aboutsummaryrefslogtreecommitdiffstats
path: root/environments
AgeCommit message (Collapse)AuthorFilesLines
2017-06-13Merge "Change HorizonSecureCookies default to False"Jenkins1-0/+1
2017-06-13Merge "Fix IronicInspectorAdmin to be https"Jenkins1-2/+2
2017-06-13Merge "Make network-isolation environment rendered for all roles"Jenkins2-59/+37
2017-06-13Make network-isolation environment rendered for all rolesSteven Hardy2-59/+37
Currently there's some hard-coded references to roles here, rendering from the roles_data.yaml is a step towards making the use of isolated networks for custom roles easier. Partial-Bug: #1633090 Depends-On: Ib681729cc2728ca4b0486c14166b6b702edfcaab Change-Id: If3989f24f077738845d2edbee405bd9198e7b7db
2017-06-13Unblock CI by reverting to non-containerized HAProxyJiri Stransky1-1/+0
In change I90253412a5e2cd8e56e74cce3548064c06d022b1 we merged containerized HAProxy setup, but because of a typo in resource registry, CI kept using the non-containerized variant and it went unnoticed that the containerized HAProxy doesn't work yet. We merged a resource registry fix in Ibcbacff16c3561b75e29b48270d60b60c1eb1083 and it brought down the CI, which now used the non-working HAProxy. After putting in the missing haproxy container image to tripleo-common in I41c1064bbf5f26c8819de6d241dd0903add1bbaa we got further, but the CI still fails on HAProxy related problem, so we should revert back to using non-containerized HAProxy for the time being. Change-Id: If73bf28288de10812f430619115814494618860f Closes-Bug: #1697645
2017-06-12Merge "Fix typo in haproxy docker mapping"Jenkins1-1/+1
2017-06-12Fix IronicInspectorAdmin to be httpsAlex Schultz1-2/+2
As noted in the original patch review I5e743f789ab7dd731bc7ad26226a92a4e71f95a1 the IronicInspectorAdmin should be https. Change-Id: I6e37427da679775f02ff0c5fe55cfee51c122e3d
2017-06-12Merge "Containerize Manila API service"Jenkins1-0/+2
2017-06-11Merge "Containerized collectd"Jenkins1-0/+2
2017-06-09Merge "Containerize Tacker Services"Jenkins1-0/+2
2017-06-09Merge "Containerize Congress API service"Jenkins1-0/+2
2017-06-08Change HorizonSecureCookies default to FalseBen Nemec1-0/+1
HorizonSecureCookies is incompatible with non-ssl deployments, which is our default deployment method. When SSL is in use, it can be turned on in the enable-tls.yaml file. This does mean that existing users won't automatically get this feature turned on as part of their upgrade because enable-tls.yaml is an environment that is intended to be copied and edited, but it's simple to add the parameter to the file for users who want that behavior after they upgrade to a version where it is available. Change-Id: If83d3d8709fc4e0c09569e8bf524721d332bf560 Closes-Bug: 1696861
2017-06-08Merge "Containerize Horizon"Jenkins1-0/+1
2017-06-08Containerized collectdMatthias Runge1-0/+2
Change-Id: I05126a108f5ab790e729d1f98399dca5801ebd69
2017-06-08Fix typo in haproxy docker mappingMichele Baldessari1-1/+1
It is 'HAproxy' and not 'HAProxy'. This needs fixing so that the proper service is instantiated when a role includes the HAproxy service. Change-Id: Ibcbacff16c3561b75e29b48270d60b60c1eb1083
2017-06-08Containerize Tacker ServicesPradeep Kilambi1-0/+2
Closes-bug: #1668935 Change-Id: I83a02735eb445e831bc74ec786f2bb42cd2f87d6
2017-06-08Containerize Congress API servicePradeep Kilambi1-0/+2
Closes-bug: #1668929 Change-Id: I051edcf2980bb9c2521e21c410055690c012a0d1
2017-06-07Containerize Manila API serviceVictoria Martinez de la Cruz1-0/+2
Co-Authored-By: Martin André <m.andre@redhat.com> Partial-Bug: #1668922 Change-Id: I0c98f26b19caf755bbc80bd6a75fc17b5d191ae4
2017-06-06Merge "Fix CephPoolDefaultSize typo"Jenkins1-1/+1
2017-06-06Merge "Containerize HAProxy for the non-ha case"Jenkins1-0/+1
2017-06-06Containerize HAProxy for the non-ha caseDamien Ciabrini1-0/+1
This change implements an initial container for haproxy in the non-HA case (aka when the container is not spawn by pacemaker). We tested this using a stock kolla haproxy container image and we were able to get haproxy running on a container with net=host correctly. Change-Id: I90253412a5e2cd8e56e74cce3548064c06d022b1 Co-Authored-By: Michele Baldessari <michele@acksyn.org> Depends-on: I51c482b70731f15fee4025bbce14e46a49a49938 Closes-Bug: #1668936
2017-06-05Merge "Example environment file to use Neutron BGPVPN driver with ODL"Jenkins1-0/+12
2017-06-03Merge "Modify vhost user socket directory's default value in environment file"Jenkins1-1/+1
2017-06-03Merge "Add support for linuxbridge agent"Jenkins2-0/+9
2017-06-02Merge "Add sshd service to containerized compute role"Jenkins2-0/+2
2017-06-02Fix CephPoolDefaultSize typoAlex Schultz1-1/+1
Ie9bdd9b16bcb9f11107ece614b010e87d3ae98a9 improperly used CephPoolDefaultSite for the puppet-ceph-devel environment. The correct configuration item is CephPoolDefaultSize. Change-Id: If3a23f8d000061da62e4a7565a7fb6cf1ac97a4a
2017-05-30Merge "Change database sync timeout from 300 to 900 in low-memory-usage ↵Jenkins1-0/+2
environment file."
2017-05-26Add sshd service to containerized compute roleOliver Walsh2-0/+2
This adds the sshd puppet service to the containerized compute role All other roles already include this service from the defaults roles data, it is only missing from the compute role. As the sshd service runs on the docker host, this must remain as a traditional puppet service. NB the sshd puppet service does not enable sshd, it just enables the management of the sshd config via t-h-t/puppet. Closes-bug: #1693837 Change-Id: I86ff749245ac791e870528ad4b410f3c1fd812e0
2017-05-26Merge "Add heat environment for disabling all telemetry services"Jenkins1-0/+20
2017-05-25Add heat environment for disabling all telemetry servicesJohn Trowbridge1-0/+20
This will be used in our HA OVB CI job where we currently are failing due to running out of memory. Telemetry will still be tested via scenarios, but this will free up a large chunk of memory in the most memory intensive job. Closes-Bug: 1693174 Change-Id: Idefe9f0de47c5b0f29b7326642d697ed179e2eb8
2017-05-25Align optional services with optional services-dockerBogdan Dobrelya2-0/+2
Add missing optional services for docker, if present in non-docker optional services, and vice versa. Fix issues with non containerized Mongo resources are missing when deploying optional containerized zaqar service. Add non containerized Ironix-Pxe resources to the optional Ironic services, as it is done for the containerized Ironic. Change-Id: I56675e015fa4bbd6d9809dbf7c21453939321410 Signed-off-by: Bogdan Dobrelya <bdobreli@redhat.com>
2017-05-25Add support for linuxbridge agentBartosz Stopa2-0/+9
Currently TripleO does not support LinuxBridge driver, setting NeutronMechanismDrivers to linuxbridge will not force ml2 plugin to use linuxbridge. This commit adds new environment file which replaces default ovs agent with linuxbridge on Compute and Controller nodes. Change-Id: I433b60a551c1eeb9d956df4d0ffb6eeffe980071 Closes-Bug: #1652211 Depends-On: Iae87dc7811bc28fe86db0c422c363eaed5e5285b Depends-On: Ie3ac03052f341c26735b423701e1decf7233d935
2017-05-23Merge "Remove osd_pool_default_min_size to allow Ceph cluster to do the ↵Jenkins1-0/+2
right thing by default"
2017-05-23Example environment file to use Neutron BGPVPN driver with ODLRicardo Noriega1-0/+12
Service_provider is configured to point to networking-odl Change-Id: Icdb1c1414b237a9409e8e7dc55bb3c01da41841c Signed-off-by: Ricardo Noriega <rnoriega@redhat.com>
2017-05-23Merge "Example environment file to use L2GW Neutron Driver with ODL"Jenkins1-0/+18
2017-05-22Remove osd_pool_default_min_size to allow Ceph cluster to do the right thing ↵Keith Schincke1-0/+2
by default The default value is 0 which has the minimum number be caluclated based on the replica count from osd_pool_defaut_size. The default replica count is 3 and the calculated min_size is 2. If the replica count is 1 then the min_size is 1. ie: min_size = replica - (replica/2) Add CephPoolDefaultSize parameter to ceph-mon.yaml. This parameter defaults to 3 but can be overriden. See puppet-ceph-devel.yaml for an example Change-Id: Ie9bdd9b16bcb9f11107ece614b010e87d3ae98a9
2017-05-22Example environment file to use L2GW Neutron Driver with ODLRicardo Noriega1-0/+18
Agent service is disabled and service_provider is configured to point to networking-odl Change-Id: I570d15a092cff66666a74e95dee69f6531a58b22 Signed-off-by: Ricardo Noriega <rnoriega@redhat.com>
2017-05-22Disable mongodb by defaultJuan Antonio Osorio Robles2-0/+2
It's not used by any service that we enable by default. So instead, I added it to the environment that enables the services that use it. Change-Id: Id2e6550fb7c319fc52469644ea022cf35757e0ce
2017-05-22Modify vhost user socket directory's default value in environment fileSaravanan KR1-1/+1
From ocata, the vhost socket directory requires a different set of permissions from the default directory (/var/run/openvswitch). Modifying the directory to a new agreed directory which will be created in puppet. Closes-Bug: #1687993 Depends-On: I255f98c40869e7508ed01a03a96294284ecdc6a8 Change-Id: I77250ca84c9da2fb5a8381e6f60234f8a05cbf12
2017-05-21Change database sync timeout from 300 to 900 in low-memory-usage environment ↵Or Idgar1-0/+2
file. During a deployment on lower spec systems, the "db sync" can take longer than five minutes. The solution is to increase the default value of DatabaseSyncTimeout from 300 to 900 by using the environment file "low-memory-usage.yaml". Change-Id: I6463dbdd4dfe1d6f2dd283211cc496fe3a628fb0 Closes-bug: #1689318
2017-05-20Merge "Comment parameters for registry in docker.yaml"Jenkins1-4/+4
2017-05-20Merge "Add IronicInspector settings to the network map"Jenkins3-0/+9
2017-05-20Merge "Dell SC: Add secondary DSM support"Jenkins1-3/+7
2017-05-20Merge "Update the template_version alias for all the templates to pike."Jenkins1-1/+1
2017-05-19Merge "Add containerized neutron-metadata agent"Jenkins1-0/+1
2017-05-19Update the template_version alias for all the templates to pike.Carlos Camacho1-1/+1
Master is now the development branch for pike changing the release alias name. Change-Id: I938e4a983e361aefcaa0bd9a4226c296c5823127
2017-05-18Add containerized neutron-metadata agentBrent Eagles1-0/+1
This patch adds support for running the neutron metadata agent in a container. Change-Id: I53c62516c95d62f5ced70818d4eb4c2c341df0d7 Partial-Bug: #1668922
2017-05-18Comment parameters for registry in docker.yamlSteven Hardy1-4/+4
These duplicate the defaults in puppet/services/docker.yaml and break things if you include an environment file (e.g that generated by quickstart containers-default-parameters.yaml) before the docker.yaml. Instead it's probably more helpful to include the commented lines showing how to enable use of a local docker registry. Change-Id: I3896fa2ea7caa603186f0af04f6d8382d50dd97a Closes-Bug: #1691524
2017-05-18Add l2gw neutron agent supportPeng Liu1-5/+12
L2 Gateway (L2GW) is an API framework for OpenStack that offers bridging two or more networks together to make them look at a single broadcast domain. This patch implements the l2gw agent which is one of the backend of the l2 gateway service plugin. Change-Id: I1ae8132ceff9410be7bd82caddf0d14251e720bf Depends-On: If1501c153b1b170b9550cb7e5a23be463fba1fe9 Partially-Implements: blueprint l2gw-service-integration Signed-off-by: Peng Liu <pliu@redhat.com>
2017-05-17Merge "docker/internal TLS: spawn extra container for neutron server's TLS ↵Jenkins1-0/+7
proxy"