Skip to content

Sync antelope caracal #1222

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 38 commits into from
Aug 19, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
510962d
rocky: update ovn to 24.03 (LTS) and OVS to 3.3
mnasiadka Jul 19, 2024
e9582c1
Bump kolla-image-tags
mnasiadka Jul 19, 2024
e92ecdf
Merge pull request #1182 from stackhpc/zed-yoga-merge
markgoddard Jul 23, 2024
9f637ea
ci-multinode: Change storage-mgmt subnet to avoid collision
markgoddard Jul 11, 2024
450fd35
Fix CVE-2024-40767
seunghun1ee Jul 23, 2024
1ebac90
Add missing newline characters at end of file
priteau Jul 23, 2024
09c6794
Merge pull request #1186 from stackhpc/2023.1-nova-bump
priteau Jul 23, 2024
1546dcc
Merge pull request #1188 from stackhpc/add-missing-newline
priteau Jul 24, 2024
8b0e622
Merge pull request #1185 from stackhpc/yoga-mn-subnet
markgoddard Jul 24, 2024
652b80b
Merge stackhpc/yoga into stackhpc/zed
markgoddard Jul 24, 2024
fc01838
Merge stackhpc/zed into stackhpc/2023.1
markgoddard Jul 24, 2024
f40f481
Merge pull request #1190 from stackhpc/2023.1-zed-merge
markgoddard Jul 24, 2024
42d348b
Add unified stackhpc_repos_enabled group var
Alex-Welsh Jul 24, 2024
61af1d8
Merge pull request #1192 from stackhpc/package-repo-option
markgoddard Jul 24, 2024
b03b549
docs: Update release train image
tomclark0 Jul 25, 2024
aadd084
docs: Update release train image
tomclark0 Jul 25, 2024
c3e661f
Support Nova images built from Rocky Linux 9.3
priteau Jul 26, 2024
9bc36f5
Rebuild Octavia images from our fork
priteau Jul 30, 2024
1a0d4c8
Merge pull request #1204 from stackhpc/ovn-octavia-provider-source
priteau Jul 30, 2024
95a432e
Magnum CAPI docs update
darmach Aug 1, 2024
9e3e39e
Remove reference to unused KA variable
sd109 Aug 1, 2024
02b9ed3
Fix issue with prometheus and hyphens
technowhizz Jul 30, 2024
accc481
fix: add missing endpoints for `Grafana` and `Horizon`
jackhodgkiss Aug 2, 2024
73da718
Merge pull request #1208 from stackhpc/blackbox-fix-singlefrontend
jackhodgkiss Aug 2, 2024
0986345
docs: Remove legacy Member and _member_ roles from Ceph RADOS Gateway…
markgoddard Aug 5, 2024
96f5c8f
docs: Improve Ceph RGW docs
markgoddard Aug 5, 2024
34bfb1a
Merge pull request #1210 from stackhpc/2023.1-rgw-roles
markgoddard Aug 5, 2024
54e4cbe
Merge pull request #1202 from stackhpc/antelope-ossa-2024-002-rl93-build
markgoddard Aug 5, 2024
956c483
Merge pull request #1201 from stackhpc/ark-image-update
markgoddard Aug 5, 2024
5003bad
Remove docs to encrypt wazuh secrets
MoteHue Aug 6, 2024
3e1ec70
Merge pull request #1214 from stackhpc/wazuh-secrets-docs
markgoddard Aug 6, 2024
ea6d1e6
Merge pull request #1207 from stackhpc/magnum-capi-docs-update
darmach Aug 7, 2024
fb5dbf0
Bump up Hashicorp collection version
cityofships Aug 7, 2024
0d64e97
Merge pull request #1215 from stackhpc/hcp_ver
markgoddard Aug 7, 2024
45a31eb
Merge branch 'stackhpc/2023.1' into ovn_24_03
bbezak Aug 9, 2024
3f1e622
bump rocky9 ovs/ovn images build from R9.4
bbezak Aug 9, 2024
e647aa1
Merge pull request #1172 from stackhpc/ovn_24_03
bbezak Aug 12, 2024
e6d7c15
Merge remote-tracking branch 'origin/stackhpc/2023.1' into sync-antel…
Alex-Welsh Aug 12, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion doc/source/_static/images/release-train.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
17 changes: 16 additions & 1 deletion doc/source/configuration/cephadm.rst
Original file line number Diff line number Diff line change
Expand Up @@ -347,6 +347,10 @@ should be used in the Kolla Manila configuration e.g.:
RADOS Gateways
--------------

RADOS Gateway integration is described in the :kolla-ansible-doc:`Kolla Ansible
documentation
<https://docs.openstack.org/kolla-ansible/latest/reference/storage/external-ceph-guide.html#radosgw>`.

RADOS Gateways (RGWs) are defined with the following:

.. code:: yaml
Expand Down Expand Up @@ -377,7 +381,7 @@ The set of commands below configure all of these.
- "config set client.rgw rgw_enable_apis 's3, swift, swift_auth, admin'"
- "config set client.rgw rgw_enforce_swift_acls true"
- "config set client.rgw rgw_keystone_accepted_admin_roles 'admin'"
- "config set client.rgw rgw_keystone_accepted_roles 'member, Member, _member_, admin'"
- "config set client.rgw rgw_keystone_accepted_roles 'member, admin'"
- "config set client.rgw rgw_keystone_admin_domain Default"
- "config set client.rgw rgw_keystone_admin_password {{ secrets_ceph_rgw_keystone_password }}"
- "config set client.rgw rgw_keystone_admin_project service"
Expand All @@ -393,6 +397,12 @@ The set of commands below configure all of these.
- "config set client.rgw rgw_swift_account_in_url true"
- "config set client.rgw rgw_swift_versioning_enabled true"

Enable the Kolla Ansible RADOS Gateway integration in ``kolla.yml``:

.. code:: yaml

kolla_enable_ceph_rgw: true

As we have configured Ceph to respond to Swift APIs, you will need to tell
Kolla to account for this when registering Swift endpoints with Keystone. Also,
when ``rgw_swift_account_in_url`` is set, the equivalent Kolla variable should
Expand All @@ -414,6 +424,11 @@ before deploying the RADOS gateways. If you are using the Kolla load balancer

kayobe overcloud service deploy -kt ceph-rgw,keystone,haproxy,loadbalancer

There are two options for load balancing RADOS Gateway:

1. HA with Ceph Ingress services
2. RGWs with hyper-converged Ceph (using the Kolla Ansible deployed HAProxy
load balancer)

.. _RGWs-with-hyper-converged-Ceph:

Expand Down
13 changes: 4 additions & 9 deletions doc/source/configuration/magnum-capi.rst
Original file line number Diff line number Diff line change
Expand Up @@ -60,12 +60,12 @@ To deploy the CAPI management cluster using this site-specific environment, run

.. code-block:: bash

# Activate the environment
./bin/activate <site-specific-name>

# Install or update the local Ansible Python venv
./bin/ensure-venv

# Activate the environment
source bin/activate <site-specific-name>

# Install or update Ansible dependencies
ansible-galaxy install -f -r ./requirements.yml

Expand Down Expand Up @@ -103,12 +103,7 @@ To configure the Magnum service with the Cluster API driver enabled, first ensur

Next, copy the CAPI management cluster's kubeconfig file into your stackhpc-kayobe-config environment (e.g. ``<your-skc-environment>/kolla/config/magnum/kubeconfig``). This file must be Ansible vault encrypted.

The following config should also be set in your stackhpc-kayobe-config environment:

.. code-block:: yaml
:caption: kolla/globals.yml

magnum_capi_helm_driver_enabled: true
The presence of a kubeconfig file in the Magnum config directory is used by Kolla to determine whether the CAPI Helm driver should be enabled.

To apply the configuration, run ``kayobe overcloud service reconfigure -kt magnum``.

Expand Down
2 changes: 0 additions & 2 deletions doc/source/configuration/wazuh.rst
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,6 @@ The short version
particular the defaults assume that the ``provision_oc_net`` network will be
used.
#. Generate secrets: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml``
#. Encrypt the secrets: ``ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/ci-multinode/wazuh-secrets.yml``
#. Deploy the Wazuh manager: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-manager.yml``
#. Deploy the Wazuh agents: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-agent.yml``

Expand Down Expand Up @@ -250,7 +249,6 @@ It will be used by wazuh secrets playbook to generate wazuh secrets vault file.
.. code-block:: console

kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/wazuh-secrets.yml

Configure Wazuh Dashboard's Server Host
---------------------------------------
Expand Down
2 changes: 1 addition & 1 deletion etc/kayobe/ansible/requirements.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ collections:
- name: stackhpc.pulp
version: 0.5.5
- name: stackhpc.hashicorp
version: 2.5.0
version: 2.5.1
- name: stackhpc.kayobe_workflows
version: 1.0.3
roles:
Expand Down
2 changes: 1 addition & 1 deletion etc/kayobe/ansible/scripts/aio-init.sh
Original file line number Diff line number Diff line change
Expand Up @@ -142,4 +142,4 @@ if ! $KOLLA_OPENSTACK_COMMAND flavor list | grep -q m1.tiny; then
$KOLLA_OPENSTACK_COMMAND flavor create --id 5 --ram 16384 --disk 160 --vcpus 8 m1.xlarge
fi

touch /tmp/.init-runonce
touch /tmp/.init-runonce
6 changes: 3 additions & 3 deletions etc/kayobe/apt.yml
Original file line number Diff line number Diff line change
Expand Up @@ -74,15 +74,15 @@ stackhpc_apt_repositories:
# Do not replace apt configuration for non-overcloud hosts. This can result in
# errors if apt reconfiguration is performed before local repository mirrors
# are deployed.
apt_repositories: "{{ stackhpc_apt_repositories | selectattr('required') | list if 'overcloud' in group_names else [] }}"
apt_repositories: "{{ stackhpc_apt_repositories | selectattr('required') | list if stackhpc_repos_enabled | bool else [] }}"

# Whether to disable repositories in /etc/apt/sources.list. This may be used
# when replacing the distribution repositories via apt_repositories.
# Default is false.
# Do not disable the default apt configuration for non-overcloud hosts. This
# can result in errors if apt reconfiguration is performed before local
# repository mirrors are deployed.
apt_disable_sources_list: "{{ 'overcloud' in group_names }}"
apt_disable_sources_list: "{{ stackhpc_repos_enabled | bool }}"

# Apt auth configuration for accessing the package repository mirror.
stackhpc_apt_auth:
Expand All @@ -98,7 +98,7 @@ stackhpc_apt_auth:
# * filename: Name of a file in which to store the auth configuration. The
# extension should be '.conf'.
# Default is an empty list.
apt_auth: "{{ stackhpc_apt_auth if 'overcloud' in group_names and stackhpc_repo_mirror_username is truthy else [] }}"
apt_auth: "{{ stackhpc_apt_auth if stackhpc_repos_enabled | bool and stackhpc_repo_mirror_username is truthy else [] }}"

###############################################################################
# Dummy variable to allow Ansible to accept this file.
Expand Down
4 changes: 2 additions & 2 deletions etc/kayobe/dnf.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,10 +41,10 @@
# file: myrepo
# gpgkey: http://gpgkey
# gpgcheck: yes
#dnf_custom_repos:
dnf_custom_repos: "{{ stackhpc_dnf_repos if stackhpc_repos_enabled | bool else [] }}"

# A dict of custom repositories that point to the local Pulp server.
# To use these repos, set dnf_custom_repos to the value of stackhpc_dnf_repos.
# To use these repos, set stackhpc_repos_enabled to true.
# This is done by default for hosts in the overcloud group via a group_vars
# file.
stackhpc_dnf_repos: "{{ dnf_custom_repos_el9 | combine(dnf_custom_repos_rocky_9) | combine(dnf_custom_repos_elrepo_9 if dnf_install_elrepo_9 | bool else {}) }}"
Expand Down
2 changes: 1 addition & 1 deletion etc/kayobe/environments/aufn-ceph/configure-openstack.sh
Original file line number Diff line number Diff line change
Expand Up @@ -25,4 +25,4 @@ ansible-galaxy collection install -p ansible/collections -r requirements.yml
source $BASE_PATH/src/kayobe-config/etc/kolla/public-openrc.sh

# Run script to configure openstack cloud
tools/openstack-config
tools/openstack-config
2 changes: 1 addition & 1 deletion etc/kayobe/environments/aufn-ceph/inventory/groups
Original file line number Diff line number Diff line change
Expand Up @@ -26,4 +26,4 @@ storage-ceph
# Monitoring groups

[monitoring:children]
controllers
controllers
7 changes: 4 additions & 3 deletions etc/kayobe/environments/ci-multinode/networks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -107,10 +107,11 @@ storage_allocation_pool_end: 192.168.41.254
storage_vlan: 105

# Storage management network
storage_mgmt_cidr: 192.168.42.0/24
# NOTE: Skipping the .42 subnet to avoid a collision with a popular number.
storage_mgmt_cidr: 192.168.43.0/24
storage_mgmt_mtu: "{{ ansible_facts.default_ipv4.mtu - 50 }}"
storage_mgmt_allocation_pool_start: 192.168.42.3
storage_mgmt_allocation_pool_end: 192.168.42.254
storage_mgmt_allocation_pool_start: 192.168.43.3
storage_mgmt_allocation_pool_end: 192.168.43.254
storage_mgmt_vlan: 106

# Provision overcloud network
Expand Down
2 changes: 1 addition & 1 deletion etc/kayobe/inventory/group_vars/all/stackhpc
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,4 @@
# Feature flags

# Whether or not to run CIS benchmark hardening playbooks. Default is false.
stackhpc_enable_cis_benchmark_hardening_hook: false
stackhpc_enable_cis_benchmark_hardening_hook: false
6 changes: 6 additions & 0 deletions etc/kayobe/inventory/group_vars/all/stackhpc-repos
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
---
# Use upstream package repos by default to avoid situations where the
# seed-hypervisor tries to use a local pulp repo on the seed VM before the seed
# vm has been provisioned
# This behaviour is overriden for Overcloud hosts.
stackhpc_repos_enabled: false
4 changes: 2 additions & 2 deletions etc/kayobe/inventory/group_vars/overcloud/stackhpc-repos
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
# Only use local pulp mirrors for overcloud hosts
# to avoid situations where the seed-hypervisor
# tries to use a local pulp repo on the seed VM
# before the seed vm has been provisioned
dnf_custom_repos: "{{ stackhpc_dnf_repos }}"

stackhpc_repos_enabled: true
enable_docker_repo: false
46 changes: 41 additions & 5 deletions etc/kayobe/kolla.yml
Original file line number Diff line number Diff line change
Expand Up @@ -147,6 +147,14 @@ kolla_sources:
type: git
location: https://github.com/stackhpc/networking-generic-switch.git
reference: stackhpc/{{ openstack_release }}
octavia-api-plugin-ovn-octavia-provider:
type: git
location: https://github.com/stackhpc/ovn-octavia-provider.git
reference: stackhpc/{{ openstack_release }}
octavia-driver-agent-plugin-ovn-octavia-provider:
type: git
location: https://github.com/stackhpc/ovn-octavia-provider.git
reference: stackhpc/{{ openstack_release }}

###############################################################################
# Kolla image build configuration.
Expand Down Expand Up @@ -433,16 +441,44 @@ kolla_build_customizations_common:
- /additions/*

kolla_build_customizations_rocky:
kolla_toolbox_packages_remove:
- openvswitch
kolla_toolbox_packages_append:
- openvswitch3.3
manila_base_packages_remove:
- openvswitch
manila_base_packages_append:
- openvswitch3.3
neutron_base_packages_remove:
- openvswitch
- python3-openvswitch
neutron_base_packages_append:
- openvswitch3.3
- python3-openvswitch3.3
nova_base_packages_remove:
- openvswitch
- python3-openvswitch
nova_base_packages_append:
- openvswitch3.3
- python3-openvswitch3.3
octavia_base_packages_remove:
- python3-openvswitch
openvswitch_base_packages_remove:
- openvswitch
- python3-openvswitch
openvswitch_base_packages_append:
- openvswitch3.3
- python3-openvswitch3.3
ovn_base_packages_override:
- ovn23.03
- ovn24.03
ovn_controller_packages_override:
- ovn23.03-host
- ovn24.03-host
ovn_nb_db_server_packages_override:
- ovn23.03-central
- ovn24.03-central
ovn_northd_packages_override:
- ovn23.03-central
- ovn24.03-central
ovn_sb_db_server_packages_override:
- ovn23.03-central
- ovn24.03-central

kolla_build_customizations_ubuntu: {}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -902,4 +902,4 @@
"version": 1,
"weekStart": ""
}
{% endraw %}
{% endraw %}
Original file line number Diff line number Diff line change
Expand Up @@ -1138,4 +1138,4 @@
"version": 1,
"weekStart": ""
}
{% endraw %}
{% endraw %}
Original file line number Diff line number Diff line change
Expand Up @@ -2531,4 +2531,4 @@
"version": 2,
"weekStart": ""
}
{% endraw %}
{% endraw %}
Original file line number Diff line number Diff line change
Expand Up @@ -5353,4 +5353,4 @@
"version": 8,
"weekStart": ""
}
{% endraw %}
{% endraw %}
Original file line number Diff line number Diff line change
Expand Up @@ -44,4 +44,4 @@ receivers:


templates:
- '/etc/prometheus/*.tmpl'
- '/etc/prometheus/*.tmpl'
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ prometheus_blackbox_exporter_endpoints_default:
- "{{ ('swift_internal:os_endpoint:' + swift_internal_base_endpoint) if not kolla_same_external_internal_vip | bool }}"
enabled: "{{ enable_swift | bool }}"
# Additional service endpoints
- endpoints: "{% set etcd_endpoints = [] %}{% for host in groups.get('etcd', []) %}{{ etcd_endpoints.append('etcd_' + host + ':http_2xx:' + hostvars[host]['etcd_protocol'] + '://' + ('api' | kolla_address(host) | put_address_in_context('url')) + ':' + hostvars[host]['etcd_client_port'] + '/metrics')}}{% endfor %}{{ etcd_endpoints }}"
- endpoints: "{% set etcd_endpoints = [] %}{% for host in groups.get('etcd', []) %}{{ etcd_endpoints.append('etcd_' + host.replace('-', '') + ':http_2xx:' + hostvars[host]['etcd_protocol'] + '://' + ('api' | kolla_address(host) | put_address_in_context('url')) + ':' + hostvars[host]['etcd_client_port'] + '/metrics')}}{% endfor %}{{ etcd_endpoints }}"
enabled: "{{ enable_etcd | bool }}"
- endpoints:
- "grafana:http_2xx:{{ grafana_public_endpoint }}"
Expand All @@ -125,9 +125,9 @@ prometheus_blackbox_exporter_endpoints_default:
- endpoints:
- "prometheus_alertmanager:http_2xx_alertmanager:{{ prometheus_alertmanager_public_endpoint if enable_prometheus_alertmanager_external else prometheus_alertmanager_internal_endpoint }}"
enabled: "{{ enable_prometheus_alertmanager | bool }}"
- endpoints: "{% set rabbitmq_endpoints = [] %}{% for host in groups.get('rabbitmq', []) %}{{ rabbitmq_endpoints.append('rabbitmq_' + host + (':tls_connect:' if rabbitmq_enable_tls else ':tcp_connect:') + ('api' | kolla_address(host) | put_address_in_context('url')) + ':' + hostvars[host]['rabbitmq_port'] ) }}{% endfor %}{{ rabbitmq_endpoints }}"
- endpoints: "{% set rabbitmq_endpoints = [] %}{% for host in groups.get('rabbitmq', []) %}{{ rabbitmq_endpoints.append('rabbitmq_' + host.replace('-', '') + (':tls_connect:' if rabbitmq_enable_tls else ':tcp_connect:') + ('api' | kolla_address(host) | put_address_in_context('url')) + ':' + hostvars[host]['rabbitmq_port'] ) }}{% endfor %}{{ rabbitmq_endpoints }}"
enabled: "{{ enable_rabbitmq | bool }}"
- endpoints: "{% set redis_endpoints = [] %}{% for host in groups.get('redis', []) %}{{ redis_endpoints.append('redis_' + host + ':tcp_connect:' + ('api' | kolla_address(host) | put_address_in_context('url')) + ':' + hostvars[host]['redis_port']) }}{% endfor %}{{ redis_endpoints }}"
- endpoints: "{% set redis_endpoints = [] %}{% for host in groups.get('redis', []) %}{{ redis_endpoints.append('redis_' + host.replace('-', '') + ':tcp_connect:' + ('api' | kolla_address(host) | put_address_in_context('url')) + ':' + hostvars[host]['redis_port']) }}{% endfor %}{{ redis_endpoints }}"
enabled: "{{ enable_redis | bool }}"

# Ensure service endpoints are defined
Expand All @@ -141,10 +141,12 @@ cloudkitty_internal_endpoint: "{{ cloudkitty_internal_fqdn | kolla_url(internal_
cloudkitty_public_endpoint: "{{ cloudkitty_external_fqdn | kolla_url(public_protocol, cloudkitty_api_public_port) }}"
gnocchi_internal_endpoint: "{{ gnocchi_internal_fqdn | kolla_url(internal_protocol, gnocchi_api_port) }}"
gnocchi_public_endpoint: "{{ gnocchi_external_fqdn | kolla_url(public_protocol, gnocchi_api_public_port) }}"
heat_internal_base_endpoint: "{{ heat_internal_fqdn | kolla_url(internal_protocol, heat_api_port) }}"
heat_public_base_endpoint: "{{ heat_external_fqdn | kolla_url(public_protocol, heat_api_public_port) }}"
grafana_public_endpoint: "{{ grafana_external_fqdn | kolla_url(public_protocol, grafana_server_public_port) }}"
heat_cfn_internal_base_endpoint: "{{ heat_cfn_internal_fqdn | kolla_url(internal_protocol, heat_api_cfn_port) }}"
heat_cfn_public_base_endpoint: "{{ heat_cfn_external_fqdn | kolla_url(public_protocol, heat_api_cfn_public_port) }}"
heat_internal_base_endpoint: "{{ heat_internal_fqdn | kolla_url(internal_protocol, heat_api_port) }}"
heat_public_base_endpoint: "{{ heat_external_fqdn | kolla_url(public_protocol, heat_api_public_port) }}"
horizon_public_endpoint: "{{ horizon_external_fqdn | kolla_url(public_protocol, horizon_listen_port) }}"
ironic_inspector_internal_endpoint: "{{ ironic_inspector_internal_fqdn | kolla_url(internal_protocol, ironic_inspector_port) }}"
ironic_inspector_public_endpoint: "{{ ironic_inspector_external_fqdn | kolla_url(public_protocol, ironic_inspector_public_port) }}"
magnum_internal_base_endpoint: "{{ magnum_internal_fqdn | kolla_url(internal_protocol, magnum_api_port) }}"
Expand All @@ -153,12 +155,12 @@ manila_internal_base_endpoint: "{{ manila_internal_fqdn | kolla_url(internal_pro
manila_public_base_endpoint: "{{ manila_external_fqdn | kolla_url(public_protocol, manila_api_public_port) }}"
nova_internal_base_endpoint: "{{ nova_internal_fqdn | kolla_url(internal_protocol, nova_api_port) }}"
nova_public_base_endpoint: "{{ nova_external_fqdn | kolla_url(public_protocol, nova_api_public_port) }}"
opensearch_dashboards_external_endpoint: "{{ opensearch_dashboards_external_fqdn | default(kolla_external_fqdn) | kolla_url(public_protocol, opensearch_dashboards_port_external) }}"
opensearch_dashboards_internal_endpoint: "{{ opensearch_dashboards_internal_fqdn | default(kolla_internal_fqdn) | kolla_url(internal_protocol, opensearch_dashboards_port) }}"
placement_internal_endpoint: "{{ placement_internal_fqdn | kolla_url(internal_protocol, placement_api_port) }}"
placement_public_endpoint: "{{ placement_external_fqdn | kolla_url(public_protocol, placement_api_public_port) }}"
swift_public_base_endpoint: "{{ swift_external_fqdn | kolla_url(public_protocol, swift_proxy_server_port) }}"
opensearch_dashboards_internal_endpoint: "{{ opensearch_dashboards_internal_fqdn | default(kolla_internal_fqdn) | kolla_url(internal_protocol, opensearch_dashboards_port) }}"
opensearch_dashboards_external_endpoint: "{{ opensearch_dashboards_external_fqdn | default(kolla_external_fqdn) | kolla_url(public_protocol, opensearch_dashboards_port_external) }}"
prometheus_internal_endpoint: "{{ prometheus_internal_fqdn | kolla_url(internal_protocol, prometheus_port) }}"
prometheus_public_endpoint: "{{ prometheus_external_fqdn | kolla_url(public_protocol, prometheus_public_port) }}"
prometheus_alertmanager_internal_endpoint: "{{ prometheus_alertmanager_internal_fqdn | kolla_url(internal_protocol, prometheus_alertmanager_port) }}"
prometheus_alertmanager_public_endpoint: "{{ prometheus_alertmanager_external_fqdn | kolla_url(public_protocol, prometheus_alertmanager_public_port) }}"
prometheus_internal_endpoint: "{{ prometheus_internal_fqdn | kolla_url(internal_protocol, prometheus_port) }}"
prometheus_public_endpoint: "{{ prometheus_external_fqdn | kolla_url(public_protocol, prometheus_public_port) }}"
swift_public_base_endpoint: "{{ swift_external_fqdn | kolla_url(public_protocol, swift_proxy_server_port) }}"
6 changes: 6 additions & 0 deletions releasenotes/notes/fix-cve-2024-40767-24b9b3c35f61a0c8.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
---
critical:
- |
Fixes `CVE-2024-40767
<https://security.openstack.org/ossa/OSSA-2024-002.html>`_ with updated
container images for Nova services.
5 changes: 5 additions & 0 deletions releasenotes/notes/ovn-24-03-47c1eb9846f261b0.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
features:
- |
``OVN`` version in Rocky Linux 9 container images has been updated to
``24.03`` (latest LTS).
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
---
fixes:
- |
Updates Octavia container images to fix a maintenance task that was
breaking OVN IPv4 load balancers with health monitors.
`LP#2072754 <https://bugs.launchpad.net/nova/+bug/2072754>`__.
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
---
features:
- |
Added a new group variable - ``stackhpc_repos_enabled`` - for unified
control over usage of StackHPC Release Train package repositories. This
makes it easier to set which hosts do or do not pull packages from release
train.
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
---
fixes:
- |
Fixes the issue with interface names containing dashes in Hashicorp collection.
Loading