- Apr 16, 2020
-
-
Mark Goddard authored
If using a separate message queue for nova notifications, i.e. nova_cell_notify_transport_url is different from nova_cell_rpc_transport_url, then Kolla Ansible will unnecessarily update the cell. This should not cause any issues since the URL is taken from nova.conf. This change fixes the comparison to use the correct URL. Change-Id: I5f0e30957bfd70295f2c22c86349ebbb4c1fb155 Closes-Bug: #1873255
-
Zuul authored
-
- Apr 15, 2020
- Apr 14, 2020
- Apr 13, 2020
-
-
Radosław Piliszek authored
etcd via tooz does not support group membership required by Designate coordination. The best k-a can do is not to configure etcd in Designate. Change-Id: I2f64f928e730355142ac369d8868cf9f65ca357e Closes-bug: #1872205 Related-bug: #1840070
-
- Apr 12, 2020
- Apr 11, 2020
-
-
Rafael Weingärtner authored
Allow operators to use custom parameters with the ceilometer-upgrade command. This is quite useful when using the dynamic pollster subsystem; that sub-system provides flexibility to create and edit pollsters configs, which affects gnocchi resource-type configurations. However, Ceilometer uses default and hard-coded resource-type configurations; if one customizes some of its default resource-types, he/she can get into trouble during upgrades. Therefore, the only way to work around it is to use the "--skip-gnocchi-resource-types" flag. This PR introduces a method for operators to execute such customization, and many others if needed. Depends-On: https://review.opendev.org/#/c/718190/ Change-Id: I92f0edba92c9e3707d89b3ff4033ac886b29cf6d
-
Zuul authored
-
- Apr 10, 2020
-
-
Zuul authored
-
Marcin Juszkiewicz authored
AArch64 does not have a way to get cpu features from libvirt. Change-Id: Ieed404e17e8a9829f38c03f7ee7fdb3caa3919e8
-
Marcin Juszkiewicz authored
AArch64 needs a bit more time to boot testing instance. So give it more time by doubling amount of connect attempts. Change-Id: I87ca65691dfbac84349e8af24d2f36f1db1c8be1
-
Radosław Piliszek authored
This is the directory used by Visual Studio Code for customized workspace preferences. Change-Id: I8bf38a5b3b8a4fe89e6b0c611e8dcb4b9a9f3302
-
Xing Zhang authored
mistralclient osc plugin does not support cacert and insecure [1] mistralclient interface support fixed in [2] [1] https://bugs.launchpad.net/python-mistralclient/+bug/1715091 [2] https://review.opendev.org/#/q/topic:bug/1854339 Change-Id: I44726b12358bc3c5898ba952371fb838693aca2c
-
Zuul authored
-
Jeffrey Zhang authored
Change-Id: I137b4f6b229d9ef34ed5be0bc4c4828ed655269e Closes-Bug: #1872008
-
- Apr 09, 2020
-
-
Zuul authored
-
Dincer Celik authored
Some services look for /etc/timezone on Debian/Ubuntu, so we should introduce it to the containers. In addition, added prechecks for /etc/localtime and /etc/timezone. Closes-Bug: #1821592 Change-Id: I9fef14643d1bcc7eee9547eb87fa1fb436d8a6b3
-
John Garbutt authored
In kolla ansible we typically configure services to communicate via IP addresses rather than hostnames. One accidental exception to this was live migration, which used the hostname of the destination even when not required (i.e. TLS not being used for libvirt). To make such hostnames work, k-a adds entries to /etc/hosts in the bootstrap-servers command. Alternatively users may provide DNS. One problem with using /etc/hosts is that, if a new compute host is added to the cloud, or an IP address is changed, that will not be reflected in the /etc/hosts file of other hosts. This would cause live migration to the new host from an old host to fail, as the name cannot be resolved. The workaround for this was to update the /etc/hosts file (perhaps via bootstrap-servers) on all hosts after adding new compute hosts. Then the nova_libvirt container had to be restarted to pick up the change. Similarly, if user has overridden the migration_interface, the used hostname could point to a wrong address on which libvirt would not listen. This change adds the live_migration_inbound_addr option to nova.conf. If TLS is not in use for libvirt, this will be set to the IP address of the host on the migration network. If TLS is enabled for libvirt, live_migration_inbound_addr will be set to migration_hostname, since certificates will typically reference the hostname rather than the host's IP. With libvirt TLS enabled, DNS is recommended to avoid the /etc/hosts issue which is likely the case in production deployments. Change-Id: I0201b46a9fbab21433a9f53685131aeb461543a8 Closes-Bug: #1729566
-
Zuul authored
-
James Kirsch authored
This patch introduces an optional backend encryption for Keystone service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Keystone service. Change-Id: I6351147ddaff8b2ae629179a9bc3bae2ebac9519 Partially-Implements: blueprint add-ssl-internal-network
-
Michal Nasiadka authored
Implement OVN Ansible role. Implements: blueprint ovn-controller-neutron-ansible Depends-On: https://review.opendev.org/713422 Change-Id: Icd425dea85d58db49c838839d8f0b864b4a89a78
-
- Apr 08, 2020
-
-
Mark Goddard authored
This is a follow up to I001defc75d1f1e6caa9b1e11246abc6ce17c775b. To maintain previous behaviour, and ensure we catch any host configuration changes, we should perform host configuration during upgrade. Change-Id: I79fcbf1efb02b7187406d3c3fccea6f200bcea69 Related-Bug: #1860161
-
- Apr 06, 2020
-
-
Jason Anderson authored
Elasticsearch 6.x dropped support for mapping types[1], which by default the Kibana index used. This means that when deploying ELK 6.x, the Kibana index must be migrated to the new schema to preserve dashboards and visualizations. There is a process defined[2], which involves creating a new index with the specified schema, then reindexing the old index's data into the new index, then doing a rename/delete. This adds support for that workflow via Ansible. It takes place after the ES container is restarted after an upgrade, so there will be a (short) period of time where the Kibana index is not migrated. During this time, Kibana still loads, but presents the user with a status screen informing that the index needs migration. [1]: https://www.elastic.co/guide/en/elasticsearch/reference/6.x/removal-of-types.html [2]: https://www.elastic.co/guide/en/kibana/6.x/migrating-6.0-index.html Implements: blueprint elasticsearch-kibana-version-upgrade Depends-On: https://review.opendev.org/709624 Change-Id: I4550629e2113f3da7f1cecfeab0d5fe0d899dae8
-
Jason Anderson authored
This updates the elasticsearch configuration file (and loading mechanism) for ELK 6.x. The default location for the configuration for all package distributions is /etc/elasticsearch[1], so now that is where we overwrite the elasticsearch.yml. The path.conf and path.scripts paths are no longer supported and will raise exceptions if utilized in 6.x. [1]: https://www.elastic.co/guide/en/elasticsearch/reference/6.x/settings.html#config-files-location Implements: blueprint elasticsearch-kibana-version-upgrade Depends-On: https://review.opendev.org/#/c/647748/ Change-Id: I4f74bfe07d4b7ca18953b11e767cf0bb94dfd67e
-
Zuul authored
-
- Apr 05, 2020
-
-
Zuul authored
-
Zuul authored
-
linpeiwen authored
manila share container name variable is fixed in some places, but in the defaults directory, manila share container_name variable is variable. If the manila share container_name variable is changed during deployment, it will not be assigned to container name, but a fixed 'manila_share' name. Change-Id: Iea23c62518add8d6820b76b16edd3221906b0ffb
-
- Apr 04, 2020
-
-
Zuul authored
-
Andreas Jaeger authored
The repo is Python 3 now, so update hacking to version 3.0 which supports Python 3. Fix problems found by updated hacking version. Remove hacking and friends from lower-constraints, they are not needed during installation. Change-Id: I7ef5ac8a89e94f5da97780198619b6facc86ecfe
-
Zuul authored
-
- Apr 03, 2020
-
-
Radosław Piliszek authored
We don't need tox nor tell our users to use it when doing kolla builds. Tox is going away from base infra images. It's already gone from aarch64 (arm64) ones. Change-Id: I2eb5203ad93c011b8806f4b6fb56db081c14a2cb
-
Mark Goddard authored
The use of default(omit) is for module parameters, not templates. We define a default value for openstack_cacert, so it should never be undefined anyway. Change-Id: Idfa73097ca168c76559dc4f3aa8bb30b7113ab28
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
- Apr 02, 2020
-
-
Zuul authored
-