Nova external ceph task have a type which break deployment.
State module not present, the module used should be stat.
Change-Id: Ie8a0b30f44fc35a597334383a85353d324e765cd
Closes-Bug: #1671526
Add a new subcommand 'check' to kolla-ansible, used to run the
smoke/sanity checks.
Add stub files to all services that don't currently have checks.
Change-Id: I9f661c5fc51fd5b9b266f23f6c524884613dee48
Partially-implements: blueprint sanity-check-container
cell0 is already setup in Ocata, when upgrading to Pike
is not anymore necessary to create.
All nova DBs (nova_api, nova and nova_cell0) are already
created in Ocata too. Only bootstrap_service is needed
while upgrading.
Change-Id: Idc4941334faf91feee868472155a8c8ea0eba436
During mongodb upgrade process "/var/lib/mongodb" should have
correct permissions, but a typo present in config.json was giving
permissions to "/var/lib/kolla/mongodb"
Change-Id: I916e7d831531131b2f141a2f7ac712d4a82f7e86
Closes-Bug: #1668303
It is unnecessary and a waste to run nova-compute-ironic on a single
node, change the host name field in nova-compute-ironic could ensure
nova-compute and nova-compute-ironic run on the same node.
Change-Id: If2acbf25caab0570da444472003599b9e0f2a1ff
Closes-Bug: #1671103
Run playbooks in serial are unnecessary and may cause some issue. This
patch disables serial.
This patch also removes the serial for MariaDB playbook. MariaDB handle
this internally.
Partial-Bug: #1668185
Change-Id: I3b4216dd82607475e9bd9b44590b631be4abdbdd
Booting from volume require cinder's ceph client secret now. Move cinder
before nova in site.yml, because nova depends on cinder ceph client key
now.
Change-Id: I01c9ed80843d98305b8963894c4917c21a35d3ac
Closes-Bug: #1670676
Ceilometer-*.json does not apply permissions at
kolla_logs/ceilometer as other roles do at config.json.
This is causing ceilometer-central to keep restarting
due cannot read/write to ceilometer-polling.log file.
Change-Id: I865bf01d6c3d87f1a2cf31976ca9e46bcbcad744
Closes-Bug: #1671020
Libvirt 2.5 (latest version in cloud archive) seems to have changed
behavior of dynamic_ownership.
Change-Id: Icf9592c2f82f0f4a35074b9b13a51643a32631e9
Closes-bug: #1668654
Due to kolla-toolbox return json object instead of just
plain string, we can use the object directly.
Change-Id: I55613f0f8ba97d1a14595c8c9b09e1ad6d2366e7
Closes-Bug: #1668521
* Move the tasks to the role
* Skip the task when container is already running
Change-Id: I1990d4dd2a02efa2b3766329000aa23419e0ff17
Closes-Bug: #1670286
docker-py 2.0.0 is released with renaming docker.Client to
docker.APIClient. and with a new python package name "docker" rather
than "docker-py".
This patch support docker and docker-py packages.
Change-Id: Ib4400a4d2ce803191ee6215c5b28f0052970332c
Closes-Bug: #1668346
The check whether 'already' presents in mongodb output
should belong to changed_when.
Change-Id: I829c8906f0f7b61d3f6e0211319899d126e6850c
Closes-Bug: #1668216
add environment parameter to handlers restart etcd container as
there are env parameters in default
Closes-Bug: #1669089
Change-Id: I99266e7a367cb54c77b3d3da35ba5055acd98f62
While deploying/genconfig designate, raise an error due
a missing .key in the item iteration
designate_rndc_key var is already used and replaced by the register
Changed register to other name.
Bind9 container should be started before other designate services.
Change-Id: Ia6aa89af1cf2317fa8f006b8d35d3760e7fb9980
heat-api kept redirecting clients to use http:// instead of https://
when communicating with our https:// only loadbalancer
Please examine the logic for enabling it carefully, it's hard to know
if it should be enabled or not, potenitially it could be a security
risk.
Based on openstack-ansible-os_heat:
commit 4033a0f854cba6719c61812ef5b553e932a6c6c2
Author: Kyle L. Henderson <kyleh@us.ibm.com>
Enable oslo_middleware proxy header parsing
"Heat has moved to using oslo_middleware for the http proxy header
parsing, however the default is to not parse the headers. When
the external protocol differs from the internal protocol this
parsing is required in order for heat to work properly since it
will return 302 redirects to the client during some operations
(such as delete stack).
An example of this is when using haproxy with https configured
for the external protocol and http for the internal protocol.
If the oslo_middleware does not parse the headers, then any
302 redirects would specify a url with http rather than
correctly specifying https and the heat client would fail to
connect on the redirect url."
Change-Id: I38661a0bc2163a7f72febd98b7ae6f51c5d45ad5