c6404af5
-
- Aug 02, 2021
-
-
Michal Arbet authored
This patch is fixing docker healthcheck for horizon by changing value of horizon_listen_port, so both apache's virtualhost and healthcheck will have same correct port always. Also removing useless apache's redirect as all redirects are done on haproxy side. Closes-Bug: #1933846 Change-Id: Ibb5ad1a5d1bbc74bcb62610d77852d8124c4a323
-
Michal Arbet authored
Kolla-ansible install python docker library in role/baremetal to group/baremetal, because of this get container facts for timesync checks is failing on deployment host. This patch adding when conditional, so deployment host will be skipped as there is no need to run timesync checks. Closes-Bug: #1933347 Change-Id: Ifefb9c74ee6a80cdbc458992d0196850ddfe7ffa
-
Michal Arbet authored
This trivial patch is setting "timeout tunnel" in haproxy's configuration for spicehtml5proxy. This option extends time when spice's websocket connection is closed, so spice will not be freezed. Default value is set to 1h as it is in novnc. Closes-Bug: #1938549 Change-Id: I3a5cd98ecf4916ebd0748e7c08111ad0e4dca0b2
-
- Jul 29, 2021
-
-
Will Szumski authored
Multiple inventories can now be passed to `kolla-ansible`. This can be useful to construct a common inventory that is shared between multiple environments. Change-Id: I2ac5d7851b310bea2ba362b353f18c592a0a6a2e
-