12457 Commits

Author SHA1 Message Date
Dr. Jens Harbott
479a78706a Stop creating non-keystone admin endpoints
The admin interface for endpoints never had any real use, the
functionality was the same as for the public or internal endpoints,
except for Keystone. Even for Keystone with API v3 it would no longer
really be needed, but it is still being required by some libraries that
cannot be changed in order to stay backwards compatible.

Signed-off-by: Dr. Jens Harbott <harbott@osism.tech>
Change-Id: Icf3bf08deab2c445361f0a0124d87ad8b0e4e9d9
2021-12-21 13:09:36 +01:00
Mark Goddard
1d0171fc70 monasca: change default of monasca_ntp_server
Updates the default value of 'monasca_ntp_server' from
'external_ntp_servers[0]' to '0.pool.ntp.org'.  This is due to the
removal of the 'external_ntp_servers' variable as part of the removal of
Chrony deployment.

Change-Id: I2e7538a2e95c7b8e9280eb051ee634b4313db129
2021-10-01 14:07:56 +01:00
Mark Goddard
3b22d334d6 CI: monasca: ignore exited monasca_thresh container
Ignore the monasca_thresh container if it is listed as exited.
The container was recently changed to operate as a 'one shot' container,
submitting a job to storm then exiting. This does not fit with the
usual pattern of Kolla Ansible container usage, but is harmless.

Depends-On: https://review.opendev.org/c/openstack/kolla/+/811977

Change-Id: Id40d2260a67ef604255fb1818d41cdcbc73164d7
2021-10-01 13:08:01 +01:00
Zuul
3e04e0043f Merge "Remove chrony role from kolla" 2021-09-30 21:07:38 +00:00
Zuul
33a7c2864c Merge "docs: ceph: add copy-on-write for Glance" 2021-09-30 18:34:41 +00:00
wu.chunyang
1f71df1a8b Remove chrony role from kolla
chrony is not supported in Xena cycle, remove it from kolla

Moved tasks from chrony role to chrony-cleanup.yml playbook to avoid a
vestigial chrony role.

Co-Authored-By: Mark Goddard <mark@stackhpc.com>

Change-Id: I5a730d55afb49d517c85aeb9208188c81e2c84cf
2021-09-30 18:56:14 +02:00
Zuul
bfba65f286 Merge "Add support for Ceph RadosGW integration" 2021-09-30 16:06:48 +00:00
Zuul
2e9d9148f6 Merge "Deploy source type images by default" 2021-09-30 14:30:34 +00:00
Mark Goddard
8c5012e940 Add support for Ceph RadosGW integration
* Register Swift-compatible endpoints in Keystone
* Load balance across RadosGW API servers using HAProxy

The support is exercised in the cephadm CI jobs, but since RGW is
not currently enabled via cephadm, it is not yet tested.

https://docs.ceph.com/en/latest/radosgw/keystone/

Implements: blueprint ceph-rgw

Change-Id: I891c3ed4ed93512607afe65a42dd99596fd4dbf9
2021-09-30 13:08:13 +00:00
Zuul
9e380bf11c Merge "Transition Keystone admin user to system scope" 2021-09-30 09:33:10 +00:00
Michał Nasiadka
393dfbf651 docs: ceph: add copy-on-write for Glance
Change-Id: I51e2b62f563e66b6bb919621272662f3f8721eb2
2021-09-30 08:32:26 +00:00
Mark Goddard
66c84843e4 Deploy source type images by default
Source images get the most test coverage, so it makes sense to deploy
these by default.

Change-Id: I8d0c8750e2c1600e84cc2e677a4eae0e9f502dac
2021-09-30 08:07:48 +00:00
Niklas Hagman
2e933dceb5 Transition Keystone admin user to system scope
A system-scoped token implies the user has authorization to act on the
deployment system. These tokens are useful for interacting with
resources that affect the deployment as a whole, or exposes resources
that may otherwise violate project or domain isolation.

Since Queens, the keystone-manage bootstrap command assigns the admin
role to the admin user with system scope, as well as in the admin
project. This patch transitions the Keystone admin user from
authenticating using project scoped tokens to system scoped tokens.
This is a necessary step towards being able to enable the updated oslo
policies in services that allow finer grained access to system-level
resources and APIs.

An etherpad with discussion about the transition to the new oslo
service policies is:

https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible

Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585
Signed-off-by: Niklas Hagman <ubuntu@post.blinkiz.com>
2021-09-28 09:45:06 -07:00
Zuul
56938253a7 Merge "Add way to change weight of haproxy backend per service" 2021-09-28 12:22:55 +00:00
Zuul
bd3cbe8b26 Merge "docs: adding and removing host: add --all-projects option" 2021-09-27 10:51:41 +00:00
Zuul
f7d5cebce2 Merge "Use mariadb_tag as default for all mariadb tags" 2021-09-27 10:51:39 +00:00
Michal Arbet
7c2b4bead2 Add way to change weight of haproxy backend per service
This patch adding option to control weight of haproxy
backends per service via host variable.

Example:

[control]
server1 haproxy_nova_api_weight=10
server2 haproxy_nova_api_weight=2 haproxy_keystone_internal_weight=10
server3 haproxy_keystone_admin_weight=50

If weight is not defined, everything is working as before.

Change-Id: Ie8cc228198651c57f8ffe3eb060875e45d1f0700
2021-09-26 09:43:57 +02:00
Zuul
d85af34ccd Merge "Bump up Ansible max supported ver to 4.x" 2021-09-24 16:43:01 +00:00
Zuul
59e6688a0c Merge "Add check and diff options to kolla-ansible" 2021-09-24 16:30:46 +00:00
Zuul
3101c5abc3 Merge "Skip setting rp_filter by default" 2021-09-23 19:14:55 +00:00
Michał Nasiadka
1b650534c0 Bump up Ansible max supported ver to 4.x
This change bumps up max supported Ansible version
to 4.x (ansible-core 2.11.x) and minimum to 2.10.

Change-Id: I8b9212934dfab3831986e8db55671baee32f4bbd
2021-09-23 10:45:31 +00:00
Michal Arbet
0e720b382b Add check and diff options to kolla-ansible
This patch is adding --check and --diff options
to kolla-ansible, which cause that kolla-ansible
run will be more verbose and able to run in
semi dry-run mode.

The --diff option for kolla-ansible can be used alone or
with --check. When you run in diff mode, any module that
supports diff mode reports the changes made or, if used
with --check, the changes that would have been made.
Diff mode is most common in modules that manipulate files
(for example, the template module) but other modules might
also show ‘before and after’ information
(for example, the user module).

For more information check [1].

[1] https://docs.ansible.com/ansible/latest/user_guide/playbooks_checkmode.html#using-diff-mode

Change-Id: Ifb82ea99e5af82540e938eab9e2a442b2820d7df
2021-09-21 17:08:39 +02:00
Mark Goddard
6dc8b56390 Use mariadb_tag as default for all mariadb tags
This allows one variable to specify the tag for all MariaDB images.

Change-Id: I164cdd41787f8bd52d8e08cb380d42625a8bbd84
TrivialFix
2021-09-21 06:50:41 +00:00
Zuul
daf2a39643 Merge "Fix neutron upgrade using host limit without controllers" 2021-09-20 23:11:19 +00:00
Zuul
552c113cd4 Merge "CI: stop setting ceph_nova_user" 2021-09-20 20:47:09 +00:00
Zuul
27f338a939 Merge "use ironic user in ironic_neutron_agent.ini file" 2021-09-20 20:03:12 +00:00
Zuul
cdaa0dbe24 Merge "Add disable_firewall variable" 2021-09-20 19:57:38 +00:00
Zuul
e06e531089 Merge "Add kolla-ansible gather-facts command" 2021-09-20 18:54:29 +00:00
Zuul
000b347431 Merge "Remove haproxy,keepalived groups" 2021-09-20 18:09:00 +00:00
Zuul
7cf30017ea Merge "Add Alertmanger metric target(s)" 2021-09-20 18:08:56 +00:00
Michal Arbet
f0241f807f Remove haproxy,keepalived groups
Haproxy was renamed in [1].

[1] https://review.opendev.org/c/openstack/kolla-ansible/+/770618

Change-Id: Ib2d7f0774fede570a8c4c315d83afd420c31da0b
2021-09-16 13:41:13 +02:00
Zuul
3455105321 Merge "gnocchi: fix external ceph integration when gnocchi-statsd is disabled" 2021-09-15 09:33:03 +00:00
Bernd Mueller
ae69994db7 use ironic user in ironic_neutron_agent.ini file
Signed-off-by: Bernd Mueller <mueller@b1-systems.de>
Change-Id: Idb8a82acbd8193fd3fe71c080a1c57e8614d89ec
2021-09-13 10:55:03 +02:00
Pierre Riteau
72e0673989 Fix neutron upgrade using host limit without controllers
When running kolla-ansible upgrade with a host limit that does not
include controllers, the neutron upgrade fails.

Change-Id: I7125a6ef1f180db6997026ff27e84feb04ee239d
Closes-Bug: #1939691
2021-09-10 22:22:40 +02:00
Radosław Piliszek
c7bec2f30a [CI] Fix upgrade with kolla-build
Continuing fixing CI after [1], this patch fixes the other branch
that [2] has not previously included.

[1] https://review.opendev.org/c/openstack/kolla-ansible/+/805449
[2] 02e07a0860e8ca8bc1d6d7716e44bd2888591ecd

Change-Id: I44014a93b92b5a8782e34cf394881dec74cdeea1
2021-09-10 12:56:58 +00:00
Michał Nasiadka
02e07a0860 CI: Temporarily enable insecure registry
As a result of https://review.opendev.org/c/openstack/kolla-ansible/+/805449
CI is failing, because we don't have a TLS certificate on our registry.

This workaround will get our CI to be green while a proper patch
(TLS certs for registry) can be worked out.

Change-Id: Ia45c8a764a1f87d1c44717c4da3b9a3f94cdc967
2021-09-10 07:31:33 +02:00
Zuul
a1a22b3a89 Merge "toolbox: Allow different users logging to ansible.log" 2021-09-09 15:55:27 +00:00
Zuul
2bd945b0f6 Merge "Add a ovsdb_timeout variable for better configuration" 2021-09-09 11:01:11 +00:00
Zuul
f27c409eea Merge "Bump libvirtd memlock ulimit" 2021-09-09 10:58:27 +00:00
Zuul
f99bf8325f Merge "Never make Docker registry insecure by default" 2021-09-09 10:49:03 +00:00
Zuul
3b13a87288 Merge "[CI] Test instance health after upgrade" 2021-09-09 10:46:03 +00:00
Zuul
44c7b166cf Merge "Use Docker healthchecks for mistral services" 2021-09-08 16:07:51 +00:00
Hongbin Lu
21b4dc5416 Zun: Temporarily skip capsule test for ubuntu
Related-Bug: #1941982
Change-Id: I0e03db1177931ee6d17b21f614573575c3493eef
2021-09-07 21:09:55 +08:00
Michał Nasiadka
24e6a6ced0 toolbox: Allow different users logging to ansible.log
Currently only operations done with default kolla_toolbox user are logged
to /var/log/kolla/ansible.log.

In order to fix logging, permissions to ansible.log must allow writing
for other users in kolla group - and then a separate patch will follow
to make custom ansible.cfg file usable by other toolbox users.

Partial-Bug: #1942846
Change-Id: I1be60ac7647b1a838e97f05f15ba5f0e39e8ae3c
2021-09-07 14:12:11 +02:00
Zuul
c48469d2ac Merge "Allow override of rabbitmq config in kolla toolbox" 2021-09-07 10:34:54 +00:00
Zuul
39931aedb4 Merge "Fix kolla-toolbox with IPv6 and disabled RabbitMQ" 2021-09-07 10:34:52 +00:00
Radosław Piliszek
11d7233ccc Bump libvirtd memlock ulimit
This is required for libvirtd with cgroupsv2 (Debian Bullseye and
soon others).
Otherwise, device attachments simply fail.
The warning message suggests filtering will be disabled but it
actually just fails the action entirely.

Change-Id: Id1fbd49a31a6e6e51b667f646278b93897c05b21
Closes-Bug: #1941940
2021-09-03 15:37:13 +00:00
Zuul
b16e676be7 Merge "reno: follow up" 2021-09-03 08:34:31 +00:00
Zuul
0e9a6fe773 Merge "Rename role haproxy to loadbalancer" 2021-09-02 16:18:58 +00:00
Piotr Parczewski
d9e0ca5b3f reno: follow up
corrected nits from:
https://review.opendev.org/c/openstack/kolla-ansible/+/800068
https://review.opendev.org/c/openstack/kolla-ansible/+/803644

Change-Id: Ia30afd795067a36b132a8c75c72dd7c65d624a83
2021-09-02 14:59:26 +02:00