16285 Commits

Author SHA1 Message Date
Zuul
4b9180acfa Merge "Copy generated inventory to bridge logs" 2020-07-16 23:45:49 +00:00
Zuul
33a87d7989 Merge "Revert "Revert "Add Zookeeper TLS support""" 2020-07-16 19:43:48 +00:00
Zuul
35ed33d594 Merge "Added development/rawhide image" 2020-07-16 04:39:01 +00:00
Zuul
c3b2aac1c1 Merge "Build multi-arch python-base/python-builder" 2020-07-15 23:19:31 +00:00
James E. Blair
7a32463f9d Revert "Revert "Add Zookeeper TLS support""
This reverts commit 05021f11a29a0213c5aecddf8e7b907b7834214a.

This switches Zuul and Nodepool to use Zookeeper TLS.  The ZK
cluster is already listening on both ports.

Change-Id: I03d28fb75610fbf5221eeee28699e4bd6f1157ea
2020-07-15 15:45:48 -07:00
danpawlik
7f9476f74e Added development/rawhide image
Fedora 33 is not released yet and the TripleO team would
like to perform some tests on that image.

Change-Id: I39f6bedadc12277739292cf31cc601bc3b6e30ec
2020-07-15 19:35:14 +02:00
Zuul
cd76e090c3 Merge "Update to gitea v1.12.2" 2020-07-15 17:05:41 +00:00
Monty Taylor
2302879244 Build multi-arch python-base/python-builder
In order to build multi-arch python images, we need
multi-arch python base and builder images.

Change-Id: Ifc0d6f7c16876bf55db8e1ee459a3eaa07744547
2020-07-15 09:09:35 -07:00
Zuul
1800b01bad Merge "Forward openstack-infra ML to openstack-discuss" 2020-07-15 15:22:14 +00:00
Zuul
ec22b7dac2 Merge "Stop cloning k8s-on-openstack" 2020-07-15 12:39:32 +00:00
Zuul
c1dfc78249 Merge "Backup all hosts with Ansible" 2020-07-14 23:02:52 +00:00
Ian Wienand
cacdb7f573 Backup all hosts with Ansible
The process of switching hosts to Ansible backups got a little
... backed up.  I think the idea was that we would move these legacy
hosts to an all-Ansible configuration a little faster than what has
ended up happening.

In the mean time, we have done a better job of merging our environment
so puppet hosts are just a regular host that runs a puppet step rather
than separate entities.

So there is no problem running these roles on these older servers.
This will bring consistency to our backup story with everything being
managed from Ansible.

This will currently setup these hosts to backup to the only opendev
backup server in vexxhost.  As a follow-on, we will add another
opendev backup host in another provider to provide dual-redundancy.
After that, we can remove the bup::site calls from these hosts and
retire the puppet-based backups.

Change-Id: Ieaea46d312056bf34992826d673356c56abfc87a
2020-07-15 08:33:44 +10:00
Ian Wienand
a020568ee5 Copy generated inventory to bridge logs
This is the inventory generated and used by bridge, copy it into the
logs as well.

Change-Id: I15d0ddc4c8340735c0332139ddedc06fc05b8269
2020-07-15 07:03:22 +10:00
Zuul
4b12ab8ad5 Merge "Add Zuul to backups group" 2020-07-14 20:04:57 +00:00
Monty Taylor
fca18e4776 Stop cloning k8s-on-openstack
We're not actually using this repo at the moment.

Change-Id: I765140c65e4d7b45e2258d8fc267090f982de058
2020-07-14 08:22:49 -05:00
Ian Wienand
c697f22413 run-base : don't strip root ssh private key
Builds running on the new container-based executors started failing to
connect to remote hosts with

 Load key "/root/.ssh/id_rsa": invalid format

It turns out the new executor is writing keys in OpenSSH format,
rather than the older PEM format.  And it seems that the OpenSSH
format is more picky about having a trailing space after the

 -----END OPENSSH PRIVATE KEY-----

bit of the id_rsa file.  By default, the file lookup runs an rstrip on
the incoming file to remove the trailing space.  Turn that off so we
generate a valid key.

Change-Id: I49bb255f359bd595e1b88eda890d04cb18205b6e
2020-07-14 13:13:13 +10:00
Ian Wienand
999a409530 Add Zuul to backups group
With I37dcce3a67477ad3b2c36f2fd3657af18bc25c40 we removed the
configuration managment of backups on the zuul server, which was
happening via puppet.  So the server continues in it's last state, but
if we ever built a fresh server it would not have backups.

Add it into the Ansible backup group, and uncomment the backup-server
group to get a run and setup the Ansible-managed backups.

Change-Id: I0af6b7fedc2f8f5a7f214771918138f72d298325
2020-07-14 08:35:57 +10:00
Zuul
5c7804d4a5 Merge "Paginate all the gitea get requests" 2020-07-13 20:53:27 +00:00
Clark Boylan
8e0420ddf3 Update to gitea v1.12.2
This includes a number of bugfixes. The most important for us likely
being one that allows you to create a repo with a HEAD set to something
other than master, https://github.com/go-gitea/gitea/pull/12182.

I didn't see any template deltas.

Change-Id: I45fdbf22fb1749d966fc5f6f457e89d40efe5949
2020-07-13 08:32:55 -07:00
Ian Wienand
5f2e6c43a8 gitea: open port 3081
I476674036748d284b9f51e30cc2ffc9650a50541 did not open port 3081 so
the proxy isn't visible.  Also this group variable is a better place
to update the setting.

Change-Id: Iad0696221bb9a19852e4ce7cbe06b06ab360cf11
2020-07-08 13:54:44 +10:00
Zuul
e15c702df6 Merge "gitea: install proxy" 2020-07-08 01:08:21 +00:00
Zuul
c72451c466 Merge "Don't install the track-upstream cron on review-test" 2020-07-08 00:26:25 +00:00
Ian Wienand
032a88412e gitea: install proxy
We have decided to go with the layer 7 reject rules; enable the
reverse proxy for production hosts.

Change-Id: I476674036748d284b9f51e30cc2ffc9650a50541
2020-07-08 09:12:36 +10:00
Zuul
49a4dc6a23 Merge "graphite: statsd timer settings" 2020-07-07 21:10:56 +00:00
Zuul
623c93d632 Merge "gitea: crawler UA reject rules" 2020-07-07 21:10:54 +00:00
Zuul
466e14b5f7 Merge "gitea: Add reverse proxy option" 2020-07-07 21:07:57 +00:00
Monty Taylor
4d26d9cb40 Don't install the track-upstream cron on review-test
This is just spawning containers that never die.

Change-Id: I1f5215c6e60ac59d1eb224bef9032785938dfc70
2020-07-07 14:40:24 -05:00
Ian Wienand
f8e35e676a graphite: statsd timer settings
This brings in the settings added with
I87c85f82f6d38506977bc9bf26d34f6e66746b01 to the container deployment.
As noted there, this stops statsd writing null values for sparesly
updated timers and counters.

Change-Id: I14b5ee40fc8efddfb7bad4fad8a8ae66746131d9
2020-07-07 17:03:46 +10:00
Zuul
c2b2efdf5b Merge "Graphite container deployment" 2020-07-07 00:41:10 +00:00
Zuul
1d610297f3 Merge "Grafana container deployment" 2020-07-06 05:56:02 +00:00
Ian Wienand
3cf11d298e Update grafana-container
There is a new release, update base container.  Add promote job that
was forgotten with the original commit
Iddfafe852166fe95b3e433420e2e2a4a6380fc64.

Change-Id: Ie0d7febd2686d267903b29dfeda54e7cd6ad77a3
2020-07-06 10:48:25 +10:00
Zuul
840a705ea9 Merge "Add new graphite and grafana servers" 2020-07-05 23:49:23 +00:00
Zuul
1e0d56ded5 Merge "UCA: mirror Victoria packages for Focal" 2020-07-04 19:58:02 +00:00
Ian Wienand
7ddbc3b54f Add new graphite and grafana servers
These are to be deployed with containers

Depends-On: https://review.opendev.org/739162
Change-Id: I595f203db86d74bdc31e09a04dbcac0eb906b080
2020-07-03 15:37:45 +10:00
Jeremy Stanley
c351382293 Forward openstack-infra ML to openstack-discuss
The OpenStack Infrastructure team has disbanded, replaced by the
OpenDev community and the OpenStack TaCT SIG. As OpenStack-specific
community infrastructure discussion now happens under TaCT's banner
and they use the openstack-discuss ML, redirect any future messages
for the openstack-infra ML there so we can close down the old list.

Change-Id: I0aea3b36668a92e47a6510880196589b94576cdf
2020-07-02 21:27:31 +00:00
Ian Wienand
185797a0e5 Graphite container deployment
This deploys graphite from the upstream container.

We override the statsd configuration to have it listen on ipv6.
Similarly we override the ngnix config to listen on ipv6, enable ssl,
forward port 80 to 443, block the /admin page (we don't use it).

For production we will just want to put some cinder storage in
/opt/graphite/storage on the production host and figure out how to
migrate the old stats.  The is also a bit of cleanup that will follow,
because we half-converted grafana01.opendev.org -- so everything can't
be in the same group till that is gone.

Testing has been added to push some stats and ensure they are seen.

Change-Id: Ie843b3d90a72564ef90805f820c8abc61a71017d
2020-07-03 07:17:28 +10:00
Ian Wienand
b146181174 Grafana container deployment
This uses the Grafana container created with
Iddfafe852166fe95b3e433420e2e2a4a6380fc64 to run the
grafana.opendev.org service.

We retain the old model of an Apache reverse-proxy; it's well tested
and understood, it's much easier than trying to map all the SSL
termination/renewal/etc. into the Grafana container and we don't have
to convince ourselves the container is safe to be directly web-facing.

Otherwise this is a fairly straight forward deployment of the
container.  As before, it uses the graph configuration kept in
project-config which is loaded in with grafyaml, which is included in
the container.

Once nice advantage is that it makes it quite easy to develop graphs
locally, using the container which can talk to the public graphite
instance.  The documentation has been updated with a reference on how
to do this.

Change-Id: I0cc76d29b6911aecfebc71e5fdfe7cf4fcd071a4
2020-07-03 07:17:22 +10:00
Zuul
90d1a15ea0 Merge "Upgrade Etherpad to 1.8.4" 2020-07-02 19:50:32 +00:00
Marcin Juszkiewicz
5e79b51695 UCA: mirror Victoria packages for Focal
Change-Id: Ie2195c8d0d9b3832a14a8bc7a1d761eb4aa53ee5
2020-07-02 16:11:26 +02:00
Dmitriy Rabotyagov
2d3cd843fd Add copr-lxc3 to list of mirrors
LXC3 is usable with CentOS 8, while lxc2 is not available for it anymore
So it's worth adding it to reduce network related issues in CI

Change-Id: I562a7d8000ecda8790da88f08128c35b1ec4a2c9
2020-07-02 00:15:37 +03:00
Zuul
9b54e7205c Merge "Remove the tcplog option from haproxy configs" 2020-07-01 19:40:20 +00:00
Ian Wienand
8d0d6155ed gitea: crawler UA reject rules
As described inline, this crawler is causing us problems as it hits
the backends indiscriminately.  Block it via the known UA strings,
which luckily are old so should not cause real client issues.

Change-Id: I0d78a8b625b69f600e00e8b3ea64576e0fdb84d9
2020-07-01 16:15:59 +10:00
Ian Wienand
870f664648 gitea: Add reverse proxy option
This adds an option to have an Apache based reverse proxy on port 3081
forwarding to 3000.  The idea is that we can use some of the Apache
filtering rules to reject certain traffic if/when required.

It is off by default, but tested in the gate.

Change-Id: Ie34772878d9fb239a5f69f2d7b993cc1f2142930
2020-07-01 15:33:05 +10:00
Clark Boylan
04efabaacb Update gitea access log format
We use the Ctx.Req object's RemoteAddr value as it should include the
IP:port combo according to https://golang.org/pkg/net/http/#Request. The
default template uses Ctx.RemoteAddr which Macaron attempts to parse for
x-forwarded-for values but this has the problem of stripping out any
port info.

The port info is important for us because we are doing layer 4 load
balancing and not http l7 load balancing. That means the ip:port
mappings are necessary to map between haproxy and gitea logs.

Change-Id: Icea0d3d815c9d8dd2afe2b1bae627510c1d76f99
2020-06-30 16:22:25 -07:00
Zuul
96fc5ea416 Merge "gitea-image: add a robots.txt" 2020-06-30 22:36:43 +00:00
Jeremy Stanley
836cb746c8 Remove the tcplog option from haproxy configs
Adding the tcplog option to an haproxy backend definition overrides
the default log format. Remove it so the supplied default (which we
based on the tcplog built-in default with some additions) will be
used instead.

Change-Id: Id302dede950c1c2ab8e74a662cc3cb1186a6593d
2020-06-30 22:22:28 +00:00
Zuul
a62d99498a Merge "Add backend source port to haproxy logs" 2020-06-30 21:39:03 +00:00
Ian Wienand
eb3e58da91 gitea-image: add a robots.txt
This looks like a very sane default robots.txt.  We can modify it as
required.

Change-Id: I8b9d3aa63538388e319f0216535f7a1d977f4885
2020-07-01 06:38:18 +10:00
Jeremy Stanley
497df9b4d1 Add backend source port to haproxy logs
When forwarding TCP sockets at OSI layer 4 with haproxy, it helps to
know the ephemeral port from which it sources each connection to the
backend. In this way, backend connections can be mapped to actual
client IP addresses by correlating backend service access logs with
haproxy logs.

Add "[%bi]:%bp" between the frontend name and backend name values
for the default log-format documented here:

    https://www.haproxy.com/blog/haproxy-log-customization/

Change-Id: Ic2623d483d98cd686a85d40bc4f2e8577fb9087f
2020-06-30 19:46:26 +00:00
James E. Blair
5b3d38d4d7 Enable access log in gitea
This will write an NCSA style access.log file to the logs volume.
This will let us see user agents, etc, to aid in troubleshooting.

Change-Id: I64457f631861768928038676545067b80ef7a122
2020-06-30 12:24:12 -07:00