This repository contains chef cookbooks for deploying various Gridcentric technologies. These cookbooks are typically used with the opensource Chef server.
The roles
directory contains chef roles.
These cookbooks were tested on chef 0.10.12. Install and configure your chef server and client. These instructions are assumed to be performed from a developer workstation with a properly configured knife client for accessing your chef server.
To import the gridcentric cookbooks into your chef server:
Upload the gridcentric cookbooks into your chef server:
cd gridcentric-cookbooks
knife cookbook upload -o cookbooks --all
Then, upload the roles to your chef server:
cd gridcentric-cookbooks
knife role from file roles/*.rb
Once your nodes are registered with your chef server, simply assign the appropriate roles to your nodes. Note that the nodes must be running the appropriate components of openstack prior to installing the gridcentric components. If chef is being used to configure openstack as well, openstack roles must appear earlier in the node's run list than the gridcentric roles.
For an all-in-one openstack cluster with a single node:
knife node run_list add <node-name> "role[gridcentric-compute]"
knife node run_list add <node-name> "role[gridcentric-api]"
Openstack compute nodes:
knife node run_list add <node-name> "role[gridcentric-compute]"
Openstack api nodes:
knife node run_list add <node-name> "role[gridcentric-api]"
External machines which will send VMS requests your VMS-enabled cluster:
knife node run_list add <node-name> "role[gridcentric-client]"
Openstack instances which will be used as VMS masters:
knife node run_list add <node-name> "role[vms-guest]"
Ubuntu 12.04 (Precise) ships with apparmor enabled by default and Openstack services come with apparmor profiles. Since VMS extends the Openstack compute service, this causes conflicts with the default compute service apparmor rules. Apparmor needs to either be provided with rules which allow access to VMS resources or the apparmor profile for Openstack compute needs to be disabled. Two recipes are provided for dealing with apparmor:
To add rules for VMS resources to apparmor, add the
vms::apparmor_rules
recipe to compute nodes:
knife node run_list add <compute-node-name> \
"recipe[vms::apparmor_rules]"
To disable apparmor completely for the Openstack compute service, add
the vms::disable_apparmor
recipe to compute nodes:
knife node run_list add <compute-node-name> \
"recipe[vms::disable_apparmor]"
Copyright 2012, Gridcentric Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.