Skip to content

Commit 45a31eb

Browse files
authored
Merge branch 'stackhpc/2023.1' into ovn_24_03
2 parents e9582c1 + 0d64e97 commit 45a31eb

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+2382
-1748
lines changed

doc/source/_static/images/release-train.svg

Lines changed: 1 addition & 1 deletion
Loading

doc/source/configuration/cephadm.rst

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -347,6 +347,10 @@ should be used in the Kolla Manila configuration e.g.:
347347
RADOS Gateways
348348
--------------
349349

350+
RADOS Gateway integration is described in the :kolla-ansible-doc:`Kolla Ansible
351+
documentation
352+
<https://docs.openstack.org/kolla-ansible/latest/reference/storage/external-ceph-guide.html#radosgw>`.
353+
350354
RADOS Gateways (RGWs) are defined with the following:
351355

352356
.. code:: yaml
@@ -377,7 +381,7 @@ The set of commands below configure all of these.
377381
- "config set client.rgw rgw_enable_apis 's3, swift, swift_auth, admin'"
378382
- "config set client.rgw rgw_enforce_swift_acls true"
379383
- "config set client.rgw rgw_keystone_accepted_admin_roles 'admin'"
380-
- "config set client.rgw rgw_keystone_accepted_roles 'member, Member, _member_, admin'"
384+
- "config set client.rgw rgw_keystone_accepted_roles 'member, admin'"
381385
- "config set client.rgw rgw_keystone_admin_domain Default"
382386
- "config set client.rgw rgw_keystone_admin_password {{ secrets_ceph_rgw_keystone_password }}"
383387
- "config set client.rgw rgw_keystone_admin_project service"
@@ -393,6 +397,12 @@ The set of commands below configure all of these.
393397
- "config set client.rgw rgw_swift_account_in_url true"
394398
- "config set client.rgw rgw_swift_versioning_enabled true"
395399
400+
Enable the Kolla Ansible RADOS Gateway integration in ``kolla.yml``:
401+
402+
.. code:: yaml
403+
404+
kolla_enable_ceph_rgw: true
405+
396406
As we have configured Ceph to respond to Swift APIs, you will need to tell
397407
Kolla to account for this when registering Swift endpoints with Keystone. Also,
398408
when ``rgw_swift_account_in_url`` is set, the equivalent Kolla variable should
@@ -414,6 +424,11 @@ before deploying the RADOS gateways. If you are using the Kolla load balancer
414424
415425
kayobe overcloud service deploy -kt ceph-rgw,keystone,haproxy,loadbalancer
416426
427+
There are two options for load balancing RADOS Gateway:
428+
429+
1. HA with Ceph Ingress services
430+
2. RGWs with hyper-converged Ceph (using the Kolla Ansible deployed HAProxy
431+
load balancer)
417432

418433
.. _RGWs-with-hyper-converged-Ceph:
419434

doc/source/configuration/magnum-capi.rst

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -60,12 +60,12 @@ To deploy the CAPI management cluster using this site-specific environment, run
6060

6161
.. code-block:: bash
6262
63-
# Activate the environment
64-
./bin/activate <site-specific-name>
65-
6663
# Install or update the local Ansible Python venv
6764
./bin/ensure-venv
6865
66+
# Activate the environment
67+
source bin/activate <site-specific-name>
68+
6969
# Install or update Ansible dependencies
7070
ansible-galaxy install -f -r ./requirements.yml
7171
@@ -103,12 +103,7 @@ To configure the Magnum service with the Cluster API driver enabled, first ensur
103103

104104
Next, copy the CAPI management cluster's kubeconfig file into your stackhpc-kayobe-config environment (e.g. ``<your-skc-environment>/kolla/config/magnum/kubeconfig``). This file must be Ansible vault encrypted.
105105

106-
The following config should also be set in your stackhpc-kayobe-config environment:
107-
108-
.. code-block:: yaml
109-
:caption: kolla/globals.yml
110-
111-
magnum_capi_helm_driver_enabled: true
106+
The presence of a kubeconfig file in the Magnum config directory is used by Kolla to determine whether the CAPI Helm driver should be enabled.
112107

113108
To apply the configuration, run ``kayobe overcloud service reconfigure -kt magnum``.
114109

doc/source/configuration/wazuh.rst

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ The short version
1212
particular the defaults assume that the ``provision_oc_net`` network will be
1313
used.
1414
#. Generate secrets: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml``
15-
#. Encrypt the secrets: ``ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/ci-multinode/wazuh-secrets.yml``
1615
#. Deploy the Wazuh manager: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-manager.yml``
1716
#. Deploy the Wazuh agents: ``kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-agent.yml``
1817

@@ -250,7 +249,6 @@ It will be used by wazuh secrets playbook to generate wazuh secrets vault file.
250249
.. code-block:: console
251250
252251
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml
253-
ansible-vault encrypt --vault-password-file ~/vault.pass $KAYOBE_CONFIG_PATH/wazuh-secrets.yml
254252
255253
Configure Wazuh Dashboard's Server Host
256254
---------------------------------------

etc/kayobe/ansible/cis.yml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,17 @@
2121
state: present
2222
when: ansible_facts.distribution == 'Ubuntu'
2323

24+
- name: Ensure service accounts have no expiry options set
25+
# This is to workaround an issue where we set the expiry to 365 days on kayobe
26+
# service accounts in a previous iteration of the CIS benchmark hardening
27+
# defaults. This should restore the defaults and can eventually be removed.
28+
command: chage -m 0 -M 99999 -W 7 -I -1 {{ item }}
29+
become: true
30+
changed_when: false
31+
with_items:
32+
- "{{ kayobe_ansible_user }}"
33+
- "{{ kolla_ansible_user }}"
34+
2435
- include_role:
2536
name: ansible-lockdown.rhel9_cis
2637
when: ansible_facts.os_family == 'RedHat' and ansible_facts.distribution_major_version == '9'

etc/kayobe/ansible/requirements.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ collections:
99
- name: stackhpc.pulp
1010
version: 0.5.5
1111
- name: stackhpc.hashicorp
12-
version: 2.5.0
12+
version: 2.5.1
1313
- name: stackhpc.kayobe_workflows
1414
version: 1.0.3
1515
roles:

etc/kayobe/ansible/scripts/aio-init.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,4 +142,4 @@ if ! $KOLLA_OPENSTACK_COMMAND flavor list | grep -q m1.tiny; then
142142
$KOLLA_OPENSTACK_COMMAND flavor create --id 5 --ram 16384 --disk 160 --vcpus 8 m1.xlarge
143143
fi
144144

145-
touch /tmp/.init-runonce
145+
touch /tmp/.init-runonce

etc/kayobe/ansible/templates/wazuh-secrets.yml.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ secrets_wazuh:
77
# Strengthen default wazuh api user pass
88
wazuh_api_users:
99
- username: "wazuh"
10-
password: "{{ secrets_wazuh.wazuh_api_users[0].password | default(lookup('password', '/dev/null length=30' ), true) }}"
10+
password: "{{ secrets_wazuh.wazuh_api_users[0].password | default(lookup('community.general.random_string', min_lower=1, min_upper=1, min_special=1, min_numeric=1, length=30)) }}"
1111
# OpenSearch 'admin' user pass
1212
opendistro_admin_password: "{{ secrets_wazuh.opendistro_admin_password | default(lookup('password', '/dev/null'), true) }}"
1313
# OpenSearch 'kibanaserver' user pass

etc/kayobe/ansible/ubuntu-upgrade.yml

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
hosts: overcloud:infra-vms:seed:seed-hypervisor
66
vars:
77
ansible_python_interpreter: /usr/bin/python3
8+
reboot_timeout_s: "{{ 20 * 60 }}"
89
tasks:
910
- name: Assert that hosts are running Ubuntu Focal
1011
assert:
@@ -37,7 +38,7 @@
3738

3839
- name: Reboot to apply updates
3940
reboot:
40-
reboot_timeout: 1200
41+
reboot_timeout: "{{ reboot_timeout_s }}"
4142
connect_timeout: 600
4243
become: true
4344
when: file_status.stat.exists
@@ -81,16 +82,24 @@
8182
hosts: overcloud:infra-vms:seed:seed-hypervisor
8283
vars:
8384
ansible_python_interpreter: /usr/bin/python3
85+
reboot_timeout_s: "{{ 20 * 60 }}"
8486
tasks:
8587
- name: Ensure Jammy repo definitions do not exist in sources.list
8688
blockinfile:
8789
path: /etc/apt/sources.list
8890
state: absent
8991
become: true
9092

93+
- name: Ensure Kolla Ansible Docker repo definition does not exist
94+
file:
95+
path: /etc/apt/sources.list.d/docker.list
96+
state: absent
97+
become: true
98+
when: apt_repositories | selectattr('url', 'match', '.*docker-ce.*') | list | length > 0
99+
91100
- name: Reboot and wait
92101
reboot:
93-
reboot_timeout: 1200
102+
reboot_timeout: "{{ reboot_timeout_s }}"
94103
connect_timeout: 600
95104
become: true
96105

etc/kayobe/ansible/wazuh-secrets.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,15 @@
1515
state: directory
1616

1717
- name: Template new secrets
18+
no_log: True
1819
template:
1920
src: wazuh-secrets.yml.j2
2021
dest: "{{ wazuh_secrets_path }}"
21-
notify: Please encrypt keys
2222

23-
handlers:
24-
- name: Please encrypt keys
25-
debug:
26-
msg: >-
27-
Please encrypt the keys using Ansible Vault.
23+
- name: In-place encrypt wazuh-secrets
24+
copy:
25+
content: "{{ lookup('ansible.builtin.file', wazuh_secrets_path) | ansible.builtin.vault(ansible_vault_password) }}"
26+
dest: "{{ wazuh_secrets_path }}"
27+
decrypt: false
28+
vars:
29+
ansible_vault_password: "{{ lookup('ansible.builtin.env', 'KAYOBE_VAULT_PASSWORD') }}"

0 commit comments

Comments
 (0)