1349 Commits

Author SHA1 Message Date
Zuul
a1a22b3a89 Merge "toolbox: Allow different users logging to ansible.log" 2021-09-09 15:55:27 +00:00
Zuul
f27c409eea Merge "Bump libvirtd memlock ulimit" 2021-09-09 10:58:27 +00:00
Zuul
f99bf8325f Merge "Never make Docker registry insecure by default" 2021-09-09 10:49:03 +00:00
Zuul
44c7b166cf Merge "Use Docker healthchecks for mistral services" 2021-09-08 16:07:51 +00:00
Michał Nasiadka
24e6a6ced0 toolbox: Allow different users logging to ansible.log
Currently only operations done with default kolla_toolbox user are logged
to /var/log/kolla/ansible.log.

In order to fix logging, permissions to ansible.log must allow writing
for other users in kolla group - and then a separate patch will follow
to make custom ansible.cfg file usable by other toolbox users.

Partial-Bug: #1942846
Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
2021-09-07 14:12:11 +02:00
Zuul
c48469d2ac Merge "Allow override of rabbitmq config in kolla toolbox" 2021-09-07 10:34:54 +00:00
Zuul
39931aedb4 Merge "Fix kolla-toolbox with IPv6 and disabled RabbitMQ" 2021-09-07 10:34:52 +00:00
Radosław Piliszek
11d7233ccc Bump libvirtd memlock ulimit
This is required for libvirtd with cgroupsv2 (Debian Bullseye and
soon others).
Otherwise, device attachments simply fail.
The warning message suggests filtering will be disabled but it
actually just fails the action entirely.

Change-Id: Id1fbd49a31a6e6e51b667f646278b93897c05b21
Closes-Bug: #1941940
2021-09-03 15:37:13 +00:00
Piotr Parczewski
d9e0ca5b3f reno: follow up
corrected nits from:
https://review.opendev.org/c/openstack/kolla-ansible/+/800068
https://review.opendev.org/c/openstack/kolla-ansible/+/803644

Change-Id: Ia30afd795067a36b132a8c75c72dd7c65d624a83
2021-09-02 14:59:26 +02:00
Radosław Piliszek
34c49b9dbe Restore libvirtd cgroupfs mount
It was removed in [1] as part of cgroupsv2 cleanup.
However, the testing did not catch the fact that the legacy
cgroups behaviour was actually still breaking despite latest
Docker and setting to use host's cgroups namespace.

[1] 286a03bad20955aa4d3f7009cef5856d328b76f1

Closes-Bug: #1941706
Change-Id: I629bb9e70a3fd6bd1e26b2ca22ffcff5e9e8c731
2021-08-30 09:33:31 +00:00
Zuul
83c5d95b47 Merge "Support monitoring Fluentd with Prometheus" 2021-08-27 09:34:12 +00:00
Zuul
d104846204 Merge "Use Docker healthchecks for nova-spicehtml5proxy service" 2021-08-27 09:04:51 +00:00
Zuul
26c480ca6f Merge "Use Docker healthchecks for memcached services" 2021-08-27 09:02:17 +00:00
Zuul
e78f4330dd Merge "Use Docker healthchecks for keystone-fernet container" 2021-08-27 09:02:15 +00:00
Zuul
6362dfa942 Merge "Fix Masakari in multi-region deploys" 2021-08-27 08:55:06 +00:00
Zuul
1a538cce0e Merge "Add ability to retry image pulling" 2021-08-23 13:22:31 +00:00
Radosław Piliszek
3c68e82585 Fix Masakari in multi-region deploys
to behave like it is most commonly expected - query Nova in the
same region.

Closes-Bug: #1939291
Change-Id: I584a83d352c747a799b5dab1d3b8159ba3805454
2021-08-20 18:53:46 +00:00
Radosław Piliszek
802f7c6218 Never make Docker registry insecure by default
To follow best security practices and help fellow operators.

More details inline and in the linked bug report.

Closes-Bug: #1940547
Change-Id: Ide9e9009a6e272f20a43319f27d257efdf315f68
2021-08-20 18:23:56 +00:00
Radosław Piliszek
cbb567cb86 Add ability to retry image pulling
Sometimes, the registries may intermittently fail to deliver the
images. This is often seen in the CI, though it also happens with
production deployments, even those with internal registries and/or
registry mirrors - due to sheer load when trying to pull the
images from many hosts.

This patchs adds two new vars to control retry behaviour.
The default has been set to make users happier by default. :-)

Change-Id: I81ad7d8642654f8474f11084c6934aab40243d35
2021-08-19 18:38:59 +00:00
Zuul
a98076f11c Merge "Use more RMQ flags for less busy wait" 2021-08-19 18:20:13 +00:00
Marc 'risson' Schmitt
0858d5487e
Fix haproxy precheck when kolla_externally_managed_cert is used
Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space>
Closes-Bug: #1940286
Change-Id: I647f8615e9fd0cc0db7c737ce4afbd1bdd0d40d4
2021-08-18 16:07:09 +02:00
Michal Arbet
90fd9152a4 Use Docker healthchecks for keystone-fernet container
This change enables the use of Docker healthchecks for
keystone-fernet container. It checks if "key 0" has
right permissions, and if rsync is able to distribute
keys to other keystones.

Implements: blueprint container-health-check
Change-Id: I17bea723d4109e869cd05d211f6f8e4653f46e17
2021-08-17 15:07:01 +02:00
Michal Arbet
2b599bdb83 Use Docker healthchecks for nova-spicehtml5proxy service
This change enables the use of Docker healthchecks for
nova-spicehtml5proxy service.

Implements: blueprint container-health-check
Change-Id: I584c588c20781e6c6567429811aecf97967baea3
2021-08-16 11:20:03 +02:00
Jan Horstmann
f8e3e169c3 Allow override of rabbitmq config in kolla toolbox
Certain overrides for rabbitmq may need to be set for `rabbitmqctl` in
kolla-toolbox aswell.
This commit allows to override `rabbitmq-env.conf` and `erl_inetrc` in
kolla-toolbox.

Change-Id: Idef6adcf9700f75a2db503444a8de093ee21a9c5
2021-08-13 12:57:16 +00:00
Radosław Piliszek
13200ace33 Fix kolla-toolbox with IPv6 and disabled RabbitMQ
Closes-Bug: #1939883
Change-Id: Ica311acba445cccac1d20757ced6f15a064ebcaa
2021-08-13 12:47:41 +00:00
Michal Arbet
85879afc0b Trivial fix nova's healthchecks
Kolla-ansible upgrade task is calling different
handlers as deploy task and these handlers are
missing healthcheck key. This patch is fixing
this.

Closes-Bug: #1939679
Change-Id: Id83d20bfd89c27ccf70a3a79938f428cdb5d40fc
2021-08-12 13:39:50 +02:00
Zuul
61f2bd86b0 Merge "fluentd: Fix check for external elasticsearch" 2021-08-11 14:32:59 +00:00
Zuul
e017e40968 Merge "Remove deprecated Designate option" 2021-08-11 13:09:06 +00:00
Zuul
6d371d47ca Merge "Support multiple inventories" 2021-08-11 11:24:20 +00:00
Zuul
578ca1d647 Merge "Add suppress_type_name to stop warnings with ES7" 2021-08-10 16:26:11 +00:00
Zuul
9cd7ed8074 Merge "Refactor and optimise image pulling" 2021-08-10 14:59:45 +00:00
Radosław Piliszek
9ff2ecb031 Refactor and optimise image pulling
We get a nice optimisation by using a filtered loop instead
of task skipping per service with 'when'.

Partially-Implements: blueprint performance-improvements
Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
2021-08-10 11:57:54 +00:00
Zuul
c0540760e0 Merge "monasca-thresh: Fix topology submission to storm" 2021-08-10 10:59:17 +00:00
Zuul
63be501318 Merge "baremetal: use docker_yum_gpgkey to fetch docker GPG key" 2021-08-09 15:36:49 +00:00
Zuul
a81c6dabdc Merge "neutron: fix neutron-server config.json with VMware" 2021-08-09 11:09:23 +00:00
Zuul
214d34ca7b Merge "Extra var ironic_enable_keystone_integration added." 2021-08-09 10:53:20 +00:00
Zuul
01a4868ba6 Merge "Fix release note for ansible_facts" 2021-08-09 10:26:01 +00:00
Doug Szumski
b692ce7af1 Support monitoring Fluentd with Prometheus
This patch adds support for integrating Prometheus with Fluentd.
This can be used to extract useful information about the status
of Fluentd, such as output buffer capacity and logging rate,
and also to extract metrics from logs via custom Fluentd
configuration. More information can be found here in [1].

[1] https://docs.fluentd.org/monitoring-fluentd/monitoring-prometheus

Change-Id: I233d6dd744848ef1f1589a462dbf272ed0f3aaae
2021-08-09 10:12:20 +01:00
Mark Goddard
a08aaf7d8e Fix release note for ansible_facts
Change-Id: I0103d7ef55e6aebe043a582d36f1a2efa137f447
2021-08-09 08:48:21 +00:00
Mark Goddard
2c786a0faf neutron: fix neutron-server config.json with VMware
Missing comma in config.json template rendered invalid JSON with VMware
plugin agent.

Closes-Bug: #1939080

Change-Id: I3d0c6421e3da7e1e753b99cf87c32fc238a21523
2021-08-09 09:29:51 +01:00
Ilya Popov
da4fd2d6a2 Extra var ironic_enable_keystone_integration added.
Basically, there are three main installation scenario:

Scenario 1:
Ironic installation together with other openstack services
including keystone. In this case variable enable_keystone
is set to true and keystone service will be installed
together with ironic installation. It is possible realise this
scenario, no fix needed

Scenario 2:
Ironic installation with connection to already installed
keystone. In this scenario we have to set enable_keystone
to “No” to prevent from new keystone service installation
during the ironic installation process. But in other hand,
we need to have correct sections in ironic.conf to provide
all information needed to connect to existing keystone.
But all sections for keystone are added to ironic.conf only
if enable_keystone var is set to “Yes”. It isn’t possible
to realise this scenario. Proposed fix provide support for
this scenario, where multiple regions share the same
keystone service.

Scenario 3:
No keystone integration. Ironic don't connect to Keystone.
It is possible realise this scenario, no fix needed

Proposed solution also keep the default behaviour: if no
enable_keystone_integration is manually defined by default
it takes value of enable_keystone variable and all behaviour
is the same. But if we don't want to install keystone and
want to connect to existing one at the same time, it will be
possible to set enable_keystone var to “No”
(preventing keystone from installation) and at the same
time set ironic_enable_keystone_integration to Yes to allow
needed section appear in ironic.conf through templating.

Change-Id: I0c7e9a28876a1d4278fb2ed8555c2b08472864b9
2021-08-06 17:58:48 +03:00
Zuul
1a4a8c1615 Merge "Reduce container metrics cardinality" 2021-08-06 14:47:38 +00:00
Zuul
bb05cf1150 Merge "Remove support for Prometheus v1" 2021-08-06 14:12:18 +00:00
Zuul
295c69b5ee Merge "Remove tempest role" 2021-08-06 14:04:55 +00:00
Zuul
caf763f7c3 Merge "Use Docker healthchecks for kuryr services" 2021-08-06 14:04:53 +00:00
Zuul
762e840a50 Merge "Use Docker healthchecks for zun services" 2021-08-06 14:04:51 +00:00
Zuul
c6f7feec48 Merge "Use Docker healthchecks for ceilometer services" 2021-08-06 13:58:58 +00:00
Zuul
ea52dd9748 Merge "nova: Use cinder user for Ceph" 2021-08-06 13:58:56 +00:00
Piotr Parczewski
30e0eae8b2 Remove deprecated Designate option
Change-Id: Ib9ea83dd0019a4c4703e673a783c45ab07afe4e7
2021-08-06 15:31:07 +02:00
Zuul
851f2c799c Merge "Check config when checking the containers" 2021-08-05 21:00:59 +00:00