blob: 0b4ec983032b8a04a1985f1197cd59e73f34ad66 [file] [log] [blame]
Matthew Treinisha970d652015-03-11 15:39:24 -04001.. _tempest-configuration:
2
Matthew Treinishbc1b15b2015-02-20 15:56:07 -05003Tempest Configuration Guide
4===========================
5
Matthew Treinishf640f662015-03-11 15:13:30 -04006This guide is a starting point for configuring tempest. It aims to elaborate
7on and explain some of the mandatory and common configuration settings and how
8they are used in conjunction. The source of truth on each option is the sample
9config file which explains the purpose of each individual option.
10
11Lock Path
12---------
13
14There are some tests and operations inside of tempest that need to be
15externally locked when running in parallel to prevent them from running at
16the same time. This is a mandatory step for configuring tempest and is still
17needed even when running serially. All that is needed to do this is:
18
19 #. Set the lock_path option in the oslo_concurrency group
20
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050021Auth/Credentials
22----------------
23
24Tempest currently has 2 different ways in configuration to provide credentials
25to use when running tempest. One is a traditional set of configuration options
26in the tempest.conf file. These options are in the identity section and let you
27specify a regular user, a global admin user, and a alternate user set of
28credentials. (which consist of a username, password, and project/tenant name)
29These options should be clearly labelled in the sample config file in the
30identity section.
31
32The other method to provide credentials is using the accounts.yaml file. This
33file is used to specify an arbitrary number of users available to run tests
34with. You can specify the location of the file in the
35auth section in the tempest.conf file. To see the specific format used in
36the file please refer to the accounts.yaml.sample file included in tempest.
37Currently users that are specified in the accounts.yaml file are assumed to
38have the same set of roles which can be used for executing all the tests you
39are running. This will be addressed in the future, but is a current limitation.
40Eventually the config options for providing credentials to tempest will be
41deprecated and removed in favor of the accounts.yaml file.
42
Matthew Treinish7909e122015-04-15 15:43:50 -040043Keystone Connection Info
44^^^^^^^^^^^^^^^^^^^^^^^^
45In order for tempest to be able to talk to your OpenStack deployment you need
46to provide it with information about how it communicates with keystone.
47This involves configuring the following options in the identity section:
48
49 #. auth_version
50 #. uri
51 #. uri_v3
52
53The *auth_version* option is used to tell tempest whether it should be using
54keystone's v2 or v3 api for communicating with keystone. (except for the
55identity api tests which will test a specific version) The 2 uri options are
56used to tell tempest the url of the keystone endpoint. The *uri* option is used
57for keystone v2 request and *uri_v3* is used for keystone v3. You want to ensure
58that which ever version you set for *auth_version* has its uri option defined.
59
60
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050061Credential Provider Mechanisms
62^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
63
64Tempest currently also has 3 different internal methods for providing
65authentication to tests. Tenant isolation, locking test accounts, and
66non-locking test accounts. Depending on which one is in use the configuration
67of tempest is slightly different.
68
69Tenant Isolation
70""""""""""""""""
71Tenant isolation was originally create to enable running tempest in parallel.
72For each test class it creates a unique set of user credentials to use for the
73tests in the class. It can create up to 3 sets of username, password, and
74tenant/project names for a primary user, an admin user, and an alternate user.
75To enable and use tenant isolation you only need to configure 2 things:
76
77 #. A set of admin credentials with permissions to create users and
78 tenants/projects. This is specified in the identity section with the
79 admin_username, admin_tenant_name, and admin_password options
80 #. To enable tenant_isolation in the auth section with the
81 allow_tenant_isolation option.
82
Matthew Treinish0fd69e42015-03-06 00:40:51 -050083This is also the currently the default credential provider enabled by tempest,
84due to it's common use and ease of configuration.
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050085
Matthew Treinish4fae4722015-04-16 21:03:54 -040086It is worth pointing out that depending on your cloud configuration you might
87need to assign a role to each of the users created Tempest's tenant isolation.
88This can be set using the *tempest_roles* option. It takes in a list of role
89names each of which will be assigned to each of the users created by tenant
90isolation. This option will not have any effect when set and tempest is not
91configured to use tenant isolation.
92
93
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050094Locking Test Accounts
95"""""""""""""""""""""
96For a long time using tenant isolation was the only method available if you
97wanted to enable parallel execution of tempest tests. However this was
98insufficient for certain use cases because of the admin credentials requirement
99to create the credential sets on demand. To get around that the accounts.yaml
100file was introduced and with that a new internal credential provider to enable
101using the list of credentials instead of creating them on demand. With locking
102test accounts each test class will reserve a set of credentials from the
103accounts.yaml before executing any of its tests so that each class is isolated
104like in tenant isolation.
105
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500106Currently, this mechanism has some limitations, mostly around networking. The
107locking test accounts provider will only work with a single flat network as
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500108the default for each tenant/project. If another network configuration is used
109in your cloud you might face unexpected failures.
110
111To enable and use locking test accounts you need do a few things:
112
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500113 #. Create a accounts.yaml file which contains the set of pre-existing
114 credentials to use for testing. To make sure you don't have a credentials
115 starvation issue when running in parallel make sure you have at least 2
Matthew Treinishfc7cd8f2015-03-30 11:51:55 -0400116 times the number of worker processes you are using to execute tempest
117 available in the file. (if running serially the worker count is 1)
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500118
119 You can check the sample file packaged in tempest for the yaml format
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500120 #. Provide tempest with the location of you accounts.yaml file with the
121 test_accounts_file option in the auth section
122
123
124Non-locking test accounts
125"""""""""""""""""""""""""
126When tempest was refactored to allow for locking test accounts, the original
127non-tenant isolated case was converted to support the new accounts.yaml file.
128This mechanism is the non-locking test accounts provider. It only makes sense
129to use it if parallel execution isn't needed. If the role restrictions were too
130limiting with the locking accounts provider and tenant isolation is not wanted
131then you can use the non-locking test accounts credential provider without the
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500132accounts.yaml file.
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500133
134To use the non-locking test accounts provider you have 2 ways to configure it.
135First you can specify the sets of credentials in the configuration file like
136detailed above with following 9 options in the identity section:
137
138 #. username
139 #. password
140 #. tenant_name
141 #. admin_username
142 #. admin_password
143 #. admin_tenant_name
144 #. alt_username
145 #. alt_password
146 #. alt_tenant_name
147
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500148The only restriction with using the traditional config options for credentials
149is that if a test requires specific roles on accounts these tests can not be
150run. This is because the config options do not give sufficient flexibility to
151describe the roles assigned to a user for running the tests.
Matthew Treinish2b7f0482015-04-10 12:49:01 -0400152
Matthew Treinish7909e122015-04-15 15:43:50 -0400153Compute
154-------
155
156Flavors
157^^^^^^^
158For tempest to be able to create servers you need to specify flavors that it
159can use to boot the servers with. There are 2 options in the tempest config
160for doing this:
161
162 #. flavor_ref
163 #. flavor_ref_alt
164
165Both of these options are in the compute section of the config file and take
166in the flavor id (not the name) from nova. The *flavor_ref* option is what will
167be used for booting almost all of the guests, *flavor_ref_alt* is only used in
168tests where 2 different sized servers are required. (for example a resize test)
169
170Using a smaller flavor is generally recommended, when larger flavors are used
171the extra time required to bring up servers will likely affect total run time
172and probably require tweaking timeout values to ensure tests have ample time to
173finish.
174
175Images
176^^^^^^
177Just like with flavors, tempest needs to know which images to use for booting
178servers. There are 2 options in the compute section just like with flavors:
179
180 #. image_ref
181 #. image_ref_alt
182
183Both options are expecting an image id (not name) from nova. The *image_ref*
184option is what what will be used for booting the majority of servers in tempest.
185*image_ref_alt* is used for tests that require 2 images such as rebuild. If 2
186images are not available you can set both options to the same image_ref and
187those tests will be skipped.
188
189There are also options in the scenario section for images:
190
191 #. img_file
192 #. img_dir
193 #. aki_img_file
194 #. ari_img_file
195 #. ami_img_file
196 #. img_container_format
197 #. img_disk_format
198
199however unlike the other image options these are used for a very small subset
200of scenario tests which are uploading an image. These options are used to tell
201tempest where an image file is located and describe it's metadata for when it's
202uploaded.
203
204The behavior of these options is a bit convoluted (which will likely be fixed
205in future versions). You first need to specify *img_dir*, which is the directory
206tempest will look for the image files in. First it will check if the filename
207set for *img_file* could be found in *img_dir*. If it is found then the
208*img_container_format* and *img_disk_format* options are used to upload that
209image to glance. However if it's not found tempest will look for the 3 uec image
210file name options as a fallback. If neither is found the tests requiring an
211image to upload will fail.
212
213It is worth pointing out that using `cirros`_ is a very good choice for running
214tempest. It's what is used for upstream testing, they boot quickly and have a
215small footprint.
216
217.. _cirros: https://launchpad.net/cirros
218
Matthew Treinish2b7f0482015-04-10 12:49:01 -0400219Networking
220----------
221OpenStack has a myriad of different networking configurations possible and
222depending on which of the 2 network backends, nova-network or neutron, you are
223using things can vary drastically. Due to this complexity Tempest has to provide
224a certain level of flexibility in it's configuration to ensure it will work
225against any cloud. This ends up causing a large number of permutations in
226Tempest's config around network configuration.
227
228
229Enabling Remote Access to Created Servers
230^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
231When Tempest creates servers for testing, some tests require being able to
232connect those servers. Depending on the configuration of the cloud, the methods
233for doing this can be different. In certain configurations it is required to
234specify a single network with server create calls. Accordingly, Tempest provides
235a few different methods for providing this information in configuration to try
236and ensure that regardless of the clouds configuration it'll still be able to
237run. This section covers the different methods of configuring Tempest to provide
238a network when creating servers.
239
240Fixed Network Name
241""""""""""""""""""
242This is the simplest method of specifying how networks should be used. You can
243just specify a single network name/label to use for all server creations. The
244limitation with this is that all tenants/projects and users must be able to see
245that network name/label if they were to perform a network list and be able to
246use it.
247
248If no network name is assigned in the config file and none of the below
249alternatives are used, then Tempest will not specify a network on server
250creations, which depending on the cloud configuration might prevent them from
251booting.
252
253To set a fixed network name simply do:
254
255 #. Set the fixed_network_name option in the compute group
256
257In the case that the configured fixed network name can not be found by a user
258network list call, it will be treated like one was not provided except that a
259warning will be logged stating that it couldn't be found.
260
261
262Accounts File
263"""""""""""""
264If you are using an accounts file to provide credentials for running Tempest
265then you can leverage it to also specify which network should be used with
266server creations on a per tenant/project and user pair basis. This provides
267the necessary flexibility to work with more intricate networking configurations
268by enabling the user to specify exactly which network to use for which
269tenants/projects. You can refer to the accounts.yaml sample file included in
270the tempest repo for the syntax around specifying networks in the file.
271
272However, specifying a network is not required when using an accounts file. If
273one is not specified you can use a fixed network name to specify the network to
274use when creating servers just as without an accounts file. However, any network
275specified in the accounts file will take precedence over the fixed network name
276provided. If no network is provided in the accounts file and a fixed network
277name is not set then no network will be included in create server requests.
278
279If a fixed network is provided and the accounts.yaml file also contains networks
280this has the benefit of enabling a couple more tests which require a static
281network to perform operations like server lists with a network filter. If a
282fixed network name is not provided these tests are skipped. Additionally, if a
283fixed network name is provided it will serve as a fallback in case of a
284misconfiguration or a missing network in the accounts file.
285
286
287With Tenant Isolation
288"""""""""""""""""""""
289With tenant isolation enabled and using nova-network then nothing changes. Your
290only option for configuration is to either set a fixed network name or not.
291However, in most cases it shouldn't matter because nova-network should have no
292problem booting a server with multiple networks. If this is not the case for
293your cloud then using an accounts file is recommended because it provides the
294necessary flexibility to describe your configuration. Tenant isolation is not
295able to dynamically allocate things as necessary if neutron is not enabled.
296
297With neutron and tenant isolation enabled there should not be any additional
298configuration necessary to enable Tempest to create servers with working
299networking, assuming you have properly configured the network section to work
300for your cloud. Tempest will dynamically create the neutron resources necessary
301to enable using servers with that network. Also, just as with the accounts
302file, if you specify a fixed network name while using neutron and tenant
303isolation it will enable running tests which require a static network and it
304will additionally be used as a fallback for server creation. However, unlike
305accounts.yaml this should never be triggered.
Matthew Treinish3220cad2015-04-15 16:25:48 -0400306
Matthew Treinishf96ab3a2015-04-15 19:11:31 -0400307Configuring Available Services
308------------------------------
309OpenStack is really a constellation of several different projects which
310are running together to create a cloud. However which projects you're running
311is not set in stone, and which services are running is up to the deployer.
312Tempest however needs to know which services are available so it can figure
313out which tests it is able to run and certain setup steps which differ based
314on the available services.
315
316The *service_available* section of the config file is used to set which
317services are available. It contains a boolean option for each service (except
318for keystone which is a hard requirement) set it to True if the service is
319available or False if it is not.
320
321Service Catalog
322^^^^^^^^^^^^^^^
323Each project which has its own REST API contains an entry in the service
324catalog. Like most things in OpenStack this is also completely configurable.
325However, for tempest to be able to figure out the endpoints to send REST API
326calls for each service to it needs to know how that project is defined in the
327service catalog. There are 3 options for each service section to accomplish
328this:
329
330 #. catalog_type
331 #. endpoint_type
332 #. region
333
334Setting *catalog_type* and *endpoint_type* should normally give Tempest enough
335information to determine which endpoint it should pull from the service
336catalog to use for talking to that particular service. However, if you're cloud
337has multiple regions available and you need to specify a particular one to use
338a service you can set the *region* option in that service's section.
339
340It should also be noted that the default values for these options are set
341to what devstack uses. (which is a de facto standard for service catalog
342entries) So often nothing actually needs to be set on these options to enable
343communication to a particular service. It is only if you are either not using
344the same *catalog_type* as devstack or you want Tempest to talk to a different
345endpoint type instead of publicURL for a service that these need to be changed.
346
347
Matthew Treinish3220cad2015-04-15 16:25:48 -0400348Service feature configuration
349-----------------------------
350
351OpenStack provides its deployers a myriad of different configuration options
352to enable anyone deploying it to create a cloud tailor-made for any individual
353use case. It provides options for several different backend type, databases,
354message queues, etc. However, the downside to this configurability is that
355certain operations and features aren't supported depending on the configuration.
356These features may or may not be discoverable from the API so the burden is
357often on the user to figure out what the cloud they're talking to supports.
358Besides the obvious interoperability issues with this it also leaves Tempest
359in an interesting situation trying to figure out which tests are expected to
360work. However, Tempest tests do not rely on dynamic api discovery for a feature
361(assuming one exists). Instead Tempest has to be explicitly configured as to
362which optional features are enabled. This is in order to prevent bugs in the
363discovery mechanisms from masking failures.
364
365The service feature-enabled config sections are how Tempest addresses the
366optional feature question. Each service that has tests for optional features
367contains one of these sections. The only options in it are boolean options
368with the name of a feature which is used. If it is set to false any test which
369depends on that functionality will be skipped. For a complete list of all these
370options refer to the sample config file.
371
372
373API Extensions
374^^^^^^^^^^^^^^
375The service feature-enabled sections often contain an *api-extensions* option
376(or in the case of swift a *discoverable_apis* option) this is used to tell
377tempest which api extensions (or configurable middleware) is used in your
378deployment. It has 2 valid config states, either it contains a single value
379"all" (which is the default) which means that every api extension is assumed
380to be enabled, or it is set to a list of each individual extension that is
381enabled for that service.