Separate per-service host configuration tasks

Currently there are a few services that perform host configuration
tasks. This is done in config.yml. This means that these changes are
performed during 'kolla-ansible genconfig', when we might expect not to
be making any changes to the remote system.

This change separates out these host configuration tasks into a
config-host.yml file, which is included directly from deploy.yml.

One change in behaviour is that this prevents these tasks from running
during an upgrade or genconfig. This is probably what we want, but we
should be careful when any of these host configuration tasks are
changed, to ensure they are applied during an upgrade if necessary.

Change-Id: I001defc75d1f1e6caa9b1e11246abc6ce17c775b
Closes-Bug: #1860161
This commit is contained in:
Mark Goddard 2020-01-17 17:00:21 +00:00
parent 96151a35d0
commit fdea19a305
25 changed files with 132 additions and 96 deletions

View File

@ -0,0 +1,12 @@
---
- name: Setting sysctl values
become: true
sysctl:
name: "{{ item.name }}"
value: "{{ item.value }}"
sysctl_set: yes
with_items:
- { name: "vm.max_map_count", value: 262144}
when:
- set_sysctl | bool
- inventory_hostname in groups['elasticsearch']

View File

@ -1,13 +1,4 @@
---
- name: Setting sysctl values
become: true
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
with_items:
- { name: "vm.max_map_count", value: 262144}
when:
- set_sysctl | bool
- inventory_hostname in groups['elasticsearch']
- name: Ensuring config directories exist
file:
path: "{{ node_config_directory }}/{{ item.key }}"

View File

@ -1,4 +1,6 @@
---
- include_tasks: config-host.yml
- include_tasks: config.yml
- name: Flush handlers

View File

@ -0,0 +1,20 @@
---
- name: Setting sysctl values
sysctl:
name: "{{ item.name }}"
value: "{{ item.value }}"
sysctl_set: yes
become: true
with_items:
- { name: "net.ipv4.ip_nonlocal_bind", value: 1}
- { name: "net.ipv6.ip_nonlocal_bind", value: 1}
- { name: "net.unix.max_dgram_qlen", value: 128}
when:
- set_sysctl | bool
- name: Load and persist keepalived module
import_role:
name: module-load
vars:
modules:
- {'name': ip_vs }

View File

@ -1,14 +1,4 @@
---
- name: Setting sysctl values
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
become: true
with_items:
- { name: "net.ipv4.ip_nonlocal_bind", value: 1}
- { name: "net.ipv6.ip_nonlocal_bind", value: 1}
- { name: "net.unix.max_dgram_qlen", value: 128}
when:
- set_sysctl | bool
- name: Ensuring config directories exist
file:
path: "{{ node_config_directory }}/{{ item.key }}"
@ -83,13 +73,6 @@
notify:
- Restart haproxy container
- name: Load and persist keepalived module
import_role:
name: module-load
vars:
modules:
- {'name': ip_vs }
- name: Copying over keepalived.conf
vars:
service: "{{ haproxy_services['keepalived'] }}"

View File

@ -1,4 +1,6 @@
---
- include_tasks: config-host.yml
- include_tasks: config.yml
- name: Flush handlers

View File

@ -0,0 +1,8 @@
---
- name: Load and persist iscsi_tcp module
import_role:
name: module-load
vars:
modules:
- {'name': iscsi_tcp}
when: inventory_hostname in groups['ironic-conductor']

View File

@ -1,11 +1,4 @@
---
- name: Load and persist iscsi_tcp module
import_role:
name: module-load
vars:
modules:
- {'name': iscsi_tcp}
- name: Ensuring config directories exist
file:
path: "{{ node_config_directory }}/{{ item.key }}"

View File

@ -4,6 +4,8 @@
(inventory_hostname in groups['ironic-api'] or
inventory_hostname in groups['ironic-inspector'])
- include_tasks: config-host.yml
- include_tasks: config.yml
when: inventory_hostname in groups['ironic-api'] or
inventory_hostname in groups['ironic-conductor'] or

View File

@ -0,0 +1,10 @@
---
- name: Load and persist configfs module
import_role:
name: module-load
vars:
modules:
- name: configfs
when:
- inventory_hostname in groups[iscsi_services.iscsid.group]
- iscsi_services.iscsid.enabled | bool

View File

@ -1,14 +1,4 @@
---
- name: Load and persist configfs module
import_role:
name: module-load
vars:
modules:
- name: configfs
when:
- inventory_hostname in groups[iscsi_services.iscsid.group]
- iscsi_services.iscsid.enabled | bool
- name: Ensuring config directories exist
file:
path: "{{ node_config_directory }}/{{ item.key }}"

View File

@ -1,4 +1,6 @@
---
- include_tasks: config-host.yml
- include_tasks: config.yml
- name: Flush handlers

View File

@ -0,0 +1,7 @@
---
- name: Load and persist dm-multipath module
import_role:
name: module-load
vars:
modules:
- {'name': dm-multipath}

View File

@ -1,11 +1,4 @@
---
- name: Load and persist dm-multipath module
import_role:
name: module-load
vars:
modules:
- {'name': dm-multipath}
- name: Ensuring config directories exist
file:
path: "{{ node_config_directory }}/{{ item.key }}"

View File

@ -1,4 +1,6 @@
---
- include_tasks: config-host.yml
- include_tasks: config.yml
- name: Flush handlers

View File

@ -0,0 +1,30 @@
---
- name: Load and persist ip6_tables module
include_role:
name: module-load
vars:
modules:
- {'name': ip6_tables}
when: neutron_services | select_services_enabled_and_mapped_to_host | list | intersect([ "neutron-l3-agent", "neutron-linuxbridge-agent", "neutron-openvswitch-agent" ]) | list | length > 0
- name: Setting sysctl values
become: true
vars:
neutron_l3_agent: "{{ neutron_services['neutron-l3-agent'] }}"
sysctl:
name: "{{ item.name }}"
value: "{{ item.value }}"
sysctl_set: yes
with_items:
- { name: "net.ipv4.ip_forward", value: 1}
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
- { name: "net.ipv4.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh1 }}"}
- { name: "net.ipv4.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh2 }}"}
- { name: "net.ipv4.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh3 }}"}
- { name: "net.ipv6.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh1 }}"}
- { name: "net.ipv6.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh2 }}"}
- { name: "net.ipv6.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh3 }}"}
when:
- set_sysctl | bool
- (neutron_l3_agent.enabled | bool and neutron_l3_agent.host_in_groups | bool)

View File

@ -1,31 +1,4 @@
---
- name: Load and persist ip6_tables module
include_role:
name: module-load
vars:
modules:
- {'name': ip6_tables}
when: neutron_services | select_services_enabled_and_mapped_to_host | list | intersect([ "neutron-l3-agent", "neutron-linuxbridge-agent", "neutron-openvswitch-agent" ]) | list | length > 0
- name: Setting sysctl values
become: true
vars:
neutron_l3_agent: "{{ neutron_services['neutron-l3-agent'] }}"
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
with_items:
- { name: "net.ipv4.ip_forward", value: 1}
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
- { name: "net.ipv4.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh1 }}"}
- { name: "net.ipv4.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh2 }}"}
- { name: "net.ipv4.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh3 }}"}
- { name: "net.ipv6.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh1 }}"}
- { name: "net.ipv6.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh2 }}"}
- { name: "net.ipv6.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh3 }}"}
when:
- set_sysctl | bool
- (neutron_l3_agent.enabled | bool and neutron_l3_agent.host_in_groups | bool)
- name: Ensuring config directories exist
become: true
file:

View File

@ -5,6 +5,8 @@
- include_tasks: clone.yml
when: neutron_dev_mode | bool
- include_tasks: config-host.yml
- include_tasks: config.yml
- include_tasks: config-neutron-fake.yml

View File

@ -0,0 +1,15 @@
---
- name: Setting sysctl values
become: true
sysctl:
name: "{{ item.name }}"
value: "{{ item.value }}"
sysctl_set: yes
with_items:
- { name: "net.bridge.bridge-nf-call-iptables", value: 1}
- { name: "net.bridge.bridge-nf-call-ip6tables", value: 1}
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
when:
- set_sysctl | bool
- inventory_hostname in groups[nova_cell_compute_group]

View File

@ -1,16 +1,4 @@
---
- name: Setting sysctl values
become: true
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
with_items:
- { name: "net.bridge.bridge-nf-call-iptables", value: 1}
- { name: "net.bridge.bridge-nf-call-ip6tables", value: 1}
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
when:
- set_sysctl | bool
- inventory_hostname in groups[nova_cell_compute_group]
- name: Ensuring config directories exist
become: true
file:

View File

@ -7,6 +7,8 @@
- include_tasks: clone.yml
when: nova_dev_mode | bool
- include_tasks: config-host.yml
- include_tasks: config.yml
- include_tasks: config-nova-fake.yml

View File

@ -0,0 +1,7 @@
---
- name: Load and persist openvswitch module
import_role:
name: module-load
vars:
modules:
- {'name': openvswitch}

View File

@ -1,11 +1,4 @@
---
- name: Load and persist openvswitch module
import_role:
name: module-load
vars:
modules:
- {'name': openvswitch}
- name: Ensuring config directories exist
become: true
file:

View File

@ -1,4 +1,6 @@
---
- include_tasks: config-host.yml
- include_tasks: config.yml
- name: Flush Handlers

View File

@ -0,0 +1,7 @@
---
fixes:
- |
Fixes an issue where host configuration tasks (``sysctl``, loading kernel
modules) could be performed during the ``kolla-ansible genconfig`` command.
See `bug 1860161 <https://bugs.launchpad.net/kolla-ansible/+bug/1860161>`__
for details.