blob: fc38e6614efaf0cf8e5b1ae3f97a589e99406a68 [file] [log] [blame]
Dennis Dmitrieveac3aab2017-07-12 16:36:41 +03001{% from 'virtual-mcp-ocata-cicd/underlay.yaml' import HOSTNAME_CFG01 with context %}
2{% from 'virtual-mcp-ocata-cicd/underlay.yaml' import REPOSITORY_SUITE with context %}
3
4{% set SALT_MODELS_REPOSITORY = os_env('SALT_MODELS_REPOSITORY','https://gerrit.mcp.mirantis.net/salt-models/mcp-virtual-lab') %}
5{% set SALT_MODELS_BRANCH = os_env('SALT_MODELS_BRANCH','master') %}
6{% set SALT_MODELS_COMMIT = os_env('SALT_MODELS_COMMIT','master') %}
7
8# Reference to a patch that should be applied to the model if required, for example: export SALT_MODELS_REF_CHANGE=refs/changes/19/7219/12
9{% set SALT_MODELS_REF_CHANGE = os_env('SALT_MODELS_REF_CHANGE', '') %}
10
11# Address pools for reclass cluster model are taken in the following order:
12# 1. environment variables,
13# 2. config.underlay.address_pools based on fuel-devops address pools
14# (see generated '.ini' file after underlay is created),
15# 3. defaults
16{% set address_pools = config.underlay.address_pools %}
17{% set IPV4_NET_ADMIN = os_env('IPV4_NET_ADMIN', address_pools.get('admin-pool01', '192.168.10.0/24')) %}
18{% set IPV4_NET_CONTROL = os_env('IPV4_NET_CONTROL', address_pools.get('private-pool01', '172.16.10.0/24')) %}
19{% set IPV4_NET_TENANT = os_env('IPV4_NET_TENANT', address_pools.get('tenant-pool01', '10.1.0.0/24')) %}
20{% set IPV4_NET_EXTERNAL = os_env('IPV4_NET_EXTERNAL', address_pools.get('external-pool01', '10.16.0.0/24')) %}
21
22{% set IPV4_NET_ADMIN_PREFIX = '.'.join(IPV4_NET_ADMIN.split('.')[0:3]) %}
23{% set IPV4_NET_CONTROL_PREFIX = '.'.join(IPV4_NET_CONTROL.split('.')[0:3]) %}
24{% set IPV4_NET_TENANT_PREFIX = '.'.join(IPV4_NET_TENANT.split('.')[0:3]) %}
25{% set IPV4_NET_EXTERNAL_PREFIX = '.'.join(IPV4_NET_EXTERNAL.split('.')[0:3]) %}
26
27# Install salt to the config node
28
29#- description: (moved to cloud-init config) Configure repository on the cfg01 node
30# cmd:
31# echo "172.18.248.114 jenkins.mcp.mirantis.net gerrit.mcp.mirantis.net" >> /etc/hosts;
32# echo "185.135.196.10 apt-mk.mirantis.com" >> /etc/hosts;
33# echo "nameserver 172.18.208.44 >> /etc/resolv.conf;
34# echo "nameserver 8.8.8.8 >> /etc/resolv.conf;
35# which wget >/dev/null || (apt-get update; apt-get install -y wget);
36# echo "deb [arch=amd64] http://apt-mk.mirantis.com/xenial nightly salt extra" > /etc/apt/sources.list.d/mcp_salt.list;
37# wget -O - http://apt-mk.mirantis.com/public.gpg | apt-key add -;
38# echo "deb http://repo.saltstack.com/apt/ubuntu/16.04/amd64/2016.3 xenial main" > /etc/apt/sources.list.d/saltstack.list;
39# wget -O - https://repo.saltstack.com/apt/ubuntu/16.04/amd64/2016.3/SALTSTACK-GPG-KEY.pub | apt-key add -;
40# node_name: {{ HOSTNAME_CFG01 }}
41# retry: {count: 1, delay: 1}
42# skip_fail: false
43
44#- description: Update packages on cfg01
45# cmd: apt-get clean; eatmydata apt-get update
46# node_name: {{ HOSTNAME_CFG01 }}
47# retry: {count: 1, delay: 1}
48# skip_fail: false
49
50- description: Installing salt master on cfg01
51 cmd: eatmydata apt-get install -y reclass git salt-master
52 node_name: {{ HOSTNAME_CFG01 }}
53 retry: {count: 1, delay: 1}
54 skip_fail: false
55
56#- description: (moved to cloud-init config) Install common packages on cfg01
57# cmd: eatmydata apt-get install -y python-pip wget curl tmux byobu iputils-ping traceroute htop tree
58# node_name: {{ HOSTNAME_CFG01 }}
59# retry: {count: 1, delay: 1}
60# skip_fail: false
61
62- description: Configure salt-master on cfg01
63 cmd: |
64 cat << 'EOF' >> /etc/salt/master.d/master.conf
65 file_roots:
66 base:
67 - /usr/share/salt-formulas/env
68 pillar_opts: False
69 open_mode: True
70 reclass: &reclass
71 storage_type: yaml_fs
72 inventory_base_uri: /srv/salt/reclass
73 ext_pillar:
74 - reclass: *reclass
75 master_tops:
76 reclass: *reclass
77 EOF
78 node_name: {{ HOSTNAME_CFG01 }}
79 retry: {count: 1, delay: 1}
80 skip_fail: false
81
82- description: Configure GIT settings and certificates
83 cmd: touch /root/.git_trusted_certs.pem;
84 for server in git.tcpcloud.eu github.com; do
85 openssl s_client -showcerts -connect $server:443 </dev/null
86 | openssl x509 -outform PEM
87 >> /root/.git_trusted_certs.pem;
88 done;
89 HOME=/root git config --global http.sslCAInfo /root/.git_trusted_certs.pem;
90 HOME=/root git config --global user.email "tcp-qa@example.com";
91 HOME=/root git config --global user.name "TCP QA";
92 node_name: {{ HOSTNAME_CFG01 }}
93 retry: {count: 1, delay: 1}
94 skip_fail: false
95
96
97- description: Clone reclass models with submodules
98 cmd: |
99 ssh-keyscan -H github.com >> ~/.ssh/known_hosts;
100 git clone -b {{ SALT_MODELS_BRANCH }} --recurse-submodules {{ SALT_MODELS_REPOSITORY }} /srv/salt/reclass;
101 pushd /srv/salt/reclass && git checkout {{ SALT_MODELS_COMMIT }} && popd;
102 {%- if SALT_MODELS_REF_CHANGE != '' %}
103 pushd /srv/salt/reclass && git fetch {{ SALT_MODELS_REPOSITORY }} {{ SALT_MODELS_REF_CHANGE }} && git checkout FETCH_HEAD && popd;
104 {%- endif %}
105 mkdir -p /srv/salt/reclass/classes/service;
106
107 # Replace firstly to an intermediate value to avoid intersection between
108 # already replaced and replacing networks.
109 # For example, if generated IPV4_NET_ADMIN_PREFIX=10.16.0 , then there is a risk of replacing twice:
110 # 192.168.10 -> 10.16.0 (generated network for admin)
111 # 10.16.0 -> <external network>
112 # So let's replace constant networks to the keywords, and then keywords to the desired networks.
113 find /srv/salt/reclass/ -type f -exec sed -i 's/192\.168\.10\./==IPV4_NET_ADMIN_PREFIX==/g' {} +
114 find /srv/salt/reclass/ -type f -exec sed -i 's/172\.16\.10\./==IPV4_NET_CONTROL_PREFIX==/g' {} +
115 find /srv/salt/reclass/ -type f -exec sed -i 's/10\.1\.0\./==IPV4_NET_TENANT_PREFIX==/g' {} +
116 find /srv/salt/reclass/ -type f -exec sed -i 's/10\.16\.0\./==IPV4_NET_EXTERNAL_PREFIX==/g' {} +
117
118 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_ADMIN_PREFIX==/{{ IPV4_NET_ADMIN_PREFIX }}./g' {} +
119 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_CONTROL_PREFIX==/{{ IPV4_NET_CONTROL_PREFIX }}./g' {} +
120 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_TENANT_PREFIX==/{{ IPV4_NET_TENANT_PREFIX }}./g' {} +
121 find /srv/salt/reclass/ -type f -exec sed -i 's/==IPV4_NET_EXTERNAL_PREFIX==/{{ IPV4_NET_EXTERNAL_PREFIX }}./g' {} +
122
123 find /srv/salt/reclass/ -type f -exec sed -i 's/apt_mk_version:.*/apt_mk_version: {{ REPOSITORY_SUITE }}/g' {} +
124
125 # Disable checkouting the model from remote repository
126 cat << 'EOF' >> /srv/salt/reclass/nodes/{{ HOSTNAME_CFG01 }}.yml
127 # local storage
128 reclass:
129 storage:
130 data_source:
131 engine: local
132 EOF
133
134 # Show the changes to the console
135 cd /srv/salt/reclass/; git diff
136 node_name: {{ HOSTNAME_CFG01 }}
137 retry: {count: 1, delay: 1}
138 skip_fail: false
139
140- description: Configure reclass
141 cmd: |
142 FORMULA_PATH=${FORMULA_PATH:-/usr/share/salt-formulas};
143 FORMULA_REPOSITORY=${FORMULA_REPOSITORY:-deb [arch=amd64] http://apt-mk.mirantis.com/xenial {{ REPOSITORY_SUITE }} salt};
144 FORMULA_GPG=${FORMULA_GPG:-http://apt-mk.mirantis.com/public.gpg};
145 which wget > /dev/null || (apt-get update; apt-get install -y wget);
146 echo "${FORMULA_REPOSITORY}" > /etc/apt/sources.list.d/mcp_salt.list;
147 wget -O - "${FORMULA_GPG}" | apt-key add -;
148 apt-get clean; apt-get update;
149 [ ! -d /srv/salt/reclass/classes/service ] && mkdir -p /srv/salt/reclass/classes/service;
Dennis Dmitriev76f65462017-07-20 16:21:26 -0400150 declare -a formula_services=("linux" "reclass" "salt" "openssh" "ntp" "git" "nginx" "collectd" "sensu" "heka" "sphinx" "keystone" "mysql" "grafana" "haproxy" "rsyslog" "horizon" "prometheus" "telegraf" "elasticsearch" "docker" "kibana");
Dennis Dmitrieveac3aab2017-07-12 16:36:41 +0300151 echo -e "\nInstalling all required salt formulas\n";
152 eatmydata apt-get install -y "${formula_services[@]/#/salt-formula-}";
153 for formula_service in "${formula_services[@]}"; do
154 echo -e "\nLink service metadata for formula ${formula_service} ...\n";
155 [ ! -L "/srv/salt/reclass/classes/service/${formula_service}" ] && ln -s ${FORMULA_PATH}/reclass/service/${formula_service} /srv/salt/reclass/classes/service/${formula_service};
156 done;
157 [ ! -d /srv/salt/env ] && mkdir -p /srv/salt/env;
158 [ ! -L /srv/salt/env/prd ] && ln -s ${FORMULA_PATH}/env /srv/salt/env/prd;
159 [ ! -d /etc/reclass ] && mkdir /etc/reclass;
160
161 cat << 'EOF' >> /etc/reclass/reclass-config.yml
162 storage_type: yaml_fs
163 pretty_print: True
164 output: yaml
165 inventory_base_uri: /srv/salt/reclass
166 EOF
167 node_name: {{ HOSTNAME_CFG01 }}
168 retry: {count: 1, delay: 1}
169 skip_fail: false
170
171- description: Restart salt-master service
172 cmd: |
173 systemctl restart salt-master;
174 node_name: {{ HOSTNAME_CFG01 }}
175 retry: {count: 1, delay: 5}
176 skip_fail: false
177
178- description: Show reclass-salt --top for cfg01 node
179 cmd: reclass-salt --top
180 node_name: {{ HOSTNAME_CFG01 }}
181 retry: {count: 1, delay: 5}
182 skip_fail: false
183
184{%- for ssh in config.underlay.ssh %}
185- description: Configure salt-minion on {{ ssh['node_name'] }}
186 cmd: |
187 [ ! -d /etc/salt/minion.d ] && mkdir -p /etc/salt/minion.d;
188 cat << "EOF" >> /etc/salt/minion.d/minion.conf
189 id: {{ ssh['node_name'] }}
190 master: {{ config.salt.salt_master_host }}
191 EOF
192 eatmydata apt-get install -y salt-minion;
193 echo "Check for system info and metadata availability ...";
194 salt-call --no-color grains.items;
195 salt-call --no-color pillar.items;
196 node_name: {{ ssh['node_name'] }}
197 retry: {count: 1, delay: 1}
198 skip_fail: false
199{%- endfor %}
200
201
202- description: Accept salt keys from all the nodes
203 cmd: salt-key -A -y
204 node_name: {{ HOSTNAME_CFG01 }}
205 retry: {count: 1, delay: 5}
206 skip_fail: true
207
208- description: Configure salt adoptors on cfg01
209 cmd: |
210 ln -s /usr/lib/python2.7/dist-packages/reclass/adapters/salt.py /usr/local/sbin/reclass-salt;
211 chmod +x /usr/lib/python2.7/dist-packages/reclass/adapters/salt.py
212 node_name: {{ HOSTNAME_CFG01 }}
213 retry: {count: 1, delay: 1}
214 skip_fail: false
215
216# Prepare salt services and nodes settings
217- description: Run 'linux' formula on cfg01
218 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@salt:master' state.sls linux;
219 node_name: {{ HOSTNAME_CFG01 }}
220 retry: {count: 1, delay: 5}
221 skip_fail: false
222
223- description: Run 'openssh' formula on cfg01
224 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
225 -C 'I@salt:master' state.sls openssh;
226 salt --hard-crash --state-output=mixed --state-verbose=False
227 -C 'I@salt:master' cmd.run "sed -i 's/PasswordAuthentication no/PasswordAuthentication
228 yes/' /etc/ssh/sshd_config && service ssh reload";
229 node_name: {{ HOSTNAME_CFG01 }}
230 retry: {count: 3, delay: 5}
231 skip_fail: false
232
233- description: '*Workaround* of the bug https://mirantis.jira.com/browse/PROD-7962'
234 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
235 '*' cmd.run "echo ' StrictHostKeyChecking no' >> /root/.ssh/config"
236 node_name: {{ HOSTNAME_CFG01 }}
237 retry: {count: 1, delay: 1}
238 skip_fail: false
239
240- description: Run 'salt.master' formula on cfg01
241 cmd: timeout 120 salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@salt:master' state.sls salt.master;
242 node_name: {{ HOSTNAME_CFG01 }}
243 retry: {count: 2, delay: 5}
244 skip_fail: false
245
246- description: Generate inventory for all the nodes to the /srv/salt/reclass/nodes/_generated
247 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
248 -C 'I@salt:master' state.sls reclass
249 node_name: {{ HOSTNAME_CFG01 }}
250 retry: {count: 1, delay: 5}
251 skip_fail: false
252
253- description: Refresh pillars on all minions
254 cmd: salt --hard-crash --state-output=mixed --state-verbose=False '*' saltutil.refresh_pillar
255 node_name: {{ HOSTNAME_CFG01 }}
256 retry: {count: 1, delay: 5}
257 skip_fail: false
258
259- description: Show reclass-salt --top for all generated nodes
260 cmd: reclass-salt --top
261 node_name: {{ HOSTNAME_CFG01 }}
262 retry: {count: 1, delay: 5}
263 skip_fail: false
264
265- description: Sync all salt resources
266 cmd: salt --hard-crash --state-output=mixed --state-verbose=False '*' saltutil.sync_all
267 node_name: {{ HOSTNAME_CFG01 }}
268 retry: {count: 1, delay: 5}
269 skip_fail: false
270
271- description: Configure linux on master
272 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@salt:master' state.sls 'linux.system'
273 node_name: {{ HOSTNAME_CFG01 }}
274 retry: {count: 1, delay: 5}
275 skip_fail: false
276
Dennis Dmitrievf8546172017-07-20 21:57:05 +0300277- description: Configure salt.minion on master
Dennis Dmitrieveac3aab2017-07-12 16:36:41 +0300278 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
Dennis Dmitrievf8546172017-07-20 21:57:05 +0300279 -C 'I@salt:master' state.sls salt.minion
280 node_name: {{ HOSTNAME_CFG01 }}
281 retry: {count: 3, delay: 10}
282 skip_fail: false
283
284- description: Run state 'salt' on master (for salt.api, etc)
285 cmd: salt --hard-crash --state-output=mixed --state-verbose=False
286 -C 'I@salt:master' state.sls salt
Dennis Dmitrieveac3aab2017-07-12 16:36:41 +0300287 node_name: {{ HOSTNAME_CFG01 }}
288 retry: {count: 3, delay: 10}
289 skip_fail: false
290
291# Bootstrap all nodes
292
293- description: Configure linux on other nodes
294 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system' state.sls 'linux'
295 node_name: {{ HOSTNAME_CFG01 }}
296 retry: {count: 1, delay: 5}
297 skip_fail: false
298
299- description: Configure openssh on all nodes
300 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system and not cfg01*' state.sls openssh;
301 salt --hard-crash --state-output=mixed --state-verbose=False
302 -C 'I@linux:system and not cfg01*' cmd.run "sed -i 's/PasswordAuthentication no/PasswordAuthentication
303 yes/' /etc/ssh/sshd_config && service ssh reload"
304 node_name: {{ HOSTNAME_CFG01 }}
305 retry: {count: 1, delay: 5}
306 skip_fail: false
307
308- description: Configure salt.minion on other nodes
309 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system and not cfg01*' state.sls salt.minion
310 node_name: {{ HOSTNAME_CFG01 }}
311 retry: {count: 3, delay: 10}
312 skip_fail: false
313
314- description: Check salt minion versions on slaves
315 cmd: salt '*' test.version
316 node_name: {{ HOSTNAME_CFG01 }}
317 retry: {count: 1, delay: 5}
318 skip_fail: false
319
320- description: Check salt top states on nodes
321 cmd: salt '*' state.show_top
322 node_name: {{ HOSTNAME_CFG01 }}
323 retry: {count: 1, delay: 5}
324 skip_fail: false
325
326- description: Configure ntp and rsyslog on nodes
327 cmd: salt --hard-crash --state-output=mixed --state-verbose=False -C 'I@linux:system' state.sls ntp,rsyslog
328 node_name: {{ HOSTNAME_CFG01 }}
329 retry: {count: 1, delay: 10}
330 skip_fail: false
331
332#- description: Hack gtw node
333# cmd: salt 'gtw*' cmd.run "ip addr del {{ IPV4_NET_CONTROL_PREFIX }}.110/24 dev ens4; ip addr flush dev ens4";
334# node_name: {{ HOSTNAME_CFG01 }}
335# retry: {count: 1, delay: 10}
336# skip_fail: false
337
338#- description: Hack cmp01 node
339# cmd: salt 'cmp01*' cmd.run "ip addr del {{ IPV4_NET_CONTROL_PREFIX }}.105/24 dev ens4; ip addr flush dev ens4";
340# node_name: {{ HOSTNAME_CFG01 }}
341# retry: {count: 1, delay: 10}
342# skip_fail: false
343
344#- description: Hack cmp02 node
345# cmd: salt 'cmp02*' cmd.run "ip addr del {{ IPV4_NET_CONTROL_PREFIX }}.106/24 dev ens4; ip addr flush dev ens4";
346# node_name: {{ HOSTNAME_CFG01 }}
347# retry: {count: 1, delay: 10}
348# skip_fail: false