Separate per-service host configuration tasks
Currently there are a few services that perform host configuration tasks. This is done in config.yml. This means that these changes are performed during 'kolla-ansible genconfig', when we might expect not to be making any changes to the remote system. This change separates out these host configuration tasks into a config-host.yml file, which is included directly from deploy.yml. One change in behaviour is that this prevents these tasks from running during an upgrade or genconfig. This is probably what we want, but we should be careful when any of these host configuration tasks are changed, to ensure they are applied during an upgrade if necessary. Change-Id: I001defc75d1f1e6caa9b1e11246abc6ce17c775b Closes-Bug: #1860161
This commit is contained in:
parent
96151a35d0
commit
fdea19a305
12
ansible/roles/elasticsearch/tasks/config-host.yml
Normal file
12
ansible/roles/elasticsearch/tasks/config-host.yml
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
- name: Setting sysctl values
|
||||
become: true
|
||||
sysctl:
|
||||
name: "{{ item.name }}"
|
||||
value: "{{ item.value }}"
|
||||
sysctl_set: yes
|
||||
with_items:
|
||||
- { name: "vm.max_map_count", value: 262144}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
- inventory_hostname in groups['elasticsearch']
|
@ -1,13 +1,4 @@
|
||||
---
|
||||
- name: Setting sysctl values
|
||||
become: true
|
||||
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
|
||||
with_items:
|
||||
- { name: "vm.max_map_count", value: 262144}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
- inventory_hostname in groups['elasticsearch']
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
file:
|
||||
path: "{{ node_config_directory }}/{{ item.key }}"
|
||||
|
@ -1,4 +1,6 @@
|
||||
---
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- name: Flush handlers
|
||||
|
20
ansible/roles/haproxy/tasks/config-host.yml
Normal file
20
ansible/roles/haproxy/tasks/config-host.yml
Normal file
@ -0,0 +1,20 @@
|
||||
---
|
||||
- name: Setting sysctl values
|
||||
sysctl:
|
||||
name: "{{ item.name }}"
|
||||
value: "{{ item.value }}"
|
||||
sysctl_set: yes
|
||||
become: true
|
||||
with_items:
|
||||
- { name: "net.ipv4.ip_nonlocal_bind", value: 1}
|
||||
- { name: "net.ipv6.ip_nonlocal_bind", value: 1}
|
||||
- { name: "net.unix.max_dgram_qlen", value: 128}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
|
||||
- name: Load and persist keepalived module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': ip_vs }
|
@ -1,14 +1,4 @@
|
||||
---
|
||||
- name: Setting sysctl values
|
||||
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
|
||||
become: true
|
||||
with_items:
|
||||
- { name: "net.ipv4.ip_nonlocal_bind", value: 1}
|
||||
- { name: "net.ipv6.ip_nonlocal_bind", value: 1}
|
||||
- { name: "net.unix.max_dgram_qlen", value: 128}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
file:
|
||||
path: "{{ node_config_directory }}/{{ item.key }}"
|
||||
@ -83,13 +73,6 @@
|
||||
notify:
|
||||
- Restart haproxy container
|
||||
|
||||
- name: Load and persist keepalived module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': ip_vs }
|
||||
|
||||
- name: Copying over keepalived.conf
|
||||
vars:
|
||||
service: "{{ haproxy_services['keepalived'] }}"
|
||||
|
@ -1,4 +1,6 @@
|
||||
---
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- name: Flush handlers
|
||||
|
8
ansible/roles/ironic/tasks/config-host.yml
Normal file
8
ansible/roles/ironic/tasks/config-host.yml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
- name: Load and persist iscsi_tcp module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': iscsi_tcp}
|
||||
when: inventory_hostname in groups['ironic-conductor']
|
@ -1,11 +1,4 @@
|
||||
---
|
||||
- name: Load and persist iscsi_tcp module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': iscsi_tcp}
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
file:
|
||||
path: "{{ node_config_directory }}/{{ item.key }}"
|
||||
|
@ -4,6 +4,8 @@
|
||||
(inventory_hostname in groups['ironic-api'] or
|
||||
inventory_hostname in groups['ironic-inspector'])
|
||||
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
when: inventory_hostname in groups['ironic-api'] or
|
||||
inventory_hostname in groups['ironic-conductor'] or
|
||||
|
10
ansible/roles/iscsi/tasks/config-host.yml
Normal file
10
ansible/roles/iscsi/tasks/config-host.yml
Normal file
@ -0,0 +1,10 @@
|
||||
---
|
||||
- name: Load and persist configfs module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- name: configfs
|
||||
when:
|
||||
- inventory_hostname in groups[iscsi_services.iscsid.group]
|
||||
- iscsi_services.iscsid.enabled | bool
|
@ -1,14 +1,4 @@
|
||||
---
|
||||
- name: Load and persist configfs module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- name: configfs
|
||||
when:
|
||||
- inventory_hostname in groups[iscsi_services.iscsid.group]
|
||||
- iscsi_services.iscsid.enabled | bool
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
file:
|
||||
path: "{{ node_config_directory }}/{{ item.key }}"
|
||||
|
@ -1,4 +1,6 @@
|
||||
---
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- name: Flush handlers
|
||||
|
7
ansible/roles/multipathd/tasks/config-host.yml
Normal file
7
ansible/roles/multipathd/tasks/config-host.yml
Normal file
@ -0,0 +1,7 @@
|
||||
---
|
||||
- name: Load and persist dm-multipath module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': dm-multipath}
|
@ -1,11 +1,4 @@
|
||||
---
|
||||
- name: Load and persist dm-multipath module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': dm-multipath}
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
file:
|
||||
path: "{{ node_config_directory }}/{{ item.key }}"
|
||||
|
@ -1,4 +1,6 @@
|
||||
---
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- name: Flush handlers
|
||||
|
30
ansible/roles/neutron/tasks/config-host.yml
Normal file
30
ansible/roles/neutron/tasks/config-host.yml
Normal file
@ -0,0 +1,30 @@
|
||||
---
|
||||
- name: Load and persist ip6_tables module
|
||||
include_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': ip6_tables}
|
||||
when: neutron_services | select_services_enabled_and_mapped_to_host | list | intersect([ "neutron-l3-agent", "neutron-linuxbridge-agent", "neutron-openvswitch-agent" ]) | list | length > 0
|
||||
|
||||
- name: Setting sysctl values
|
||||
become: true
|
||||
vars:
|
||||
neutron_l3_agent: "{{ neutron_services['neutron-l3-agent'] }}"
|
||||
sysctl:
|
||||
name: "{{ item.name }}"
|
||||
value: "{{ item.value }}"
|
||||
sysctl_set: yes
|
||||
with_items:
|
||||
- { name: "net.ipv4.ip_forward", value: 1}
|
||||
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh1 }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh2 }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh3 }}"}
|
||||
- { name: "net.ipv6.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh1 }}"}
|
||||
- { name: "net.ipv6.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh2 }}"}
|
||||
- { name: "net.ipv6.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh3 }}"}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
- (neutron_l3_agent.enabled | bool and neutron_l3_agent.host_in_groups | bool)
|
@ -1,31 +1,4 @@
|
||||
---
|
||||
- name: Load and persist ip6_tables module
|
||||
include_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': ip6_tables}
|
||||
when: neutron_services | select_services_enabled_and_mapped_to_host | list | intersect([ "neutron-l3-agent", "neutron-linuxbridge-agent", "neutron-openvswitch-agent" ]) | list | length > 0
|
||||
|
||||
- name: Setting sysctl values
|
||||
become: true
|
||||
vars:
|
||||
neutron_l3_agent: "{{ neutron_services['neutron-l3-agent'] }}"
|
||||
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
|
||||
with_items:
|
||||
- { name: "net.ipv4.ip_forward", value: 1}
|
||||
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh1 }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh2 }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh3 }}"}
|
||||
- { name: "net.ipv6.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh1 }}"}
|
||||
- { name: "net.ipv6.neigh.default.gc_thresh2", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh2 }}"}
|
||||
- { name: "net.ipv6.neigh.default.gc_thresh3", value: "{{ neutron_l3_agent_host_ipv6_neigh_gc_thresh3 }}"}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
- (neutron_l3_agent.enabled | bool and neutron_l3_agent.host_in_groups | bool)
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
become: true
|
||||
file:
|
||||
|
@ -5,6 +5,8 @@
|
||||
- include_tasks: clone.yml
|
||||
when: neutron_dev_mode | bool
|
||||
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- include_tasks: config-neutron-fake.yml
|
||||
|
15
ansible/roles/nova-cell/tasks/config-host.yml
Normal file
15
ansible/roles/nova-cell/tasks/config-host.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
- name: Setting sysctl values
|
||||
become: true
|
||||
sysctl:
|
||||
name: "{{ item.name }}"
|
||||
value: "{{ item.value }}"
|
||||
sysctl_set: yes
|
||||
with_items:
|
||||
- { name: "net.bridge.bridge-nf-call-iptables", value: 1}
|
||||
- { name: "net.bridge.bridge-nf-call-ip6tables", value: 1}
|
||||
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
- inventory_hostname in groups[nova_cell_compute_group]
|
@ -1,16 +1,4 @@
|
||||
---
|
||||
- name: Setting sysctl values
|
||||
become: true
|
||||
sysctl: name={{ item.name }} value={{ item.value }} sysctl_set=yes
|
||||
with_items:
|
||||
- { name: "net.bridge.bridge-nf-call-iptables", value: 1}
|
||||
- { name: "net.bridge.bridge-nf-call-ip6tables", value: 1}
|
||||
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ nova_compute_host_rp_filter_mode }}"}
|
||||
when:
|
||||
- set_sysctl | bool
|
||||
- inventory_hostname in groups[nova_cell_compute_group]
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
become: true
|
||||
file:
|
||||
|
@ -7,6 +7,8 @@
|
||||
- include_tasks: clone.yml
|
||||
when: nova_dev_mode | bool
|
||||
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- include_tasks: config-nova-fake.yml
|
||||
|
7
ansible/roles/openvswitch/tasks/config-host.yml
Normal file
7
ansible/roles/openvswitch/tasks/config-host.yml
Normal file
@ -0,0 +1,7 @@
|
||||
---
|
||||
- name: Load and persist openvswitch module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': openvswitch}
|
@ -1,11 +1,4 @@
|
||||
---
|
||||
- name: Load and persist openvswitch module
|
||||
import_role:
|
||||
name: module-load
|
||||
vars:
|
||||
modules:
|
||||
- {'name': openvswitch}
|
||||
|
||||
- name: Ensuring config directories exist
|
||||
become: true
|
||||
file:
|
||||
|
@ -1,4 +1,6 @@
|
||||
---
|
||||
- include_tasks: config-host.yml
|
||||
|
||||
- include_tasks: config.yml
|
||||
|
||||
- name: Flush Handlers
|
||||
|
@ -0,0 +1,7 @@
|
||||
---
|
||||
fixes:
|
||||
- |
|
||||
Fixes an issue where host configuration tasks (``sysctl``, loading kernel
|
||||
modules) could be performed during the ``kolla-ansible genconfig`` command.
|
||||
See `bug 1860161 <https://bugs.launchpad.net/kolla-ansible/+bug/1860161>`__
|
||||
for details.
|
Loading…
Reference in New Issue
Block a user