Hardware introspection daemon for OpenStack Ironic
Go to file
Dmitry Tantsur f250f530b8 Update devstack plugin for the recent authentication change
Change-Id: Ib37b9a44adf3a68e20db5b3e36444851ebbe9925
2015-06-12 17:18:38 +02:00
bin Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
devstack Update devstack plugin for the recent authentication change 2015-06-12 17:18:38 +02:00
functest Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
ironic_inspector Merge "Use keystonemiddleware auth credentials" 2015-06-12 11:47:59 +00:00
ironic_inspector_ramdisk Do not require scheduling attributes in ramdisk 2015-06-05 15:25:03 +02:00
locale Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
.gitignore Small sdist-related cleanup 2015-01-16 14:55:54 +01:00
.gitreview Post-migration updates for stackforge and launchpad 2014-11-14 15:14:33 +01:00
babel.cfg Add scripts to manage translations 2015-03-04 00:07:37 +00:00
CONTRIBUTING.rst Launchpad project was renamed 2015-06-03 10:53:14 +02:00
example.conf Use keystonemiddleware auth credentials 2015-06-12 19:22:57 +09:00
HTTP-API.rst Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
ironic-inspector.8 Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
LICENSE Apache license 2014-10-03 17:15:55 +02:00
MANIFEST.in Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
plugin-requirements.txt Remove profile matching from eDeploy plugin 2015-04-28 15:24:54 -04:00
README.rst Launchpad project was renamed 2015-06-03 10:53:14 +02:00
requirements.txt Update from global requirements 2015-06-02 14:16:59 +02:00
setup.cfg Rename discoverd -> inspector 2015-05-29 09:06:56 +02:00
setup.py Naming clean up 2015-06-09 15:42:46 +02:00
test-requirements.txt Update from global requirements 2015-06-02 14:16:59 +02:00
tox.ini Use keystonemiddleware auth credentials 2015-06-12 19:22:57 +09:00

Hardware introspection for OpenStack Ironic

This is an auxiliary service for discovering hardware properties for a node managed by OpenStack Ironic. Hardware introspection or hardware properties discovery is a process of getting hardware parameters required for scheduling from a bare metal node, given it's power management credentials (e.g. IPMI address, user name and password).

A special ramdisk is required to collect the information on a node. The default one can be built using diskimage-builder and ironic-discoverd-ramdisk element (see Configuration below).

Support for ironic-inspector is present in Tuskar UI --OpenStack Horizon plugin for TripleO.

ironic-inspector requires OpenStack Kilo (2015.1) release or newer.

Please use launchpad to report bugs and ask questions. Use PyPI for downloads and accessing the released version of this README. Refer to CONTRIBUTING.rst for instructions on how to contribute.

Note

ironic-inspector was called ironic-discoverd before version 2.0.0.

Workflow

Usual hardware introspection flow is as follows:

  • Operator installs undercloud with ironic-inspector (e.g. using instack-undercloud).

  • Operator enrolls nodes into Ironic either manually or by uploading CSV file to Tuskar UI. Power management credentials should be provided to Ironic at this step.

  • Nodes are put in the correct state for introspection as described in Node States.

  • Operator sends nodes on introspection either manually using ironic-inspector API (see Usage) or again via Tuskar UI.

  • On receiving node UUID ironic-inspector:

    • validates node power credentials, current power and provisioning states,
    • allows firewall access to PXE boot service for the nodes,
    • issues reboot command for the nodes, so that they boot the ramdisk.
  • The ramdisk collects the required information and posts it back to ironic-inspector.

  • On receiving data from the ramdisk, ironic-inspector:

    • validates received data,
    • finds the node in Ironic database using it's BMC address (MAC address in case of SSH driver),
    • fills missing node properties with received data and creates missing ports.

    Note

    ironic-inspector is responsible to create Ironic ports for some or all NIC's found on the node. ironic-inspector is also capable of deleting ports that should not be present. There are two important configuration options that affect this behavior: add_ports and keep_ports (please refer to example.conf for detailed explanation).

    Default values as of ironic-inspector 1.1.0 are add_ports=pxe, keep_ports=all, which means that only one port will be added, which is associated with NIC the ramdisk PXE booted from. No ports will be deleted. This setting ensures that deploying on introspected nodes will succeed despite Ironic bug 1405131.

    Ironic inspection feature by default requires different settings: add_ports=all, keep_ports=present, which means that ports will be created for all detected NIC's, and all other ports will be deleted. Refer to the Ironic inspection documentation for details.

  • Separate API (see Usage) can be used to query introspection results for a given node.

  • Nodes are put in the correct state for deploying as described in Node States.

Starting DHCP server and configuring PXE boot environment is not part of this package and should be done separately.

Installation

Install from PyPI (you may want to use virtualenv to isolate your environment):

pip install ironic-inspector

Also there is a DevStack plugin for ironic-inspector - see CONTRIBUTING.rst for the current status.

Finally, some distributions (e.g. Fedora) provide ironic-inspector packaged, some of them - under its old name ironic-discoverd.

Configuration

Copy example.conf to some permanent place (e.g. /etc/ironic-inspector/inspector.conf). Fill in at least these configuration values:

  • os_username, os_password, os_tenant_name - Keystone credentials to use when accessing other services and check client authentication tokens;
  • os_auth_url, identity_uri - Keystone endpoints for validating authentication tokens and checking user roles;
  • database - where you want ironic-inspector SQLite database to be placed;
  • dnsmasq_interface - interface on which dnsmasq (or another DHCP service) listens for PXE boot requests (defaults to br-ctlplane which is a sane default for TripleO based installations but is unlikely to work for other cases).

See comments inside example.conf for the other possible configuration options.

Note

Configuration file contains a password and thus should be owned by root and should have access rights like 0600.

As for PXE boot environment, you'll need:

  • TFTP server running and accessible (see below for using dnsmasq). Ensure pxelinux.0 is present in the TFTP root.

  • Build and put into your TFTP directory kernel and ramdisk from the diskimage-builder ironic-discoverd-ramdisk element:

    ramdisk-image-create -o discovery fedora ironic-discoverd-ramdisk

    You need diskimage-builder 0.1.38 or newer to do it (using the latest one is always advised).

  • You need PXE boot server (e.g. dnsmasq) running on the same machine as ironic-inspector. Don't do any firewall configuration: ironic-inspector will handle it for you. In ironic-inspector configuration file set dnsmasq_interface to the interface your PXE boot server listens on. Here is an example dnsmasq.conf:

    port=0
    interface={INTERFACE}
    bind-interfaces
    dhcp-range={DHCP IP RANGE, e.g. 192.168.0.50,192.168.0.150}
    enable-tftp
    tftp-root={TFTP ROOT, e.g. /tftpboot}
    dhcp-boot=pxelinux.0
  • Configure your $TFTPROOT/pxelinux.cfg/default with something like:

    default discover
    
    label discover
    kernel discovery.kernel
    append initrd=discovery.initramfs discoverd_callback_url=http://{IP}:5050/v1/continue
    
    ipappend 3

    Replace {IP} with IP of the machine (do not use loopback interface, it will be accessed by ramdisk on a booting machine).

    Note

    There are some prebuilt images which use obsolete ironic_callback_url instead of discoverd_callback_url. Modify pxelinux.cfg/default accordingly if you have one of these.

Here is inspector.conf you may end up with:

[DEFAULT]
debug = false
[ironic]
identity_uri = http://127.0.0.1:35357
os_auth_url = http://127.0.0.1:5000/v2.0
os_username = admin
os_password = password
os_tenant_name = admin
[firewall]
dnsmasq_interface = br-ctlplane

Note

Set debug = true if you want to see complete logs.

Running

If you installed ironic-inspector from the RPM, you might already have a systemd unit, so you can:

systemctl enable openstack-ironic-inspector
systemctl start openstack-ironic-inspector

Otherwise run as root:

ironic-inspector --config-file /etc/ironic-inspector/inspector.conf

Note

Running as root is not required if ironic-inspector does not manage the firewall (i.e. manage_firewall is set to false in the configuration file).

A good starting point for writing your own systemd unit should be one used in Fedora (note usage of old name).

Usage

ironic-inspector has a simple client library for Python and a CLI tool bundled with it.

Client library is in module ironic_inspector.client, every call accepts additional optional arguments:

  • base_url ironic-inspector API endpoint, defaults to 127.0.0.1:5050,
  • auth_token Keystone authentication token.

CLI tool is based on OpenStackClient with prefix openstack baremetal introspection. Accepts optional argument --inspector-url with the ironic-inspector API endpoint.

  • Start introspection on a node:

    introspect(uuid, new_ipmi_username=None, new_ipmi_password=None)

    $ openstack baremetal introspection start UUID [--new-ipmi-password=PWD [--new-ipmi-username=USER]]
    • uuid - Ironic node UUID;
    • new_ipmi_username and new_ipmi_password - if these are set, ironic-inspector will switch to manual power on and assigning IPMI credentials on introspection. See Setting IPMI Credentials for details.
  • Query introspection status:

    get_status(uuid)

    $ openstack baremetal introspection status UUID
    • uuid - Ironic node UUID.

Refer to HTTP-API.rst for information on the HTTP API.

Using from Ironic API

Ironic Kilo introduced support for hardware introspection under name of "inspection". ironic-inspector introspection is supported for some generic drivers, please refer to Ironic inspection documentation for details.

Node States

  • As of Ironic Kilo release the nodes should be moved to MANAGEABLE provision state before introspection (requires python-ironicclient of version 0.5.0 or newer):

    ironic node-set-provision-state <UUID> manage

    With Juno release and/or older python-ironicclient it's recommended to set maintenance mode, so that nodes are not taken by Nova for deploying:

    ironic node-update <UUID> replace maintenance=true
  • After successful introspection and before deploying nodes should be made available to Nova, either by moving them to AVAILABLE state (Kilo):

    ironic node-set-provision-state <UUID> provide

    or by removing maintenance mode (Juno and/or older client):

    ironic node-update <UUID> replace maintenance=false

    Note

    Due to how Nova interacts with Ironic driver, you should wait 1 minute before Nova becomes aware of available nodes after issuing these commands.

Setting IPMI Credentials

If you have physical access to your nodes, you can use ironic-inspector to set IPMI credentials for them without knowing the original ones. The workflow is as follows:

  • Ensure nodes will PXE boot on the right network by default.
  • Set enable_setting_ipmi_credentials = true in the ironic-inspector configuration file.
  • Enroll nodes in Ironic with setting their ipmi_address only. This step allows ironic-inspector to distinguish nodes.
  • Set maintenance mode on nodes. That's an important step, otherwise Ironic might interfere with introspection process.
  • Start introspection with providing additional parameters:
    • new_ipmi_password IPMI password to set,
    • new_ipmi_username IPMI user name to set, defaults to one in node driver_info.
  • Manually power on the nodes and wait.
  • After introspection is finished (watch nodes power state or use ironic-inspector status API) you can turn maintenance mode off.

Note that due to various limitations on password value in different BMC, ironic-inspector will only accept passwords with length between 1 and 20 consisting only of letters and numbers.

Plugins

ironic-inspector heavily relies on plugins for data processing. Even the standard functionality is largely based on plugins. Set processing_hooks option in the configuration file to change the set of plugins to be run on introspection data. Note that order does matter in this option.

These are plugins that are enabled by default and should not be disabled, unless you understand what you're doing:

ramdisk_error

reports error, if error field is set by the ramdisk, also optionally stores logs from logs field, see HTTP API for details.

scheduler

validates and updates basic hardware scheduling properties: CPU number and architecture, memory and disk size.

validate_interfaces

validates network interfaces information.

Here are some plugins that can be additionally enabled:

example

example plugin logging it's input and output.

root_device_hint

gathers block devices from ramdisk and exposes root device in multiple runs.

edeploy

plugin for eDeploy hardware detection and classification utilities, requires a special ramdisk.

Refer to CONTRIBUTING.rst for information on how to write your own plugin.

Troubleshooting

Errors when starting introspection

  • Refusing to introspect node <UUID> with provision state "available" and maintenance mode off

    In Kilo release with python-ironicclient 0.5.0 or newer Ironic defaults to reporting provision state AVAILABLE for newly enrolled nodes. ironic-inspector will refuse to conduct introspection in this state, as such nodes are supposed to be used by Nova for scheduling. See Node States for instructions on how to put nodes into the correct state.

Introspection times out

There may be 3 reasons why introspection can time out after some time (defaulting to 60 minutes, altered by timeout configuration option):

  1. Fatal failure in processing chain before node was found in the local cache. See Troubleshooting data processing for the hints.
  2. Failure to load the ramdisk on the target node. See Troubleshooting PXE boot for the hints.
  3. Failure during ramdisk run. See Troubleshooting ramdisk run for the hints.

Troubleshooting data processing

In this case ironic-inspector logs should give a good idea what went wrong. E.g. for RDO or Fedora the following command will output the full log:

sudo journalctl -u openstack-ironic-inspector

(use openstack-ironic-discoverd for version < 2.0.0).

Note

Service name and specific command might be different for other Linux distributions (and for old version of ironic-inspector).

If ramdisk_error plugin is enabled and ramdisk_logs_dir configuration option is set, ironic-inspector will store logs received from the ramdisk to the ramdisk_logs_dir directory. This depends, however, on the ramdisk implementation.

Troubleshooting PXE boot

PXE booting most often becomes a problem for bare metal environments with several physical networks. If the hardware vendor provides a remote console (e.g. iDRAC for DELL), use it to connect to the machine and see what is going on. You may need to restart introspection.

Another source of information is DHCP and TFTP server logs. Their location depends on how the servers were installed and run. For RDO or Fedora use:

$ sudo journalctl -u openstack-ironic-inspector-dnsmasq

(use openstack-ironic-discoverd-dnsmasq for version < 2.0.0).

The last resort is tcpdump utility. Use something like :

$ sudo tcpdump -i any port 67 or port 68 or port 69

to watch both DHCP and TFTP traffic going through your machine. Replace any with a specific network interface to check that DHCP and TFTP requests really reach it.

If you see node not attempting PXE boot or attempting PXE boot on the wrong network, reboot the machine into BIOS settings and make sure that only one relevant NIC is allowed to PXE boot.

If you see node attempting PXE boot using the correct NIC but failing, make sure that:

  1. network switches configuration does not prevent PXE boot requests from propagating,
  2. there is no additional firewall rules preventing access to port 67 on the machine where ironic-inspector and its DHCP server are installed.

If you see node receiving DHCP address and then failing to get kernel and/or ramdisk or to boot them, make sure that:

  1. TFTP server is running and accessible (use tftp utility to verify),
  2. no firewall rules prevent access to TFTP port,
  3. DHCP server is correctly set to point to the TFTP server,
  4. pxelinux.cfg/default within TFTP root contains correct reference to the kernel and ramdisk.

Troubleshooting ramdisk run

Connect to the remote console as described in Troubleshooting PXE boot to see what is going on with the ramdisk. The ramdisk drops into emergency shell on failure, which you can use to look around. There should be file called logs with the current ramdisk logs.