Boss drum, motivating rhythm of life with the healing, rhythmic synergy. More seriously, this patch re-arranges the documentation structure to conform to the structure outlined in [1]. With it, some changes are made to effectively transition the links and simplify the sphinx configuration. The Mitaka/Liberty documentation links are removed as they are no longer available. [1] http://specs.openstack.org/openstack/docs-specs/specs/pike/os-manuals-migration.html Change-Id: Icc985de3af4de5ea7a5aa01b6e6f6e524c67f11b
12 KiB
Advanced configuration
The OpenStack-Ansible project provides a basic OpenStack environment, but many deployers will wish to extend the environment based on their needs. This could include installing extra services, changing package versions, or overriding existing variables.
Using these extension points, deployers can provide a more 'opinionated' installation of OpenStack that may include their own software.
Including OpenStack-Ansible in your project
Including the openstack-ansible repository within another project can be done in several ways:
- A git submodule pointed to a released tag.
- A script to automatically perform a git checkout of OpenStack-Ansible.
When including OpenStack-Ansible in a project, consider using a
parallel directory structure as shown in the ansible.cfg
files section.
Also note that copying files into directories such as
env.d
or conf.d
should be handled via some
sort of script within the extension project.
Ansible forks
The default MaxSessions setting for the OpenSSH Daemon is 10. Each Ansible fork makes use of a Session. By default, Ansible sets the number of forks to 5. However, you can increase the number of forks used in order to improve deployment performance in large environments.
Note that more than 10 forks will cause issues for any playbooks
which use delegate_to
or local_action
in the
tasks. It is recommended that the number of forks are not raised when
executing against the Control Plane, as this is where delegation is most
often used.
The number of forks used may be changed on a permanent basis by
including the appropriate change to the ANSIBLE_FORKS
in
your .bashrc
file. Alternatively it can be changed for a
particular playbook execution by using the --forks
CLI
parameter. For example, the following executes the nova playbook against
the control plane with 10 forks, then against the compute nodes with 50
forks.
# openstack-ansible --forks 10 os-nova-install.yml --limit compute_containers
# openstack-ansible --forks 50 os-nova-install.yml --limit compute_hosts
For more information about forks, please see the following references:
- OpenStack-Ansible Bug 1479812
- Ansible forks entry for ansible.cfg
- Ansible Performance Tuning
Including OpenStack-Ansible with your Ansible structure
You can create your own playbook, variable, and role structure while
still including the OpenStack-Ansible roles and libraries by setting
environment variables or by adjusting
/usr/local/bin/openstack-ansible.rc
.
The relevant environment variables for Ansible 1.9 (included in OpenStack-Ansible) are as follows:
ANSIBLE_LIBRARY
-
This variable should point to
openstack-ansible/playbooks/library
. Doing so allows roles and playbooks to access OpenStack-Ansible's included Ansible modules. ANSIBLE_ROLES_PATH
-
This variable should point to
openstack-ansible/playbooks/roles
. This allows Ansible to properly look up any OpenStack-Ansible roles that extension roles may reference. ANSIBLE_INVENTORY
-
This variable should point to
openstack-ansible/playbooks/inventory
. With this setting, extensions have access to the same dynamic inventory that OpenStack-Ansible uses.
The paths to the openstack-ansible
top level directory
can be relative in this file.
Consider this directory structure:
my_project
|
|- custom_stuff
| |
| |- playbooks
|- openstack-ansible
| |
| |- playbooks
The environment variables set would use
../openstack-ansible/playbooks/<directory>
.
env.d
The /etc/openstack_deploy/env.d
directory sources all
YAML files into the deployed environment, allowing a deployer to define
additional group mappings.
This directory is used to extend the environment skeleton, or modify
the defaults defined in the playbooks/inventory/env.d
directory.
See also :deploy_guide:Understanding Container Groups <app-custom-layouts.html> in Appendix C of the Deployment Guide.
conf.d
Common OpenStack services and their configuration are defined by
OpenStack-Ansible in the
/etc/openstack_deploy/openstack_user_config.yml
settings
file.
Additional services should be defined with a YAML file in
/etc/openstack_deploy/conf.d
, in order to manage file
size.
See also :deploy_guide:Understanding Host Groups <app-custom-layouts.html> in Appendix C of the Deployment Guide.
user*.yml files
Files in /etc/openstack_deploy
beginning with
user_
will be automatically sourced in any
openstack-ansible
command. Alternatively, the files can be
sourced with the -e
parameter of the
ansible-playbook
command.
user_variables.yml
and user_secrets.yml
are
used directly by OpenStack-Ansible. Adding custom variables used by your
own roles and playbooks to these files is not recommended. Doing so will
complicate your upgrade path by making comparison of your existing files
with later versions of these files more arduous. Rather, recommended
practice is to place your own variables in files named following the
user_*.yml
pattern so they will be sourced alongside those
used exclusively by OpenStack-Ansible.
Ordering and precedence
user_*.yml
files contain YAML variables which are
applied as extra-vars when executing openstack-ansible
to
run playbooks. They will be sourced in alphanumeric order by
openstack-ansible
. If duplicate variables occur in the
user_*.yml
files, the variable in the last file read will
take precedence.
Adding Galaxy roles
Any roles defined in
openstack-ansible/ansible-role-requirements.yml
will be
installed by the
openstack-ansible/scripts/bootstrap-ansible.sh
script.
Setting overrides in configuration files
All of the services that use YAML, JSON, or INI for configuration can
receive overrides through the use of a Ansible action plugin named
config_template
. The configuration template engine allows a
deployer to use a simple dictionary to modify or add items into
configuration files at run time that may not have a preset template
option. All OpenStack-Ansible roles allow for this functionality where
applicable. Files available to receive overrides can be seen in the
defaults/main.yml
file as standard empty dictionaries
(hashes).
Practical guidance for using this feature is available in the :deploy_guide:Deployment Guide <app-advanced-config-override.html>.
This module has been submitted for consideration into Ansible Core.
Build the environment with additional python packages
The system will allow you to install and build any package that is a python installable. The repository infrastructure will look for and create any git based or PyPi installable package. When the package is built the repo-build role will create the sources as Python wheels to extend the base system and requirements.
While the packages pre-built in the repository-infrastructure are
comprehensive, it may be needed to change the source locations and
versions of packages to suit different deployment needs. Adding
additional repositories as overrides is as simple as listing entries
within the variable file of your choice. Any user_.*.yml
file within the "/etc/openstack_deployment" directory will work to
facilitate the addition of a new packages.
swift_git_repo: https://private-git.example.org/example-org/swift
swift_git_install_branch: master
Additional lists of python packages can also be overridden using a
user_.*.yml
variable file.
swift_requires_pip_packages:
- virtualenv
- virtualenv-tools
- python-keystoneclient
- NEW-SPECIAL-PACKAGE
Once the variables are set call the play repo-build.yml
to build all of the wheels within the repository infrastructure. When
ready run the target plays to deploy your overridden source code.
Module documentation
These are the options available as found within the virtual module documentation section.
module: config_template
version_added: 1.9.2
short_description: >
Renders template files providing a create/update override interfacedescription:
- The module contains the template functionality with the ability to
override items in config, in transit, through the use of a simple
dictionary without having to write out various temp files on target
machines. The module renders all of the potential jinja a user could
provide in both the template file and in the override dictionary which
is ideal for deployers who may have lots of different configs using a
similar code base.
- The module is an extension of the **copy** module and all of attributes
that can be set there are available to be set here.
options:
src:
description:
- Path of a Jinja2 formatted template on the local server. This can
be a relative or absolute path.
required: true
default: null
dest:
description:
- Location to render the template to on the remote machine.
required: true
default: null
config_overrides:
description:
- A dictionary used to update or override items within a configuration
template. The dictionary data structure may be nested. If the target
config file is an ini file the nested keys in the ``config_overrides``
will be used as section headers.
config_type:
description:
- A string value describing the target config type.
choices:
- ini
- json
- yaml
Example task using the config_template module
- name: Run config template ini
config_template:
src: test.ini.j2
dest: /tmp/test.ini
config_overrides: "{{ test_overrides }}"
config_type: ini
Example overrides dictionary (hash)
test_overrides:
DEFAULT:
new_item: 12345
Original template file
test.ini.j2
[DEFAULT]
value1 = abc
value2 = 123
Rendered on disk file
/tmp/test.ini
[DEFAULT]
value1 = abc
value2 = 123
new_item = 12345
In this task the test.ini.j2
file is a template which
will be rendered and written to disk at /tmp/test.ini
. The
config_overrides entry is a dictionary (hash) which
allows a deployer to set arbitrary data as overrides to be written into
the configuration file at run time. The config_type
entry specifies the type of configuration file the module will be
interacting with; available options are "yaml", "json", and "ini".
Discovering available overrides
All of these options can be specified in any way that suits your
deployment. In terms of ease of use and flexibility it's recommended
that you define your overrides in a user variable file such as
/etc/openstack_deploy/user_variables.yml
.
The list of overrides available may be found by executing:
find . -name "main.yml" -exec grep '_.*_overrides:' {} \; \
| grep -v "^#" \
| sort -u