Skip to content

rmahmood/gridcentric-cookbooks

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Description

This repository contains chef cookbooks for deploying various Gridcentric technologies. These cookbooks are typically used with the opensource Chef server.

Roles

The roles directory contains chef roles.

Usage

These cookbooks were tested on chef 0.10.12. Install and configure your chef server and client. These instructions are assumed to be performed from a developer workstation with a properly configured knife client for accessing your chef server.

Installation

To import the gridcentric cookbooks into your chef server:

Upload the gridcentric cookbooks into your chef server:

cd gridcentric-cookbooks
knife cookbook upload -o cookbooks --all

Then, upload the roles to your chef server:

cd gridcentric-cookbooks
knife role from file roles/*.rb

Using the Cookbooks

Once your nodes are registered with your chef server, simply assign the appropriate roles to your nodes. Note that the nodes must be running the appropriate components of openstack prior to installing the gridcentric components. If chef is being used to configure openstack as well, openstack roles must appear earlier in the node's run list than the gridcentric roles.

For an all-in-one openstack cluster with a single node:

knife node run_list add <node-name> "role[gridcentric-compute]"
knife node run_list add <node-name> "role[gridcentric-api]"

Openstack compute nodes:

knife node run_list add <node-name> "role[gridcentric-compute]"

Openstack api nodes:

knife node run_list add <node-name> "role[gridcentric-api]"

External machines which will send VMS requests your VMS-enabled cluster:

knife node run_list add <node-name> "role[gridcentric-client]"

Openstack instances which will be used as VMS masters:

knife node run_list add <node-name> "role[vms-guest]"

Apparmor

Ubuntu 12.04 (Precise) ships with apparmor enabled by default and Openstack services come with apparmor profiles. Since VMS extends the Openstack compute service, this causes conflicts with the default compute service apparmor rules. Apparmor needs to either be provided with rules which allow access to VMS resources or the apparmor profile for Openstack compute needs to be disabled. Two recipes are provided for dealing with apparmor:

To add rules for VMS resources to apparmor, add the vms::apparmor_rules recipe to compute nodes:

knife node run_list add <compute-node-name> \
    "recipe[vms::apparmor_rules]"

To disable apparmor completely for the Openstack compute service, add the vms::disable_apparmor recipe to compute nodes:

knife node run_list add <compute-node-name> \
    "recipe[vms::disable_apparmor]"

License

Copyright 2012, Gridcentric Inc.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

Chef cookbooks for VMS-enabled OpenStack deployments.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Ruby 100.0%