4314 Commits

Author SHA1 Message Date
Jorge Niedbalski
1596475db6 [prometheus] Initial implementation of prometheus-alertmanager
This patch extends the prometheus role for being able
to deploy the prometheus-alertmanager[0] container.

The variable enable_prometheus_alertmanager
decides if the container should be deployed and enabled.

If enabled, the following configuration and actions are performed:

- The alerting section on the prometheus-server configuration
is added pointing the prometheus-alertmanager host group as targets.

- HAProxy is configured to load-balance over the prometheus-alertmanager
host group. (external/internal).

Please note that a default (dummy) configuration is provided, that
allows the service to start, the operator should extend it via a node custom config

[0] https://github.com/openstack/kolla/tree/master/docker/prometheus/prometheus-alertmanager

Change-Id: I3a13342c67744a278cc8d52900a913c3ccc452ae
Closes-Bug: 1774725
Signed-off-by: Jorge Niedbalski <jorge.niedbalski@linaro.org>
2018-07-11 16:20:35 -04:00
Zuul
2f37a2b4af Merge "Support deploying Monasca Log Transformer" 2018-07-11 06:51:38 +00:00
Zuul
dc3492867f Merge "Upgrade identity v2 to identity v3 API" 2018-07-11 06:40:42 +00:00
Zuul
fc7f0a9274 Merge "Fix ownership of virtualenv in bootstrap-servers" 2018-07-11 05:52:30 +00:00
Zuul
204ad2a205 Merge "update sahara.conf file for kolla" 2018-07-11 05:23:36 +00:00
Stanislaw Bogatkin
90b886e555 Keep timestamp field
There are cases when we can lost original timestamp field given from
logs, like when we send our logs to the next fluentd forwarder in chain
of forwarders, it will rewrite our timestamp by default. Save
`Timestamp` field explicitly to avoid such situation and be able to
reconstruct messages date and time.

Closes-Bug: #1781046
Change-Id: I2b4486aedacbe16dc4c0fb2e4e4984bd80e59f2d
2018-07-10 23:32:52 +03:00
Mark Goddard
e78f823110 Bifrost: set TFTP cache master path properly
Ironic creates hardlinks between the TFTP master image store and the
HTTP root path when iPXE is enabled. With Docker volumes used for these
locations we run into https://bugs.launchpad.net/ironic/+bug/1507894
during deployment. If we use a directory under /httpboot to store the
master images this issue is avoided.

This change uses the new bifrost config variable,
ironic_tftp_master_path added in [1] to configure the path, rather than
the existing hacked approach of modifying the ironic.conf config file
after the bifrost_deploy container has started.

[1] https://review.openstack.org/#/c/577071

Change-Id: I5c62999c4956bebd0d3920d756ce67ba194b0ebe
2018-07-10 15:07:23 +01:00
Mark Goddard
0cc2daa57d Fix sudoers in bootstrap-servers when user != group
In some cases we may want a configuration in which the kolla user's
primary group name is not the same as their username. Doing this
currently breaks the sudoers configuration, since user entries should
reference a user, or a group prefixed with a '%'.

There does not seem to be a good reason to give root privileges to the
entire group (which sometimes may be a shared group), so let's revert to
giving only the user root privileges.

See kayobe CI test [1] in which a different user and group were
configured, leading to permission denied when using kolla ansible.

[1] http://logs.openstack.org/53/581053/2/check/kayobe-overcloud-centos/a70168e

TrivialFix

Change-Id: I677778ebd0de58df0adfa2a8705f161ec5552283
2018-07-10 12:45:23 +01:00
Mark Goddard
8ec92df8e3 Make sudoers config optional in bootstrap-servers
In some environments it may not be desirable to modify the sudoers
configuration. This change makes this part of bootstrap-servers
optional, based on the create_kolla_user_sudoers variable.

Change-Id: I653403bfc5431741807edef57df58e05e679900b
2018-07-09 19:10:39 +01:00
Mark Goddard
2a69050e37 Append to kolla user groups in bootstrap-servers
This makes the bootstrap-servers command more idempotent, since without
the append argument set the kolla user will be removed from the docker
group before being added to it again in a later task.

TrivialFix

Change-Id: Iab0f6b5e18a103e9140631ee3ebbbb48c490bc24
2018-07-09 19:05:24 +01:00
Mark Goddard
4283dff9b4 Fix ownership of virtualenv in bootstrap-servers
In I86bf5e1df3d6568c4f1ca6f4757f08a3dd22754d, creation of the kolla user
was moved to after package installation to ensure the sudo package is
installed when required. This change does not work when python
dependencies are installed in a virtual environment however - when the
virtualenv variable is set.

This change moves the ownership change of the virtualenv to after the
kolla user has been created. It also uses the kolla_user and kolla_group
variables to set the user and group appropriately.

Change-Id: I320e5d611099ad162945a98d5505a79606da0eba
TrivialFix
2018-07-09 18:58:53 +01:00
Zuul
53b2cdca2c Merge "Remove trusts_delegated_roles" 2018-07-06 06:42:04 +00:00
Zuul
095ec410de Merge "Skydive: Update Keystone and Neutron configuration" 2018-07-06 06:27:58 +00:00
Doug Szumski
9c88262ad9 Support deploying Monasca Log Transformer
The Monasca Log Transformer takes raw, unstandardised logs from one
Kafka topic, standardises them with whatever rules the operator wants
to use, and then writes them to a standardised logs topic in Kafka. It
is currently implemented as a Logstash config file.

Since Kolla does a fairly good job of standardising logs, this service
does very little processing. However, when other sources of logs
are used, it may be useful to add rules to the Transformer, particularly
if it's not possible to standardise the logs at source.

Ingesting the logs from this service with Fluentd will be covered under
a different commit.

Change-Id: I31cbb7e9a40a848391f517a56a67e3fd5bc12529
Partially-Implements: blueprint monasca-roles
2018-07-05 17:33:53 +01:00
Zuul
bbacab5fb2 Merge "Standardise Monasca Kafka variable name" 2018-07-05 12:41:54 +00:00
Zuul
344ee2fc57 Merge "Fix missed notify for zun-wsproxy container." 2018-07-05 11:17:55 +00:00
Zuul
66205ab1fa Merge "Migrate ceph keyring creation to kolla_ceph_keyring module" 2018-07-05 07:29:37 +00:00
fan_guiju
420b523f31 Added delay_auth_decision config option for swift
The authtoken config variable delay_auth_decision must be set to True.
The default is False, but that breaks public access, StaticWeb, FormPost,
TempURL, and authenticated capabilities requests (using Discoverability).

Change-Id: I420a95f5f9fda3321a4acfc5846e40294a8bd588
Closes-Bug: #1768795
2018-07-04 23:11:40 -04:00
Peter Cipriano
acccec75a3 Fix missed notify for zun-wsproxy container.
Change-Id: I8b8631e1c215580dd7711a0c0b3683b06ddc47d3
2018-07-04 22:19:19 -04:00
MinSun
f692b4c9ac Make nova nova_instance_datadir_volume configurable.
User can use custom directory for nova instance.
For example using a shared file system as backend.

Change-Id: I11fe4891719a2e2a34888d8b798df5602e294e4f
2018-07-05 10:16:59 +08:00
Zuul
17cc67816f Merge "Option for enable SSL verification on docker registry" 2018-07-04 15:02:55 +00:00
Doug Szumski
b54ceef8bf Standardise Monasca Kafka variable name
Other lists of servers have the postfix _servers. To be consistent
this change uses the same format for Kafka.

Change-Id: Ia595f2ab485904e76fb76211f6715a7c019886ea
Partially-Implements: blueprint monasca-roles
2018-07-04 11:12:08 +01:00
chenxing
4968508d7f Upgrade identity v2 to identity v3 API
As of the Queens release, Keystone solely implements the Identity
API v3. Support for Identity API v2.0 has been removed since Queens
in favor of the Identity API v3.

Change-Id: If65b26935e8bd1e6655d84259499f4013762e4e3
Closes-Bug: #1778846
2018-07-04 05:58:32 +00:00
Sylvain Baubeau
d0f85e3fe5 Skydive: Update Keystone and Neutron configuration
Skydive recently splitted the OpenStack configuration:
one for the authentication - on the analyzer - 'auth.keystone'
and an other one for the Neutron probe on the agent
'agent.topology.neutron'.

Change-Id: Idce277d30f01e7a36499b1aee24c54779c54a807
2018-07-03 16:29:28 +02:00
Zuul
f1c6d54cef Merge "Only start tgtd when cinder_iscsi_helper=tgtadm" 2018-07-03 14:09:49 +00:00
Zuul
19d79f9484 Merge "dev mode: Add support for blazar" 2018-07-03 13:48:25 +00:00
Zuul
80916b3678 Merge "Fix default value logic of 'glance_backend_file' variable" 2018-07-03 12:44:33 +00:00
Zuul
58007e89ac Merge "fix freezer prechecks" 2018-07-03 12:37:06 +00:00
Zuul
9dd3b527b6 Merge "Create and use keystone_admin[project|user]" 2018-07-03 12:26:38 +00:00
Kien Nguyen
c4b8bedd01 Remove trusts_delegated_roles
This option's default value has changed since Newton.[1]

[1] aab01c00ff

Change-Id: I981a59be716072aab40862b3e23bbb1fbd1d63fc
2018-07-03 17:04:49 +07:00
Zuul
34d424a3ee Merge "Make Swift log_level changeable" 2018-07-03 07:24:58 +00:00
caoyuan
8397d3a7b6 Add kuryr prechecks for zun
the zun is need kuryr to be enabled[0], add it into
prechecks is a good idea.

[0]: https://docs.openstack.org/zun/latest/install/compute-install-ubuntu.html#install-and-configure-components

Change-Id: I4f46907c9b47b9108a9aa7bfbd668b833db420af
2018-07-03 12:45:03 +08:00
Zuul
28c0b0d252 Merge "Add zun-wsproxy into kolla-ansible" 2018-07-03 04:11:31 +00:00
Joshua Harlow
6a331d4e37 Create and use keystone_admin[project|user]
It is not always convenient to use the the given
admin project and admin user; especially when some clouds
use different user and project for there keystone 'admin'

This allows setting the variables for these users to something
else, and defaults them to there current values of 'admin'.

Change-Id: I22b79a30f01c90a92ecc0974886edf3791518f2f
2018-07-02 22:12:51 +00:00
Kevin Tibi
acfc4fd26a Option for enable SSL verification on docker registry
By default, kolla configure docker to use an insecure connection
with the private registry. If we want to use SSL verification we need
to add an option.

Change-Id: Id1805c9cfeb499da9bb56c70028f14c6f8bb20b6
2018-07-02 17:01:29 +02:00
Zuul
0a24bc4198 Merge "Add sudo package for bootstrap-servers" 2018-07-02 13:05:35 +00:00
Zuul
f8848529fa Merge "config proxy settings inside glance_api container" 2018-07-02 11:46:43 +00:00
Jeffrey Zhang
3397668d10 Migrate ceph keyring creation to kolla_ceph_keyring module
In this way, keyring caps is updatable.

Change-Id: Idf7f222645b5073e2c72d59eecf3d47b3f1dc6ba
2018-07-02 09:49:48 +08:00
Zuul
716a428c62 Merge "Expire mysql binary logs out of the box" 2018-06-29 18:53:11 +00:00
Paul Bourke
4423f25d84 Only start tgtd when cinder_iscsi_helper=tgtadm
Change-Id: I1b0e1df0e91b7a4abc408ee4b0852e1278e441ef
2018-06-28 10:04:23 +00:00
caoyuan
1b2bb2ef36 Add zun-wsproxy into kolla-ansible
the zun-wsproxy image is exists in kolla[0], but kolla-ansible
missing, this ps to add it.

[0]: https://github.com/openstack/kolla/tree/master/docker/zun/zun-wsproxy
Co-Authored-By: ZhijunWei <wzj334965317@outlook.com>

Change-Id: I89ef3463dfa5df8cf2d963ff0f0c7ddc382fc79b
Closes-Bug: #1765728
2018-06-27 15:18:49 +00:00
Zuul
12d8ba0523 Merge "Stop enabling the ironic's pxe_ipmitool driver" 2018-06-27 10:52:54 +00:00
Zuul
88d69fa0b6 Merge "Revert "Remove keystone_authtoken section for aodh"" 2018-06-27 09:55:32 +00:00
caoyuan
2b3a046871 Add the role enabled check for some projects
1. Add the role enabled check for some projects
2. adjust the file created positon for keystone to keep
consistence with others

Change-Id: Id2b893ba546b3adf41d97927f8d20dca403a0457
2018-06-27 16:59:28 +08:00
Zuul
b138820bf4 Merge "Fix cinder volume issue with multipathd" 2018-06-27 03:11:10 +00:00
Zuul
30f6456e81 Merge "Fix the task about --limit does not perform" 2018-06-27 01:49:39 +00:00
Doug Szumski
f450dd9779 Expire mysql binary logs out of the box
As reported in the bug, these can grow to 10s to 100s of GB
in a month. To reduce the chance of filling the disk and
bringing down the control plane this change defines
an expiry time.

Closes-Bug: 1720113
Change-Id: I508aad1f515d5108a3d08c90318b70d0a918908c
2018-06-26 17:26:59 +01:00
Benjamin Diaz
fbddccd5f1 Revert "Remove keystone_authtoken section for aodh"
This reverts commit f8fd06011aed5cd9028a8c1e206762a78e137df7.

Based on the code, overall uses service_credentials, but looks like a
few parts is using keystonemiddleware.auth_*

Closes-Bug: #1775956

Change-Id: I766a5624737cae892fe77fa8151b20e0972ed5b2
2018-06-26 12:37:13 -03:00
Zuul
0844bf33f5 Merge "Optimse the external ceph configure action" 2018-06-26 14:02:37 +00:00
Dmitry Tantsur
b698435c45 Stop enabling the ironic's pxe_ipmitool driver
Both the driver and the enabled_drivers options are being removed
this week. Stop setting them to avoid breakages.

Change-Id: I0e0bf851424b8f5839b159ef83f1cc65c30e2fb3
2018-06-26 15:20:43 +02:00