summaryrefslogtreecommitdiffstats
path: root/xci/installer
AgeCommit message (Collapse)AuthorFilesLines
2019-09-01Refactor k8s scenario implementationFatih Degirmenci3-26/+74
This change updates the scenario logic for basic k8s scenarios that enables the use of various network plugins. The change simply stops copying k8s-cluster.yml over but instead operates on the existing/original k8s-cluster.yml and updates kube_network_plugin in place. This makes it easier to maintain the scenarios and more importantly unblocks us from bumping kubespray and kubernetes versions. Please note that opnfv-scenario-requirements.yml contains version and the refspec of the corresponding change in releng-xci-scenarios repo so this change must be verified properly and if it passes CI, it needs to be amended, updating k8-calico-nofeature scenario's version to master and submitted. And then the change in releng-xci-scenarios can properly be verified. https://gerrit.opnfv.org/gerrit/#/c/releng-xci-scenarios/+/68418/ installer-type:kubespray deploy-scenario:k8-calico-nofeature JIRA: XCI-20 Change-Id: I1f851d20f5f7bc256199303581b05659091fddf9 Signed-off-by: Fatih Degirmenci <fdegir@gmail.com>
2019-08-14Separate vxlan trafficManuel Buil2-0/+12
Currently, all traffic is going through the untagged interface. However, we are creating interfaces for the different traffic. This patch moves the private traffic (VM-VM), which normally uses vxlan tunnels, to the interface created for that deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: I680698d0bf7ab8045d4ca8f7b5bea8c1e1881d71 Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-13Fix the labels for nohaManuel Buil1-1/+1
Both nodes are openstack-helm-node-class=primary. That creates problems when deploying neutron because two l3 agents and dhcp agents are deployed which sometimes results in problems deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: Id13ee3cf308f5120061176302573739d7c5a5ed3 Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-12Set the correct labels for nohaManuel Buil2-14/+26
In noha mode, node1 and node2 is used for controller and compute roles. This patch changes that making node1 only controller and node2 only compute. It also modifies a bit the syntax to make it more ansible friendly deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: I3f40f59ea3c167914ea4c810f7dda60c75fb7175 Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-09Fix noha deploymentManuel Buil1-3/+17
JIRA:XCI-11 noha was not passing the tempest test, however, nobody is testing that test upstream. We should use the test that it being really tested upstream deploy-scenario:k8-calico-nofeature installer-type:osh xci-flavor:noha Change-Id: I551e966e81a93120e96027b32096ec18b21bd3bd Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-08Merge "Fix problems when redeploying with osh"Manuel Buil2-8/+28
2019-08-07Fix problems when redeploying with oshnikoskarandreas2-8/+28
When deploying manually after a previous deployment, keys and fingerprints of the VMs clash with the stored ones. This patch clears the relevant files and also fixes an issue with keepalived role which failes ansible lint when already cached. deploy-scenario:k8-calico-nofeature installer-type:osh Signed-off-by: nikoskarandreas <nick@intracom-telecom.com> Change-Id: I9331a5b7d0ac66a35064dfe7f62dd78a461e570c
2019-08-06Merge "Remove hardcoded ips"Manuel Buil1-2/+2
2019-08-06Merge "Move variable definition to vars"Manuel Buil2-15/+18
2019-08-06Remove hardcoded ipsManuel Buil1-2/+2
We should use the Ansible variables whenever possible instead of hardcoding values like IPs deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: Iee5f179b0b36d2fcbf9b2eca82a3c31cefd83229 Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-06Move variable definition to varsManuel Buil2-15/+18
Ansible best practices recommend doing the definition of variables in the vars directory instead of directly in the tasks deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: Ia5e215f8492a901b8c75ac06ee23258249f7f09a Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-06Add the required dashes in yaml filesManuel Buil6-0/+6
deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: I0423ab27186316d40c93cce847d7cb9fa7308df1 Signed-off-by: Manuel Buil <mbuil@suse.com>
2019-08-05Support of opensuse in OSH-XCINikos Mimigiannis3-2/+22
deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: Ie198ee7e25579f1438561f71fd965518b067fe42 Signed-off-by: Nikos Mimigiannis <nmimi@intracom-telecom.com>
2019-08-01Introduction of Openstack-helm as installernikoskarandreas18-0/+946
This patch creates a new installer tree in xci that uses openstack-helm to deploy openstack on a kubernetes cluster. USAGE: Export INSTALLER_TYPE=osh, DEPLOY_SCENARIO=k8-calico-nofeature and XCI_FLAVOR=noha or mini and run xci-deploy.sh as in documentation. deploy-scenario:k8-calico-nofeature installer-type:osh Change-Id: I212f70eb51c2a38c798c11367d2ebb8bf5f4a1de Signed-off-by: nikoskarandreas <nick@intracom-telecom.com>
2019-06-12Pin ara version to 0.16.4Nikos Mimigiannis1-0/+1
The ara module just released an update which changes how the module can be imported. As a result, the xci-deploy script immediately fails when trying to setup the virtualenv. This patch sets ara to its previous version (ara==0.16.4). Change-Id: Ic54d18dc877857389e8b36bbf2e8bf4b70bc2812 Signed-off-by: Nikos Mimigiannis <nmimi@intracom-telecom.com>
2019-01-08SHA Bump for stable/rockyManuel Buil2-81/+81
Moving to the newer SHAs of stable/rocky installer-type:osa Change-Id: I89de6554d5e3bef8b2b49c6a3e621d3ca3a6f4dc Signed-off-by: Manuel Buil <mbuil@suse.com>
2018-11-06Merge "Bug fix: NFS clients pointing to wrong server"Manuel Buil1-30/+30
2018-11-06Bug fix: NFS clients pointing to wrong serverManuel Buil1-30/+30
We are deploying the NFS server in computes. In all flavors, node2 takes the role of compute00 and thus the NFS server is in 172.29.244.12. Therefore, the openstack config for ha is wrong Change-Id: I5e82ddd670b44e291c0b866ba4fde57e74b68643 Signed-off-by: Manuel Buil <mbuil@suse.com>
2018-11-02xci: osa: Bump SHAs to the HEAD of the Rocky branchMarkos Chandras3-85/+90
Change-Id: I50c367433dc8cf8964c291c916ea939e25f638cb Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-11-01xci: Add missing update_cache statementsMarkos Chandras2-2/+2
When we install packages from the distro repos we need to make sure that the database is updated. This also takes SUSE's zypper pkg manager into consideration which can benefit from the same Ansible option. Change-Id: I7a2206bfc5827b9ccb448278759711c560bb4679 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-10-26os_neutron SHA bumpManuel Buil1-1/+1
We need a commit for SFC scenario: https://github.com/openstack/openstack-ansible-os_neutron/commit/200fa4a7aaa15a6d6758418eafffe093174d2f72 Change-Id: Ia497a49a910d16eaf3c7ee896f0f75aab812bd7a Signed-off-by: Manuel Buil <mbuil@suse.com>
2018-10-25Merge "Introduce the Barbican in XCI for SFC-HA scenario"Markos Chandras1-0/+1
2018-10-20xci: Add OS variables to the post-deployment playbookVenkata Harshavardhan Reddy Allu1-0/+1
OSM needs access to OpenStack credentials and authentication url. This patch would provide that using the xci_flavor specific user_variables.yml file. This patch is necessary to complete the initial integration of OSM. installer-type:osa deploy-scenario:os-nosdn-osm Change-Id: Ic228b323fc69ce46c8093f6dfbc116d8c71a0391 Signed-off-by: Venkata Harshavardhan Reddy Allu <venkataharshavardhan_ven@srmuniv.edu.in>
2018-10-19Introduce the Barbican in XCI for SFC-HA scenarioPanagiotis Karalis1-0/+1
The barbican OS component is introduced for SFC HA deployed scenario. The reason behind is that In HA scenarios we need Openstack Barbican to gather and store the fernet keys so Tacker can access them and be able to register new VIMs. deploy-scenario:os-odl-sfc installer-type:osa JIRA: SFC-131 Change-Id: Ife416fb2a7dc04ddadc93f962695aee4ed448501 Signed-off-by: Panagiotis Karalis <pkaralis@intracom-telecom.com>
2018-10-18xci: osa: Bump SHAs to the HEAD of the Rocky branchManuel Buil3-90/+89
Since Rocky, networking-odl depends on ceilometer and requires it to be installed. Therefore, all odl scenarios need to have ceilometer deployed. Once that is done, we can unfreeze n-odl repo. Besides, we need to introduce a SHA bump for neutron and ceilometer to include the latest changes to support this fix Ceilometer should be git cloned always, otherwise repo_build will fail as ceilometer is now part of requirements.txt [mchandras: Instead of just bumping selective network related roles, lets just do a complete sha bump for stable/rocky] deploy-scenario:os-odl-sfc installer-type:osa Change-Id: I81a39436e4ff648faabda4e82fce1d3f14615741 Signed-off-by: Manuel Buil <mbuil@suse.com> Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-10-12Fix idf for k8sManuel Buil1-0/+3
deploy-scenario:k8-calico-nofeature installer-type:kubespray Change-Id: If1c9f5908f39f9c09efb86e27a3f3883b4cd75b9 Signed-off-by: Manuel Buil <mbuil@suse.com>
2018-09-16Merge "xci: Drop custom XCI certificates"Fatih Degirmenci6-16/+0
2018-09-14xci: Drop custom XCI certificatesMarkos Chandras6-16/+0
OSM requires a CA even when we create a self-signed certificate. We don't actually need to do that since HAproxy and friends can create the whole chain for us, so we can finally get rid of this playbook. installer-type:osa deploy-scenario:os-nosdn-nofeature Change-Id: I14a3adbe3492cd6c562c5167c42dd45756e8e3dd Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-09-13Enable post-deployment for k8s based scenariosFatih Degirmenci2-2/+59
k8-calico-onap scenario will have post deployment tasks to install ONAP using OOM so post-deployment tasks are required to do that. deploy-scenario:k8-calico-nofeature installer-type:kubespray Change-Id: I67c8188cb573f6fc5c80e15a9101cacca1b7b10e Signed-off-by: Fatih Degirmenci <fdegir@gmail.com>
2018-09-12xci: osa: Bump SHA for os_neutronManuel Buil1-1/+1
We require the following patch to deploy ODL when using Ubuntu https://review.openstack.org/#/c/597003/1 This SHA bump adds it Change-Id: I0382a4c3946aeff2ddd86a932055dd770c520c74 Signed-off-by: Manuel Buil <mbuil@suse.com>
2018-09-10xci: osa: Bump the SHA for the openstack_openrc roleMarkos Chandras1-1/+1
Previous bump missed the latest SHA for this role and yardstick started failing again due to the incomplete openrc file. Change-Id: I73f024250c73a42a6c2a36acaf8b1f8c6867dd2a Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-09-07xci: osa: Update OSA SHAs to the HEAD of the Rocky branchMarkos Chandras2-20/+57
Change-Id: I012f829c124d665d7d8d9ebb6b18a72d6d73258f Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-09-06Merge "playbooks: configure-opnfvhost: Ensure we copy only the tracked files"Markos Chandras2-2/+36
2018-09-05xci: osa: Update openrc roleMarkos Chandras1-2/+2
This update fixes the values for OS_INSECURE and OS_VERIFY Change-Id: I7d49bd493bde18f40122721188b006052cf7a901 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-09-04playbooks: configure-opnfvhost: Ensure we copy only the tracked filesMarkos Chandras2-2/+36
This prevents rsync spending time copying temporary files which may have been created during a CI run. deploy-scenario:os-nosdn-nofeature installer-type:osa Change-Id: Ie02e0dbfc06b8fac40d6b90c4c99e361ecf1c0b2 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-09-04xci: osa: Restore self-signed XCI certificateMarkos Chandras6-0/+16
This reverts commit cc583f30f881ba956fb4f1402aa4dd1608b27da2. We still need to have control over the generated certificates so lets keep creating our own. deploy-scenario:os-nosdn-nofeature installer-type:osa Change-Id: I9e730bce2dba578ca0b561b168eaf1c2eca1282d
2018-09-03xci: osa: Update ansible role for configuring the proxy serverMarkos Chandras3-3/+3
The old role has disappeared so we have to use another one. Change-Id: I8533912a19680e93a9cf061109019a0801485936 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-09-03Revert "xci: osa: Disable haproxy ssl configuration"Markos Chandras7-32/+8
This reverts commit 42501f0ef7e0f0729b1c780102fb9713ef383fb3. This also removes the entire SSL management code and we let the haproxy_server role generate the certificates for us. We also need to bump the openrc role to include an upstream patch which fixes the openrc template file. deploy-scenario:os-nosdn-nofeature installer-type:osa Change-Id: I9bb590c9f1d5bc63519cfb4794dc15f794cc5b07 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-08-30xci: Bump OSA and bifrost SHAsMarkos Chandras2-94/+105
This change - bumps OSA SHA to b9d9269528ecbe04b2638a73c2b0f49839f27422 - bumps bifrost SHA to 0d0cfd908d10a670668619c575fd338d1ff328b7 - Pins Ansible to 2.5.8. OSA is using 2.5.5 which has a bug in the pause module so we need to use something newer. Change-Id: Idf05bbef880db11de4a41464ae5080aa21a0613c Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-08-23[xci] integrate istio in XCIwutianwei1-2/+2
using kubespary to deploy the istio, kubespary support to deploy istio installer-type:kubespray deploy-scenario:k8-nosdn-istio Change-Id: Id8c04936187c89fafa921dada382a0e9e11aab27 Signed-off-by: wutianwei <wutianwei1@huawei.com> Signed-off-by: Fatih Degirmenci <fdegir@gmail.com>
2018-08-22Print OpenStack login information at the endFatih Degirmenci1-15/+16
The info is logged to the console before post-deployment tasks and this makes it seeing the deployment status and login info inconvenient. This change moves the logging to the end, after post-deployment. Change-Id: Ic7e232a0b8343e666f54087fbcc09481ab59ca90 Signed-off-by: Fatih Degirmenci <fdegir@gmail.com>
2018-08-21xci: Bump OSA and bifrost SHAsFatih Degirmenci3-102/+140
This change - bumps OSA SHA to cbfdb7dc295ff702044b807336fab067d84a3f20 (mostly based on Rocky RC1) - bumps bifrost SHA to c1c6fb7487d5b967624400623fd35aabf303b917 - pins Ansible to 2.4.6.0 - switches to ollivier/functest-healtcheck since OS is bumped to Rocky Change-Id: Icc14e3e794b489dafd78b426c54051a3732ccb1a Signed-off-by: Fatih Degirmenci <fdegir@gmail.com> Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-08-16Update SHA for ODLManuel Buil1-1/+1
Deployment not working because of a bug. This bug gets fixed with the new SHA Change-Id: I91c6df6bf7ea10492265466ebdfbf4264492936b Signed-off-by: Manuel Buil <mbuil@suse.com>
2018-08-10Merge changes from topic 'extend-suse-support-id-skip-verify'Markos Chandras1-2/+2
* changes: xci: xci-destroy-env.sh: Update virtualbmc path xci: create-vm-nodes: Install virtualbmc in the XCI virtualenv xci: osa: Drop openSUSE mirror variables
2018-08-10xci: osa: Drop openSUSE mirror variablesMarkos Chandras1-2/+2
we let downloads.opensuse.org redirect us to a good one since the hardcoded one does not appear to work anymore. Ansible gets upset if we feed it an empty variables file, so we set a couple of variables there to make it happy. Change-Id: I887522ebc71dd866d544e75beeff47af6111e059 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-08-09Integrate os-nosdn-osm scenarioFatih Degirmenci2-1/+80
This change integrates os-nosdn-osm scenario. The installation of OSM is done as post-deployment. This is achieved by the addition of the new playbook named post-deployment.yml in scenario role folder. This mechanism is available for all OpenStack scenarios. If anything needs to be done for a specific scenario as part of the post-deployment, it can be achieved by creating playbook post-deployment.yml. If post-deployment.yml exists in scenario role, the framework will run it once the regular deployment playbooks are run successfully. If the file does not exist, it will be skipped. The location of the post-deployment.yml is releng-xci-scenarios/<scenario>/role/<scenario>/tasks/post-deployment.yml This is only implemented for OpenStack scenarios currently and similar mechanism is needed for K8S scenarios as well which will be implemented in a separate change. installer-type:osa deploy-scenario:os-nosdn-osm Change-Id: I16780abffca39699eb2f38f662479f0e4d551504 Signed-off-by: Fatih Degirmenci <fdegir@gmail.com>
2018-07-04xci: osa: Disable haproxy ssl configurationMarkos Chandras3-3/+9
The self-signed certificates are causing troubles so until we implement a proper certificate chain in XCI we should disable the SSL endpoints. Change-Id: Ife4ef78de1569121c435a806924a3f90917fd85b Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-06-06xci: osa: switch back from GitHub to OpenStack OSA reposMarkos Chandras2-80/+80
Switching to github.com for the gitclones did not make much of a difference since we are still seeing randomg SSL failures during git clones. So we can switch back to git://git.openstack.org hoping that the git protocol will be more efficient than https. Moreover some projects are moving away from github mirroring and this breaks our tests. Change-Id: I8188ec7cbfbf16eeb4634bd9a44b12a104ce1059 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-06-06xci: OSA: Bump Queens SHAs to fix spice-html5 repo relocationMarkos Chandras1-3/+4
The spice-html5 repository moved from github to its own gitlab hosting and that broke everything. As such, we update the OSA roles which contain the correct URL for the new repository. Change-Id: I3e2883c0436c9c93d2a8a338343ca3a75a1431e4 Signed-off-by: Markos Chandras <mchandras@suse.de>
2018-06-01Merge "xci: kubespray: Use bootstrap role for k8s deployments"Markos Chandras2-1/+19