92 Commits

Author SHA1 Message Date
Jenkins
3e85ebb1df Merge "Re-organizes Contrail services to the correct roles" 2017-01-31 22:45:13 +00:00
Michael Henkel
9c9667e214 Re-organizes Contrail services to the correct roles
In current setup some Contrail services belong to the wrong roles.
The Contrail control plane can be impacted if the Analytics database has problems.
Furthermore contrail tripleo puppet modules are being refactored to conform to the
new interface of the puppet-contrail modules.

Closes-Bug: 1659560

Change-Id: Id0dd35b95c5fe9d0fcc1e16c4b7d6cc601f10818
2017-01-27 12:35:15 +01:00
Jenkins
d427c2a326 Merge "Use TLS proxy for neutron server's internal TLS" 2017-01-27 01:07:11 +00:00
Juan Antonio Osorio Robles
033e1f3600 Use TLS proxy for neutron server's internal TLS
This uses the tls_proxy resource added in a previous commit [1] in
front of the neutron server when internal TLS is enabled. Right
now values are passed quite manually, but a subsequent commit will use
t-h-t to pass the appropriate hieradata, and then we'll be able to
clean it up from here.

Note that the proxy is only deployed when internal TLS is enabled.

[1] I82243fd3acfe4f23aab373116b78e1daf9d08467

bp tls-via-certmonger

Change-Id: I6dfbf49f45aef9f47e58b5c0dbedd2b4e239979e
2017-01-26 19:00:46 +02:00
Dan Radez
a63ee9c5f9 Adding congress service
Change-Id: Ic74ccd5fa7b3b04ca810416e5160463252f17474
Signed-off-by: Dan Radez <dradez@redhat.com>
2017-01-26 08:26:43 -05:00
Dan Radez
c6f085616a Adding tacker service
Change-Id: I3d6bbc05644e840395f87333ec80e3b844f69903
2017-01-25 13:59:09 -05:00
Jenkins
4e76833b37 Merge "Use TLS proxy for Glance API's internal TLS" 2017-01-24 17:46:53 +00:00
Jenkins
5b2913183c Merge "Implement Nova ec2api profile" 2017-01-23 19:28:39 +00:00
Juan Antonio Osorio Robles
5318a83322 Use TLS proxy for Glance API's internal TLS
This uses the tls_proxy resource added in the previous commit [1] in
front of the Glance API server when internal TLS is enabled. Right
now values are passed quite manually, but a subsequent commit will use
t-h-t to pass the appropriate hieradata, and then we'll be able to clean
it up from here.

Note that the proxy is only deployed when internal TLS is enabled.

[1] I82243fd3acfe4f23aab373116b78e1daf9d08467

bp tls-via-certmonger
Depends-On: Id5dfb38852cf2420f4195a3c1cb98d5c47bbd45e

Change-Id: Id35a846d43ecae8903a0d58306d9803d5ea00bee
2017-01-23 14:54:43 +00:00
Emilien Macchi
014375ff23 Remove last bits of Glance Registry
Glance Registry has been removed in TripleO. So we can clean
puppet-tripleo and remove last bits that used to deploy this service.

Change-Id: Iea8f6340349ab366606205305a3ec9a6e4f11ba6
2017-01-23 08:01:37 -05:00
Jenkins
499bb5911e Merge "Add haproxy firewall rules for galera and redis" 2017-01-23 12:28:41 +00:00
Sven Anderson
0b32f609ad Implement Nova ec2api profile
Change-Id: If4b091e1ca02f43aa9c65392baf8ceea007b7cfb
2017-01-20 14:08:30 +01:00
Jenkins
b8e4fbe838 Merge "Adds etcd" 2017-01-19 21:08:34 +00:00
Feng Pan
ade8845ac8 Adds etcd
etcd is used by networking-vpp ML2 driver as the messaging mechanism. This
patch adds etcd service which can be used by other services.

Implements: blueprint fdio-integration-tripleo

Change-Id: Idaa3e3deddf9be3d278e90b569466c2717e2d517
Signed-off-by: Feng Pan <fpan@redhat.com>
2017-01-18 23:58:11 -05:00
Juan Antonio Osorio Robles
53ee464a37 Use network entries for nova placement
Having these available from t-h-t, we should be able to use these now.

Change-Id: I7272df25c4fdba152fe15d40444311bc35ace4d9
Depends-On: Id0d34c7c3939ee81126ffd26d0658c0a87805a44
2017-01-19 01:37:10 +02:00
Emilien Macchi
858b220cc3 Implement Nova Placement API profile
Allow TripleO to deploy Nova Placement API with a new profile.

Change-Id: I5e25a50f3d7a9b39f4146a61cb528963ee09e90c
2017-01-11 09:40:12 -05:00
Michele Baldessari
8eb99b868b Add haproxy firewall rules for galera and redis
This change adds haproxy rules for galera and redis.  They are not there
because these haproxy entries do not use the ::tripleo::haproxy::endpoint
function which does this automatically.

Rabbit does not need them because it does not go through haproxy.

Closes-Bug: #1654280
Change-Id: If995d5c36341f3c089cbda9a0827ea28c19c796b
2017-01-09 11:45:03 +01:00
Jenkins
8cbf9c8504 Merge "Fixes missing haproxy firewall rules for OpenDaylight" 2017-01-04 19:13:01 +00:00
Tim Rozet
0f002c6514 Fixes missing haproxy firewall rules for OpenDaylight
This migrates the haproxy config for ODL to use the
tripleo::haproxy::endpoint class.  This class automatically configures
firewall rules for each haproxy endpoint.  Also removes listening on
public network for IP and adds listening on ctlplane network for admin
access.

Partial-Bug: 1651476

Change-Id: I1f2af2793d040fda17bf73252afe59434d99f31f
Signed-off-by: Tim Rozet <trozet@redhat.com>
2017-01-04 10:36:03 -05:00
Jenkins
3b74e6c055 Merge "Split ovn plugin and northd configuration" 2016-12-22 20:49:28 +00:00
Jenkins
b9745a7b1e Merge "Fix a typo in haproxy.pp" 2016-12-19 10:49:12 +00:00
Jenkins
34253ecfb5 Merge "Changes default MidoNet API port on HAProxy" 2016-12-11 00:19:33 +00:00
Juan Antonio Osorio Robles
5b0bd1c00a Add verify required and CA bundle to haproxy
This only takes effect is internal-tls is used, and forces haproxy to
do proper verifications of the SSL certificates provided by the
servers.

bp tls-via-certmonger
Change-Id: Ibd98ec46dd6570887db29f55fe183deb1c9dc642
2016-11-30 14:34:41 +02:00
Jenkins
8e73e53d59 Merge "Proxy manila in http mode" 2016-11-23 14:56:33 +00:00
Steven Hardy
4458ce0d9a Split ovn plugin and northd configuration
This allows us to use the composable services interfaces to handle
providing the IP address for northd, and will be more flexible in
the event folks want to deploy northd/ovndb on a different node to
the neutron plugin.

This also adds ovn_northd to the haproxy configuration so we can access
it via the ovn_northd_vip in other service profiles.  Note we need
to ensure the haproxy config only hits the bootstrap node as northd
won't be running on the other nodes.

Change-Id: I9af7bd837c340c3df016fc7ad4238b2941ba7a95
Partial-Bug: #1634171
2016-11-22 12:42:36 -05:00
Jenkins
cd49ce7f92 Merge "Use mode 'http' in haproxy for ceilometer, neutron, aodh and gnocchi" 2016-11-22 11:13:41 +00:00
Juan Antonio Osorio Robles
a177abd035 Proxy manila in http mode
It needs it so HAProxy will be able to set the X-Forwarded-Proto header.
Related-Bug: #1640126
Change-Id: I1726fa1742bc70518338b80fc6d27567bb020e7c
2016-11-22 09:52:41 +00:00
Juan Antonio Osorio Robles
255ea29cd4 Use mode 'http' in haproxy for ceilometer, neutron, aodh and gnocchi
HAProxy won't pass X-Forwarded-Proto to these services in mode tcp, so we need
to switch it to http in order for it to work and for the services to properly
set the protocol in the links they serve.

Change-Id: Ib10282159fb9269eebe81af23171ec9fb1297cd0
Closes-Bug: #1640126
2016-11-22 10:31:02 +02:00
Jenkins
7e623480c4 Merge "Adds auto-detection for VIP interfaces" 2016-11-21 23:58:42 +00:00
Jenkins
3df8e5e339 Merge "Add panko service support" 2016-11-21 21:19:37 +00:00
Tim Rozet
87763459ae Adds auto-detection for VIP interfaces
Previously the ctrl plane VIP would default to 'br-ex' which in non-vlan
deployments ends up being the wrong interface.  The public VIP interface
was also defaulted to 'br-ex' which would be incorrect for vlan based
deployments.  Since a user has already given the nic template (and in
most cases the subnet that corresponds to the nic) the installer should
be able to figure out which interface the public/control vip should be
on.

These changes enable that type of auto-detection, unless a user
explicitly overrides the heat parameters for ControlVirtualInterface and
PublicVirtualInterface.  Also removes calling keepalived from haproxy
now that the services are composed separately on the Controller role.

Partial-Bug: 1606632

Change-Id: I05105fce85be8ace986db351cdca2916f405ed04
Signed-off-by: Tim Rozet <trozet@redhat.com>
2016-11-20 11:47:57 -05:00
Alejandro Andreu
6d8c6e1f30 Changes default MidoNet API port on HAProxy
The default port of the MidoNet Cluster (formerly known as MidoNet API)
is now 8181 instead of 8081.

Since this parameter is configurable through the settings, the default
value for the port has been added to the $service_ports array.

Change-Id: I2785d3109993bca0bd68077ff55cfeafbf594e19
2016-11-18 09:25:56 +01:00
Steven Hardy
92f9c952d6 Replace hard-coded haproxy/keepalived coupling
We have a variable in hiera which tells us if the keepalived
service is enabled, so use it here.  Without this any deployment
disabling OS::TripleO::Services::Keepalived will fail.

Change-Id: I90faf51881bd05920067c1e1d82baf5d7586af23
Closes-Bug: #1642677
2016-11-17 17:37:45 +00:00
Jenkins
6661cefcc4 Merge " Enable TLS in the internal network for Barbican API" 2016-11-15 18:21:14 +00:00
Pradeep Kilambi
a6089cb92f Add panko service support
Change-Id: I35f283bdf8dd0ed979c65633724f0464695130a4
2016-11-14 10:57:14 -05:00
Jenkins
d7f4f3efbf Merge "Fix barbican server name to not use aodh hiera" 2016-11-14 09:36:37 +00:00
Juan Antonio Osorio Robles
6e78c2f19a Enable TLS in the internal network for Barbican API
This optionally enables TLS for Barbican API in the internal network.
 If internal TLS is enabled, each node that is serving the Barbican API
 service will use certmonger to request its certificate.

 bp tls-via-certmonger

Change-Id: I1c1d3dab9bba7bec6296a55747e9ade242c47bd9
2016-11-14 09:06:28 +02:00
Jenkins
ffd36a3154 Merge "Enable TLS in the internal network for Cinder API" 2016-11-11 19:19:40 +00:00
Pradeep Kilambi
d6241cdfc1 Fix barbican server name to not use aodh hiera
this looks like a copy/paste error. Let barbican use its own
hiera data.

Change-Id: I84118c1a561c3db2f18504b55c5a8c4f042e7e3b
2016-11-11 12:57:12 +00:00
Jenkins
311bd47d1f Merge "Enable TLS in the internal network for Nova API" 2016-11-09 13:27:01 +00:00
Jenkins
7ce94fce7d Merge "Better way to ensure keepalived before haproxy." 2016-11-09 13:26:32 +00:00
Jenkins
f050e6ee9c Merge "Pass X-Forwarded-Proto for missing services" 2016-11-09 10:48:44 +00:00
Sofer Athlan-Guyot
b11d048e55 Better way to ensure keepalived before haproxy.
The lastest patchset of https://review.openstack.org/393361 was actually
not working.

The `if defined` idiom depends on *evaluation* order.

At the time it's red in the haproxy.pp class, the line that loads the
class 'haproxy' has still not yet been reached and thus the `defined`
result is false. The constraint is not added.

For this reason, the use of `defined` in module is not advised by
puppetlabs[1].

[1] https://docs.puppet.com/puppet/latest/reference/function.html#defined

Change-Id: Ibd352cb313f8863d62db8987419378bed5b87256
Relates-To: #1638029
2016-11-08 18:35:11 +01:00
Jenkins
c326036cfc Merge "Enable TLS in the internal network for gnocchi" 2016-11-08 16:19:48 +00:00
Jenkins
4d6b55c699 Merge "Improve failed mysql node removal time in HA deploys." 2016-11-08 16:12:46 +00:00
Juan Antonio Osorio Robles
005bf64e4a Pass X-Forwarded-Proto for missing services
aodh, ceilometer, gnocchi and neutron need the X-Forwarded-Proto in
order to return links with the correct protocol when SSL is enabled.
This enables it in HAProxy

Change-Id: Icceab92f86b1cc40d42195fa4ba0c75f302795b8
Closes-Bug: #1640126
2016-11-08 13:22:13 +02:00
Chris Jones
943e494356 Improve failed mysql node removal time in HA deploys.
In HA deployments, we now check mysql nodes every 1s and removed them
immediately if they are failed. Previously we would check every 2s and
allow them to fail 5 checks before being removed, producing errors from
other OpenStack services for 10s, which causes confusion and delay for
operators.
Additionally, these check options are now also a class parameter so can
be overridden by operators.

Closes-Bug: #1639189

Change-Id: I0b915f790ae5a4b018a212d3aa83cca507be05e9
2016-11-08 10:44:14 +00:00
Steven Hardy
1bee7bc8fa Increase haproxy timeouts
It's been proposed this may help with the
('Connection aborted.', BadStatusLine("''",)) errors.

This patch increase queue, server and client timeouts to 2m (default is 1m)
Related-Bug: #1638908

Change-Id: Ie4f059f3fad2271bb472697e85ede296eee91f5d
2016-11-07 11:36:37 +00:00
Juan Antonio Osorio Robles
cf70097238 Enable TLS in the internal network for Cinder API
This optionally enables TLS for Cinder API in the internal network.
If internal TLS is enabled, each node that is serving the Cinder API
service will use certmonger to request its certificate.

bp tls-via-certmonger

Change-Id: Ib4a9c8d3ca57f1b02e1bb0d150f333db501e9863
2016-11-02 10:53:24 +02:00
Juan Antonio Osorio Robles
625c7d9fc8 Fix default for barbican documentation
Change-Id: Id4dc2379b0c423012a0b3aaf49d1e1a7d633a03b
2016-11-01 15:47:53 +02:00