aboutsummaryrefslogtreecommitdiffstats
path: root/tools/vsperf_install.yml
blob: 3c78e0ca8cc6a83259246263c72ceba3f45d8eca (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
##############################################################################
# Copyright (c) 2017 Nokia
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Apache License, Version 2.0
# which accompanies this distribution, and is available at
# http://www.apache.org/licenses/LICENSE-2.0
##############################################################################
heat_template_version: 2015-04-30

description: >
  Used to run VMs with Vsperf

parameters:
  image:
    type: string
    description: Name of the image
    default: yardstick-vsperf

  flavor:
    type: string
    default: vsperf-flavor

  timeout:
    type: number
    description: Timeout in seconds for WaitCondition, depends on your image and environment
    default: 6000

  external_net_name:
    type: string
    description: Name of the external network which management network will connect to
    default: ext-net1

resources:
  network:
    type: OS::Neutron::Net
    properties:
      name: vsperf_net

  subnet:
    type: OS::Neutron::Subnet
    properties:
      name: vsperf_subnet
      ip_version: 4
      cidr: 192.168.0.0/24
      network: { get_resource: network }

  management_router:
    type: OS::Neutron::Router
    properties:
      name: management_router
      external_gateway_info:
        network: { get_param: external_net_name }

  management_router_interface:
    type: OS::Neutron::RouterInterface
    properties:
      router: { get_resource: management_router }
      subnet: { get_resource: subnet }

  floating_ip:
    type: OS::Neutron::FloatingIP
    properties:
      floating_network: { get_param: external_net_name }

  floating_ip_association:
    type: OS::Nova::FloatingIPAssociation
    properties:
      floating_ip: { get_resource: floating_ip }
      server_id: {get_resource: vsperf_vm}

  keypair:
    type: OS::Nova::KeyPair
    properties:
      name: yardstick-key
      public_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0RkXfW6pksd1cZmXuvXZF/Mlqqq3ahIGcGoULOC97XMpu0vdxMpcUwdjwGqMwEXTVyfHidu0l99bLqOCpSUKCmbWx3ONJ+1kqFx4HwsKEWLiyDYqsuMrDeZT1eFjC5avCoTcrIw2wq5NaBb00lDGagNZOeopaL5YIa4+PizEY23+cir24D67NU21Fg3JE92AIeGlNa4j66L3a+lL0hZq74Dilmp42wm4GsbplRO6KJfyaraowHb1X+TmhCjBgHk6M/OJ9yPAroZyJNcwjMAuuxhAYWRuT3SdbnoUR0RG2VhfDh0qNid7vOqLbhKPeaLLFmzkN+9w3WdCp6LbSYt87 yardstick@yardstick.opnfv.org

  wait_handle:
    type: OS::Heat::WaitConditionHandle

  wait_condition:
    type: OS::Heat::WaitCondition
    properties:
      handle: { get_resource: wait_handle }
      count: 1
      timeout: { get_param: timeout }

  vsperf_vm:
    type: OS::Nova::Server
    depends_on: [subnet, keypair]
    properties:
      name: { get_param: "OS::stack_name" }
      image: { get_param: image }
      flavor: { get_param: flavor }
      key_name: {get_resource: keypair}
      networks:
        - network: { get_resource: network }
      config_drive: True
      user_data_format : RAW
      user_data:
        str_replace:
          template: |
            #!/bin/bash
            cat <<'CEOF' > /tmp/vsperf_post_build.sh
            echo "Install vswitchperf"
            mv /root/vswitchperf /home/ubuntu
            chown -R ubuntu:ubuntu /home/ubuntu/vswitchperf
            cd /home/ubuntu/vswitchperf/systems
            sudo -H -u ubuntu ./build_base_machine.sh
            echo "Set password less access to MoonGen server"
            sudo -H -u ubuntu ssh-keygen -b 2048 -t rsa -f /home/ubuntu/.ssh/id_rsa -N ''
            sudo -H -u ubuntu touch /home/ubuntu/.cloud-warnings.skip
            echo "Enable 1GB huge pages"
            update-grub
            $NOTIFY --data-binary '{"status": "SUCCESS"}'
            CEOF
            chmod +x /tmp/vsperf_post_build.sh
            nohup /tmp/vsperf_post_build.sh &
          params:
            $NOTIFY: { get_attr: ['wait_handle', 'curl_cli'] }

outputs:
  vm_uuid:
    description: uuid of the VM
    value: { get_attr: [ vsperf_vm, show,id ] }
VERSION_2 else: self.volume_api_version = float(kwargs['volume_api_version']) if kwargs.get('magnum_api_version') is None: self.magnum_api_version = 1 else: self.magnum_api_version = float(kwargs['magnum_api_version']) self.user_domain_id = kwargs.get('user_domain_id', 'default') if kwargs.get('user_domain_name') is None: self.user_domain_name = 'Default' else: self.user_domain_name = kwargs['user_domain_name'] self.project_domain_id = kwargs.get('project_domain_id', 'default') if kwargs.get('project_domain_name') is None: self.project_domain_name = 'Default' else: self.project_domain_name = kwargs['project_domain_name'] if kwargs.get('interface') is None: self.interface = 'public' else: self.interface = kwargs['interface'] self.region_name = kwargs.get('region_name', None) self.cacert = False if kwargs.get('cacert') is not None: if isinstance(kwargs.get('cacert'), str): if file_utils.file_exists(kwargs['cacert']): self.cacert = kwargs['cacert'] else: self.cacert = str2bool(kwargs['cacert']) else: self.cacert = kwargs['cacert'] if isinstance(kwargs.get('proxy_settings'), ProxySettings): self.proxy_settings = kwargs.get('proxy_settings') elif isinstance(kwargs.get('proxy_settings'), dict): self.proxy_settings = ProxySettings(**kwargs.get('proxy_settings')) else: self.proxy_settings = None if (not self.username or not self.password or not self.auth_url or not self.project_name): raise OSCredsError('username, password, auth_url, and project_name' ' are required') self.auth_url = self.__scrub_auth_url() def __scrub_auth_url(self): """ As the Python APIs are have more stringent requirements around how the auth_url is formed than the CLI, this method will scrub any version from the end of :return: """ auth_url_tokens = self.auth_url.rstrip('/').split('/') last_token = auth_url_tokens[len(auth_url_tokens) - 1] token_iters = len(auth_url_tokens) if last_token.startswith('v'): token_iters -= 1 if self.identity_api_version == keystone_utils.V2_VERSION_NUM: last_token = keystone_utils.V2_VERSION_STR else: last_token = 'v' + str(int(self.identity_api_version)) new_url = None for ctr in range(0, token_iters): if new_url: new_url += '/' + auth_url_tokens[ctr] else: new_url = auth_url_tokens[ctr] new_url += '/' + last_token return new_url def __str__(self): """Converts object to a string""" return ('OSCreds - username=' + str(self.username) + ', password=' + str(self.password) + ', auth_url=' + str(self.auth_url) + ', project_name=' + str(self.project_name) + ', identity_api_version=' + str(self.identity_api_version) + ', image_api_version=' + str(self.image_api_version) + ', network_api_version=' + str(self.network_api_version) + ', compute_api_version=' + str(self.compute_api_version) + ', heat_api_version=' + str(self.heat_api_version) + ', user_domain_id=' + str(self.user_domain_id) + ', user_domain_name=' + str(self.user_domain_name) + ', project_domain_id=' + str(self.project_domain_id) + ', project_domain_name=' + str(self.project_domain_name) + ', interface=' + str(self.interface) + ', region_name=' + str(self.region_name) + ', proxy_settings=' + str(self.proxy_settings) + ', cacert=' + str(self.cacert)) class ProxySettings: """ Represents the information required for sending traffic (HTTP & SSH) through a proxy """ def __init__(self, **kwargs): """ Constructor :param host: the HTTP proxy host :param port: the HTTP proxy port :param https_host: the HTTPS proxy host (defaults to host) :param https_port: the HTTPS proxy port (defaults to port) :param ssh_proxy_cmd: the SSH proxy command string (optional) """ self.host = kwargs.get('host') self.port = kwargs.get('port') if self.port and isinstance(self.port, numbers.Number): self.port = str(self.port) self.https_host = kwargs.get('https_host', self.host) self.https_port = kwargs.get('https_port', self.port) if self.https_port and isinstance(self.https_port, numbers.Number): self.https_port = str(self.https_port) self.ssh_proxy_cmd = kwargs.get('ssh_proxy_cmd') if not self.host or not self.port: raise ProxySettingsError('host & port are required') def __str__(self): """Converts object to a string""" return 'ProxySettings - host=' + str(self.host) + \ ', port=' + str(self.port) + \ ', ssh_proxy_cmd=' + str(self.ssh_proxy_cmd) class ProxySettingsError(Exception): """ Exception to be thrown when an OSCred are invalid """ class OSCredsError(Exception): """ Exception to be thrown when an OSCred are invalid """