Currently the agent generates loadbalancer configuration in
haproxy specific format. Going forward agent will generate
a generic json based loadbalancer config. This config will
be handled by driver specific configuration parser. Currently
only haproxy parsing is supported.
Manage haproxy daemon for lbaas. Two options avaialable:
- Manage through supervisor. This will run on non-daemon mode
as the process cannot be managed by supervisord if it runs in
background. Process monitoring provided by supervisor.
- Start/stop the daemon as we do today. Need additional changes
to ensure monitoring/restarting of the process.
Additional commit needed to enable this code from vrouter_netns.
Generate the same mac-address for all interfaces sharing the same
IP. In addition a change to daemonize the haproxy process instead
of managing through supervisor.
This fix commits the vrouter agent code to read
the custom_attributes from ifmap node and copy it
to config.json file which the haproxy parser
would read. Added missing '}'. Incorporating the
comments
This fix adds tenant SSL support to existing custom attributes.
User can provide barbican container ref in custom attributes
and haproxy parser then downloads the container/secrets
and populates the certificate.
Also, the keystone auth credentials need to specified in a
separate auth file whose path should be provided in
contrail-vrouter-agent.conf file. Renaming to file as
keystone_auth_cfg_file
Reviewed: https:/ /review. opencontrail. org/14576 github. org/Juniper/ contrail- controller/ commit/ 888049f626fbd7d 6ad349ffb2270bc c3886958f1
Committed: http://
Submitter: Zuul
Branch: R2.20
commit 888049f626fbd7d 6ad349ffb2270bc c3886958f1
Author: Rudra Rugge <email address hidden>
Date: Fri May 8 10:54:27 2015 -0700
Generate loadbalancer config in json format
Currently the agent generates loadbalancer configuration in
haproxy specific format. Going forward agent will generate
a generic json based loadbalancer config. This config will
be handled by driver specific configuration parser. Currently
only haproxy parsing is supported.
Closes-Bug: #1452928 15ac5c331e4b6c5 82b93d9d3a3
Change-Id: I2d198aff0a5696
Conflicts: agent/oper/ loadbalancer_ haproxy. cc
src/vnsw/
LBAAS haproxy process manager
Manage haproxy daemon for lbaas. Two options avaialable: restarting of the process.
- Manage through supervisor. This will run on non-daemon mode
as the process cannot be managed by supervisord if it runs in
background. Process monitoring provided by supervisor.
- Start/stop the daemon as we do today. Need additional changes
to ensure monitoring/
Additional commit needed to enable this code from vrouter_netns.
Change-Id: I05c13d7c96c86b ee2fcddc73342ba 28c6010c8e6
Partial-Bug: #1452928
Enable haproxy config translation
Enable haproxy config translation from json format
Also enable haproxy daemon handling by supervisord
Change-Id: If3489ea66430ec 0ac50bb6198093a 0689fa16219
Closes-Bug: #1452928
Conflicts:
src/nodemgr/ haproxy_ stats.py
Generate mac from instance ip for service VMs
Generate the same mac-address for all interfaces sharing the same
IP. In addition a change to daemonize the haproxy process instead
of managing through supervisor.
Change-Id: I2394f29c4a11bf feee4b0184ce6cd 6867b01e0e9
Closes-Bug: #1461882
Haproxy config generation fixes for HTTPS protocol
Change-Id: I140361ad4785be 2a87d23a04181e7 3ca999e8e2b
Closes-bug: #1466318
Fix for poodle vulnerability; ChangeId: I9432d035eb59b1 ff53cb5d33350cd 5f8063e077c; Closes-Bug: #1475392
Change-Id: I390a77261bc0d3 257108c06951c79 f1d2c3dadaa
Fix for FREAK SSL vulnerability
This fix pushes selected set of secure ciphers into
haproxy config file
Change-Id: Idfc11ce0411024 e7154d3b2c46a09 5fb4f80337d
Closes-Bug: #1477400
HAProxy Performance Tuning
HAProxy's default config is non-performant.
This fix updates following config in HAProxy:
1) Increase TCP client/server timeouts.
2) Increase ulimit globally per HAProxy process.
3) Increase maxconn globally per HAProxy process.
Change-Id: I28be29d5ab3dcb 2a35fcbe9168300 edf18b2c23c
Closes-Bug: #1477781
Allow custom configs with LBaaS
This fix takes care of haproxy parsing and
validation changes on vrouter agent. Removing
extra white spaces
Closes-Bug: #1475393 8a178d555db5703 fa1e73d0cc9
Change-Id: I822e27792f7816
Allow custom configs with LBaaS
This fix enables a new field "custom-attr" in loadbalancer_pool
properties in the schema.
Change-Id: I17eecc2fedea4d 1d3889b7e114e99 732ac2eecc9
Closes-Bug: #1475393
Allow custom configs with LBaaS
This fix commits the vrouter agent code to read
the custom_attributes from ifmap node and copy it
to config.json file which the haproxy parser
would read. Added missing '}'. Incorporating the
comments
Closes-Bug: #1475393 48b2283971b2959 c9be5931361
Change-Id: I6f22f4f537c97c
Conflicts: agent/oper/ loadbalancer. cc agent/oper/ loadbalancer_ config. cc agent/oper/ loadbalancer_ config. h
src/vnsw/
src/vnsw/
src/vnsw/
Change-Id: Iea0aff5589a21e 3c802e4e63633a1 d74f22cdeaf
Conflicts: agent/oper/ loadbalancer. cc
src/vnsw/
WIP: Tenant SSL Cert Support
This fix adds tenant SSL support to existing custom attributes. vrouter- agent.conf file. Renaming to file as auth_cfg_ file
User can provide barbican container ref in custom attributes
and haproxy parser then downloads the container/secrets
and populates the certificate.
Also, the keystone auth credentials need to specified in a
separate auth file whose path should be provided in
contrail-
keystone_
Change-Id: I2b857338200310 33a05dfc27cbfa4 fa3a3485611
Partial-Bug: #1499903
Conflicts: haproxy_ stats.py agent/oper/ instance_ manager. cc agent/oper/ netns_instance_ adapter. cc agent/oper/ test/instance_ manager_ test.cc opencontrail- vrouter- netns/opencontr ail_vrouter_ netns/vrouter_ netns.py
src/nodemgr/
src/vnsw/
src/vnsw/
src/vnsw/
src/vnsw/
Change-Id: I31535a59086726 3588d00e889db5e 41eec711545