Added the scripts for net pings, other tiny fixes
List of changes:
* Added the scripts to ping MCC, MOSK nodes via cfg-checker
* Added allow fio port for allow all cvp sg
* Added nfs-utils package dowload for manila share testing
Related-PROD: PROD-37187
Change-Id: I3a13f9967c2e91510bf924a5183d79964d6e962e
diff --git a/k8s/docker-mos-toolset-full b/k8s/docker-mos-toolset-full
index 42e7ac6..b29659d 100644
--- a/k8s/docker-mos-toolset-full
+++ b/k8s/docker-mos-toolset-full
@@ -1,7 +1,7 @@
FROM ubuntu:20.04 AS download-packages
RUN mkdir /opt/packages && cd /opt/packages && \
apt-get update && \
- apt-get download $(apt-cache depends --recurse --no-recommends --no-suggests --no-conflicts --no-breaks --no-replaces --no-enhances iperf3 iperf fio | grep "^\w" | sort -u) || true && \
+ apt-get download $(apt-cache depends --recurse --no-recommends --no-suggests --no-conflicts --no-breaks --no-replaces --no-enhances iperf3 iperf fio nfs-utils | grep "^\w" | sort -u) || true && \
rm -rf /var/lib/apt/lists/*
FROM mirantis.azurecr.io/openstack/heat:antelope-jammy-20240927160001
diff --git a/k8s/workspace/run-networks-ping-mcc.sh b/k8s/workspace/run-networks-ping-mcc.sh
new file mode 100644
index 0000000..769c437
--- /dev/null
+++ b/k8s/workspace/run-networks-ping-mcc.sh
@@ -0,0 +1,26 @@
+#!/bin/bash
+
+. "$(dirname "$0")/functions.sh"
+cd /artifacts
+. env.sh
+. /opt/cfg-checker/.checkervenv/bin/activate
+fname="/artifacts/reports/$MY_CLIENTSHORTNAME-mcc-networks-ping-$(get_timestamp).txt"
+nets=$(mos-checker --env-name $MY_CLIENTSHORTNAME-mcc --env-config /artifacts/envs/mcc-checker.env --kube-config /artifacts/envs/mcc-kubeconfig.yaml network list 2>&1 | grep -A20 "# Runtime networks list" | grep "\:" | awk '{print $1}')
+nets=$(echo "$nets" | tr ' ' '\n' | grep -v '/32' | grep -v '10.99.')
+
+echo "The following CIRDs will be pinged:"
+printf "%s\n\n" "$nets"
+
+cidr_options=""
+for net in $nets; do
+ cidr_options+="--cidr $net " # Append each network to the list
+done
+
+summary=$(mos-checker --env-name $MY_CLIENTSHORTNAME-mcc --env-config /artifacts/envs/mcc-checker.env --kube-config /artifacts/envs/mcc-kubeconfig.yaml network ping --detailed $cidr_options 2>&1 | awk '/Summary/ {flag=1} flag')
+
+printf "%s\n" "$summary"
+printf "%s\n" "$summary" > $fname
+echo ""
+echo "The report is saved to $fname"
+
+deactivate
diff --git a/k8s/workspace/run-networks-ping-mos.sh b/k8s/workspace/run-networks-ping-mos.sh
new file mode 100644
index 0000000..093d699
--- /dev/null
+++ b/k8s/workspace/run-networks-ping-mos.sh
@@ -0,0 +1,26 @@
+#!/bin/bash
+
+. "$(dirname "$0")/functions.sh"
+cd /artifacts
+. env.sh
+. /opt/cfg-checker/.checkervenv/bin/activate
+fname="/artifacts/reports/$MY_CLIENTSHORTNAME-mos-networks-ping-$(get_timestamp).txt"
+nets=$(mos-checker --env-name $MY_CLIENTSHORTNAME-mos --env-config /artifacts/envs/mos-checker.env --kube-config /artifacts/envs/mos-kubeconfig.yaml network list 2>&1 | grep -A20 "# Runtime networks list" | grep "\:" | grep -v 'o-hm0' | awk '{print $1}')
+nets=$(echo "$nets" | tr ' ' '\n' | grep -v '/32' | grep -v '10.99.')
+
+echo "The following CIRDs will be pinged:"
+printf "%s\n\n" "$nets"
+
+cidr_options=""
+for net in $nets; do
+ cidr_options+="--cidr $net " # Append each network to the list
+done
+
+summary=$(mos-checker --env-name $MY_CLIENTSHORTNAME-mos --env-config /artifacts/envs/mos-checker.env --kube-config /artifacts/envs/mos-kubeconfig.yaml network ping --detailed $cidr_options 2>&1 | awk '/Summary/ {flag=1} flag')
+
+printf "%s\n" "$summary"
+printf "%s\n" "$summary" > $fname
+
+echo ""
+echo "The report is saved to $fname"
+deactivate
diff --git a/scripts/prepare.sh b/scripts/prepare.sh
index fbf2abc..226f0c3 100644
--- a/scripts/prepare.sh
+++ b/scripts/prepare.sh
@@ -239,6 +239,8 @@
echo security group rule create --protocol tcp --dst-port 80 ${sg_all} >>${cmds}
# https
echo security group rule create --protocol tcp --dst-port 443 ${sg_all} >>${cmds}
+ # fio
+ echo security group rule create --protocol tcp --dst-port 8765 ${sg_all} >>${cmds}
}
function _sg_icmp() {