openstack-ansible-specs/specs/liberty/tunable-openstack-configuration.rst
Jesse Pretorius a9851a7d79 Move specs to appropriate cycle folders
This patch moves specs to their appropriate cycle folders.

Change-Id: I58b2c2e10a9643b9a951439bf307604fb23a54e3
2015-09-07 10:44:32 +01:00

6.5 KiB

Tunable OpenStack Configuration

date

2015-08-26

tags

openstack, configuration, tuning

Instead of implementing a specific variable for each possible/desired configuration entry in every role, there is a more general way that this could be done which would enable the deployer to implement any desired valid configuration entry for a given role. OpenStack Ansible will then only need to implement deviations from the standard OpenStack default settings. Examples of these settings would be minimum settings to make the service work and best practice settings. Changes to templates would allow the project the ability to ship flat, or otherwise minimally dynamic, configuration files in an effort to limit the sheer size and scope of the number of variables we have if a given role.

This implementation is intended to:

  • Reduce the cruft of variables the project needs to carry just to enable customizations requested from deployers.
  • Reduce the amount of configuration file settings the project needs to work through for every major upgrade of the underlying OpenStack environment.
  • Decrease the turnaround time for deployers to implement additional configuration items in OpenStack configuration files.

Problem description

The OpenStack Ansible project currently carries a lot of variables in roles which are simply there to enable the ability to override OpenStack default settings. This is unnecessary cruft which has to be reviewed for deprecated options whenever the project starts working with an updated version of OpenStack.

It also introduces an unnecessary propose/develop/test/release cycle for simple changes to configuration files which could easily be done by a deployer if they're enabled to do so.

Proposed change

  • A new Ansible action plugin will be created which will facilitate the ability for templates to be updated dynamically. This change will build off of the existing Ansible template functionality and but allow for changes to be applied through a simple dictionary data structure. Updates are applied to the template while in transit allowing us to carry minimal code while leveraging all of the already built in Ansible functionality.
  • The action plugin named "config_template" will add two new input types config_data and config_type. The new input options will be optional allowing us to simply replace our current template tasks with the config_template module.
  • New defaults will be created as empty dictionaries as base entry points for deployers to override items in config.

Code wise the change to a templed task will look something this:

- name: run config template ini
  config_template:
    src: templates/test.ini.j2
    dest: /tmp/test.ini
    config_data: {'data': 'things'}
    config_type: ini

- name: run config template json
  config_template:
    src: templates/test.json.j2
    dest: /tmp/test.json
    config_data: {'data': 'things'}
    config_type: json

- name: run config template yaml
  config_template:
    src: templates/test.yaml.j2
    dest: /tmp/test.yaml
    config_data: {'data': 'things'}
    config_type: yaml
To note:

A dictionary used to update or override items within a configuration template. The dictionary data structure may be nested. If the target config file is an ini file the nested keys in the config_data will be used as section headers.

Alternatives

Continue to use the current paradigm of adding an ansible variable per configuration configurable file entry.

Playbook impact

The existing roles would need to be adjusted to support the new config_data entry point and to have the relevant template tasks updated to the config_template module.

Upgrade impact

This change will not impact current upgrades as everything in all of the templates can remain the same. The proposed module changes simply make it possible for deployers to update templates as needed without having to make changes in tree. In future releases we can deprecate variables we're presently carrying as needed or wanted while still maintaining the ability to override options as needed through the use of the config_template module.

Security impact

None.

Performance impact

None.

End user impact

None

Deployer impact

Deployers will be able to dynamically update configuration options based on their need without making changes in tree. This will allow deployers a greater ability to tailor deployments as needed.

Developer impact

This would reduce the need for developers to get involved with small patches that implement basic configuration file entries which deployers wish to use.

Dependencies

None.

Implementation

Assignee(s)

Primary assignee:

https://launchpad.net/~kevin-carter IRC: cloudnull

Other contributors:

None at this time.

Work items

Implement tunable configurations for all configuration files that fall under the following formats: [yaml, json, ini]

  • Develop Ansible Action Plugin to enable the ability to make in flight config changes to an existing template.
  • Change all template tasks within the roles that drop configuration files to use the new config_template module.
  • Replace the copy_update module with the config_template module.

Testing

In the current gate testing we can add a basic template test to override a few options / add a few options and assert that the changes from the base template took place. This can be accomplished using items from the example tasks and a simple json, ini, and yaml data structure. We could also set overrides with the gate that we know we want to run within our deployments such that we're exercising the OpenStack code paths that we're attempting to enable via the gate. In this way we might be able to cut out some of our gate script variables as well.

Documentation impact

While the Action Plugin has documentation within it, per the normal Ansible module documentation process, we can also update our general install documentation to reference the existence of the new module and how it works. I'd like to refrain from documenting every override entry point as the authoritative source for those types of items will be the role "defaults" themselves.

References

None