3738 Commits

Author SHA1 Message Date
Terekhin, Alexey (at4945)
aa3efe9715 Adding the feature to launch Prometheus process with custom script
This change adds feature to launch Prometheus process using a custom script which should be stored in override values. Because the known issue https://github.com/prometheus/prometheus/issues/6934 is still open many years, we are going to struggle with growing WAL files using our custom downstream wrapper script which stops Prometheus process and deletes WALs.
This solution can not fit all customers because completely kills wal cached data but it is ok for our purposes. Such way I just added the feature to use another custom script to launch Prometheus and left original functionality by default. Default/custom mode are defined in 'values.yaml' as the body of the custom launcher script.

Change-Id: Ie02ea1d6a7de5c676e2e96f3dcd6aca172af4afb
2022-12-29 16:09:22 -08:00
vs422h (Vladimir Sigunov)
8232476426 [Grafana] Fix uid for the grafana user
The correct uid for the grafana user is 472 (see official docs).

Change-Id: I54c210e21ae2f10c9f0929764466d3c504b777ce
2022-12-28 14:12:48 -05:00
Stephen Taylor
575c2885de [ceph-client] Fix OSD count checks in the ceph-rbd-pool job
This change adjusts the minimum OSD count check to be based on the
osd value, and the maxiumum OSD count check to be based on the
final_osd value. This logic supports both full deployments and
partial deployments, with the caveat that it may allow partial
deployments to over-provision storage.

Change-Id: I93aac65df850e686f92347d406cd5bb5a803659d
2022-12-19 14:49:36 -07:00
Stephen Taylor
0aad6d05f0 [ceph-client] Correct check for too many OSDs in the pool job
The target OSD count and the final target OSD count may differ in
cases where a deployment may not include all of the hardware it is
expected to include eventually. This change corrects the check for
more OSDs running than expected to be based on the final OSD count
rather than the intermediate one to avoid false failures when the
intermediate target is exceeded and the final target is not.

Change-Id: I03a13cfe3b9053b6abc5d961426e7a8e92743808
2022-12-15 11:09:12 -07:00
Anselme, Schubert (sa246v)
d30bbfbfe7
Uplift nginx ingress controller to v1.5.1
Signed-off-by: Anselme, Schubert (sa246v) <sa246v@att.com>
Change-Id: I8e3eb2ebd52c0dae1d0cc0ebaa23885b8c0cf83f
2022-12-14 15:19:51 -05:00
Ritchie, Frank (fr801x)
f28a6ce288 Set sticky bit for tmp
tmp is an emptyDir volume mount with 0777 permissions. Some versions
of Ruby require the sticky bit to be set.

Change-Id: Ib6f4daa2068e7b29c62b5858848774b7117f6808
2022-11-22 15:12:03 -05:00
Zuul
d09cae73be Merge "Fix resource name in role of ingress chart" 2022-11-08 17:24:10 +00:00
v-vamshiko
6e832eef4b OVS - Enable hardware offload
Change-Id: I0dfc5689fdc2f5f66f059132b8a5475857a03c92
2022-11-03 22:01:49 +00:00
josedev-union
4a224320d8 Fix resource name in role of ingress chart
Change-Id: I05a959b4678852699b7b5531cd8303e15662b372
2022-10-30 20:00:52 +02:00
Gage Hugo
4d10d7e04d Remove fedora nodesets
osh-infra still have references to fedora 27 which is quite old now,
this change removes those definitions since they are unused.

Change-Id: I4f127113f0014ec2ed11f21e230facd08820af6e
2022-10-22 04:22:50 +00:00
Zuul
20311b8ece Merge "Update neutron images to xena" 2022-10-12 18:55:28 +00:00
Zuul
3d0286268f Merge "Bump minikube and k8s versions" 2022-10-12 18:50:26 +00:00
Gage Hugo
c60bdf744d Bump minikube and k8s versions
This change modifies the versions of both minikube
and kubernetes that we deploy for OSH.

minikube is now 1.25.2
kubernetes is 1.23.12

Change-Id: Ic33c1b1ca0110bdd87705ca5b891823f16b303f8
2022-10-11 19:22:27 +00:00
ju217q
a480a58da5 [RabbitMQ] Remove guest admin account
Moved removal of guest user account to init for security
and best practices.

Change-Id: I333f2a0e3124646cf7432e742978a0f3d2277a51
2022-10-10 20:09:56 +00:00
Gage Hugo
0e913fa97a Update neutron images to xena
A couple of the ingress images are still pointing to the older
stein release of neutron. This change updates them to use the
updated xena release.

Change-Id: I95aecec5474e587d01d7e8812ec662fbf46ca634
2022-10-04 12:07:54 -05:00
Stephen Taylor
6852f7c8ed [ceph-client] Make use of noautoscale with Pacific
The Ceph Pacific release has added a noautoscale flag to enable
and disable the PG autoscaler for all pools globally. This change
utilizes this flag for enabling and disabling autoscaler when the
Ceph major version is greater than or equal to 16.

Change-Id: Iaa3f2d238850eb413f26b82d75b5f6835980877f
2022-09-27 13:15:02 -06:00
Markin, Sergiy (sm515x)
ed7e58f4b1 [postgres] Update postgres to 14.5
Updated postgres binary version to 14.5.

Also replaced deprecated config item wal_keep_segments with wal_keep_size.

Change-Id: Ie86850f8ebb8bfaae4ba5457409d3920b230ce9c
2022-09-19 19:20:23 -05:00
Zuul
b704608be3 Merge "Add hostPort support in rabbitmq" 2022-09-13 05:11:55 +00:00
Markin, Sergiy (sm515x)
5c4056ad34 [DATABASE] Add verify databases backup
HTK - added verify_databases_backup_in_directory function that is
going to be defined inside mariadb/postgresql/etcd charts.

Mariadb chart - added verify_databases_backup_archives function
implementation.

Added mariadb-verify container to mariadb-backup cronjob to run
verification process.

Added remove backup verification pocess - comparition of local and remote file md5 hashes.

PostgreSQL chart - added empty implementation of verify_databases_backup_archives() function. This is a subject for future realization.

Change-Id: I361cdb92c66b0b27539997d697adfd1e93c9a29d
2022-09-09 01:41:00 +00:00
Ritchie, Frank (fr801x)
818c475f1d Grafana 8.5.10 with unified alerting
This PS updates Grafana to 8.5.10 and enables unified alerting
which will be the default in 9.x.

The following directories are required for unified alerting:
/var/lib/grafana/alerting
/var/lib/grafana/csv

If a user is upgrading from Grafana 7.x and wants to opt out of unified
alerting they will need to set:

[alerting]
enabled = true
[unified_alerting]
enabled = false

in grafana.ini. Additionally, to roll back, the env var

GF_DEFAULT_FORCE_MIGRATION: true

needs to be set for the grafana_run_migrator pod.

Unified alerting doc:

https://grafana.com/docs/grafana/v9.0/alerting/migrating-alerts/

Change-Id: I3a6ca005b9d9433e958802e7e978b81479a16fb8
2022-09-08 10:40:27 -04:00
Zuul
07e25f44d0 Merge "Fixing broken mariadb helmrelease for helmv3" 2022-09-04 21:35:40 +00:00
Zuul
d5cbc992e4 Merge "[libvirt] Remove use of exec" 2022-09-02 01:49:26 +00:00
Thales Elero Cervi
111f41edf6 Fixing broken mariadb helmrelease for helmv3
In an environment with helmv3, it was noticed that the mariadb
helmrelease is failing to render properly due to unsupported map key
type (int).

This change quickly fix this problem by quoting the value, forcing it to
be rendered as a string.

Signed-off-by: Thales Elero Cervi <thaleselero.cervi@windriver.com>
Change-Id: I2f2be87d0f79ca439e731d07354bcd5f149790d5
2022-09-01 13:31:09 -03:00
SPEARS, DUSTIN (ds443n)
d279c5ecdf [libvirt] Remove use of exec
Using the combination of `exec` and `systemd-run` is not compatable with containerd v1.6.6.

Change-Id: I80e3b92915830f7d2377688c9b229631348d4354
2022-09-01 10:57:25 -04:00
Oleksii Shcherba
6d9ef589e5 The new URI downloading calico manifests
When we use Calico v3.23, docs.projectcalico.org is
redirected to projectcalico.docs.tigera.io and moved manifests
to folder archive.
Calico v3.20 present in both locations.

Change-Id: I653fbac92c4ec5c2a53670391658a50a25fe81a0
2022-08-31 15:37:48 -05:00
Zuul
1760ca7af5 Merge "Adjusting of getting kibana ingress value parameters." 2022-08-30 02:58:49 +00:00
Terekhin, Alexey (at4945)
54055938e6 Adjusting of getting kibana ingress value parameters.
This change fixed getting network kibana ingress parameters.

Change-Id: I0d6609e6785566a4b6f341be0113ea80b184f7ae
2022-08-29 15:28:26 -07:00
wangjiaqi07
33fe830d04 remove unicode from code
Change-Id: Ida6ad438393ae1218e5c715872951a1fc9ecf115
2022-08-25 11:40:33 +08:00
Terekhin, Alexey (at4945)
a10c1b0c6c Fix for getting kibana ingress parameters.
This change fixed getting network kibana ingress parameters
from override value files.

Change-Id: If9931267edad2c1196e395168c562ef0d0d380d6
2022-08-15 13:36:37 -07:00
Zuul
ff70971009 Merge "Modify use_external_ingress_controller place in openstack-helm" 2022-08-11 16:33:11 +00:00
Jose Bautista
9b959144f0 Add hostPort support in rabbitmq
Change-Id: I0f295a80ee05e9df9c41e65e43569ecf531775c5
2022-08-10 09:18:32 +03:00
Mohammed Naser
70f2bc42bd Start using ensure-helm role for publishing
At the moment, our publishing scripts have their own little
way of deploying Helm so it's using the old version of Helm
which is failing linting.

This updates it so that it matches how we're running it inside
our lint playbook, and it will also fix the builds since it's
also failing because of the old version of Helm.

Change-Id: I719c2dadc3ca87912234ac13d87d63e8c7b779a7
2022-08-09 16:30:21 -04:00
Mohammed Naser
0224fb0f2c Fix chart builds
We broke the chart builds when we dropped the 'package' target in the
Makefile.   This fixes it also removes/drops the need to run the sed
locally since we point to the local folders anyways.

Change-Id: Iac8924f14c8fbb8e07b96b51790539c3ce1618e6
2022-08-09 10:46:56 -04:00
Alexey Terekhin
2dcd38e4b0 Update kibana index pattern creation
This change updates the kibana indices creation to repeatedly make
call attempts until we get a 200 response back.

Change-Id: Id0f012bda83913fc66c4ce105de97496043e487c
2022-08-04 15:36:13 +00:00
Yanos Angelopoulos
a4a2b5803b Modify use_external_ingress_controller place in openstack-helm
Having the "use_external_ingress_controller" field in
"network.server.ingress" yaml path is not a good choice as there are
services such neutron that use this path to define backend service,
named "server", options. We propose moving it to the root of the
path "network".

Change-Id: If98d6555a9c012872d3fb1a38b370a3195ea49ab
2022-07-29 16:43:19 +03:00
Brian Haley
f31cfb2ef9 support image registries with authentication
Based on spec in openstack-helm repo,
support-OCI-image-registry-with-authentication-turned-on.rst

Each Helm chart can configure an OCI image registry and
credentials to use. A Kubernetes secret is then created with these
info. Service Accounts then specify an imagePullSecret specifying
the Secret with creds for the registry. Then any pod using one
of these ServiceAccounts may pull images from an authenticated
container registry.

Change-Id: Iebda4c7a861aa13db921328776b20c14ba346269
2022-07-20 14:28:47 -05:00
Zuul
381d066f01 Merge "[ceph-client] Add the ability to run Ceph commands from values" 2022-07-19 06:49:33 +00:00
Kostiantyn Kalynovskyi
4c7031a6d9 Idempotency for deploy-k8s script
The change makes sure that the script runs idempotently
and if run twice in a row no extra work is going to be done

Change-Id: Ifc055b32528bc4702b480f2de92c544578c96d73
2022-07-15 16:05:01 +00:00
Stephen Taylor
de2227f6e7 [ceph-client] Add the ability to run Ceph commands from values
The major reason for the addition of this feature is to facilitate
an upgrade to the Pacific Ceph release, which now requires the
require-osd-release flag to be set to the proper release in order
to avoid a cluster warning scenario. Any Ceph command can be run
against the cluster using this feature, however.

Change-Id: I194264c420cfda8453c139ca2b737e56c63ef269
2022-07-15 07:32:59 -06:00
Yanos Angelopoulos
772198f15d Support having a single external ingress controller
This change allows creating a single ingress resource using the
public fqdn of the service, instead of two (cluster and namespace)
that is currently the case. Every openstack-helm chart can have a
network.server.ingress.use_external_ingress_controller boolean
field to choose the creation of a single ingress resource
(ingressName-namespace-fqdn).

Signed-off-by: Yanos Angelopoulos <yanos@admin.grnet.gr>
Change-Id: I46da850fccc3fee76595a2e6c49d51197a282c3e
2022-07-05 22:32:50 +00:00
Brian Haley
e511ba8517 Fix 'tox -e releasenotes'
Running 'tox -e releasenotes' fails with:

ERROR: You must give at least one requirement to install

Added missing doc/requirements.txt dep to tox.ini, similar
to recent openstack-helm patch.

Trivialfix

Change-Id: I01f82cdd92828ad0c99c343a1261f57562be3041
2022-06-29 14:23:53 -04:00
ahmesyed
1147988b8e Remove systemd-resolved to fix Ubuntu 20.04 issues
With Ubuntu 20.04 DNS would keep failing until systemd-resolved
is disabled and stopped.

Change-Id: I22ad34ac027eadfb723879bd86c99ac79aedee8a
2022-06-28 16:11:57 +00:00
Ritchie, Frank (fr801x)
4f0f5155e7 Set default python
Python needs to be set to python2 before checking for python3 to prevent
certain test framework errors.

Change-Id: Ifd1ed35160338688d3c723c055ca75cd999e46e0
2022-06-27 17:58:20 +00:00
Zuul
3e1572c959 Merge "[MariaDB] Add liveness probe to restart a pod that got stuck in a transfer wsrep_local_state_comment" 2022-06-22 17:26:49 +00:00
Zuul
5e1a6db7cb Merge "Add missing CRDs for volume snapshots (classes, contents)" 2022-06-22 02:26:32 +00:00
Markin, Sergiy (sm515x)
931ba39e87 [MariaDB] Add liveness probe to restart a pod that got stuck in a transfer wsrep_local_state_comment
Readiness probe that we currently have does not help with restarting a
pod that got stuck in a transfer state reported by
wsrep_local_state_comment.

root@mariadb-server-2:/# mysql_status_query wsrep_ready
OFF
root@mariadb-server-2:/# mysql_status_query wsrep_connected
ON
root@mariadb-server-2:/# mysql_status_query wsrep_cluster_status
non-Primary
root@mariadb-server-2:/# mysql_status_query wsrep_local_state_comment
Transfer

So the idea is to add a liveness probe that will take care of this.

Change-Id: I2ccecc75349667fe19c6f7f9dccc2dbbd17d0a5e
2022-06-21 20:32:52 +00:00
Ruslan Aliev
6addeaf050 Add missing CRDs for volume snapshots (classes, contents)
Also bump images versions.

Signed-off-by: Ruslan Aliev <raliev@mirantis.com>
Change-Id: I0d9814bd3427055c530f4b2e5de8bd17f36694dc
2022-06-17 14:31:23 -05:00
Zuul
9be2ea22a0 Merge "Add pods watch and list permissions" 2022-06-15 21:16:51 +00:00
Zuul
e92b91829c Merge "[ceph-mon] Allow for unconditional mon restart" 2022-06-15 21:13:32 +00:00
Walter Wahlstedt
9dad642c84 Add pods watch and list permissions
Change-Id: I050bc8df976032b094154a4c6612dd80eb4d54f8
2022-06-15 13:38:56 -05:00