267 Commits

Author SHA1 Message Date
Zuul
ad7b32e4de Merge "Add Docker default AppArmor profile to neutron" 2019-03-15 17:06:44 +00:00
Jiří Suchomel
a2a5dda47c Added volume related keys to pod mounts to ease the overriding
If user wants to add an extra volumeMounts/volume to a pod,
amd uses override values e.g. like this

pod:
  mounts:
    nova_placement:
      init_container: null
      nova_placement:
        volumeMounts:
          - name: nova-etc
          ...

helm template parser complains with

Warning: The destination item 'nova_placement' is a table and ignoring the source 'nova_placement' as it has a non-table value of: <nil>

So when we create empty values for such keys in values.yaml, the source
will be present and warning does not need to be shown.

Change-Id: Ib8dc53c3a54e12014025de8fafe16fbe9721c0da
2019-03-15 16:29:19 +00:00
Zuul
1ad5467252 Merge "Increase default logging" 2019-03-06 04:09:58 +00:00
Zuul
532d583b9a Merge "Support per-host overrides of auto_bridge_add" 2019-03-06 03:42:49 +00:00
chengli3
6e2e4aba8d Support per-host overrides of auto_bridge_add
.Values.network.auto_bridge_add is a global config. So in multi nodes
deployment, it requires that all hosts have the same nic names. This is
a strict limit.
This patch is to support per-host auto_bridge_add, so that we can define
different auto_bridge_add for hosts.
Also, this patch move .network.auto_bridge_add to .conf.auto_bridge_add

Change-Id: I4a4d6efbbfe073d035bc5c03700fbe998e708d0f
Story: 2005059
Task: 29601
2019-03-05 16:40:58 +08:00
dt241s
584c63c2e9 Add Docker default AppArmor profile to neutron
Change-Id: I17b44183c00a23081f00a6932d519c2ed7806385
2019-02-28 14:09:58 -06:00
Jean-Philippe Evrard
5890ebf4f8 Increase default logging
The current helm chart defaults drops logs of any warnings
(and above) for any logger outside of the namespace
of the deployed chart.

This is a problem, as logging could reveal important information for
operators. While this could be done with a value override, there
is no reason to hide warning, errors, or critical information that
are happening in the cycle of the operation of the software
deployed with the helm charts. For example, nothing would get
logged in oslo_service, which is a very important part of running
OpenStack.

This fixes it by logging to stdout all the warnings (and above)
for OpenStack apps.

Change-Id: I16f77f4cc64caf21b21c8519e6da34eaf5d31498
2019-02-28 09:53:01 +00:00
Zuul
66ba0be81c Merge "Explicitly set datefmt for logging" 2019-02-27 01:31:09 +00:00
Zuul
62c937c6d0 Merge "Fix missing dependency key in neutron values.yaml" 2019-02-25 18:22:57 +00:00
sg774j
93658c75ec enable_proxy_headers_parsing to various services.
Adding this parameter to Cinder, Heat, Glance,and Neutron
config. Adding this parameter allows proper handling to resource
links in response using API services behind https proxy.

Change-Id: Ib99a16b6252b15d9f138417485731ec401cb8f81
2019-02-21 15:01:45 +00:00
Pavlo Shchelokovskyy
55645c7e73 Explicitly set datefmt for logging
the defaults in Python [0] and oslo.log [1] are such that when using
separate config file for logging configuration (log-config-append)
the log fomat of dates containes miliseconds twice (as in sec,ms.ms)
which is exactly what is currently seen in logs of OpenStack services
deployed by openstack-helm.

When not provided with datefmt log formatter option, Python effectively
uses '%Y-%m-%d %H:%M:%S,%f' [0] as a default time formatting string to
render `%(asctime)s`, but the defaults in oslo.log add another `.%f`
to it [1].

Since `log-date-format` oslo.log option has no effect when using
log-config-append, we need to explicitly set date format to avoid double
miliseconds rendering in date of log entries.

[0] 6ee41793d2/Lib/logging/__init__.py (L427-L428)
[1] http://git.openstack.org/cgit/openstack/oslo.log/tree/oslo_log/_options.py?id=7c5f8362b26313217b6c248e77be3dc8e2ef74a5#n148

Change-Id: I47aa7ce96770d94b905b56d6fe4abad428f01047
2019-02-21 08:28:35 +00:00
Sphicas, Phil (ps3910)
27ef3fba34 Fix missing dependency key in neutron values.yaml
Resolve issue with sriov dependency removal.
sriov key is required even if there are no dependencies.

Change-Id: I978b411502af575579e4f4a56e0974ef2baf5f52
2019-02-14 09:01:17 -08:00
David Smith
740eb2d219 Remove L3 and DHCP dependency for sriov_agent
Change-Id: I111d713c511d3d742f2ec4519d4f1091354bbb11
2019-01-28 18:19:31 -05:00
Jaesang Lee
2a03fd65bf Upgrade rally to 1.3.0
Since rally 1.0, rally has been a platform for testing, and rally for
openstack has been separated by rally-openstack. The current version
of rally in openstack-helm is version 0.8 which corresponds to ocata.
This patch tests with the latest version of rally-openstack, version
1.3.0, and removes scenarios that are no longer in use.

Change-Id: I380a976c0f48c4af0796c9d866fc8787025ce548
2018-12-20 00:22:49 +00:00
Mike Pham
95a6a2e875 Enable Egress policy enforcement
This PS is enable the Egress policies
and enforces them in Openstack-helm.

Depends-On: Icbe2a18c98dba795d15398dcdcac64228f6a7b4c
Change-Id: I6ef3cd157749fd562acb2f89ad44e63be4f7e975
2018-12-17 14:38:29 +00:00
Tin Lam
29f32a07ac Enable network policy enforcement
This patch set updates the gate to by default uses network policy
for all components and enforces them in Openstack-helm.

Change-Id: I70c90b5808075797f02670f21481a4f968205325
Depends-On: I78e87ef3276e948ae4dd2eb462b4b8012251c8c8
Co-Authored-By: Mike Pham <tp6510@att.com>
Signed-off-by: Tin Lam <tin@irrational.io>
2018-10-23 14:58:13 +00:00
Tin Lam
3cd4d0898a Upgrade default from newton to ocata
This patch set moves the default deployment to ocata from newton.
Newton zuul job is now moved into its separate job.

Change-Id: Ic534c8ee02179f23c7855d93a4707e5a2fd77354
Signed-off-by: Tin Lam <tin@irrational.io>
2018-10-13 04:18:46 +00:00
Roy Tang
fed088d84b Update Neutron TaaS Rootwrap Filter
Need to adjust taas rootwrap filter for i40e_sysfs_command.
Add code to allow sriov agent init script to run best effort.
Update way to set nic promisc mode.

Change-Id: Id1e22ea4b636ae7e05b880739a88c410a4da587c
2018-10-04 08:15:00 +00:00
Pete Birley
8e4ee070e6 SRIOV: Set sriov device mtu
This PS exposes the ability to set the vf device mtu.

Change-Id: If1193a71f1da391918e122c3d60f967023b732e1
Signed-off-by: Pete Birley <pete@port.direct>
2018-09-18 12:28:48 -05:00
Zuul
eecb07a645 Merge "Change default SRIOV exclude_devices to """ 2018-09-14 03:23:48 +00:00
Matt McEuen
7df16a8a10 Change default SRIOV exclude_devices to ""
The current default for exclude_devices is null, which will
render suboptimally when using secret-based configmaps.
This changes it to "" (empty string) which will render correctly
when SRIOV is enabled.

Change-Id: Ib33181943d90278e1e1e9498bb0d77fd6c029ce5
2018-09-13 16:52:36 -05:00
Zuul
34e8122cf5 Merge "Neutron TaaS support as L2 Extension" 2018-09-11 21:08:55 +00:00
Roy Tang
2f5a1c0c77 Neutron TaaS support as L2 Extension
This is the second draft to enhance neutron in ocata to support
Tap-as-a-service (TaaS) as a L2 Extension.

Change-Id: I96951b38dd43ab4904339b778b5726a579c76a4c
2018-09-07 14:20:19 +00:00
Jean-Philippe Evrard
05d0e2b4b8 Revert "Update OSH Author copyrights to OSF"
This reverts commit b1755c399341388627a668ab9fd6f43b7416f65a.

Change-Id: I215a172f2ff4220340292b95f5323847944baeb7
2018-08-28 17:25:13 +00:00
Matt McEuen
b1755c3993 Update OSH Author copyrights to OSF
This PS updates the "Openstack-Helm Authors" copyright attribution
to be the "OpenStack Foundation", as decided in the 2018-03-20
team meeting:
http://eavesdrop.openstack.org/meetings/openstack_helm/2018/openstack_helm.2018-03-20-15.00.log.html

No other copyright attributions were changed.

Change-Id: I167ceedab8fadee28c19514fad6f125d0a521caf
2018-08-26 17:17:41 -05:00
Pete Birley
4b3cbafc9a Keystone: Correct endpoint definition
This PS udpates the keystone endpoint definition to point to the
correct host for the admin endpoint when looked up using endpoint
functions from helm-toolkit.

Change-Id: Ic6b82a002cca92e37d21f594bad5f00758f1ea7a
Signed-off-by: Pete Birley <pete@port.direct>
2018-08-23 11:33:21 -05:00
Pete Birley
7e90bb02bd Logging: update logging config to pass null as a string to oslo config
This PS updates the logging config to pass null as a string though to
the rendering engine, which is required to avoid things like `<no value>`
when base64 encoding output.

Change-Id: I04d6afbc693ec1adf560c7be15704c8b7434c08f
Signed-off-by: Pete Birley <pete@port.direct>
2018-08-20 13:28:27 -05:00
Pete Birley
4a6d740154 Keystone: Stop running keystone container with root user
This PS updates the keystoen chart to stop running the keystone api
as the root user.

Change-Id: If3042210f761476846da02fc8e648c700267a591
Signed-off-by: Pete Birley <pete@port.direct>
2018-08-04 10:06:32 -05:00
Pete Birley
5f349ae653 Keystone: Disable v2 api
This PS disables the v2 keystone API, and finishes the migration to
full v3 support.

Change-Id: I3021ebe0bee668db9f28e7fb18e2d4b26172f209
Signed-off-by: Pete Birley <pete@port.direct>
2018-08-03 14:50:45 +00:00
Pete Birley
dc7008d9a5 Keystone: enable external access to admin endpoint
This PS moves to use port 80 by default for the keystone
asdmin endpoint, and adjusts paths accordingly.

Change-Id: Iccae704dadc17eba269e857301654782f64763c9
Signed-off-by: Pete Birley <pete@port.direct>
2018-08-02 14:40:20 +00:00
Pete Birley
d003a082c8 Logging: Only output std logs to stdout
This PS removes the double logging of openstack components that
were caused by outputting to both stdout and stderr.

Change-Id: I6e0ae5861bbf5b8d736ae08251aa865e1c4ce0d8
Signed-off-by: Pete Birley <pete@port.direct>
2018-07-27 11:01:30 +00:00
Pete Birley
95c5b4942d Keystone: Use service domain for service users
This PS moves to use a service domain for openstack service accounts
and users.

Change-Id: Ibe7c5f83a9fc9960fb85e53f9745d24f2192a94a
Signed-off-by: Pete Birley <pete@port.direct>
2018-07-26 05:19:38 +00:00
Pete Birley
ec2f9d0808 Keystone: Update admin port declaration to use standard layout
This PS updates keystone, and the keystone endpoints sections to use
the same layout for port declarations as other charts.

Change-Id: I7dddabee6c74bf023da4b1cdf722a409e7475f8f
Signed-off-by: Pete Birley <pete@port.direct>
2018-07-25 13:00:52 -05:00
Ruslan Khanbikov
e0ed5d2708 RabbitMQ: It adds HA and ttl policy for notificaitons queues
This patchset introduces mirroring "notificaitons.*" queues messages across
rmq cluster nodes and add ttl expiration time for messages, utilizing
rabbitmq helm-toolkit

the configuration example:

rabbitmq:
  policies:
    - name: "test"
      vhost: "nova"
      definition: ".*"
      definition:
        ha-mode: all
  ...

equals:
 rabbitmqctl set_policies -p nova test ".*" "{"ha-mode":"all"}"
Signed-off-by: Ruslan Khanbikov <rk760n@att.com>

Change-Id: I61215de07cfaeb9d896126ef9abc94fcc9e429b9
Depends-On: I85240a50fb64a4d74454768034fe3bdcf25f3019
2018-07-06 18:31:25 +00:00
Zuul
e8f561127f Merge "Add logging.conf files to enabled loggers/handlers/formatters" 2018-06-26 18:02:54 +00:00
Steve Wilkerson
da7bc575ec Add logging.conf files to enabled loggers/handlers/formatters
This introduces a mechanism for generating the logging.conf
file for the openstack services via the values. This allows us to
define loggers, handlers, and formatters for the services and the
modules they're composed of.

This also allows us to take advantage of the oslo fluent handler
and formatter. The fluent handler and formatter give us the
following benefits: sending logs directly to fluentd instead of
routed to stdout/stderr and then through fluentbit to fluentd,
project specific tags on the logged events (enables us to define
more robust filters in fluentd for aggregation if required),
full traceback support, and additional metadata (modules that
created logged event, etc)

Depends-On: https://review.openstack.org/577796

Change-Id: I63340ce6b03191d93a74d9ac6947f0b49b8a1a39
2018-06-26 09:51:14 -05:00
Pete Birley
e19be77f08 Ingress: Add initial TLS Support for core service public endpoints
This PS adds support for TLS on over-ridden fqdn's for public
endpoints for core OpenStack Services. Currently this implementation
is limited, in that it does not provide support for dynamicly loading
CAs into the containers, or specifying them manually via configuration.
As a result only well known or CA's added manually to containers will
be recognised.

Change-Id: I8f1b699af29cbed2d83ad91bb6840dccce8c5146
Depends-On: I535f38a8d92c01280d79926a1f0acd06984aabbf
Signed-off-by: Tin Lam <tin@irrational.io>
Signed-off-by: Pete Birley <pete@port.direct>
2018-06-26 07:15:24 +00:00
Pete Birley
9fbd4fe793 Neutron: Use internal endpoint for nova communication
This PS moves to use the internal endpoint for nova interaction.

Change-Id: Ifb796fb80314c97bc117d82a93a9cd0cfa95591e
Signed-off-by: Pete Birley <pete@port.direct>
2018-06-25 18:40:32 +00:00
Pete Birley
f0937065ed Neutron: Increase default number of RPC workers
This PS increases the number of default RPC works to a more
sane value - even with a large number of replicas a single worker
thread has difficulty keeping up.

Change-Id: I9a4ce7a88983b52c506b6a5f6253688f8a3aa61e
Depends-On: I705f2ddf3facfe56838f606f88cfb15b822d18a5
Signed-off-by: Pete Birley <pete@port.direct>
2018-06-13 13:17:27 +00:00
Chris Wedgwood
f1ed9027ff neutron: use defaults to be appropriate "good enough" for most users
Change-Id: Id9923de748e73704f46d215f6687c66e50d28b8d
2018-05-25 19:11:11 +00:00
Pete Birley
9258649674 Neutron: provide config support for queens
This PS updates the neutron config to support up to the queens
release of OpenStack.

Change-Id: I02ffbb1d85134605e665b6bef4379d45af134b58
Signed-off-by: Pete Birley <pete@port.direct>
2018-05-17 06:30:26 +00:00
Hyunsun Moon
896fc6b8d2 ovs,neutron: use auto_bridge_add for external bridge and interface
Also changed ovs-agent-init to take care of configuring default external
bridge and interface for cosistency with lb-agent.

Change-Id: I1d893b73a784f55594c30f17ef022348d68f0f1b
2018-05-15 14:20:22 +00:00
Steve Wilkerson
354b311ec5 Add local-registry image managment to OSH from OSH-Infra
This PS adds the local registry image managment to OSH from OSH-Infra.
With this the delta between helm-toolkits in the Repo's is removed,
allowing the toolkit from OSH-Infra to be used and the one from OSH
to be depreciated.

Change-Id: If5e218cf7df17261fe5ef249d281f9d9637e2f6a
Co-Authored-By: Pete Birley <pete@port.direct>
2018-05-12 14:35:48 +00:00
Zuul
1f458b2057 Merge "neutron: default to OVSHybridIptablesFirewallDriver firewall driver" 2018-04-27 20:00:17 +00:00
Chris Wedgwood
2f0383eed1 neutron: default to OVSHybridIptablesFirewallDriver firewall driver
Default to using the hybrid iptables driver as the openvswitch
firewall driver is considered experimental and less well tested.

https://docs.openstack.org/neutron/pike/admin/config-ovsfwdriver.html

Change-Id: I76815685f31627dadd7d7b45f1527e051d9cbb89
2018-04-27 01:37:24 +00:00
Sean Eagan
97ac197a6e Move to v0.3.1 of kubernetes-entrypoint
Move to v0.3.1 of kubernetes-entrypoint which has 2
breaking changes to pod dependencies, and also adds support for
depending on jobs via labels.

Change-Id: I49d2cea11fbe5c5919ae22a020b877ebbb285992
2018-04-25 12:45:50 -05:00
Hyunsun Moon
6c9b4df6fe openvswitch: allow setting ovsdb connection using vsctl
Also changed neutron agents to use default, ptcp:6640:127.0.0.1.

Change-Id: Id43c376851f0c408da4684c219dc79ef4a1c157b
Closes-Bug: 1761117
2018-04-24 11:01:31 +09:00
Pete Birley
5bb772cf50 Neutron: Enable sharing of network namespaces with host
This PS enables sharing of network namespaces with the host,
allowing for hitless upgrades of agents, and much simpler debugging.

It does however require mount propogation to be enabled in kubernetes
which is a alpha gated feature introduced in 1.8, and enabled by default
as a beta feature in 1.10.

Depends-On: I7a37f45ff6061b144c6f04233712cd84fccb3e83
Change-Id: I2a191a343fe637cbfd9e4af5277f9784af736dd1
2018-04-22 22:23:09 +00:00
Pete Birley
5b9f231788 Neutron: Update rootwrap for distros where python2 is the default
This PS updates rootwrap to account for distros where python2 is
the default entrypoint for python 2.7 as opposed to either python
or python2.7.

Change-Id: Ia67768985133242e0aef10bb6ce54028eabfe1cf
2018-04-19 20:29:11 -05:00
Pete Birley
40a45b9751 RabbitMQ: Add vHost management and improve security
This PS adds vhost management to rabbitmq jobs. It also prevents
sensitive information being displayed in the management job, and
removes the 'administrator' tag from service users.

Change-Id: Id337f763c5e4776bce7269676a8a2dc54dc2e5f8
2018-04-19 08:26:45 -05:00