blob: 942c9476f358e5b6a334f0c528c1908d5ee458bd [file] [log] [blame]
Dennis Dmitrieveac3aab2017-07-12 16:36:41 +03001{% from 'virtual-mcp-ocata-cicd/underlay.yaml' import HOSTNAME_CFG01 with context %}
2{% from 'virtual-mcp-ocata-cicd/underlay.yaml' import REPOSITORY_SUITE with context %}
3
4{% set SALT_MODELS_REPOSITORY = os_env('SALT_MODELS_REPOSITORY','https://gerrit.mcp.mirantis.net/salt-models/mcp-virtual-lab') %}
5{% set SALT_MODELS_BRANCH = os_env('SALT_MODELS_BRANCH','master') %}
6{% set SALT_MODELS_COMMIT = os_env('SALT_MODELS_COMMIT','master') %}
7
8# Reference to a patch that should be applied to the model if required, for example: export SALT_MODELS_REF_CHANGE=refs/changes/19/7219/12
9{% set SALT_MODELS_REF_CHANGE = os_env('SALT_MODELS_REF_CHANGE', '') %}
10
11# Address pools for reclass cluster model are taken in the following order:
12# 1. environment variables,
13# 2. config.underlay.address_pools based on fuel-devops address pools
14# (see generated '.ini' file after underlay is created),
15# 3. defaults
16{% set address_pools = config.underlay.address_pools %}
17{% set IPV4_NET_ADMIN = os_env('IPV4_NET_ADMIN', address_pools.get('admin-pool01', '192.168.10.0/24')) %}
18{% set IPV4_NET_CONTROL = os_env('IPV4_NET_CONTROL', address_pools.get('private-pool01', '172.16.10.0/24')) %}
19{% set IPV4_NET_TENANT = os_env('IPV4_NET_TENANT', address_pools.get('tenant-pool01', '10.1.0.0/24')) %}
20{% set IPV4_NET_EXTERNAL = os_env('IPV4_NET_EXTERNAL', address_pools.get('external-pool01', '10.16.0.0/24')) %}
21
22{% set IPV4_NET_ADMIN_PREFIX = '.'.join(IPV4_NET_ADMIN.split('.')[0:3]) %}
23{% set IPV4_NET_CONTROL_PREFIX = '.'.join(IPV4_NET_CONTROL.split('.')[0:3]) %}
24{% set IPV4_NET_TENANT_PREFIX = '.'.join(IPV4_NET_TENANT.split('.')[0:3]) %}
25{% set IPV4_NET_EXTERNAL_PREFIX = '.'.join(IPV4_NET_EXTERNAL.split('.')[0:3]) %}
26
27# Install salt to the config node
28
29#- description: (moved to cloud-init config) Configure repository on the cfg01 node
30# cmd:
31# echo "172.18.248.114 jenkins.mcp.mirantis.net gerrit.mcp.mirantis.net" >> /etc/hosts;
32# echo "185.135.196.10 apt-mk.mirantis.com" >> /etc/hosts;
33# echo "nameserver 172.18.208.44 >> /etc/resolv.conf;
34# echo "nameserver 8.8.8.8 >> /etc/resolv.conf;
35# which wget >/dev/null || (apt-get update; apt-get install -y wget);
36# echo "deb [arch=amd64] http://apt-mk.mirantis.com/xenial nightly salt extra" > /etc/apt/sources.list.d/mcp_salt.list;
37# wget -O - http://apt-mk.mirantis.com/public.gpg | apt-key add -;
38# echo "deb http://repo.saltstack.com/apt/ubuntu/16.04/amd64/2016.3 xenial main" > /etc/apt/sources.list.d/saltstack.list;
39# wget -O - https://repo.saltstack.com/apt/ubuntu/16.04/amd64/2016.3/SALTSTACK-GPG-KEY.pub | apt-key add -;
40# node_name: {{ HOSTNAME_CFG01 }}
41# retry: {count: 1, delay: 1}
42# skip_fail: false
43
44#- description: Update packages on cfg01
45# cmd: apt-get clean; eatmydata apt-get update
46# node_name: {{ HOSTNAME_CFG01 }}
47# retry: {count: 1, delay: 1}
48# skip_fail: false
49
50- description: Installing salt master on cfg01
51 cmd: eatmydata apt-get install -y reclass git salt-master
52 node_name: {{ HOSTNAME_CFG01 }}
53 retry: {count: 1, delay: 1}
54 skip_fail: false
55
56#- description: (moved to cloud-init config) Install common packages on cfg01
57# cmd: eatmydata apt-get install -y python-pip wget curl tmux byobu iputils-ping traceroute htop tree
58# node_name: {{ HOSTNAME_CFG01 }}
59# retry: {count: 1, delay: 1}
60# skip_fail: false
61
62- description: Configure salt-master on cfg01
63 cmd: |
64 cat << 'EOF' >> /etc/salt/master.d/master.conf
65 file_roots:
66 base:
67 - /usr/share/salt-formulas/env
68 pillar_opts: False
69 open_mode: True
70 reclass: &reclass
71 storage_type: yaml_fs
72 inventory_base_uri: /srv/salt/reclass
73 ext_pillar:
74 - reclass: *reclass
75 master_tops:
76 reclass: *reclass
77 EOF
78 node_name: {{ HOSTNAME_CFG01 }}
79 retry: {count: 1, delay: 1}
80 skip_fail: false
81
82- description: Configure GIT settings and certificates
83 cmd: touch /root/.git_trusted_certs.pem;
84 for server in git.tcpcloud.eu github.com; do
85 openssl s_client -showcerts -connect $server:443 </dev/null
86 | openssl x509 -outform PEM
87 >> /root/.git_trusted_certs.pem;
88 done;
89 HOME=/root git config --global http.sslCAInfo /root/.git_trusted_certs.pem;
90 HOME=/root git config --global user.email "tcp-qa@example.com";
91 HOME=/root git config --global user.name "TCP QA";
92 node_name: {{ HOSTNAME_CFG01 }}
93 retry: {count: 1, delay: 1}
94 skip_fail: false
95
96
97- description: Clone reclass models with submodules
98 cmd: |
99 ssh-keyscan -H github.com >> ~/.ssh/known_hosts;
100 git clone -b {{ SALT_MODELS_BRANCH }} --recurse-submodules {{ SALT_MODELS_REPOSITORY }} /srv/salt/reclass;
101 pushd /srv/salt/reclass && git checkout {{ SALT_MODELS_COMMIT }} && popd;
102 {%- if SALT_MODELS_REF_CHANGE != '' %}
103 pushd /srv/salt/reclass && git fetch {{ SALT_MODELS_REPOSITORY }} {{ SALT_MODELS_REF_CHANGE }} && git checkout FETCH_HEAD && popd;
104 {%- endif %}
105 mkdir -p /srv/salt/reclass/classes/service;
106
107 # Replace firstly to an intermediate value to avoid intersection between
108 # already replaced and replacing networks.
109 # For example, if generated IPV4_NET_ADMIN_PREFIX=10.16.0 , then there is a risk of replacing twice:
110 # 192.168.10 -> 10.16.0 (generated network for admin)
111 # 10.16.0 -> <external network>
112 # So let's replace constant networks to the keywords, and then keywords to the desired networks.
113 find /srv/salt/reclass/ -type f -exec sed -i 's/192\.168\.10\./==IPV4_NET_ADMIN_PREFIX==/g' {} +
114 find /srv/salt/reclass/ -type f -exec sed -i 's/172\.16\.10\./==IPV4_NET_CONTROL_PREFIX==/g' {} +
115 find /srv/salt/reclass/ -type f -exec sed -i 's/10\.1\.0\./==IPV4_NET_TENANT_PREFIX==/g' {} +
116 find /srv/salt/reclass/ -type f -exec sed -i 's/10\.16\.0\./==IPV4_NET_EXTERNAL_PREFIX==/g' {} +
117
118 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_ADMIN_PREFIX==/{{ IPV4_NET_ADMIN_PREFIX }}./g' {} +
119 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_CONTROL_PREFIX==/{{ IPV4_NET_CONTROL_PREFIX }}./g' {} +
120 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_TENANT_PREFIX==/{{ IPV4_NET_TENANT_PREFIX }}./g' {} +
121 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_EXTERNAL_PREFIX==/{{ IPV4_NET_EXTERNAL_PREFIX }}./g' {} +
122
123 find /srv/salt/reclass/ -type f -exec sed -i 's/apt_mk_version:.*/apt_mk_version: {{ REPOSITORY_SUITE }}/g' {} +
124
125 # Disable checkouting the model from remote repository
126 cat << 'EOF' >> /srv/salt/reclass/nodes/{{ HOSTNAME_CFG01 }}.yml
127 # local storage
128 reclass:
129 storage:
130 data_source:
131 engine: local
132 EOF
133
134 # Show the changes to the console
135 cd /srv/salt/reclass/; git diff
136 node_name: {{ HOSTNAME_CFG01 }}
137 retry: {count: 1, delay: 1}
138 skip_fail: false
139
140- description: Configure reclass
141 cmd: |
142 FORMULA_PATH=${FORMULA_PATH:-/usr/share/salt-formulas};
143 FORMULA_REPOSITORY=${FORMULA_REPOSITORY:-deb [arch=amd64] http://apt-mk.mirantis.com/xenial {{ REPOSITORY_SUITE }} salt};
144 FORMULA_GPG=${FORMULA_GPG:-http://apt-mk.mirantis.com/public.gpg};
145 which wget > /dev/null || (apt-get update; apt-get install -y wget);
146 echo "${FORMULA_REPOSITORY}" > /etc/apt/sources.list.d/mcp_salt.list;
147 wget -O - "${FORMULA_GPG}" | apt-key add -;
148 apt-get clean; apt-get update;
149 [ ! -d /srv/salt/reclass/classes/service ] && mkdir -p /srv/salt/reclass/classes/service;
150 declare -a formula_services=("linux" "reclass" "salt" "openssh" "ntp" "git" "nginx" "collectd" "sensu" "heka" "sphinx" "keystone" "mysql" "grafana" "haproxy" "rsyslog" "horizon" "prometheus" "telegraf" "elasticsearch" "docker" "kibana");
151 echo -e "\nInstalling all required salt formulas\n";
152 eatmydata apt-get install -y "${formula_services[@]/#/salt-formula-}";
153 for formula_service in "${formula_services[@]}"; do
154 echo -e "\nLink service metadata for formula ${formula_service} ...\n";
155 [ ! -L "/srv/salt/reclass/classes/service/${formula_service}" ] && ln -s ${FORMULA_PATH}/reclass/service/${formula_service} /srv/salt/reclass/classes/service/${formula_service};
156 done;
157 [ ! -d /srv/salt/env ] && mkdir -p /srv/salt/env;
158 [ ! -L /srv/salt/env/prd ] && ln -s ${FORMULA_PATH}/env /srv/salt/env/prd;
159 [ ! -d /etc/reclass ] && mkdir /etc/reclass;
160
161 cat << 'EOF' >> /etc/reclass/reclass-config.yml
162 storage_type: yaml_fs
163 pretty_print: True
164 output: yaml
165 inventory_base_uri: /srv/salt/reclass
166 EOF
167 node_name: {{ HOSTNAME_CFG01 }}
168 retry: {count: 1, delay: 1}
169 skip_fail: false
170
171- description: Restart salt-master service
172 cmd: |
173 systemctl restart salt-master;
174 node_name: {{ HOSTNAME_CFG01 }}
175 retry: {count: 1, delay: 5}
176 skip_fail: false
177
178- description: Show reclass-salt --top for cfg01 node
179 cmd: reclass-salt --top
180 node_name: {{ HOSTNAME_CFG01 }}
181 retry: {count: 1, delay: 5}
182 skip_fail: false
183
184{%- for ssh in config.underlay.ssh %}
185- description: Configure salt-minion on {{ ssh['node_name'] }}
186 cmd: |
187 [ ! -d /etc/salt/minion.d ] && mkdir -p /etc/salt/minion.d;
188 cat << "EOF" >> /etc/salt/minion.d/minion.conf
189 id: {{ ssh['node_name'] }}
190 master: {{ config.salt.salt_master_host }}
191 EOF
192 eatmydata apt-get install -y salt-minion;
193 echo "Check for system info and metadata availability ...";
194 salt-call --no-color grains.items;
195 salt-call --no-color pillar.items;
196 node_name: {{ ssh['node_name'] }}
197 retry: {count: 1, delay: 1}
198 skip_fail: false
199{%- endfor %}
200
201
202- description: Accept salt keys from all the nodes
203 cmd: salt-key -A -y
204 node_name: {{ HOSTNAME_CFG01 }}
205 retry: {count: 1, delay: 5}
206 skip_fail: true
207
208- description: Configure salt adoptors on cfg01
209 cmd: |
210 ln -s /usr/lib/python2.7/dist-packages/reclass/adapters/salt.py /usr/local/sbin/reclass-salt;
211 chmod +x /usr/lib/python2.7/dist-packages/reclass/adapters/salt.py
212 node_name: {{ HOSTNAME_CFG01 }}
213 retry: {count: 1, delay: 1}
214 skip_fail: false
215
216# Prepare salt services and nodes settings
217- description: Run 'linux' formula on cfg01
218 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@salt:master' state.sls linux;
219 node_name: {{ HOSTNAME_CFG01 }}
220 retry: {count: 1, delay: 5}
221 skip_fail: false
222
223- description: Run 'openssh' formula on cfg01
224 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
225 -C 'I@salt:master' state.sls openssh;
226 salt --hard-crash --state-output=mixed --state-verbose=False
227 -C 'I@salt:master' cmd.run "sed -i 's/PasswordAuthentication no/PasswordAuthentication
228 yes/' /etc/ssh/sshd_config && service ssh reload";
229 node_name: {{ HOSTNAME_CFG01 }}
230 retry: {count: 3, delay: 5}
231 skip_fail: false
232
233- description: '*Workaround* of the bug https://mirantis.jira.com/browse/PROD-7962'
234 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
235 '*' cmd.run "echo ' StrictHostKeyChecking no' >> /root/.ssh/config"
236 node_name: {{ HOSTNAME_CFG01 }}
237 retry: {count: 1, delay: 1}
238 skip_fail: false
239
240- description: Run 'salt.master' formula on cfg01
241 cmd: timeout 120 salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@salt:master' state.sls salt.master;
242 node_name: {{ HOSTNAME_CFG01 }}
243 retry: {count: 2, delay: 5}
244 skip_fail: false
245
246- description: Generate inventory for all the nodes to the /srv/salt/reclass/nodes/_generated
247 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
248 -C 'I@salt:master' state.sls reclass
249 node_name: {{ HOSTNAME_CFG01 }}
250 retry: {count: 1, delay: 5}
251 skip_fail: false
252
253- description: Refresh pillars on all minions
254 cmd: salt --hard-crash --state-output=mixed --state-verbose=False '*' saltutil.refresh_pillar
255 node_name: {{ HOSTNAME_CFG01 }}
256 retry: {count: 1, delay: 5}
257 skip_fail: false
258
259- description: Show reclass-salt --top for all generated nodes
260 cmd: reclass-salt --top
261 node_name: {{ HOSTNAME_CFG01 }}
262 retry: {count: 1, delay: 5}
263 skip_fail: false
264
265- description: Sync all salt resources
266 cmd: salt --hard-crash --state-output=mixed --state-verbose=False '*' saltutil.sync_all
267 node_name: {{ HOSTNAME_CFG01 }}
268 retry: {count: 1, delay: 5}
269 skip_fail: false
270
271- description: Configure linux on master
272 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@salt:master' state.sls 'linux.system'
273 node_name: {{ HOSTNAME_CFG01 }}
274 retry: {count: 1, delay: 5}
275 skip_fail: false
276
277- description: Configure minion on master
278 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
279 -C 'I@salt:master' state.sls 'salt.minion'
280 node_name: {{ HOSTNAME_CFG01 }}
281 retry: {count: 3, delay: 10}
282 skip_fail: false
283
284# Bootstrap all nodes
285
286- description: Configure linux on other nodes
287 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system' state.sls 'linux'
288 node_name: {{ HOSTNAME_CFG01 }}
289 retry: {count: 1, delay: 5}
290 skip_fail: false
291
292- description: Configure openssh on all nodes
293 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system and not cfg01*' state.sls openssh;
294 salt --hard-crash --state-output=mixed --state-verbose=False
295 -C 'I@linux:system and not cfg01*' cmd.run "sed -i 's/PasswordAuthentication no/PasswordAuthentication
296 yes/' /etc/ssh/sshd_config && service ssh reload"
297 node_name: {{ HOSTNAME_CFG01 }}
298 retry: {count: 1, delay: 5}
299 skip_fail: false
300
301- description: Configure salt.minion on other nodes
302 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system and not cfg01*' state.sls salt.minion
303 node_name: {{ HOSTNAME_CFG01 }}
304 retry: {count: 3, delay: 10}
305 skip_fail: false
306
307- description: Check salt minion versions on slaves
308 cmd: salt '*' test.version
309 node_name: {{ HOSTNAME_CFG01 }}
310 retry: {count: 1, delay: 5}
311 skip_fail: false
312
313- description: Check salt top states on nodes
314 cmd: salt '*' state.show_top
315 node_name: {{ HOSTNAME_CFG01 }}
316 retry: {count: 1, delay: 5}
317 skip_fail: false
318
319- description: Configure ntp and rsyslog on nodes
320 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system' state.sls ntp,rsyslog
321 node_name: {{ HOSTNAME_CFG01 }}
322 retry: {count: 1, delay: 10}
323 skip_fail: false
324
325#- description: Hack gtw node
326# cmd: salt 'gtw*' cmd.run "ip addr del {{ IPV4_NET_CONTROL_PREFIX }}.110/24 dev ens4; ip addr flush dev ens4";
327# node_name: {{ HOSTNAME_CFG01 }}
328# retry: {count: 1, delay: 10}
329# skip_fail: false
330
331#- description: Hack cmp01 node
332# cmd: salt 'cmp01*' cmd.run "ip addr del {{ IPV4_NET_CONTROL_PREFIX }}.105/24 dev ens4; ip addr flush dev ens4";
333# node_name: {{ HOSTNAME_CFG01 }}
334# retry: {count: 1, delay: 10}
335# skip_fail: false
336
337#- description: Hack cmp02 node
338# cmd: salt 'cmp02*' cmd.run "ip addr del {{ IPV4_NET_CONTROL_PREFIX }}.106/24 dev ens4; ip addr flush dev ens4";
339# node_name: {{ HOSTNAME_CFG01 }}
340# retry: {count: 1, delay: 10}
341# skip_fail: false