Skip to content

Commit e54a5f4

Browse files
authored
Merge pull request #1066 from stackhpc/zed-yoga-merge
zed: yoga merge
2 parents 4d63427 + 99f9d4c commit e54a5f4

File tree

8 files changed

+32
-66
lines changed

8 files changed

+32
-66
lines changed

.github/workflows/stackhpc-container-image-build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ jobs:
253253
if docker push $image; then
254254
echo "Pushed $image"
255255
break
256-
elif $i == 5; then
256+
elif [ $i -eq 5 ] ; then
257257
echo "Failed to push $image"
258258
echo $image >> image-build-logs/push-failed-images.txt
259259
else

doc/source/contributor/environments/ci-multinode.rst

Lines changed: 11 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -2,65 +2,17 @@
22
Multinode Test Environment
33
==========================
44

5-
.. warning::
6-
7-
This guide was written for the Yoga release and has not been validated for
8-
Zed. Proceed with caution.
9-
10-
11-
12-
Set up hosts
13-
============
14-
1. Create four baremetal instances with a centos 8 stream LVM image, and a
15-
Centos 8 stream vm
16-
2. SSH into each baremetal and run ``sudo chown -R centos:.`` in the home
17-
directory, then add the lines::
18-
19-
10.0.0.34 pelican pelican.service.compute.sms-lab.cloud
20-
10.205.3.187 pulp-server pulp-server.internal.sms-cloud
21-
22-
to ``/etc/hosts`` (if you're waiting on them starting up, you can progress
23-
until ``kayobe overcloud host configure`` without this step)
24-
25-
Basic Kayobe Setup
26-
==================
27-
1. SSH into the VM
28-
2. ``sudo dnf install -y python3-virtualenv``
29-
3. ``mkdir src`` and ``cd src``
30-
4. Clone https://github.com/stackhpc/stackhpc-kayobe-config.git, then checkout
31-
commit f31df6256f1b1fea99c84547d44f06c4cb74b161
32-
5. ``cd ..`` and ``mkdir venvs``
33-
6. ``virtualenv venvs/kayobe`` and source ``venvs/kayobe/bin/activate``
34-
7. ``pip install -U pip``
35-
8. ``pip install ./src/kayobe``
36-
9. Acquire the Ansible Vault password for this repository, and store a copy at
37-
``~/vault-pw``
38-
10. ``export KAYOBE_VAULT_PASSWORD=$(cat ~/vault-pw)``
39-
40-
Config changes
41-
==============
42-
1. In etc/kayobe/ansible/requirements.yml remove version from vxlan
43-
2. In etc/kayobe/ansible/configure-vxlan.yml, change the group of
44-
vxlan_interfaces so that the last octet is different e.g. 224.0.0.15
45-
3. Also under vxlan_interfaces, add vni:x where x is between 500 and 1000
46-
4. Also under vxlan_interfaces, check vxlan_dstport is not 4789 (this causes
47-
conflicts, change to 4790)
48-
5. In etc/kayobe/environments/ci-multinode/tf-networks.yml, edit admin_ips so
49-
that the compute and controller IPs line up with the
50-
instances that were created earlier, remove the other IPs for seed and
51-
cephOSD
52-
6. In etc/kayobe/environments/ci-multinode/network-allocation.yml, remove all
53-
the entries and just assign ``aio_ips:`` an empty set ``[]``
54-
7. In etc/kayobe/environments/ci-multinode/inventory/hosts, remove the seed
55-
8. run stackhpc-kayobe-config/etc/kayobe/ansible/growroot.yml (if this fails,
56-
manually increase the partition size on each host)
57-
58-
Final steps
59-
===========
60-
1. ``source kayobe-env --environment ci-aio``
61-
2. Run ``kayobe overcloud host configure``
62-
3. Run ``kayobe overcloud service deploy``
63-
5+
The ``ci-multinode`` environment provides a Kayobe configuration for multi-node
6+
clouds to be used for test and development purposes. It is designed to be used
7+
in combination with the `terraform-kayobe-multinode
8+
<https://github.com/stackhpc/terraform-kayobe-multinode>`__ repository. Follow
9+
the instructions in terraform-kayobe-multinode to deploy a cluster using this
10+
configuration. This documentation covers configuration of additional services
11+
beyond the defaults. This includes:
12+
13+
* Manila
14+
* Magnum
15+
* Wazuh
6416

6517
Manila
6618
======

doc/source/operations/rabbitmq.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ If you are running Wallaby or Xena, synchronise the Pulp containers.
7373

7474
.. code-block:: console
7575
76-
kayobe playbook run etc/kayobe/ansible/pulp-container-sync.yml etc/kayobe/ansible/pulp-container-publish.yml -e stackhpc_pulp_images_kolla_filter=rabbitmq
76+
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/pulp-container-sync.yml $KAYOBE_CONFIG_PATH/ansible/pulp-container-publish.yml -e stackhpc_pulp_images_kolla_filter=rabbitmq
7777
7878
Ensure that Kolla Ansible is up to date.
7979

etc/kayobe/ansible/vault-generate-backend-tls.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
# Required for uri module to work with self-signed certificates and for systems to trust
33
# the self-signed CA
4-
- name: Install CA on controllers
5-
hosts: controllers
4+
- name: Install CA
5+
hosts: controllers:network
66
tasks:
77
- name: Copy the intermediate CA
88
copy:
@@ -16,7 +16,7 @@
1616
shell: "{{ 'update-ca-trust' if ansible_facts.os_family == 'RedHat' else 'update-ca-certificates' }}"
1717

1818
- name: Generate backend API certificates
19-
hosts: controllers
19+
hosts: controllers:network
2020
vars:
2121
vault_api_addr: "https://{{ kolla_internal_fqdn }}:8200"
2222
vault_intermediate_ca_name: "OS-TLS-INT"

etc/kayobe/environments/ci-multinode/kolla/config/barbican.conf

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,9 @@ enabled_secretstore_plugins=vault_plugin
77
[vault_plugin]
88
vault_url = https://{{ kolla_internal_vip_address }}:8200
99
use_ssl = True
10-
ssl_ca_crt_file = {% raw %}{{ openstack_cacert }}{% endraw %}
10+
{% raw %}
11+
ssl_ca_crt_file = {{ openstack_cacert }}
12+
{% endraw %}
1113
approle_role_id = {{ secrets_barbican_approle_role_id }}
1214
approle_secret_id = {{ secrets_barbican_approle_secret_id }}
1315
kv_mountpoint = barbican

etc/kayobe/kolla/config/prometheus/ceph.rules

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ groups:
117117
requests.
118118

119119
- alert: PgsUnclean
120-
expr: ceph_pool_metadata * on(pool_id,instance) group_left() (ceph_pg_total - ceph_pg_clean) > 0
120+
expr: ceph_pool_metadata * on(pool_id,instance) group_left() (ceph_pg_total - ceph_pg_clean - ceph_pg_backfilling - ceph_pg_backfill_wait) > 0
121121
for: 15m
122122
labels:
123123
severity: warning
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
issues:
3+
- |
4+
Generate backend TLS files for network hosts. This fixes backend TLS
5+
configuration for deployments where some API services are running on
6+
network hosts.
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
fixes:
3+
- |
4+
Prevents raising a Ceph ``PgsUnclean`` alert because of backfilling which
5+
can frequently happen because of normal rebalancing activities, such as use
6+
of the Ceph balancer or OSD addition.

0 commit comments

Comments
 (0)