Skip to content

Instantly share code, notes, and snippets.

@FlorianOtel
Created May 5, 2015 15:17
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save FlorianOtel/cab952b01150df01d0dc to your computer and use it in GitHub Desktop.
Save FlorianOtel/cab952b01150df01d0dc to your computer and use it in GitHub Desktop.
OpenShift-v3 beta3 -- Ansible playbook run, 20150505-1710 (from master1)
[root@master1 src]# cat /etc/ansible/hosts
# This is an example of a bring your own (byo) host inventory
[OSEv3:children]
masters
nodes
[OSEv3:vars]
deployment_type=enterprise
ansible_ssh_user=root
# Pre-release registry URL
#openshift_registry_url=docker-buildvm-rhose.usersys.redhat.com:5000/openshift3_beta/ose-${component}:${version}
# Pre-release additional repo
#openshift_additional_repos=[{'id': 'ose-devel', 'name': 'ose-devel', 'baseurl': 'http://buildvm-devops.usersys.redhat.com/puddle/build/OpenShiftEnterprise/3.0/latest/RH7-RHOSE-3.0/$basearch/os', 'enabled': 1, 'gpgcheck': 0}]
# host group for masters
[masters]
master1.nuage-vpc253.internal openshift_hostname=master1.nuage-vpc253.internal openshift_public_hostname=<Elastic IP of master1---edited>
# host group for nodes
[nodes]
node1.nuage-vpc253.internal openshift_hostname=node1.nuage-vpc253.internal
node2.nuage-vpc253.internal openshift_hostname=node2.nuage-vpc253.internal
cat ansible-playbook-run-20150505-1710
PLAY [Populate oo_masters_to_config host group] *******************************
TASK: [add_host ] *************************************************************
hostname=master1.nuage-vpc253.internal
ok: [localhost] => (item=master1.nuage-vpc253.internal) => {"item": "master1.nuage-vpc253.internal", "new_groups": ["oo_masters_to_config"], "new_host": "master1.nuage-vpc253.internal"}
PLAY [Configure master instances] *********************************************
GATHERING FACTS ***************************************************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838538.61-36146231176790/setup; rm -rf /root/.ansible/tmp/ansible-tmp-1430838538.61-36146231176790/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Install firewalld packages] ******************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Check if iptables-services is installed] *****************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Ensure iptables services are not enabled] ****************
skipping: [master1.nuage-vpc253.internal] => (item=iptables)
skipping: [master1.nuage-vpc253.internal] => (item=ip6tables)
TASK: [os_firewall | Reload systemd units] ************************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Start and enable firewalld service] **********************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | need to pause here, otherwise the firewalld service starting can sometimes cause ssh to fail] ***
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Mask iptables services] **********************************
skipping: [master1.nuage-vpc253.internal] => (item=iptables)
skipping: [master1.nuage-vpc253.internal] => (item=ip6tables)
TASK: [os_firewall | Add firewalld allow rules] *******************************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'})
TASK: [os_firewall | Persist firewalld allow rules] ***************************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'})
TASK: [os_firewall | Remove firewalld allow rules] ****************************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'})
TASK: [os_firewall | Persist removal of firewalld allow rules] ****************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'})
TASK: [os_firewall | Install iptables packages] *******************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> state=present name=iptables,iptables-services
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python -tt /root/.ansible/tmp/ansible-tmp-1430838540.55-2887234420307/yum; rm -rf /root/.ansible/tmp/ansible-tmp-1430838540.55-2887234420307/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item=iptables,iptables-services) => {"changed": false, "item": "iptables,iptables-services", "msg": "", "rc": 0, "results": ["iptables-1.4.21-13.el7.x86_64 providing iptables is already installed", "iptables-services-1.4.21-13.el7.x86_64 providing iptables-services is already installed"]}
TASK: [os_firewall | Check if firewalld is installed] *************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838542.77-64625117886010/command; rm -rf /root/.ansible/tmp/ansible-tmp-1430838542.77-64625117886010/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => {"changed": false, "cmd": ["rpm", "-q", "firewalld"], "delta": "0:00:00.044804", "end": "2015-05-05 11:09:03.107902", "failed": false, "failed_when_result": false, "rc": 1, "start": "2015-05-05 11:09:03.063098", "stderr": "", "stdout": "package firewalld is not installed", "stdout_lines": ["package firewalld is not installed"], "warnings": ["Consider using yum module rather than running rpm"]}
TASK: [os_firewall | Ensure firewalld service is not enabled] *****************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Reload systemd units] ************************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Start and enable iptables service] ***********************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> state=started name=iptables
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838543.19-41455690662673/service; rm -rf /root/.ansible/tmp/ansible-tmp-1430838543.19-41455690662673/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => {"changed": false, "enabled": true, "name": "iptables", "state": "started"}
TASK: [os_firewall | need to pause here, otherwise the iptables service starting can sometimes cause ssh to fail] ***
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Mask firewalld service] **********************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Add iptables allow rules] ********************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=add protocol=tcp port=4001 name=etcd embedded
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838543.89-161283833957572/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430838543.89-161283833957572/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'}) => {"changed": false, "item": {"port": "4001/tcp", "service": "etcd embedded"}, "output": []}
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=add protocol=tcp port=8443 name=OpenShift api https
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838544.2-20012380676559/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430838544.2-20012380676559/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'}) => {"changed": false, "item": {"port": "8443/tcp", "service": "OpenShift api https"}, "output": []}
TASK: [os_firewall | Remove iptables rules] ***********************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=8080 name=OpenShift api http
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838544.51-58066877108824/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430838544.51-58066877108824/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'}) => {"changed": false, "item": {"port": "8080/tcp", "service": "OpenShift api http"}, "output": []}
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=8444 name=former OpenShift web console port
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838544.84-268618040909235/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430838544.84-268618040909235/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'}) => {"changed": false, "item": {"port": "8444/tcp", "service": "former OpenShift web console port"}, "output": []}
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=7001 name=former etcd peer port
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838545.14-243529809368051/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430838545.14-243529809368051/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'}) => {"changed": false, "item": {"port": "7001/tcp", "service": "former etcd peer port"}, "output": []}
TASK: [openshift_facts | Gather OpenShift facts] ******************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts; rm -rf /root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
failed: [master1.nuage-vpc253.internal] => {"failed": true, "parsed": false}
Traceback (most recent call last):
File "/root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts", line 4981, in <module>
main()
File "/root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts", line 461, in main
openshift_facts = OpenShiftFacts(role, fact_file, local_facts)
File "/root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts", line 36, in __init__
self.facts = self.generate_facts(local_facts)
File "/root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts", line 44, in generate_facts
facts = self.apply_provider_facts(defaults, provider_facts, roles)
File "/root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts", line 142, in apply_provider_facts
facts['common'][h_var] = self.choose_hostname([provider_facts['network'].get(h_var)], facts['common'][ip_var])
File "/root/.ansible/tmp/ansible-tmp-1430838545.48-33979235548537/openshift_facts", line 164, in choose_hostname
ips = [ i for i in hostnames if i is not None and re.match(r'\A\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\Z', i) ]
File "/usr/lib64/python2.7/re.py", line 137, in match
return _compile(pattern, flags).match(string)
TypeError: expected string or buffer
OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 56: Applying options for *
debug1: auto-mux: Trying existing master
debug2: fd 3 setting O_NONBLOCK
debug2: mux_client_hello_exchange: master version 4
debug3: mux_client_forwards: request forwardings: 0 local, 0 remote
debug3: mux_client_request_session: entering
debug3: mux_client_request_alive: entering
debug3: mux_client_request_alive: done pid = 2122
debug3: mux_client_request_session: session request sent
debug1: mux_client_request_session: master session id: 2
debug3: mux_client_read_packet: read header failed: Broken pipe
debug2: Received exit status from master 0
Shared connection to master1.nuage-vpc253.internal closed.
FATAL: all hosts have already failed -- aborting
PLAY RECAP ********************************************************************
to retry, use: --limit @/root/config.retry
localhost : ok=1 changed=0 unreachable=0 failed=0
master1.nuage-vpc253.internal : ok=12 changed=0 unreachable=0 failed=1
### Host listing
root@master1 openshift-ansible]# ansible-playbook -vvvv --syntax-check --list-hosts ./playbooks/byo/config.yml
playbook: ./playbooks/byo/config.yml
play #1 (Populate oo_masters_to_config host group): host count=1
localhost
play #2 (Configure master instances): host count=0
play #3 (Additional instance config): host count=0
play #4 (Populate oo_nodes_to_config and oo_first_master host groups): host count=1
localhost
play #5 (Gather and set facts for node hosts): host count=0
play #6 (Create temp directory for syncing certs): host count=1
localhost
play #7 (Register nodes): host count=0
play #8 (Configure node instances): host count=0
play #9 (Delete the temporary directory on the master): host count=0
play #10 (Delete temporary directory on localhost): host count=1
localhost
play #11 (Additional instance config): host count=0
#### Task list
[root@master1 openshift-ansible]# ansible-playbook -vvvv --syntax-check --list-tasks ./playbooks/byo/config.yml
playbook: ./playbooks/byo/config.yml
play #1 (Populate oo_masters_to_config host group):
add_host
play #2 (Configure master instances):
Install firewalld packages
Check if iptables-services is installed
Ensure iptables services are not enabled
Reload systemd units
Start and enable firewalld service
need to pause here, otherwise the firewalld service starting can sometimes cause ssh to fail
Mask iptables services
Add firewalld allow rules
Persist firewalld allow rules
Remove firewalld allow rules
Persist removal of firewalld allow rules
Install iptables packages
Check if firewalld is installed
Ensure firewalld service is not enabled
Reload systemd units
Start and enable iptables service
need to pause here, otherwise the iptables service starting can sometimes cause ssh to fail
Mask firewalld service
Add iptables allow rules
Remove iptables rules
Gather OpenShift facts
assert
Ensure libselinux-python is installed
Create any additional repos that are defined
Remove the additional repos if no longer defined
Remove any yum repo files for other deployment types
Configure gpg keys if needed
Configure yum repositories
Set common OpenShift facts
Set hostname
Set master OpenShift facts
Set dns OpenShift facts
Install OpenShift Master package
Reload systemd units
Create certificate parent directory if it doesn't exist
Create config parent directory if it doesn't exist
Use enterprise default for openshift_registry_url if not set
Use online default for openshift_registry_url if not set
Create master config
Configure OpenShift settings
Start and enable openshift-master
Create the OpenShift client config dir(s)
Create the OpenShift client config(s)
Update the permissions on the OpenShift client config(s)
Set master sdn OpenShift facts
Install openshift-sdn-master
Reload systemd units
Configure openshift-sdn-master settings
Enable openshift-sdn-master
Create group for deployment type
play #3 (Additional instance config):
Transfer the fedora_apache pod template
Transfer the fedora_apache pod template
Ensure irbrc is installed for user root
Ensure vimrc is installed for user root
Bash Completion
play #4 (Populate oo_nodes_to_config and oo_first_master host groups):
Evaluate oo_nodes_to_config
Evaluate oo_first_master
play #5 (Gather and set facts for node hosts):
Gather OpenShift facts
openshift_facts
play #6 (Create temp directory for syncing certs):
Create local temp directory for syncing certs
play #7 (Register nodes):
Gather OpenShift facts
Use enterprise default for openshift_registry_url if not set
Use online default for openshift_registry_url if not set
Create node config
Register unregistered nodes
Create the temp directory on the master
Create a tarball of the node config directories
Retrieve the node config tarballs from the master
play #8 (Configure node instances):
Ensure certificate directory exists
Unarchive the tarball on the node
Install firewalld packages
Check if iptables-services is installed
Ensure iptables services are not enabled
Reload systemd units
Start and enable firewalld service
need to pause here, otherwise the firewalld service starting can sometimes cause ssh to fail
Mask iptables services
Add firewalld allow rules
Persist firewalld allow rules
Remove firewalld allow rules
Persist removal of firewalld allow rules
Install iptables packages
Check if firewalld is installed
Ensure firewalld service is not enabled
Reload systemd units
Start and enable iptables service
need to pause here, otherwise the iptables service starting can sometimes cause ssh to fail
Mask firewalld service
Add iptables allow rules
Remove iptables rules
Gather OpenShift facts
assert
Ensure libselinux-python is installed
Create any additional repos that are defined
Remove the additional repos if no longer defined
Remove any yum repo files for other deployment types
Configure gpg keys if needed
Configure yum repositories
Set common OpenShift facts
Set hostname
Set node OpenShift facts
Test if node certs and config exist
Install OpenShift Node package
Reload systemd units
Configure OpenShift Node settings
Start and enable openshift-node
Disable openshift-node if openshift-node is managed externally
Set node sdn OpenShift facts
Install openshift-sdn-node
Reload systemd units
Configure openshift-sdn-node settings
Ensure we aren't setting DOCKER_OPTIONS in /etc/sysconfig/openshift-sdn-node
Configure docker insecure-registry setting
Start and enable openshift-sdn-node
Create group for deployment type
play #9 (Delete the temporary directory on the master):
file name={{ sync_tmpdir }} state=absent
play #10 (Delete temporary directory on localhost):
file name={{ mktemp.stdout }} state=absent
play #11 (Additional instance config):
Ensure irbrc is installed for user root
Ensure vimrc is installed for user root
Bash Completion
Change root to be in the Docker group
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment