13684 Commits

Author SHA1 Message Date
Zuul
21236c2e90 Merge "CI: Install rich on depends-on podman builds" 2023-11-30 18:58:51 +00:00
Zuul
016cb7d427 Merge "enable quorum queues" 2023-11-30 17:46:57 +00:00
Zuul
9bbfd2f954 Merge "fluentd: Use labels for transition to v5" 2023-11-30 16:51:22 +00:00
Michal Nasiadka
6fb1220b65 CI: Install rich on depends-on podman builds
Change-Id: I54f94c383ae5a1185b364495422e1ab79cbd1afb
2023-11-30 15:29:43 +01:00
Sven Kieske
64575519aa enable quorum queues
This implements a global toggle `om_enable_rabbitmq_quorum_queues`
to enable quorum queues for each service in RabbitMQ, similar to
what was done for HA[0].

Quorum Queues are enabled by default.

Quorum queues are more reliable, safer, simpler and faster than
replicated mirrored classic queues[1].

Mirrored classic queues are deprecated and scheduled for removal
in RabbitMQ 4.0[2].

Notice, that we do not need a new policy in the RabbitMQ definitions
template, because their usage is enabled on the client side and can't
be set using a policy[3].

Notice also, that quorum queues are not yet enabled in oslo.messaging
for the usage of reply_ and fanout_ queues (transient queues).
This will change once[4] is merged.

[0]: https://review.opendev.org/c/openstack/kolla-ansible/+/867771
[1]: https://www.rabbitmq.com/quorum-queues.html
[2]: https://blog.rabbitmq.com/posts/2021/08/4.0-deprecation-announcements/
[3]: https://www.rabbitmq.com/quorum-queues.html#declaring
[4]: https://review.opendev.org/c/openstack/oslo.messaging/+/888479

Signed-off-by: Sven Kieske <kieske@osism.tech>
Change-Id: I6c033d460a5c9b93c346e9e47e93b159d3c27830
2023-11-30 13:53:00 +00:00
Zuul
9b6a70e441 Merge "etcd: update to v3.4" 2023-11-30 01:10:27 +00:00
Zuul
1551c4d2de Merge "CI: Fail on fluentd log parsing errors" 2023-11-30 01:10:25 +00:00
Jan Gutter
ccfa2a6c16 etcd: update to v3.4
* Updates etcd to v3.4
* Updated the config to use v3.4's logging mechanism
* Deprecated etcd CA parameters aren't used, so we are not affected
  by their removal.
* Note that we are not currently guarding against skip-version updates for
  etcd.

Notable non-voting jobs exercising some of this:
* kolla-ansible-ubuntu-upgrade-cephadm (cinder->tooz->etcd3gw->etcd)
* kolla-ansible-ubuntu-zun (see
  https://review.opendev.org/c/openstack/openstack-ansible/+/883194 )

Depends-On: https://review.opendev.org/c/openstack/kolla/+/890464
Change-Id: I086e7bbc7db64421445731a533265e7056fbdb43
2023-11-29 17:43:33 +00:00
Jan Gutter
ae21f31785 etcd: deduplicate environments for containers
* etcd service containers usually have a set of
  environment parameters required to boot the container.
* The short-lived etcd bootstrap containers pass extra
  ETCD_INITIAL_* environment variables, but still need to
  pass the ones that the service containers use.
* This uses ansible's `combine` filter to cut down on the
  duplication.
* This is intended to be just a straightforward refactor.

Change-Id: I04e95f92a8f365553afd618d58b99de595d48312
2023-11-29 17:43:22 +00:00
Michal Nasiadka
ba54f8cdda CI: Fail on fluentd log parsing errors
Change-Id: Ie3963f5ed20f7fb61ef2e03f0cf12a4ea1c87c9c
2023-11-29 17:42:44 +00:00
Dr. Jens Harbott
0b1a59dd8c podman: install "rich" dependency
This dependency was added to podman-py in version 4.8.0, but not added
properly to their requirements. Install it explicitly for our tox
and integration testing as a workaround.

[0] https://github.com/containers/podman-py/issues/350

Change-Id: I61a5fdfc4e505f2577185f0c0f1297cf2709be2c
2023-11-29 17:04:06 +00:00
Zuul
0b7d9c368e Merge "Update etcd docs and reno" 2023-11-29 14:16:03 +00:00
Zuul
29e1827bd1 Merge "CI: Add oslo_db.exception.DBConnectionError to check-logs.sh" 2023-11-29 14:15:59 +00:00
Dr. Jens Harbott
8e7a67bfd7
Update etcd docs and reno
Just some minor formatting and wording updates

Change-Id: Ia42944512f8d14a1993bd4ae3d09f0f2ab431322
2023-11-29 12:07:53 +00:00
Zuul
e971d0c795 Merge "etcd: Add support for more scenarios" 2023-11-29 11:13:18 +00:00
Michal Nasiadka
6e9e66b892 CI: Add oslo_db.exception.DBConnectionError to check-logs.sh
Change-Id: Ia1de6d9452e2c900169e9b4ccb7dfc1280283909
2023-11-29 10:04:44 +01:00
Zuul
65c2196975 Merge "Fix Horizon WSGI application log parsing" 2023-11-28 18:53:58 +00:00
Jan Gutter
ed3b27cc92 etcd: Add support for more scenarios
This commit addresses a few shortcomings in the etcd service:
  * Adding or removing etcd nodes required manual intervention.

  * The etcd service would have brief outages during upgrades or
    reconfigures because restarts weren't always serialised.

This makes the etcd service follow a similar pattern to mariadb:
  * There is now a distiction between bootstrapping the cluster
    and adding / removing another member.

  * This more closely follows etcd's upstream bootstrapping
    guidelines.

  * The etcd role now serialises restarts internally so the
    kolla_serial pattern is no longer appropriate (or necessary).

This does not remove the need for manual intervention in all
failure modes: the documentation has been updated to address the
most common issues.

Note that there's repetition in the container specifications: this
is somewhat deliberate. In a future cleanup, it's intended to reduce
the duplication.

Change-Id: I39829ba0c5894f8e549f9b83b416e6db4fafd96f
2023-11-28 18:43:56 +01:00
Zuul
9a0ac440df Merge "Revert "Enable RabbitMQ HA queues by default"" 2023-11-28 16:45:06 +00:00
Michal Nasiadka
06baa8f63f fluentd: Use labels for transition to v5
Depends-On: https://review.opendev.org/c/openstack/kolla/+/901508
Change-Id: I8c7d3de95d0f1f8e57a993b8c3417d90459e19be
2023-11-28 15:13:00 +00:00
Doug Szumski
4168b46cff Fix Horizon WSGI application log parsing
Like other WSGI services in Kolla Ansible, the Horizon WSGI application
handles log output via the `wsgi.errors` object. See [1] for further
information. The problem is that this log output is written to a file called
`horizon.log`, causing it to processed as an 'Oslo log' in the Fluentd
processing pipeline. Since the log format doesn't match the expected format,
this results in parsing errors.

This fix renames the log file and adjusts the format to match other WSGI
applications. The logs are then processed in the same way as other WSGI
application logs, resolving the issue.

[1] https://modwsgi.readthedocs.io/en/master/user-guides/debugging-techniques.html

Change-Id: I93777d1c53920f5470c78356e6b3a4064fbe04b4
Closes-Bug: #1898174
2023-11-28 14:43:18 +00:00
Zuul
db79eb0a55 Merge "Rename kolla_docker to kolla_container" 2023-11-28 12:06:09 +00:00
Matt Crees
cdda49ecb9 Revert "Enable RabbitMQ HA queues by default"
This reverts commit b86c304a2987d0e60570bcd43cbb08da9b64c241.

Reason for revert: We want to enable Quorum Queues by default in Caracal, without requiring two queue migrations between releases. See etherpad for details: https://etherpad.opendev.org/p/kolla-ansible-rmq-quorum-queues-proposal

Change-Id: Ia19ab97f538125475297976347c5da332a7fdda7
2023-11-28 10:07:12 +00:00
Zuul
a20532de03 Merge "Fix octavia's proxysql configuration" 2023-11-27 11:36:52 +00:00
Zuul
5472fa729a Merge "Fix expose prometheus externally with single frontend" 2023-11-27 09:54:47 +00:00
Zuul
e50c99d1e1 Merge "Fix proxysql get mariadb_backup_database_password" 2023-11-23 14:52:29 +00:00
Zuul
303421ee5c Merge "Fix typo" 2023-11-23 14:24:30 +00:00
Zuul
887b47604f Merge "Move [oslo_policy] back inside Jinja if block" 2023-11-23 13:15:33 +00:00
Pierre Riteau
ab77177d2d Fix typo
Change-Id: Id6ca24c058fabf0c68bcb5b6d1e58175aaf531eb
2023-11-23 10:05:00 +00:00
Zuul
d6844dc895 Merge "Fix an issue with prometheus scraping itself" 2023-11-23 02:44:46 +00:00
Michal Arbet
ff7856258e Fix octavia's proxysql configuration
The patch [1] mentioned below added the jobboard
functionality to the octavia role, but unfortunately
it incorrectly implemented the functionality of users
and rules for proxysql.

This patch fixes this bug.

[1] https://review.opendev.org/c/openstack/kolla-ansible/+/888588

Closes-Bug: #2044293
Change-Id: I6524fabad19b438113db4affe05f5586db99dff4
2023-11-22 20:49:32 +01:00
Zuul
bad6759ee4 Merge "Fix glance-api failed to start privsep daemon" 2023-11-22 15:37:17 +00:00
Zuul
449683c5aa Merge "Configure CloudKitty with Prometheus basic auth" 2023-11-22 11:24:45 +00:00
Zuul
84f0a37e49 Merge "Fix grafana prometheus datasource" 2023-11-22 08:47:22 +00:00
Will Szumski
2c9dc5da03 Fix expose prometheus externally with single frontend
Closes-Bug: #2043831
Change-Id: I010fabd255d93d5329de82af2b5d21c8fa7d93c4
2023-11-22 07:30:26 +00:00
Pierre Riteau
4131eb458d Configure CloudKitty with Prometheus basic auth
Closes-Bug: #2044226
Change-Id: I5e17152584b758c9ca4f1cc14520337f979584b7
2023-11-22 07:08:19 +00:00
Pierre Riteau
c2bd891405 Move [oslo_policy] back inside Jinja if block
This avoids generating an empty [oslo_policy] section in nova.conf when
no custom policy file is defined.

Change-Id: I23fae8387573e7f37eda0f2a09cd937239afd93f
2023-11-21 21:39:13 +00:00
Zuul
151f510a6c Merge "Remove Glance and Neutron TLS proxies from fluentd input config" 2023-11-21 16:08:41 +00:00
Zuul
4e74d5964b Merge "Adding mariadb_port to wsrep sync status so alterative ports can be used" 2023-11-21 11:58:20 +00:00
Zuul
57a8ff033f Merge "Deprecate Masakari" 2023-11-21 07:32:17 +00:00
Zuul
bd63dfd1e4 Merge "Set HAProxy server timeout for openstack exporter" 2023-11-18 09:31:29 +00:00
Zuul
d9272118a2 Merge "keystone: do not report changed on tasks that list" 2023-11-17 19:16:17 +00:00
Zuul
e89b474b16 Merge "Deploy Glance and Cinder Backup with S3 backend support" 2023-11-17 19:11:49 +00:00
Zuul
f4cd334b9f Merge "keystone: Add support for OIDC options" 2023-11-17 19:01:31 +00:00
Will Szumski
775fac2b10 Fix an issue with prometheus scraping itself
Closes-Bug: #2043829
Change-Id: Ic4cbaf592a2699d9c0312c575f68613c8681239f
2023-11-17 18:25:12 +00:00
Will Szumski
dfce510c0f Fix grafana prometheus datasource
See:
https://grafana.com/docs/grafana/latest/administration/provisioning/

Closes-Bug: #2043828
Change-Id: I9ed07dc8c995adddf6d89838cd515af93d10bd00
2023-11-17 18:10:04 +00:00
Matt Anson
8000550e02 Set HAProxy server timeout for openstack exporter
Set the openstack exporter HAProxy backend server timeout to
``prometheus_openstack_exporter_timeout`` to ensure that scrapes
that take longer than haproxy_server_timeout don't timeout.

Closes-Bug: #2006051
Change-Id: I44841a6b6fa5bf659cace06295d18c093ad7f927
2023-11-17 14:41:52 +00:00
Zuul
48db509042 Merge "CI: bump upgrade jobs timeout to 3h (10800)" 2023-11-17 12:02:45 +00:00
Zuul
cab0296971 Merge "Enable 3.12 Required Feature Flags for RabbitMQ" 2023-11-17 11:47:02 +00:00
Michal Nasiadka
b390bba41a CI: bump upgrade jobs timeout to 3h (10800)
These jobs are timing out sometimes [1].

[1]: https://zuul.openstack.org/builds?job_name=kolla-ansible-rocky9-cephadm&job_name=kolla-ansible-rocky9-cephadm-upgrade&job_name=kolla-ansible-ubuntu-cephadm&job_name=kolla-ansible-ubuntu-cephadm-upgrade&job_name=kolla-ansible-debian-cephadm&job_name=kolla-ansible-debian-cephadm-upgrade&result=TIMED_OUT&skip=0

Change-Id: I047426e4df4856ea2a6ea5a014a7bcb1c9c98554
2023-11-17 07:06:13 +00:00