267 Commits

Author SHA1 Message Date
Samuel Liu
73e696b3fb Replace node-role.kubernetes.io/master with control-plane
The master label is no longer present on kubeadm control plane nodes(v1.24). For new clusters, the label 'node-role.kubernetes.io/master' will no longer be added to control plane nodes, only the label 'node-role.kubernetes.io/control-plane' will be added. For more information, refer to KEP-2067[https://github.com/kubernetes/enhancements/tree/master/keps/sig-cluster-lifecycle/kubeadm/2067-rename-master-label-taint]: Rename the kubeadm "master" label and taint.

the kubernetes pr: https://github.com/kubernetes/kubernetes/pull/107533

Change-Id: Iad8c833371efb3ec35149c89eb8fafdf1150fa87
2023-03-21 09:02:00 +08:00
Sadegh Hayeri
c83582a866 Add ovn
Change-Id: Iacf6423399d51134af5b00b472ef6b42e17dfd6a
2023-03-17 21:31:48 +03:30
okozachenko
e03c021e70 Fix ovs dependency labels
Depends-On: https://review.opendev.org/c/openstack/openstack-helm-infra/+/866478
Change-Id: I94ba8c5143d6d243c0ba31af62639852582bd1c7
2022-12-14 01:51:32 +11:00
ricolin
b72f3d0f3c Avoid unrequired policy setup
OpenStack services already moved to use policy in code.
No need to have policy file at this point, at least no need to put
default policy rule to policy.yaml file anymore.
To put in duplicate rules, will cause unnecessay logs and process.
Also not healthy for policy in code maintain as the `default` rules in
openstack-helm might override actual default rules in code which we
might not even mean to change it at all.

Change-Id: I29ea57aa80444ed64673818e597c9ca346ba7b2f
2022-11-23 22:43:10 +08:00
josebb
52bdfae2bf Distinguish between port number of internal endpoint and binding
port number in neutron

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: I38dca50a8462faa4e9a7eeed56839b1b996eae06
2022-09-02 18:27:48 +03:00
josebb
753e43072d Support TLS endpoints in neutron
This allows neutron to consume TLS openstack endpoints.
Jobs consume openstack endpoints, typically identity endpoints.
And neutron itself interact with other openstack services via
endpoints.

Change-Id: I204b8a1a5a1fb253ea4207f5f5d76d47fac41bef
2022-08-12 21:28:56 +03:00
Brian Haley
ced30abead Support image registries with authentication
Based on spec
support-OCI-image-registry-with-authentication-turned-on.rst

Each Helm chart can configure an OCI image registry and
credentials to use. A Kubernetes secret is then created with this
info. Service Accounts then specify an imagePullSecret specifying
the Secret with creds for the registry. Then any pod using one
of these ServiceAccounts may pull images from an authenticated
container registry.

Related OSH-infra change:
https://review.opendev.org/c/openstack/openstack-helm-infra/+/848142

Change-Id: I54540f14fed29622bc5af8d18939afd06d65e2d8
2022-08-11 00:18:37 +00:00
Thiago Brito
c6c58102d3 Enable taint toleration for neutron
This changes use the helm-toolkit template for toleration
in openstack services

Signed-off-by: Lucas Cavalcante <lucasmedeiros.cavalcante@windriver.com>
Story: 2009276
Task: 43531
Depends-On: I168837f962465d1c89acc511b7bf4064ac4b546c
Change-Id: Ib33118af841b3273f146d94c6499c232b793a0be
2022-03-22 18:44:40 +00:00
Anderson, Craig (ca846m)
d514395d81 Improve health probe logging for nova and neutron
1. Log specific compute services failing rabbitMQ socket tests in nova
   health probe
2. Log specific compute services failing Database socket tests in nova
   health probe
3. Make log level configurable for nova and neutron health probes

Change-Id: I5e5d909d598af734596eb1732ae42808c1f6cd12
2022-02-22 10:05:15 +00:00
Thiago Brito
21157f8e6a Add option to disable helm.sh/hook annotations
Adding a helm3_hook in values.yaml file in case hooks needs
to be disabled (e.g. on Helm v2).

Signed-off-by: Thiago Brito <thiago.brito@windriver.com>
Change-Id: I1c03ea9ee88d1306283ce577b100c9864bec5d1b
2021-09-29 18:40:15 -03:00
xuxant02@gmail.com
ee0c142748 Made dnsmasq.conf overridable in configmap-etc secret
As dnsmasq.conf data in configmap-etc secret was empty, there was no option
to override it. Added the section in the values.yaml file where the dnsmasq.conf
config can be added which will be reflected in dhcp-agent.

Change-Id: If11c33f6f837dbf0d16e54cc92cabf399e773968
2021-07-14 14:24:05 +05:45
Mohammed Naser
44be41440c Wire up rootwrap daemon
This patch allow Neutron to start taking advantage of the rootwrap
daemon which should significantly increase performance.

Change-Id: I9d4f8dd8f9d36dc558e5e280b8f8193212345f34
2021-07-07 19:18:19 +05:45
Thiago Brito
8ab6013409 Changing all policies to yaml format
In the Victoria cycle oslo.policy decided to change all default policies
to yaml format. Today on openstack-helm we have a mix of json and yaml
on projects and, after having a bad time debugging policies that should
have beeing mounted somewhere but was being mounted elsewhere, I'm
proposing this change so we can unify the delivery method for all
policies across components on yaml (that is supported for quite some
time). This will also avoid having problems in the future as the
services move from json to yaml.

[1] https://specs.openstack.org/openstack/oslo-specs/specs/victoria/policy-json-to-yaml.html

Signed-off-by: Thiago Brito <thiago.brito@windriver.com>
Change-Id: Id170bf184e44fd77cd53929d474582022a5b6d4f
2021-05-26 18:15:41 -03:00
Haider, Nafiz (nh532m)
c900712f30 feat(tls): Make openstack services compatible with rabbitmq TLS
Depends-on: https://review.opendev.org/c/openstack/openstack-helm-infra/+/770678

Co-authored-by: Sangeet Gupta <sg774j@att.com>

Change-Id: I11e9ad3f4079b0e12e498f9ed57e5b87ae9dc66a
2021-05-21 01:27:18 +00:00
Kabanov, Dmitrii
46f4343f19 [Neutron] Update Rally tests
The PS updates Rally tests and removes "name" parameter. According to
Rally documentation [0] this parameter was always ignored. Latest version of Rally (2.1.0) is failing with a message: "Scenario plugin
'NeutronNetworks.<...>' doesn't pass restricted_parameters@default
validation. Details: You can't specify parameters 'name' in
'network_update_args/port_update_args/router_update_args/subnet_update_args'"

[0] https://github.com/openstack/rally-openstack/blob/2.1.0/CHANGELOG.rst

Change-Id: If4e80dfcb56a6e1daa1a055285329f9fc2d58332
2021-04-16 04:14:21 +00:00
KHIYANI, RAHUL (rk0850)
e1fac0ba4d Add missing flags to nginx container in neutron chart
This adds readOnly-fs flag to nginx container

Change-Id: Ie75e460fe2f45f1ae908f1fe475461267251461f
2020-11-04 00:04:09 -06:00
Tin Lam
6895a5ba7a fix(neutron): fixes tls issue
Updated neutron to use an Nginx sidecar to terminate internal TLS rather
than using Apache with a separate RPC servers. Multiple RPC servers (in
sidecar) causes communication issues with RabbitMQ causing expected
errors.

Change-Id: Iaa6d3d64b730a54b1b85a338517bcb5be1842bda
Signed-off-by: Tin Lam <tin@irrational.io>
2020-10-21 11:02:57 -05:00
Zuul
28669f8854 Merge "Sync logging values with upstream repos" 2020-09-17 04:08:40 +00:00
okozachenko
a8fc28696d Sync logging values with upstream repos
Some OSH charts have diffferent values for logger_root
handler from upsgream repo config defaul values.
Exactly, logger_root handler values.
This leads double logging finally.
To fix this, set logger_root as null like upstream repos.

Change-Id: I20e4f48efe29ae59c56f74e0ed9a4085283de6ad
2020-09-15 19:15:05 +03:00
Zuul
0abcd93fd9 Merge "Do not pass extra config files to neutron agents" 2020-09-14 22:06:07 +00:00
PrateekDodda
c57391366a Implement missing security context template for deployment server
This change adds security context template at pod/container level

Change-Id: I2180cdf934ce21bc5ae7148f2830d1a8683e82db
2020-09-03 14:22:22 +00:00
rajesh.kudaka
a2f2e0418f Update ovs dpdk config when required
This commit enables user to update dpdk bond config
only when required using the flag UPDATE_DPDK_BOND_CONFIG.
This helps in avoiding disruption in ovs dpdk during ovs
agent restart or when there is a update in bond config.

Setting UPDATE_DPDK_BOND_CONFIG to true will have default
behavior.

Setting UPDATE_DPDK_BOND_CONFIG to false will disable
configuration of bonds after the first run and can be
set to true when required.

Change-Id: I4c8ec145c8f1c1c1b5f7a5201f792e040fdd89a2
2020-08-14 11:26:53 -05:00
Andrii Ostapenko
2895760204
Don't use jq in rally containers
jq is not a part of xrally-openstack container, so using something worse
for the same instead of producing an extra image.

Change-Id: I0f22488fcb9f0247e6279e6754393f22b2dd0251
Signed-off-by: Andrii Ostapenko <andrii.ostapenko@att.com>
2020-08-11 14:03:22 -05:00
Ann Taraday
75472fc856 Do not pass extra config files to neutron agents
Passing config files from other agents result in
incorrent loading of extensions.

Value metadata_proxy_socket should be set in neutron.conf

Change-Id: If22168ccc77c918f7cfcb5d9d0d548f02d2a09e9
2020-08-07 22:08:55 +00:00
Gage Hugo
44882d60e2 Update xrally version to 2.0.0
This change updates the xrally image from 1.3.0 to 2.0.0
in order to better match the current versions of openstack
we are running in the gate.

Change-Id: I3f417a20e0f6d34b9e7ed569207a3df90c6ddfd2
2020-07-31 20:00:24 +00:00
sgupta
702c17eb78 feat(tls): Make openstack services compatible with mariadb with TLS
Depends-on: https://review.opendev.org/#/c/741037/
Change-Id: I21f4ede3bd18c0af8da1eba60cd0b7b932a31410
2020-07-14 23:32:03 +00:00
Zuul
009bde9d31 Merge "Add missing security context to Neutron pods/containers" 2020-07-13 18:46:33 +00:00
Tin Lam
918a307427 feat(tls): add tls support to openstack services
This patch set enables TLS for the following OpenStack services: keystone,
horizon, glance, cinder, heat, nova, placement and neutron for s- (stein)
and t- (train) release. This serves as a consolidation and clean up patch
for the following patches:

[0] https://review.opendev.org/#/c/733291
[1] https://review.opendev.org/#/c/735202
[2] https://review.opendev.org/#/c/733962
[3] https://review.opendev.org/#/c/733404
[4] https://review.opendev.org/#/c/734896

This also addresses comments mentioned in previous patches.

Co-authored-by: Gage Hugo <gagehugo@gmail.com>
Co-authored-by: sgupta <sg774j@att.com>

Depends-on: https://review.opendev.org/#/c/737194/

Change-Id: Id34ace54298660b4b151522916e929a29f5731be
Signed-off-by: Tin Lam <tin@irrational.io>
2020-07-10 09:36:31 -05:00
DODDA, PRATEEK REDDY (PD2839)
f742ebd6ae Add missing security context to Neutron pods/containers
This updates the Neutron chart to include the pod
security context on the pod template.

This also adds the container security context to set
readOnlyRootFilesystem flag to true

Change-Id: I50ccec785eb3b18d6c00df2ad5f566a72db4604d
2020-07-07 01:41:22 +00:00
Tin
5dd018ecbe RFC: fix(cleanup): neutron
Change-Id: I371da6b47ca6ef31c2909302b0aa71040f8930d9
Signed-off-by: Tin <tin@irrational.io>
2020-06-26 09:13:46 -05:00
Zuul
35a794ccc8 Merge "[neutron] Unhardcode probes timings" 2020-06-03 07:36:05 +00:00
Zuul
08e652a06f Merge "Allow neutron sriov agent to set num_queues per vf" 2020-06-02 15:18:25 +00:00
Roy Tang
da47437f32 Allow neutron sriov agent to set num_queues per vf
Change-Id: I465c882ab2939e5c0297c889fddc6c93bf5a7b91
2020-05-28 21:36:24 +00:00
Andrii Ostapenko
8cfa2aa390 Enable yamllint checks
- brackets
- braces
- colon
- commas
- comments
- document-end
- document-start
- empty-lines
- hyphens
- indentation
- new-line-at-end-of-file
- new-lines
- octal-values
- trailing-spaces

with corresponding code adjustment.

Also add yamllint.conf under the check.

Change-Id: Ie6251c9063c9c99ebe7c6db54c65d45d6ee7a1d4
2020-05-27 19:16:34 -05:00
Tin Lam
6d35251cf1 fix(rally): update cleanup
The cleanup script used for router, network, server, and flavor does not
account for the first column being the resource ID. Matching via
^[sc]_rally will always result in an empty return. This fix now correctly
matches the the name of the second column. This also fixes an issue where
rally creates flavor as "private", adding --all so it cleans up the
private flavors as well.

Change-Id: Id1a0e31e56b51fd92a95e8588d259ce21fa839d6
Signed-off-by: Tin Lam <tin@irrational.io>
2020-05-10 22:07:52 +00:00
Roy Tang
03a43cb91e Add support to set ovs module log level
Change-Id: I1fcd5b49cb2af4c76ed32b332f83ca8fa783a3c6
2020-04-17 11:02:19 -07:00
Gage Hugo
db79e79788 Remove OSH Authors copyright
The current copyright refers to a non-existent group
"openstack helm authors" with often out-of-date references that
are confusing when adding a new file to the repo.

This change removes all references to this copyright by the
non-existent group and any blank lines underneath.

Change-Id: Ia035037e000f1bf95202fc07b8cd1ad0fc019094
2020-04-03 20:53:32 +00:00
Oleksii Grudev
6969a5d596 [neutron] Unhardcode probes timings
This patch adds ability to unhardcode readiness/
liveness probes timings for those probes which still
were hardcoded. Moreover it introduces
RPC_PROBE_TIMEOUT and RPC_PROBE_RETRIES variables
which are passed to health probe script and
allow to unhardcode RPCtest  timeout and number of
retries

Change-Id: I2e48eed26abb82208a4ac4ae596d27ca8db99c90
2020-04-01 14:57:11 +03:00
Zuul
5763f146c9 Merge "Revert "Add neutron-ovs-cleanup to neutron charts"" 2020-03-10 00:52:42 +00:00
Hemachandra Reddy
9abf057340 Revert "Add neutron-ovs-cleanup to neutron charts"
This reverts commit 09d6a3e68c3d95e27ce7a7395735d058062e9d17.

It causes failures during brown field upgrade.

Change-Id: Ie619358bd0ae046bfb94b9e9d811251b54d2897e
2020-03-09 17:49:17 +00:00
Zuul
75af494206 Merge "[Rally] Add clean up script to neutron" 2020-03-04 02:01:20 +00:00
Deepak Tiwari
a101959321 OVS-DPDK: support for VLAN underlay for tunnel traffic
For OVS-DPDK deployments, where tunnel interface is bound to DPDK, there
should be support to transport the tunnel traffic over a VLAN network.

Change-Id: I1e63c9a6eb03a3f78a8592244d7c4b4928164fa5
2020-02-26 08:42:38 +00:00
Tin Lam
0b994a9c08 [Rally] Add clean up script to neutron
Rally can leave behind rally-generated network and router in the neutron
helm test. This patch set adds in a clean up script to clean up these
rally-generated resources.

Change-Id: If7dc9e4e5a659657e8a7e32f6d94703992dcd193
Signed-off-by: Tin Lam <tin@irrational.io>
2020-02-25 17:43:12 +00:00
Gage Hugo
f9dbba7043 Revert "Revert "Keystone Authtoken Cache: allow universal secret key to be set""
This reverts commit 90d070390db08abf9da42a2bac54397112bbcd48.

Change-Id: I017c6e9676b872e1aab21f9dc8aa2f93db58d49f
2020-02-21 11:16:55 -06:00
Zuul
8c6269f719 Merge "Fix health-probe concurrency and timings" 2020-02-20 22:04:40 +00:00
Zuul
7d34ef85e9 Merge "Add network namespace cleanup" 2020-02-20 19:02:55 +00:00
Sangeet Gupta
414b10fab0 Fix health-probe concurrency and timings
Changed Nova and Neutron health-probe script to exit if previous
probe process is still running.
The health-probe has RPC call timeout of 60 seconds and has 2
retries. In worst case scenario the probe process can run a little
over 180 seconds. Changing the periodSeconds so that probe starts
after previous one is complete. Also changing timeoutSeconds value
a little to give little more extra time for the probe to finish.
Increasing the liveness probe periods as they are not do critical
which will reduce the resource usage for the probes.

Co-authored-by: Randeep Jalli <rj2083@att.com>

Change-Id: Ife1c381d663c1e271a5099bdc6d0dfefb00d8d73
2020-02-18 17:24:23 +00:00
Deepak Tiwari
09d6a3e68c Add neutron-ovs-cleanup to neutron charts
neutron-ovs-cleanup needs to be run at the startup once

Change-Id: I0160bb0377082026af4aa90413196ce65cfd23c9
2020-02-18 05:11:24 +00:00
Vasyl Saienko
90d070390d Revert "Keystone Authtoken Cache: allow universal secret key to be set"
This reverts commit 1c85fdc390e05eb578874e77fad9d4ec942da791.

Do not use randomly generated strings in configmaps as this leads to
whole helm release redeployment even no values are changed. The random
items have to be generated outside of helm chart and provided via
values.
Also previous behaviour didn't allow to use cache during rolling upgrade
as new pods were spawned with new key.

Change-Id: I423611b18fca0d65e2e721a9c6a0c3d8df0813d2
2020-02-12 11:18:06 +00:00
Hemachandra Reddy
62db99d1d1 Add network namespace cleanup
Removes stale DHCP and L3 namespaces. The cron runs once in 12 hours.

Network namespace cleanup is implemented as a daemonset as Kubernetes
does not have a cronjob that works like daemonset-cronjob.
Network namespace cleanup should run on all nodes where DHCP and L3
agents run.

Change-Id: I7525e493067669026e0d57889a3e3238a2bd1308
2020-02-11 05:01:36 +00:00