4 Commits

Author SHA1 Message Date
Ian Wienand
6256d26f47 Role integration-tests : use a group match for openafs
This adds a group match for the openafs hosts.  This is so a further
role can run kafs separately.

Change-Id: I5ade7a4c34c89f79012fbcd85efcefddb9c0e810
2019-06-17 15:55:05 +10:00
Clark Boylan
9c465131db Make kdc03 the master kerberos kdc and admin server
This change will convert kdc03 to a master from a hot standby and will
remove kdc01 from management.

Cutover plan:
  Disable kdc01 in ansible emergeny file
  Stop run-kprop cron on kdc01
  Stop kadmind on kdc01
  Execute run-kprop.sh on kdc01
  Merge this change
  Wait for puppet to convert kdc03 to the master
  Confirm that run-kprop works from kdc03 to kdc04
  Update dns records as documented in our kerberos docs
  Test kadmin works
  Delete old kdc01 server

Change-Id: Ib14b11fa1f0a6bc11b0f615ce5b6f6be214b5629
2019-02-22 15:47:49 -08:00
Ian Wienand
ee7faefe08 Create ansible roles to install puppet
Currently our puppet-requiring hosts (all !bridge) do not manage their
puppet installs.  This is OK for existing servers, but new servers
come up without puppet installed.

This is playbooks to manage puppet installs on hosts.  It is mostly a
port of the relevant parts of ./install_puppet.sh for our various
control-plane platforms.

Basic testing with zuul-integration jobs is added.  Using this in the
control-plane base.yaml playbooks will be a follow-on.

Change-Id: Id5b2f5eb0f1ade198acf53a7c886dd5b3ab79816
2018-08-28 16:42:45 +10:00
Ian Wienand
7bfb0db43f Add role integration jobs
The top-level roles in roles/* should be usable as roles under Zuul
and as generic Ansible roles (for control plane).

Add an integration job to ensure this.  Start with the kerberos and
afs roles.

Change-Id: I9f5d572d5f69ca4b58e6e62b06fc873fe7a1e2f0
2018-08-28 11:28:42 +10:00