123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431 |
- ---
- # Configure the agent installation artifacts for multi-node PXE installation.
- #
- # TODO: For fact delegation, when certain hosts are unreachable, add
- # "ignore_unreachable: yes" to the tasks and then handle it with a
- # prompt & fail afterwards.
- #
- - name: Prepare the files required for a multi-node installation using agent install.
- hosts: workstation.lab.example.com
- become: no
- gather_subset: min
- tasks:
- # NOTE: This one is actually a prep item, but it's only needed for agent installs.
- - name: Ensure nmstate is installed.
- become: yes
- ansible.builtin.yum:
- name: nmstate
- state: present
- - name: Check the dependency status.
- ansible.builtin.stat:
- path: "{{ ansible_facts['user_dir'] }}/{{ item }}"
- get_attributes: no
- get_checksum: no
- get_mime: no
- register: dependencies
- loop:
- - install-pull-secret
- - .ssh/openshift.pub
- - ca/ca-cert.pem
- - mirror/working-dir/cluster-resources/idms-oc-mirror.yaml
- - Downloads/rhcos-418.94.202501221327-0-live.x86_64.iso
- - ansible.builtin.assert:
- that:
- - dependencies.results[0].stat.exists
- - dependencies.results[1].stat.exists
- - dependencies.results[2].stat.exists
- - dependencies.results[3].stat.exists
- - dependencies.results[4].stat.exists
- fail_msg: |
- ERROR: Either pull secret, SSH keypair, CA certificate, RHCOS ISO, or mirror artifacts are missing.
- Ensure all the relevant preceding tasks have been completed:
- - Quay prerequisites,
- - Quay deployment,
- - oc-mirror prerequisites,
- - oc-mirror execution,
- - coreos-installer prerequisites
- Exiting.
- success_msg: "OK, dependencies exist."
- - name: Check whether someone fiddled with installation before.
- ansible.builtin.stat:
- path: "{{ ansible_facts['user_dir'] }}/ipi/.openshift_install.log"
- register: install_log
- - name: Warn if installation log was found.
- ansible.builtin.pause:
- prompt: |
- WARNING: Found .openshift_install.log in the cluster working directory. This usually
- means there were previous attempts of creating installation artifacts.
-
- If you want to recreate the cluster working directory from scratch, run this
- playbook with the variable "recreate_cluster_dir" set to any value like this:
-
- ansible-playbook -e recreate_cluster_dir=yes ./65-agent-ipi-multinode.yml
-
- Continuing in 5 seconds unless you interrupt execution.
- seconds: 5
- when:
- - install_log.stat.exists
- - recreate_cluster_dir is not defined
- - name: Load the dependencies as facts.
- ansible.builtin.set_fact:
- pull_secret: "{{ lookup('ansible.builtin.file', ansible_facts['user_dir'] + '/install-pull-secret') }}"
- public_key: "{{ lookup('ansible.builtin.file', ansible_facts['user_dir'] + '/.ssh/openshift.pub') }}"
- lab_ca_cert: "{{ lookup('ansible.builtin.file', ansible_facts['user_dir'] + '/ca/ca-cert.pem') }}"
- content_sources: "{{ lookup('ansible.builtin.file', ansible_facts['user_dir'] + '/mirror/working-dir/cluster-resources/idms-oc-mirror.yaml')
- | ansible.builtin.from_yaml_all }}"
- - name: Set the fact determining installation type (required for templating).
- ansible.builtin.set_fact:
- install_type: ipi
- install_host: master03.ocp4.example.com
- other_hosts:
- - name: master01.ocp4.example.com
- role: master
- - name: master02.ocp4.example.com
- role: master
- - name: worker01.ocp4.example.com
- role: worker
- - name: worker02.ocp4.example.com
- role: worker
- - name: Collect facts from the rendezvous machine (must be reachable for that).
- delegate_to: "{{ install_host }}"
- delegate_facts: yes
- ansible.builtin.setup:
- gather_subset: min,interfaces
- - name: Collect facts from the other machines (must be reachable for that).
- delegate_to: "{{ item.name }}"
- delegate_facts: yes
- ansible.builtin.setup:
- gather_subset: min,interfaces
- loop: "{{ other_hosts }}"
- - name: Ensure install-config is there.
- ansible.builtin.template:
- src: templates/install-config-template.yaml.j2
- dest: "{{ ansible_facts['user_dir'] }}/install-config-ipi.yaml"
- mode: 0644
- owner: student
- group: student
- register: updated_install_config
- - name: Ensure agent-config is there.
- ansible.builtin.template:
- src: templates/agent-config-template.yaml.j2
- dest: "{{ ansible_facts['user_dir'] }}/agent-config-ipi.yaml"
- mode: 0644
- owner: student
- group: student
- register: updated_agent_config
- - name: Remove the installation directory if so required.
- ansible.builtin.file:
- path: "{{ ansible_facts['user_dir'] }}/ipi"
- state: absent
- when:
- - recreate_cluster_dir is defined
- - recreate_cluster_dir
- - name: Ensure the presence of installation directory.
- ansible.builtin.file:
- path: "{{ ansible_facts['user_dir'] }}/ipi"
- state: directory
- mode: 0755
- - name: Also, ensure that the right install-config.yaml file is in there.
- ansible.builtin.copy:
- src: "{{ ansible_facts['user_dir'] }}/install-config-ipi.yaml"
- remote_src: yes
- dest: "{{ ansible_facts['user_dir'] }}/ipi/install-config.yaml"
- mode: 0644
- register: published_install_config
- when:
- - (not install_log.stat.exists) or (recreate_cluster_dir is defined) or updated_install_config.changed or updated_agent_config.changed
- - name: The same, but for agent-config.yaml.
- ansible.builtin.copy:
- src: "{{ ansible_facts['user_dir'] }}/agent-config-ipi.yaml"
- remote_src: yes
- dest: "{{ ansible_facts['user_dir'] }}/ipi/agent-config.yaml"
- mode: 0644
- register: published_agent_config
- when:
- - (not install_log.stat.exists) or (recreate_cluster_dir is defined) or updated_install_config.changed or updated_agent_config.changed
- # TODO: agent installer needs to have a disabled check of valid-platform-network-settings or it refuses to
- # install complaining about OpenStack not being supported. Long story short:
- #
- # https://github.com/openshift/assisted-service/blob/94614068710f5e528f56ab034988cb7d1ad42f0d/docs/user-guide/deploy-on-OSP.md
- # https://github.com/orgs/okd-project/discussions/2112
- #
- # I suppose there has to be a customization of /var/usrlocal/share/assisted-service/assisted-service.env,
- # where DISABLED_HOST_VALIDATIONS=valid-platform-network-settings
- #
- # Short of that, the rendezvous host needs to have this file patched, then:
- #
- # systemctl restart assisted-service
- # systemctl restart agent
- #
- # and reboot any nodes that have registered by then so they re-register.
- #
- - name: This block will only execute if install-config or agent-config files were published.
- block:
- - name: Ensure the presence of customization directory.
- ansible.builtin.file:
- path: "{{ ansible_facts['user_dir'] }}/ipi/openshift"
- state: directory
- mode: 0755
- - name: Render chrony customizations in home directory.
- ansible.builtin.template:
- src: templates/chrony-customization.bu.j2
- dest: "{{ ansible_facts['user_dir'] }}/chrony-{{ item }}.bu"
- mode: 0644
- owner: student
- group: student
- loop:
- - master
- - worker
- - name: Publish chrony customizations in manifests directory.
- ansible.builtin.command:
- cmd: butane ./chrony-{{ item }}.bu -o ./ipi/openshift/99_chrony_{{ item }}.yaml
- chdir: "{{ ansible_facts['user_dir'] }}"
- creates: ipi/openshift/99_chrony_{{ item }}.yaml
- loop:
- - master
- - worker
- - name: Ensure the agent image cache directory exists.
- ansible.builtin.file:
- path: "{{ ansible_facts['user_dir'] }}/.cache/agent/image_cache"
- state: directory
- mode: 0755
- - name: Ensure that the agent ISO and all other artifacts are gone if anything was updated.
- ansible.builtin.file:
- path: "{{ ansible_facts['user_dir'] }}/ipi/{{ item }}"
- state: absent
- loop:
- - auth
- - boot-artifacts
- - .openshift_install.log
- - .openshift_install_state.json
- when: published_install_config.changed or published_agent_config.changed
- - name: Check whether the initrd is there.
- ansible.builtin.stat:
- path: "{{ ansible_facts['user_dir'] }}/ipi/boot-artifacts/agent.x86_64-initrd.img"
- get_attributes: no
- get_checksum: no
- get_mime: no
- register: agent_initrd
- - name: Ensure that CoreOS ISO is a link to the downloaded one in Downloads.
- ansible.builtin.file:
- path: "{{ ansible_facts['user_dir'] }}/.cache/agent/image_cache/coreos-x86_64.iso"
- state: hard
- src: "{{ ansible_facts['user_dir'] }}/Downloads/rhcos-418.94.202501221327-0-live.x86_64.iso"
- - name: Create agent boot artifacts.
- ansible.builtin.command:
- cmd: openshift-install-fips agent create pxe-files
- chdir: "{{ ansible_facts['user_dir'] }}/ipi"
- when: not agent_initrd.stat.exists
- # Copy the boot artifacts to utility and prepare the PXE boot stuff, fix DNS bits.
- - name: Copy the boot artifacts to utility and prepare the PXE boot stuff.
- hosts: utility.lab.example.com
- become: no
- gather_subset: min
- tasks:
- - name: Set the fact containing all the installation hosts.
- ansible.builtin.set_fact:
- install_hosts:
- - master01.ocp4.example.com
- - master02.ocp4.example.com
- - master03.ocp4.example.com
- - worker01.ocp4.example.com
- - worker02.ocp4.example.com
- - name: Collect facts from the installation machines (must be reachable for that).
- delegate_to: "{{ item }}"
- delegate_facts: yes
- ansible.builtin.setup:
- gather_subset: min,interfaces
- loop: "{{ install_hosts }}"
- - name: Ensure there is a target directory for boot files on utility.
- become: yes
- ansible.builtin.file:
- path: /var/www/html/openshift4/ipi
- owner: root
- group: root
- mode: 0755
- state: directory
- - name: Copy the boot artifacts to the target directory if necessary.
- become: yes
- ansible.builtin.copy:
- src: "/home/student/ipi/boot-artifacts/{{ item }}"
- dest: "/var/www/html/openshift4/ipi/{{ item }}"
- owner: root
- group: root
- mode: 0644
- loop:
- - agent.x86_64-vmlinuz
- - agent.x86_64-initrd.img
- - agent.x86_64-rootfs.img
- - name: Ensure the IPI PXE boot config file is in TFTP boot directory.
- become: yes
- ansible.builtin.copy:
- dest: "/var/lib/tftpboot/pxelinux.cfg/pxeboot-ipi.cfg"
- owner: root
- group: root
- mode: 0644
- content: |
- default menu.c32
- prompt 0
- timeout 50
- menu title **** OpenShift 4.18.6 Agent PXE Boot Menu ****
-
- label Install CoreOS 4.18.6 Agent Node
- kernel http://192.168.50.254:8080/openshift4/ipi/agent.x86_64-vmlinuz
- append console=tty0 console=ttyS0 initrd=http://192.168.50.254:8080/openshift4/ipi/agent.x86_64-initrd.img coreos.live.rootfs_url=http://192.168.50.254:8080/openshift4/ipi/agent.x86_64-rootfs.img rw ignition.firstboot ignition.platform.id=metal
- - name: Ensure files with MAC addresses are symlinks to pxeboot-ipi.cfg
- become: yes
- ansible.builtin.file:
- src: pxeboot-ipi.cfg
- dest: "/var/lib/tftpboot/pxelinux.cfg/{{ hostvars[item]['ansible_facts']['default_ipv4']['macaddress'] | regex_replace('^', '01-') | regex_replace(':', '-') }}"
- owner: root
- group: root
- state: link
- force: yes
- loop: "{{ install_hosts }}"
- - name: Ensure forward DNS records are there.
- become: yes
- ansible.builtin.lineinfile:
- path: /var/named/ocp4.example.com.db
- regexp: "{{ item.regex }}"
- line: "{{ item.line }}"
- insertafter: "{{ item.after | default(omit) }}"
- insertbefore: "{{ item.before | default(omit) }}"
- loop:
- - regex: '^master01\.ipi '
- line: "master01.ipi IN A 192.168.50.10"
- after: '^master01 '
- - regex: '^master02\.ipi '
- line: "master02.ipi IN A 192.168.50.11"
- after: '^master02 '
- - regex: '^master03\.ipi '
- line: "master03.ipi IN A 192.168.50.12"
- after: '^master03 '
- - regex: '^worker01\.ipi '
- line: "worker01.ipi IN A 192.168.50.13"
- after: '^worker01 '
- - regex: '^worker02\.ipi '
- line: "worker02.ipi IN A 192.168.50.14"
- after: '^worker02 '
- - regex: '^api\.ipi '
- line: "api.ipi IN A 192.168.50.8"
- before: '^master01\.ipi '
- - regex: '^api-int\.ipi '
- line: "api-int.ipi IN A 192.168.50.8"
- after: '^api\.ipi '
- - regex: '^\*\.apps\.ipi '
- line: "*.apps.ipi IN A 192.168.50.9"
- after: '^api-int\.ipi '
- register: dnsfw_fix
- notify:
- - reload dns
- - name: Increase the serial number of the forward zone if changed.
- block:
- - name: Load the zone file.
- become: yes
- ansible.builtin.slurp:
- src: /var/named/ocp4.example.com.db
- register: zonefile_fw
- - name: Read the serial number from the zone file and increase it by one.
- ansible.builtin.set_fact:
- new_fw_serial: "{{ (zonefile_fw.content | ansible.builtin.b64decode() | ansible.builtin.regex_search('^.*; serial', ignorecase=True, multiline=True) | ansible.builtin.regex_replace('; serial.*$', '') | trim | int) + 1 }}"
- - name: Insert the new serial number instead of the old one.
- become: yes
- ansible.builtin.lineinfile:
- path: /var/named/ocp4.example.com.db
- regexp: "; serial"
- line: " {{ new_fw_serial }} ; serial"
- when: dnsfw_fix.changed
- - name: Ensure reverse DNS records are there.
- become: yes
- ansible.builtin.lineinfile:
- path: /var/named/ocp4.example.com.reverse.db
- regexp: '^{{ item.addr }}\s+IN\s+PTR'
- line: "{{ item.addr }} IN PTR {{ item.host }}"
- insertbefore: "^40 IN PTR idm"
- loop:
- - addr: 8
- host: apps.ipi.ocp4.example.com.
- - addr: 9
- host: api.ipi.ocp4.example.com.
- - addr: 10
- host: master01.ipi.ocp4.example.com.
- - addr: 11
- host: master02.ipi.ocp4.example.com.
- - addr: 12
- host: master03.ipi.ocp4.example.com.
- - addr: 13
- host: worker01.ipi.ocp4.example.com.
- - addr: 14
- host: worker02.ipi.ocp4.example.com.
- register: dnsre_fix
- notify:
- - reload dns
- - name: Increase the serial number of the reverse zone if changed.
- block:
- - name: Load the zone file.
- become: yes
- ansible.builtin.slurp:
- src: /var/named/ocp4.example.com.reverse.db
- register: zonefile_re
- - name: Read the serial number from the zone file and increase it by one.
- ansible.builtin.set_fact:
- new_re_serial: "{{ (zonefile_re.content | ansible.builtin.b64decode() | ansible.builtin.regex_search('^.*; serial', ignorecase=True, multiline=True) | ansible.builtin.regex_replace('; serial.*$', '') | trim | int) + 1 }}"
- - name: Insert the new serial number instead of the old one.
- become: yes
- ansible.builtin.lineinfile:
- path: /var/named/ocp4.example.com.reverse.db
- regexp: "; serial"
- line: " {{ new_re_serial }} ; serial"
- when: dnsre_fix.changed
- handlers:
- - name: reload dns
- become: yes
- ansible.builtin.systemd_service:
- name: named
- state: reloaded
- ## TODO: wipe the filesystems of all related machines (or warn that a reset is needed if unreachable)
- ...
|