Use this script/pipeline to check if your custom linux image (Vhd) built works on Azure.
We wish to help our customers and also the community who are using Azure to use their Linux Virtual Machines with custom images and generalized images with less hassle. Hence the requirement of this pipeline which the customer/community can fork in their repositories and run as part of their regular validations.
This can also be used by Support teams across and outside Microsoft to validate incoming customers' images using Azure Cloud Shell
- Terraform
- Azure Account
- Azure AAD Appliation Id Setup
- Currently AAD Application ID and Client Secret is Supported
- Ensure that Azure App has contributor access
- Ensure that Terraform is available on Azure pipeline
- Ensure that relevant pipeline variables are set
All requirements are met. Terraform is already installed by default.
- Ensure that Requirements is met
- clone the repo using the following command
git clone https://github.com/Azure/linux-image-validations
- Tar the validations folder using the following command
tar -cvzf validations/* validator.tar.gz
- Ensure that
validator.tar.gz
is present inside an Azure Storage Account.https://storage_account.blob.core.windows.net/container/validator.tar.gz
- Create a file called validate_upload.sh with the following details and place it inside the storage account
#!/bin/bash -e generation=$2 vhdName=$1 sudo $(which tar) -xzf validator.tar.gz [[ -n "$(uname -a | grep -i $distro)" || -n "$(uname -a | grep -i debian)" ]] && sudo $(which python) validate.py [[ -n "$(uname -a | grep -i $redhat)" || -n "$(uname -a | grep -i centos)" ]] && sudo $(which platform_python) validate.py cat logs.json # Example of a curl call echo "https://contoso.com/images/$vhdName/validation/$generation" curl --location --request POST "https://contoso.com/images/$vhdName/validation/$generation" \ --header 'Content-Type: application/json' -d @logs.json
- For folks who wish to run from commandline. Do note that this is to be performed after previous steps are in place.
- Deploying Resources (Terraform variables / Environment variables can also be used)
cd linux-image-validations/azure terraform apply
- Cleanup of Resources
cd linux-image-validations/azure terraform destroy
Terraform is used in setting up of the infrastructure. Python is used to run the scripts inside the Virtual Machine using the Azure Custom Script Extension By doing so will perform the inherent validations such as WALinuxAgent Availability
- Single VM
- Single nic support
- Testing of Generation 1 and Generation 2 Virtual Machine.
- HA Not supported
- Input is currently the SAS Uri to the Linux VHD.
- High Availability with cluster
- Multiple NIC support
Output is currently rendered in JSON We are currently in the Information Gathering wherein most of the details is not validated rather than displayed directly. The output details are currently available in logs.json
- /proc/cmdline - This is used to check if the VM supports Serial console
- Grub configuration - This is used to check if the VM supports Serial console
- OS Release and Kernel Version
- Disk Usage Report
- MBR/EFI Boot
- Repo availability - (yum and dnf)
- Driver details
- Cloud-Init details
- Instance Metadata Service (IMDS)
- Generation 1 and Generation 2 VM Bootability
- WALinuxAgent Availability.
- Network Connectivity
- Repo Availability (Currently Yum and dnf supported)
- Azure Site Recovery
- Cloud-Init validation
- RedHat
- CentOS
- SLES
- OpenSUSE
- Ubuntu - (Works - E2E testing is required)
- Debian - (Works - E2E testing is required)
We sincerely welcome contributions from our customers and community. Together we believe that we can make this a better validation system for Linux Images on Azure.
- Documentation
- Code Enhancement
- Testing and Bug Reports
Issue Template to report Bugs and bugs are tracked on issues tab.
This can also be used to propose new feature request. Please turn the feature-request
flag
[Issue Occurrence - Optional]
Short one-liner issue statement
[Environment]
1. Linux / Windows / OS X
2. Azure Pipelines
3. CloudShell
[Description]
Provide Detailed Description explaining the issue statement
Add Screenshots / Snippets / Error messages if available
[Steps to Reproduce]
[Severity]
- naming convention for terraform scripts - snake_case for variables
- PEP-8 for Python is followed
- Commit Message format.
Multiple file changes involving multiple work should be submitted with multiple commits.
<Repo Name / Work Name>: Short one-liner of the work Description: <Provide your description in brief> Signed-off-by:
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.