- Sep 05, 2022
-
-
Stig Telfer authored
Fluentd has a default timeout of 5s for flushing data to ElasticSearch. If there is a significant backlog of unsent log messages, this timeout can be exceeded, resulting in Fluentd failing to make further progress. Raise the default timeout to 60s. This patch adopts the configuration parameters previously proposed by Krzysztof Klimonda. Closes-Bug: #1983031 Closes-Bug: #1896611 Change-Id: I1aaab654a5a0752fccef2cfb8cc0bde4a0ee2562
-
- Aug 30, 2022
-
-
Michal Arbet authored
Prometheus is creating user and granting permissions to database from which is gathering metrics. This process is different when haproxy/proxysql is used. Proxysql: - kolla-ansible should use root_shard_ID user to connect to ProxySQL endpoint and it is routed to proper shard. Haproxy: - kolla-ansible should use root user to connect to HAProxy endpoint and that's all. If proxysql is not used, mariadb role will not create user shard_root_ID user in bootstrap (from my perspective of view it should), and therefore it will fail when HAProxy is used. This patch is just fixing user to connect. Change-Id: Icd07807b2c404eb4d3f398879639b17f1e7949c2
-
- Aug 29, 2022
-
-
Radosław Piliszek authored
HAProxy prechecks could fail if the ansible_user was not allowed to access Docker API. Change-Id: I09bfa35392bed77321d2de2424e44e60b60a8451
-
Pierre Riteau authored
Closes-Bug: #1987866 Change-Id: Iaf352a15b9e6c9607e0d33c803c132d9267ca727
-
Pierre Riteau authored
MariaDB is left unchanged because its custom_member_list uses a different group (mariadb_default_database_shard_hosts). Change-Id: Icefd5a3d02ae4dfeb27401696c35ca2c38e203d3
-
LinPeiWen authored
In a multi-controller node, the presence of "run_once: True" and "when: inventory_hostname == groups['keystone'][-1]" will cause the task to be skipped Closes-Bug: #1987982 Change-Id: I6a8f4ca285cda0675711b631aeed7ae4c992d879
-
Pierre Riteau authored
Instead of specifying a custom member list for each service that should be configured as active/passive, a new `active_passive` parameter can be set to true. This only works if `custom_member_list` is not used. Change-Id: I3758bc2377c25a277a29f02ebc20c946c7499093
-
- Aug 26, 2022
-
-
Radosław Piliszek authored
This avoids root privileges in tftpd's unprivileged container. Change-Id: I50366205c9cefe2af26c27580c02368f029b7605
-
Radosław Piliszek authored
Change-Id: I6b03d7ec0eb84c9a2544c2ad13102028452c2ec1
-
- Aug 22, 2022
-
-
Michal Arbet authored
This change enables the use of Docker healthchecks for mariadb-server service. Depends-On: https://review.opendev.org/c/openstack/kolla/+/805613 Change-Id: I893687a0501ea0f281b879df3141a354bff9eca6
-
wangxiyuan authored
openEuler 20.03 LTS SP2 is out of date. This patch: 1. Upgrade openEuler to 22.03 TLS for host OS. 2. Switch guest OS from centOS 8 to ubuntu Change-Id: If2ff036e965def141f67240945802611e1f4dc4e
-
- Aug 12, 2022
-
-
Piotr Parczewski authored
A follow up patch to I563f2438b3cb0895606b029b5269ce2e50c413e3 Change-Id: I1e4c5db46413668d4b5df2f2dcedc5d9aaecd63a
-
- Aug 10, 2022
-
-
Pierre Riteau authored
This can be used to forward Prometheus Alertmanager notifications to Microsoft Teams. Change-Id: I563f2438b3cb0895606b029b5269ce2e50c413e3 Depends-On: https://review.opendev.org/c/openstack/kolla/+/812678
-
- Aug 09, 2022
-
-
Michal Arbet authored
This patch ads proxysql-config role which is used for generating users and rules configuration. Change-Id: I1fcb0e8040ea55f8f6b8384a56479eabdaf61c33
-
Michal Arbet authored
This patch adds loadbalancer-config role which is "wrapper" around haproxy-config and proxysql-config role which will be added in follow-up patches. Change-Id: I64d41507317081e1860a94b9481a85c8d400797d
-
Michal Arbet authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/769385 Depends-On: https://review.opendev.org/c/openstack/kolla/+/765781 Change-Id: I3c4182a6556dafd2c936eaab109a068674058fca
-
- Aug 08, 2022
-
-
Monty Taylor authored
clouds.yaml[0] is a richer way to express configuration for OpenStack clouds. It's also fully supported by Ansible's OpenStack modules as well as python-openstackclient and openstacksdk. It's the future - who doesn't like the future? Write a file using both the public (default) and the internal endpoints for the admin user. Also, change all of the examples to reference it and to get python-openstackclient to use it too. [0] https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_config.html Implements: blueprint use-clouds-yaml Change-Id: I557d2e4975c7b3d3c713a556b9ba47af9567ce6e
-
- Aug 05, 2022
-
-
Marcin Juszkiewicz authored
During deployment I got this error: RUNNING HANDLER [loadbalancer : Stop master haproxy container] ok: [192.168.66.143] RUNNING HANDLER [loadbalancer : Stop master proxysql container] ok: [192.168.66.143] RUNNING HANDLER [loadbalancer : Stop master keepalived container] fatal: [192.168.66.143]: FAILED! => changed=false msg: 'No such container: keepalived to stop' Looks like we forgot to allow keepalived to not be present. Change-Id: I720c719a6a6b35c5c2d5b5ee59b48349e58bac82
-
- Aug 03, 2022
-
-
Radosław Piliszek authored
This patch follows upstream and disables linuxbridge testing. Users are notified of the situation via the release note. Change-Id: I524682ceb5287c14ef0ba99baae0c081850f4c5e
-
- Aug 02, 2022
-
-
Mark Goddard authored
By default Bifrost generates passwords for use by services, and stores them in files in /root/.config/bifrost/ in the container. This directory is not persistent, so the passwords are lost if the container is recreated. This is generally not a problem, because recreating the container is generally done when redeploying Bifrost, and new passwords will be generated and written to configuration files. However, if you access the Ironic or Inspector APIs outside of the Bifrost playbooks, the credentials will have changed. This change fixes the issue by persisting the credentials directory in a Docker volume. Note that applying this change will cause existing credentials to be removed. Closes-Bug: #1983356 Change-Id: I45a899e228b7634ba86fab5822139252c48a7f07
-
- Jul 29, 2022
-
-
Mark Goddard authored
With the handler in the haproxy-config role, it gets triggered once for every service that changes the firewall config. This happens because the role is included dynamically. If we move the handler to the haproxy role, which is only included once, the handler will trigger at most once. This is a follow up for Iea3680142711873984efff2b701347b6a56dd355. Change-Id: Iad9ed241026435085bc9a0f5802818010b47830f
-
Mark Goddard authored
This variable shadows the name of the actual project that calls this role, so we end up with the following nonsense: TASK [haproxy-config : Copying over haproxy-config haproxy config] Change-Id: Id60046e0ddc7ec843f2e4ce7ddee7683470a88b2
-
Michal Arbet authored
Kolla environment currently uses haproxy to fullfill HA in mariadb. This patch is switching haproxy to proxysql if enabled. This patch is also replacing mariadb's user 'haproxy' with user 'monitor'. This replacement has two reasons: - Use better name to "monitor" galera claster as there are two services using this user (HAProxy, ProxySQL) - Set password for monitor user as it's always better to use password then not use. Previous haproxy user didn't use password as it was historically not possible with haproxy and mariadb-clustercheck wasn't implemented. Depends-On: https://review.opendev.org/c/openstack/kolla/+/769385 Depends-On: https://review.opendev.org/c/openstack/kolla/+/765781 Depends-On: https://review.opendev.org/c/openstack/kolla/+/850656 Change-Id: I0edae33d982c2e3f3b5f34b3d5ad07a431162844
-
- Jul 28, 2022
-
-
Victor Chembaev authored
Closes-Bug: 1982777 Change-Id: Ic752b981041b233ab55d5b9abef667b21b47857d
-
Radosław Piliszek authored
We built Jammy images under the existing focal tag. Change-Id: I22859732bbe241a78e9ea451f104e7810fa4cbcc
-
Radosław Piliszek authored
Change-Id: I8ad42b20302a67b94b95a234da309279be0fe82d
-
- Jul 27, 2022
-
-
Radosław Piliszek authored
It is no longer needed per the removed comment. Change-Id: I8d88c21c7e115b842a56f0ba5c780c3bde593964
-
k-s-dean authored
This change introduces automated configuration of firewalld and adds a new filter for extracting services from the project_services dict. the filter selects any enabled services and their haproxy element and returns them so they can be iterated over. This commit also enables automated configuration of firewalld from enabled openstack services and adds them to the defined zone and reloads the system firewall. Change-Id: Iea3680142711873984efff2b701347b6a56dd355
-
Radosław Piliszek authored
Change-Id: I63673761959a560e97c848f092f086ceba25839a
-
Michal Nasiadka authored
This reverts commit 73fc230f. Reason for revert: CI jobs failing with "msg": "{{ s3_url }}: 's3_url' is undefined" Change-Id: Iba7099988cea0c0d8254b9e202309cd9c82a984d
-
- Jul 26, 2022
-
-
Michal Nasiadka authored
Needed for CentOS Stream 9 and Rocky Linux 9. Change-Id: I614e64e227304fdc50c08bd16d67ccf03586b92c
-
- Jul 25, 2022
-
-
Michal Nasiadka authored
ansible-lint introduced var-spacing - let's fix our code. Change-Id: I0d8aaf3c522a5a6a5495032f6dbed8a2be0251f0
-
- Jul 21, 2022
-
-
Sergei Raiskii authored
Added options to configure S3 cinder backup driver, so cinder backup can use S3 storage, for safekeeping backups. Change-Id: Id6ff6206714581555baacecebfb6d8dd53bed8ac
-
- Jul 20, 2022
- Jul 19, 2022
-
-
Dr. Jens Harbott authored
* Add jammy to allowed Ubuntu distros in precheck Depends-On: https://review.opendev.org/c/openstack/kolla-ansible/+/847187 Depends-On: https://review.opendev.org/c/openstack/ansible-collection-kolla/+/850336 Change-Id: Ib68adc2e33bf211d9cec007a1edb9590cafaefd1
-
- Jul 12, 2022
-
-
Michal Arbet authored
Render {{ openstack_service_workers }} for workers of each openstack service is not enough. There are several services which has to have more workers because there are more requests sent to them. This patch is just adding default value for workers for each service and sets {{ openstack_service_workers }} as default, so value can be overrided in hostvars per server. Nothing changed for normal user. Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
-
Christian Berendt authored
To use notifications with ironic, the notification_level option in the [DEFAULT] section of the configuration file must be set, we use ``info`` as a reasonable level. Closes-Bug: #1969826 Change-Id: I38bb1e5404e917c788689a3181741022f875da06
-
- Jul 08, 2022
-
-
Pierre Riteau authored
Change-Id: I7d79a18599f54583ff4f38a554459fe02ada9ae7
-
- Jul 07, 2022
-
-
Pierre Riteau authored
Change-Id: I6d9ee98912120b9ece60ee22c7b0ad71dab8ed30
-