Split IPSEC deployment in two

The first phase sets up the node-to-node tunnels at step 1; this
ensures that the corosync cluster setup is done over the tunnels
and prevents any timeouts that were happening when the setup was
done after the cluster was up. This has the added value that all
the pacemaker communication is encrypted from the beginning.

The second phase is the VIP tunnel setup, which is in step 3. This
is because we need the VIPs to be setup by pacemaker, and we also
need pacemaker to be up.

Depends-On: Ib9a134648c74e5dfcbd7a8ebd2d67bda87992497
Change-Id: Ic402dc73044e2426b097ed0eaf57a77c5e6eef24
This commit is contained in:
Juan Antonio Osorio Robles 2018-01-17 10:10:56 +00:00
parent d6148195c6
commit 1363eda063
1 changed files with 11 additions and 1 deletions

View File

@ -85,13 +85,20 @@ outputs:
- name: generate ipsec global vars
set_fact:
ipsec_psk: "{{ generated_psk.stdout }}"
ipsec_skip_firewall_rules: true
delegate_to: "{{item}}"
delegate_facts: true
no_log: true
with_items:
- "{{ groups.ipsec }}"
deploy_steps_tasks:
- name: IPSEC configuration on step 1
when: step == '1'
block:
- include_role:
name: tripleo-ipsec
vars:
ipsec_configure_vips: false
ipsec_skip_firewall_rules: false
# In step 2 the pacemaker resources are created and the VIPs
# are assigned to the nodes. We need those VIPs to be assigned
# already before setting up the IPSEC tunnels. Hence we do this
@ -101,3 +108,6 @@ outputs:
block:
- include_role:
name: tripleo-ipsec
vars:
ipsec_configure_vips: true
ipsec_skip_firewall_rules: true