11546 Commits

Author SHA1 Message Date
Zuul
8dfab9675c Merge "Add trove-guestagent.conf" 2020-08-10 12:21:30 +00:00
Zuul
0c12a63cd2 Merge "Fix Barbican client (Castellan) with TLS (part 2)" 2020-08-10 11:55:40 +00:00
likui
3888196334 Add trove-guestagent.conf
Add trove-guestagent.conf templates for trove-guestagent service.
Default the Guest Agent config file to be injected during instance creation.

Change-Id: Id0750b84fef8e19658b27f8ae16a857e1394216e
2020-08-10 16:14:24 +08:00
Zuul
3d68859f15 Merge "CI: add kolla_python_version variable" 2020-08-07 15:42:13 +00:00
Mark Goddard
97e26b49cd Fix Barbican client (Castellan) with TLS (part 2)
This patch is a continuation of
I6a174468bd91d214c08477b93c88032a45c137be for the nova-cell role, which
was missed.

The Castellan (Barbican client) has different parameters to control
the used CA file.
This patch uses them.
Moreover, this aligns Barbican with other services by defaulting
its client config to the internal endpoint.

See also [1].

[1] https://bugs.launchpad.net/castellan/+bug/1876102

Closes-Bug: #1886615

Change-Id: I056f3eebcf87bcbaaf89fdd0dc1f46d143db7785
2020-08-07 14:16:04 +01:00
Zuul
fb9bdcb59b Merge "Enable glance role to copy extra configuration" 2020-08-07 09:26:02 +00:00
Michal Nasiadka
7c08f42b2c CI: add kolla_python_version variable
Change-Id: Ic697729bda80bfb83171bf68223a2703b8318aad
2020-08-07 09:28:24 +02:00
nikparasyr
6033b71d5e Enable glance role to copy extra configuration
Glance role copies glance-image-import.conf
when enabled to allow configuration of
glance interoperable image import. Property
protection can be enabled and file is copied.

Change-Id: I5106675da5228a5d7e630871f0882269603e6571
Closesl-Bug: #1889272
Signed-off-by: nikparasyr <nik.parasyr@protonmail.com>
2020-08-06 18:43:50 +02:00
Zuul
644f74b185 Merge "Update TLS documentation" 2020-08-05 16:32:56 +00:00
Zuul
54d8c92c7b Merge "Fix actions for Aodh and Swift" 2020-08-05 08:25:10 +00:00
Zuul
743df472d7 Merge "Fix play hosts for ironic, monasca, neutron, nova" 2020-08-04 13:36:27 +00:00
James Kirsch
589803c186 Update TLS documentation
Updated TLS documentation to reflect new features and configuration
options added in Ussuri.

Change-Id: I74550eaf394287b14fc521293cc4b5ea8074192c
Partially-Implements: blueprint add-ssl-internal-network
2020-08-04 13:58:39 +01:00
Radosław Piliszek
c1a6ca0d21 Fix actions for Aodh and Swift
These two roles were missing 'stop' and 'deploy-containers',
respectively.

Change-Id: Iaf434be9baf1973323bb177fad799aea39210fba
2020-08-04 14:32:37 +02:00
Zuul
4e62c86236 Merge "Add timesync prechecks" 2020-08-04 09:12:43 +00:00
Zuul
c58a824e88 Merge "[docker] Added a new flag to disable default iptables rules" 2020-08-04 09:11:28 +00:00
Zuul
0cb9fca9ca Merge "linuxbridge: Fix name of securitygroup section" 2020-08-03 11:04:57 +00:00
Zuul
f8de418aff Merge "CI: Add centos linuxbridge job" 2020-08-03 09:59:12 +00:00
Mark Goddard
9bca246b10 Fix play hosts for ironic, monasca, neutron, nova
Some plays were not applied to all groups referenced by the services
they deploy. In most cases this works fine, but if the default inventory
is modified this may cause problems where containers are not deployed to
hosts in the missing groups, if they are not a member of other groups
that the play is targeted to.

This change syncs up the play hosts for all services.

Closes-Bug: #1889387

Change-Id: I6b92d8e53a29b06a065e0611840140d09c8a6695
2020-08-03 09:50:59 +01:00
Zuul
00ed275c44 Merge "Fix kolla_address in IPv6 fully-routed topo case" 2020-08-01 04:14:34 +00:00
Zuul
202dc899f4 Merge "Fix Masakari role missing deploy-containers" 2020-07-31 13:25:05 +00:00
Zuul
0048e3dd11 Merge "prometheus-openstack-exporter config service filtering" 2020-07-31 10:54:46 +00:00
Zuul
0a6a30b77a Merge "Remove deprecated options in Trove" 2020-07-30 15:29:19 +00:00
Radosław Piliszek
5d3ca8b09e Fix Masakari role missing deploy-containers
Masakari was introduced parallelly to deploy-containers action and
so we missed to add this functionality to it.

Change-Id: Ibef198d20d481bc92b38af786cdf0292b246bb12
Closes-Bug: #1889611
2020-07-30 15:41:37 +02:00
Nick Jones
07f67f1b92 linuxbridge: Fix name of securitygroup section
With an incorrectly named section, whatever's defined in here is
actually ignored which can result in unexpected behaviour.

Closes-Bug: 1889455

Change-Id: Ib2e2b53e9a3c0e62a2e997881c0cd1f92acfb39c
Signed-off-by: Nick Jones <nick@dischord.org>
2020-07-30 09:43:51 +00:00
Michal Nasiadka
1f50f1be79 CI: Add centos linuxbridge job
Change-Id: I8aa02ac2caf320934be5ca439b9b9a24ac6aa573
2020-07-30 10:57:44 +02:00
Marcin Juszkiewicz
18e84f4d04 CI: drop not used Xenial nodeset definitions
Change-Id: I96c477063338c48b033694dd85482a8723fd498b
2020-07-29 17:41:55 +02:00
likui
3660c77637 Remove deprecated options in Trove
Option "network_label_regex" from group "DEFAULT" is
deprecated for removal.

Change-Id: I8aab2ca322159e61e4cbe9a5b30825a71a991e7e
2020-07-29 17:39:00 +08:00
Radosław Piliszek
3018199f0b Add timesync prechecks
If not running containerised chrony, we need to check that host
has its own means of system clock synchronization.

Change-Id: I31b3e9ed625d63a4bf82c674593522268c20ec4c
Partial-Bug: #1885689
2020-07-28 18:35:27 +00:00
Mark Goddard
9702d4c3c3 Performance: use import_tasks for check-containers.yml
Including tasks has a performance penalty when compared with importing
tasks. If the include has a condition associated with it, then the
overhead of the include may be lower than the overhead of skipping all
imported tasks. In the case of the check-containers.yml include, the
included file only has a single task, so the overhead of skipping this
task will not be greater than the overhead of the task import. It
therefore makes sense to switch to use import_tasks there.

Partially-Implements: blueprint performance-improvements

Change-Id: I65d911670649960708b9f6a4c110d1a7df1ad8f7
2020-07-28 12:10:59 +01:00
Zuul
da1d14b186 Merge "Move TLS documentation to its own page" 2020-07-28 10:30:41 +00:00
Zuul
2966766fc2 Merge "Drop a no-longer-relevant note" 2020-07-28 10:30:40 +00:00
Radosław Piliszek
fffe9021ff Drop a no-longer-relevant note
Modern Ansible handles this just fine.

Change-Id: Iea4d0499b92e2449ef8bc01651af6d3548ceab20
2020-07-27 17:34:54 +02:00
Radosław Piliszek
e1e8533c89 Drop RDP console variables
These are noop after Hyper-V support was removed.

Change-Id: Ib451b154893e5cedc366aed83c35f48d92c7ab82
2020-07-27 15:38:56 +02:00
Justinas Balciunas
9fc98be11a prometheus-openstack-exporter config service filtering
This change disables services in the Prometheus openstack-exporter
if they are not enabled in the deployment. Such behaviour allows
to avoid warnings and errors in the log files and keep the
log file contents clean and informative.

Change-Id: I4dcac976620a5f451e3d273183199aefe400994a
2020-07-27 13:30:26 +00:00
Zuul
21f5a02604 Merge "Remove Hyper-V integration" 2020-07-27 12:47:33 +00:00
Zuul
34ace98ff4 Merge "Improve Grafana DB bootstrap" 2020-07-27 11:57:49 +00:00
Zuul
cd9afc5ba3 Merge "Set Kafka default replication factor" 2020-07-27 11:57:45 +00:00
Zuul
676cfa5c1f Merge "fluentd: log to a file instead of stdout" 2020-07-27 10:57:43 +00:00
Mark Goddard
3870c74d0b Move TLS documentation to its own page
Moved the TLS documentation from "advanced-configuration" doc to its
own TLS document. This is in preparation for improving it.

Change-Id: I4c83f1810ef1222aaa3560174c1ba39328853c4e
Co-Authored-By: James Kirsch <generalfuzz@gmail.com>
2020-07-27 10:05:58 +00:00
Christian Berendt
6eb02245d6 Remove Hyper-V integration
Change-Id: I2e22ec47f644de2f1509a0111c9e1fffe8da0a1a
2020-07-27 10:25:46 +01:00
Dincer Celik
fc7ce6cabe [docker] Added a new flag to disable default iptables rules
Docker is manipulating iptables rules by default to provide network
isolation, and this might cause problems if the host already has an
iptables-based firewall.

This change introduces docker_disable_default_iptables_rules to
disable the iptables manipulation by putting "iptables: false" [1] to
daemon.json

For better defaults, this feature will be enabled by default in
Victoria.

[1] https://docs.docker.com/network/iptables/

Closes-Bug: #1849275

Change-Id: I165199fc98fb98f227f2a20284e1bab03ef65b5b
2020-07-27 09:09:45 +00:00
Doug Szumski
2c730590d7 Improve Grafana DB bootstrap
This fixes an issue where multiple Grafana instances would race
to bootstrap the Grafana DB. The following changes are made:

- Only start additional Grafana instances after the DB has been
  configured.

- During upgrade, don't allow old instances to run with an
  upgraded DB schema.

Change-Id: I3e0e077ba6a6f43667df042eb593107418a06c39
Closes-Bug: #1888681
2020-07-27 08:23:05 +00:00
Doug Szumski
a273e28e20 Set Kafka default replication factor
This ensures that when using automatic Kafka topic creation, with more than one
node in the Kafka cluster, all partitions in the topic are automatically
replicated. When a single node goes down in a >=3 node cluster, these topics will
continue to accept writes providing there are at least two insync replicas.

In a two node cluster, no failures are tolerated. In a three node cluster, only a
single node failure is tolerated. In a larger cluster the configuration may need
manual tuning.

This configuration follows advice given here:

[1] https://docs.cloudera.com/documentation/kafka/1-2-x/topics/kafka_ha.html#xd_583c10bfdbd326ba-590cb1d1-149e9ca9886--6fec__section_d2t_ff2_lq

Closes-Bug: #1888522

Change-Id: I7d38c6ccb22061aa88d9ac6e2e25c3e095fdb8c3
2020-07-27 08:23:05 +00:00
Michal Nasiadka
696533f228 fluentd: log to a file instead of stdout
fluentd logs currently to stdout, which is known to produce big docker logs
in /var/lib/docker. This change makes fluentd to log to /var/log/kolla/fluentd.

Closes-Bug: #1888852
Change-Id: I8fe0e54cb764a26d26c6196cef68aadc6fd57b90
2020-07-27 07:13:13 +00:00
Zuul
61e32bb131 Merge "Revert "Remove the waiting for ironic-api to be accessible"" 2020-07-25 09:57:55 +00:00
Mark Goddard
4a6050a333 Revert "Remove the waiting for ironic-api to be accessible"
This reverts commit 8fc86893893685e828600e21ddba147b64f0adc3.

It appears that it is still necessary to wait for ironic to be up, otherwise inspector may fail to start:

The baremetal service for 192.0.2.10:None exists but does not have any supported versions.

Change-Id: Ibc8314c91113618ce9e92b8933a63eba3cf3bbe1
2020-07-24 14:55:13 +00:00
Zuul
9a141eb144 Merge "Fix some CloudKitty API responses when behind SSL" 2020-07-24 10:38:57 +00:00
Zuul
ef38c505f8 Merge "Add support for encrypting etcd service" 2020-07-24 07:53:50 +00:00
Zuul
98f773d0be Merge "Masakari: copy TLS certificates into containers" 2020-07-24 07:53:48 +00:00
Zuul
39909a600c Merge "Performance: remove unnecessary conditions from includes" 2020-07-24 07:52:37 +00:00