Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

STF 1.5.5 release ops #546

Merged
merged 54 commits into from
Sep 11, 2024
Merged
Changes from 1 commit
Commits
Show all changes
54 commits
Select commit Hold shift + click to select a range
87686b0
Fix xrefs for director Operator (#481)
leifmadsen Jun 19, 2023
be5cec0
Initial pass for external ES (#483)
csibbitt Aug 22, 2023
982cec2
Trivial leftover suggestions (#485)
csibbitt Aug 22, 2023
1f7aca7
Link ES section to KB article (#486)
csibbitt Sep 5, 2023
564130c
Initial changes to installation for STF 1.5.3 (#484)
leifmadsen Sep 5, 2023
4856eda
use_redhat and migration link (#462)
csibbitt Sep 7, 2023
b248a57
Override qdr::router_id defaults in stf-connectors (#487)
leifmadsen Sep 11, 2023
563a551
Don't enable event collection by default on OSP (#488)
leifmadsen Sep 12, 2023
72d91b6
No longer import the events dashboard (#490)
leifmadsen Sep 13, 2023
e2ba966
Installation of cluster monitoring is no longer necessary (#491)
leifmadsen Sep 14, 2023
ae4bbb9
Adjust the default polling interval for collectd (#489)
leifmadsen Sep 21, 2023
a17f01e
Remove logs configuration from sample CR (#493)
leifmadsen Sep 26, 2023
720ac91
mg_master_RHOSPDOC-1380_chunk-installation-procedure (#492)
mickogeary Sep 26, 2023
428b8ae
Reduce the number of Ceilometer pollsters (#497)
leifmadsen Sep 28, 2023
bd2ba0c
Deprecate the use of high availability mode in STF (#494)
leifmadsen Sep 28, 2023
56ba82e
Fix up the table syntax in Observability Strategy (#495)
leifmadsen Sep 28, 2023
24f9d92
Do not manage the event pipeline by default (#498)
leifmadsen Sep 28, 2023
e99b8a1
Minor clean up and user experience updates (#496)
leifmadsen Oct 2, 2023
ac64c72
Creating an alert does not use curl (#500)
leifmadsen Oct 3, 2023
a5a82aa
Eliminate duplicate line (#501)
csibbitt Oct 4, 2023
3e400fc
Adding details for QDR password auth (#502)
csibbitt Oct 12, 2023
13e7f21
Support OCP versions 4.12 through 4.14 (#503)
leifmadsen Oct 24, 2023
3802f4a
Summary: Replace incorrect stf-connectors.yaml filename with enable-s…
rheslop Oct 24, 2023
f94a996
Clean up the STF install (#505)
leifmadsen Oct 24, 2023
741aba4
Provide the preferred STF object for deployment (#507)
leifmadsen Oct 24, 2023
51e894c
Fix various RHOSP links and versions (#508)
leifmadsen Oct 25, 2023
0c88867
Update and adjust dashboard procedures (#509)
leifmadsen Oct 25, 2023
0c5a236
Add deprecation note for Grafana authentication (#510)
leifmadsen Oct 25, 2023
c8386ab
Update deprecated Grafana login warning (#511)
leifmadsen Oct 25, 2023
e2f1961
Add updated architecture diagrams (#499)
leifmadsen Nov 3, 2023
9c79b75
Update install guide for dependent operators (#513)
leifmadsen Nov 23, 2023
b7ef9b6
Clean up the prerequisites lists (#514)
leifmadsen Nov 23, 2023
0cad5de
Add removal instructions for COO (#516)
leifmadsen Nov 28, 2023
66bd308
Refer to cert-manager removal documentation (#515)
leifmadsen Nov 28, 2023
86aec74
Pre-STF 1.5.3 Documentation Walkthrough and Cleanup (#517)
leifmadsen Nov 30, 2023
bd3472c
Modularize STF architecture changes (#518)
leifmadsen Nov 30, 2023
d098587
Update diagrams for Cluster Observability Operator (#519)
leifmadsen Dec 1, 2023
c1d1be8
mg_master_517_minor-style-edits (#521)
mickogeary Dec 5, 2023
0e56add
Reference 17.1 in docinfo.xml (#522)
leifmadsen Dec 5, 2023
36d54d1
PrometheusRules must reference monitoring.rhobs (#523)
leifmadsen Dec 5, 2023
eea657b
Basic Auth in Grafana no longer supported (#525)
csibbitt Dec 7, 2023
3b88889
Adjust prometheus query to use token (#520)
csibbitt Dec 12, 2023
e534bf3
Update installation to target Grafana Operator v5 (#526)
leifmadsen Jan 30, 2024
0d5626e
Add enable dashboard procedure (#527)
leifmadsen Jan 31, 2024
8e1b8fa
Update OCP version support status (#529)
leifmadsen Feb 8, 2024
d8e2c12
Update required resource permission reference (#528)
leifmadsen Feb 8, 2024
8477306
Drop unused module found in other issue (#533)
leifmadsen Mar 1, 2024
fe90630
mg-master_RHOSPDOC-1200_STF-disconnected (#531)
mickogeary Mar 5, 2024
dbb15fb
Use OpenShift supported version vars vs static (#536)
leifmadsen Mar 6, 2024
2033bb6
minor doc updates from OSPRH-7722, OSP-32244, OSP-32175 (#541)
mickogeary Jun 20, 2024
0480450
add-callouts-for-stfconnectorsyaml-in-proc_configuring-the-stf-connec…
mickogeary Jun 21, 2024
3b72ed4
Use plural resource names in permissions (#544)
csibbitt Jul 17, 2024
bf28151
Update supported OCP versions (#545)
vkmc Sep 10, 2024
cba41a6
Merge branch 'master' into release-prep-1.5.5
vkmc Sep 10, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Adding details for QDR password auth (#502)
* Adding details for QDR password auth

* Move note about disabling auth to main section

* Update doc-Service-Telemetry-Framework/modules/proc_retrieving-the-qdr-password.adoc

Co-authored-by: Leif Madsen <[email protected]>

* Update doc-Service-Telemetry-Framework/modules/proc_retrieving-the-qdr-password.adoc

Co-authored-by: mickogeary <[email protected]>

---------

Co-authored-by: Leif Madsen <[email protected]>
Co-authored-by: mickogeary <[email protected]>
3 people authored Oct 12, 2023
commit 3e400fc7127f22bf843730b809d116dadb6d94c5
Original file line number Diff line number Diff line change
@@ -29,6 +29,7 @@ include::../modules/proc_configuring-red-hat-openstack-platform-overcloud-for-st
ifdef::include_when_13,include_when_17[]
include::../modules/proc_getting-ca-certificate-from-stf-for-overcloud-configuration.adoc[leveloffset=+2]
endif::include_when_13,include_when_17[]
include::../modules/proc_retrieving-the-qdr-password.adoc[leveloffset=+2]
include::../modules/proc_retrieving-the-qdr-route-address.adoc[leveloffset=+2]
include::../modules/proc_creating-the-base-configuration-for-stf.adoc[leveloffset=+2]
include::../modules/proc_configuring-the-stf-connection-for-the-overcloud.adoc[leveloffset=+2]
Original file line number Diff line number Diff line change
@@ -9,6 +9,7 @@ As part of the {OpenStack} ({OpenStackShort}) overcloud deployment using directo
ifdef::include_when_13,include_when_17[]
. xref:getting-ca-certificate-from-stf-for-overcloud-configuration_assembly-completing-the-stf-configuration[]
endif::include_when_13,include_when_17[]
. xref:retrieving-the-qdr-password_assembly-completing-the-stf-configuration[Retrieving the {MessageBus} password]
. xref:retrieving-the-qdr-route-address_assembly-completing-the-stf-configuration[Retrieving the {MessageBus} route address]
. xref:creating-the-base-configuration-for-stf_assembly-completing-the-stf-configuration[Creating the base configuration for {ProjectShort}]
. xref:configuring-the-stf-connection-for-the-overcloud_assembly-completing-the-stf-configuration[Configuring the {ProjectShort} connection for the overcloud]
Original file line number Diff line number Diff line change
@@ -40,6 +40,8 @@ data:
role: edge
verifyHostname: false
sslProfile: sslProfile
saslUsername: guest@default-interconnect
saslPassword: pass:<password_from_stf>

MetricsQdrSSLProfiles:
- name: sslProfile
Original file line number Diff line number Diff line change
@@ -9,6 +9,7 @@ To configure the {Project} ({ProjectShort}) connection, you must create a file t
ifdef::include_when_13,include_when_17[]
* Retrieve the CA certificate from the {MessageBus} deployed by {ProjectShort}. For more information, see xref:getting-ca-certificate-from-stf-for-overcloud-configuration_assembly-completing-the-stf-configuration[].
endif::include_when_13,include_when_17[]
* Retrieve the {MessageBus} password. For more information, see xref:retrieving-the-qdr-password_assembly-completing-the-stf-configuration[].
* Retrieve the {MessageBus} route address. For more information, see xref:retrieving-the-qdr-route-address_assembly-completing-the-stf-configuration[].

// The following configuration should match the contents in modules/proc_creating-openstack-environment-file-for-multiple-clouds.adoc. If you have changes to make, please make the same changes to both files.
@@ -41,6 +42,8 @@ parameter_defaults:
role: edge
verifyHostname: false
sslProfile: sslProfile
saslUsername: guest@default-interconnect
saslPassword: pass:<password_from_stf>

MetricsQdrSSLProfiles:
- name: sslProfile
@@ -68,6 +71,7 @@ endif::[]
* The `qdr::router_id` configuration is to override the default value which uses the fully-qualified domain name (FQDN) of the host. In some cases the FQDN can result in a router ID length of greater than 61 characters which results in failed QDR connections. For deployments with shorter FQDN values this is not necessary.
* The `resource_registry` configuration directly loads the collectd service because you do not include the `collectd-write-qdr.yaml` environment file for multiple cloud deployments.
* Replace the `host` sub-parameter of `MetricsQdrConnectors` with the value that you retrieved in xref:retrieving-the-qdr-route-address_assembly-completing-the-stf-configuration[].
* Replace the `<password_from_stf>` portion of the `saslPassword` sub-parameter of `MetricsQdrConnectors` with the value you retrieved in xref:retrieving-the-qdr-password_assembly-completing-the-stf-configuration[].
ifdef::include_when_13,include_when_17[]
* Replace the `caCertFileContent` parameter with the contents retrieved in xref:getting-ca-certificate-from-stf-for-overcloud-configuration_assembly-completing-the-stf-configuration[].
endif::include_when_13,include_when_17[]
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
[id="retrieving-the-qdr-password_{context}"]
= Retrieving the {MessageBus} password

[role="_abstract"]
When you configure the {OpenStack} ({OpenStackShort}) overcloud for {Project} ({ProjectShort}), you must provide the {MessageBus} password in the {ProjectShort} connection file.

You can disable basic authentication on the {MessageBus} connection by setting the value of the `transports.qdr.auth` parameter of the ServiceTelemetry spec to `none`. The `transports.qdr.auth` parameter is absent in versions of {ProjectShort} before 1.5.3, so the default behavior is that basic authentication is disabled. In a new install of {ProjectShort} 1.5.3 or later, the default value of `transports.qdr.auth` is `basic`, but if you upgraded to {ProjectShort} 1.5.3, the default value of `transports.qdr.auth` is `none`.

.Procedure

. Log in to your {OpenShift} environment where {ProjectShort} is hosted.

. Change to the `service-telemetry` project:
+
[source,bash]
----
$ oc project service-telemetry
----

. Retrieve the {MessageBus} password:
+
[source,bash,options="nowrap",subs="verbatim"]
----
$ oc get secret default-interconnect-users -o json | jq -r .data.guest | base64 -d
----