- May 13, 2022
-
-
Simon Dodsley authored
Add an enable_cinder_backend_pure_iscsi and enable_cinder_backend_pure_fc options to etc/kolla/globals.yml to enable use of the FlashArray backend. Update the documentation to include a section on configuring Cinder with the FlashArray. Implements: blueprint pure-cinder-driver Change-Id: I464733f1322237321ed1ffff8636cf30bd1cbb38
-
- May 02, 2022
-
-
Pierre Riteau authored
This is a follow up to I7e5c1e20c7b66b64cbd333f669ef8d8da60daaa8. Change-Id: I11a86f59c1fb9cddde3370b544ee7bf4e8ae4fb4
-
- Apr 24, 2022
-
-
Christian Berendt authored
With the parameter bifrost_deploy_verbosity it is possible to set the verbosity of the bootstrap of Bifrost. This makes it possible to reduce verbosity when running /bifrost/playbooks/install.yaml if needed. Change-Id: I5815220f2193a492ae7e1f63443075790ae7aaef
-
- Apr 22, 2022
-
-
Mark Goddard authored
We run some nova tasks once per cell, using a condition to match a single host in the cell. In other similar tasks, we use run_once, which will fail all hosts if the task fails. Typically these tasks are critical, and that is desirable. However, with the approach used in nova-cell to support multiple cells, if a once-per-cell task fails, then other hosts will continue to execute, which could lead to unexpected results. This change adds any_errors_fatal to the plays or blocks that run these tasks. Closes-Bug: #1948694 Change-Id: I2a5871ccd4e8198171ef3239ce95f475f3e4b051
-
- Apr 21, 2022
-
-
Christian Berendt authored
Change-Id: Ide82b7a7fa6752b60f2c9c31cdc4c79183fc62f6
-
- Apr 20, 2022
-
-
Marcin Juszkiewicz authored
We have only one value for install_type now and it gets removed from image names. Change-Id: I8bf95fd7aa9dd26b80d618ca0fcb097003b4cb0a
-
- Apr 16, 2022
-
-
LinPeiWen authored
In fluentd v1.0, "format" became a deprecated parameter, replaced by "<parse>" Change-Id: I0825e81fcd90fbc7f64c8df3ea9ae199ad79294a
-
- Apr 15, 2022
-
-
Will Szumski authored
This uses the same approach as the mariadb role (and others). Closes-Bug: #1928193 Co-Authored-By:
John Garbutt <johng@stackhpc.com> Change-Id: I79a7a8c80327cfd9ef31d17fe71f450a181a638c
-
- Apr 13, 2022
-
-
Juan Pablo Suazo authored
Adds the ability to configure the Prometheus Pushgateway options alongside the rest of kolla-ansible's configurations. Closes-Bug: #1968597 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: I2d20288267ceda95076229628db10299ddbde31f
-
Maksim Malchuk authored
Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the configuration of the corresponding 'dhcp-range' and 'dhcp-option' blocks in Ironic Inspector dnsmasq for multiple ranges. The old parameters 'ironic_dnsmasq_dhcp_range' and 'ironic_dnsmasq_default_gateway' used for the only range are now removed. This change implements the same solution used in the TripleO several years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649 fix for lease time. The value can be changed globally or per range. Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
Christian Berendt authored
Currently the ovs-dpdkctl.sh file is present in the tools directory and the "Copying ovs-dpdkctl tool" task accesses it. This is bad practice. Files copied from a role should either be referenced by an absolute path or be part of the role itself. This change moves the ovs-dpdkctl.sh file in the files directory of the role. Change-Id: I01459d39207e54f270f32f37b4a5153c5a819347
-
- Apr 12, 2022
-
-
Bernd Mueller authored
Signed-off-by:
Bernd Mueller <mueller@b1-systems.de> Change-Id: I90d98be9dfb14942ffb4f5293cf52a96a643ee90
-
- Apr 08, 2022
-
-
Marcin Juszkiewicz authored
Change-Id: I562fa187094f212003d0b17d20675f771cf082e6
-
- Apr 06, 2022
-
-
Radosław Piliszek authored
Change-Id: Icc13e3607c6d1dfa4e12d1ceaf9ea5546a22a12b
-
Radosław Piliszek authored
Change-Id: I2ae1a402e723cd1063618d1b9fb18f6adb27a390
-
Radosław Piliszek authored
Change-Id: I8e4096d7136d0ce9e54f1af0bb9ba110487fb35b
-
Radosław Piliszek authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/832163 Change-Id: Ia2dba1854e925041ae23c731273b810bb2d5ec30
-
- Apr 05, 2022
-
-
Marcin Juszkiewicz authored
As we have only source image type then we do not need to handle other option. Change-Id: I753aa0182cfc975bb8b5cd1476ab2c336a7691fa
-
Mark Goddard authored
This change addresses an issue in the nova-libvirt-cleanup command, added in I46854ed7eaf1d5b5e3ccd8531c963427848bdc99. Check for rc=1 pgrep command, since a lack of matches is a pass. Also, use bash for set -o pipefail. Change-Id: Iffda0dfffce8768324ffec55e629134c70e2e996
-
- Apr 01, 2022
-
-
Pierre Riteau authored
The main venus group should not be in the group providing additional control of service placement. Change-Id: I569254077d5ef9814c99bbcc7fafd7be3bacad67
-
- Mar 30, 2022
-
-
Michal Nasiadka authored
This key can be used by users in networking-generic-switch scenario instead of adding cleartext password in ml2_conf.ini. Change-Id: I10003e6526a55a97f22678ab81c411e4645c5157
-
- Mar 29, 2022
-
-
Mark Goddard authored
If any nova compute service fails to register itself, Kolla Ansible will fail the host that queries the Nova API. This is the first compute host in the inventory, and fails in the task: Waiting for nova-compute services to register themselves Other hosts continue, often leading to further errors later on. Clearly this is not idea. This change modifies the behaviour to query the compute service list until all expected hosts are present, but does not fail the querying host if they are not. A new task is added that executes for all hosts, and fails only those hosts that have not registered successfully. Alternatively, to fail all hosts in a cell when any compute service fails to register, set nova_compute_registration_fatal to true. Change-Id: I12c1928cf1f1fb9e28f1741e7fe4968004ea1816 Closes-Bug: #1940119
-
- Mar 28, 2022
-
-
wangxiyuan authored
openEuler is the newest open source operating system, which is quite famous and widely used in China. This patch aims to add the OS support in kolla-ansible for the host OS. bp: support-openeuler-os Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830320 Change-Id: I66dc84f02c324dbc0787ec25d4bd92ada9362e94
-
- Mar 25, 2022
-
-
Juan Pablo Suazo authored
Adds a new configuration file that provides fluentd with an appropiate regex to match with OpenvSwitch logs in both default files. The regex is segmented with variable as to isolate the relevant parts of each log message. Closes-Bug: #1965815 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: Ife83c50c048d517a5c8a5dee588f8f7846fcee00
-
Jan Horstmann authored
This commit changes the indentation scheme used in `ansible/roles/grafana/templates/provisioning.yaml.j2` to the commonly used pattern of two whitespaces. Change-Id: I2f9d34930ed06aa2e63f7cc28bfdda7046fc3e67
-
- Mar 24, 2022
-
-
Sven Kieske authored
this adds back the ability to configure the rabbitmq/erlang kernel network interface which was removed in https://review.opendev.org/#/c/584427/ seemingly by accident. Closes-Bug: 1900160 Change-Id: I6f00396495853e117429c17fadfafe809e322a31
-
Michał Nasiadka authored
Designate sink is an optional service that consumes notifications, users should have an option to disable it when they don't use them. Change-Id: I1d5465d9845aea94cff39ff5158cd8b1dccc4834
-
Michał Nasiadka authored
In most real world deployments, there will be multiple backend DNS servers, allow to specify all of them for the pool configuration. Change-Id: Ic9737d0446a807891b429f080ae1bf048a3c8e4a
-
- Mar 23, 2022
-
-
Michal Nasiadka authored
In Xena [1] we removed Monasca Grafana service, but some components were left to support cleanup operations. [1]: https://review.opendev.org/c/openstack/kolla-ansible/+/788228 Change-Id: Iccc7bc3628bb7cbab1ac28f41c7b7dc7695894c6
-
- Mar 22, 2022
-
-
Will Szumski authored
Change-Id: Ie87a7488dad369464793b47c3d2db67d7dc1694e
-
Daniel Meyerholt authored
The backend external tasks which utilize an existing bind9 installation require appropriate permissions to be able to copy rndc config and key. Closes-Bug: #1912063 Change-Id: Ie50228a26d635e3db82e41ec266ab820bf58938e Signed-off-by:
Daniel Meyerholt <dxm523@gmail.com>
-
- Mar 21, 2022
-
-
Radosław Piliszek authored
Like other containers. This ensures that upgrade already updates PXE components and no additional deploy/reconfigure is needed. Closes-Bug: #1963752 Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
-
Juan Pablo Suazo authored
This commit adds support for pushing Ceilometer metrics to Prometheus instead of Gnocchi or alongside it. Closes-Bug: #1964135 Signed-off-by:
Juan Pablo Suazo <jsuazo@whitestack.com> Change-Id: I9fd32f63913a534c59e2d17703702074eea5dd76
-
Mark Goddard authored
Change Ia1239069ccee39416b20959cbabad962c56693cf added support for running a libvirt daemon on the host, rather than using the nova_libvirt container. It did not cover migration of existing hosts from using a container to using a host daemon. This change adds a kolla-ansible nova-libvirt-cleanup command which may be used to clean up the nova_libvirt container, volumes and related items on hosts, once it has been disabled. The playbook assumes that compute hosts have been emptied of VMs before it runs. A future extension could support migration of existing VMs, but this is currently out of scope. Change-Id: I46854ed7eaf1d5b5e3ccd8531c963427848bdc99
-
Mark Goddard authored
In some cases it may be desirable to run the libvirt daemon on the host. For example, when mixing host and container OS distributions or versions. This change makes it possible to disable the nova_libvirt container, by setting enable_nova_libvirt_container to false. The default values of some Docker mounts and other paths have been updated to point to default host directories rather than Docker volumes when using a host libvirt daemon. This change does not handle migration of existing systems from using a nova_libvirt container to libvirt on the host. Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/830504 Change-Id: Ia1239069ccee39416b20959cbabad962c56693cf
-
- Mar 18, 2022
-
-
Mark Goddard authored
Follow up to I91d0e23b22319cf3fdb7603f5401d24e3b76a56e, which fixes a conditional corner case when removing the ha-all policy. Change-Id: Iea75551bc6d0da7dd10515dd8bd28c014eed7a5e
-
Imran Hussain authored
Consistently use template instead of copy. This has the added advantage of allowing variables inside ceph conf files and keyrings. Closes-Bug: 1959565 Signed-off-by:
Imran Hussain <ih@imranh.co.uk> Change-Id: Ibd0ff2641a54267ff06d3c89a26915a455dff1c1
-
- Mar 17, 2022
-
-
jinyuanliu authored
This project [1] can provide a one-stop solution to log collection, cleaning, indexing, analysis, alarm, visualization, report generation and other needs, which involves helping operator or maintainer to quickly solve retrieve problems, grasp the operational health of the platform, and improve the level of platform management. [1] https://wiki.openstack.org/wiki/Venus Change-Id: If3562bbed6181002b76831bab54f863041c5a885
-
- Mar 10, 2022
-
-
Mark Goddard authored
In Kolla Ansible OpenStack deployments, by default, libvirt is configured to allow read-write access via an unauthenticated, unencrypted TCP connection, using the internal API network. This is to facilitate migration between hosts. By default, Kolla Ansible does not use encryption for services on the internal network (and did not support it until Ussuri). However, most other services on the internal network are at least authenticated (usually via passwords), ensuring that they cannot be used by anyone with access to the network, unless they have credentials. The main issue here is the lack of authentication. Any client with access to the internal network is able to connect to the libvirt TCP port and make arbitrary changes to the hypervisor. This could include starting a VM, modifying an existing VM, etc. Given the flexibility of the domain options, it could be seen as equivalent to having root access to the hypervisor. Kolla Ansible supports libvirt TLS [1] since the Train release, using client and server certificates for mutual authentication and encryption. However, this feature is not enabled by default, and requires certificates to be generated for each compute host. This change adds support for libvirt SASL authentication, and enables it by default. This provides base level of security. Deployments requiring further security should use libvirt TLS. [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021 Closes-Bug: #1964013 Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
-
- Mar 08, 2022
-
-
Nathan Taylor authored
Add "enable_prometheus_etcd_integration" configuration parameter which can be used to configure Prometheus to scrape etcd metrics endpoints. The default value of "enable_prometheus_etcd_integration" is set to the combined values of "enable_prometheus" and "enable_etcd". Change-Id: I7a0b802c5687e2d508e06baf55e355d9761e806f
-