-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Add docs Signed-off-by: michal.gubricky <[email protected]> * Add info where methods can be defined Signed-off-by: michal.gubricky <[email protected]> * Add note about specifying config.yaml file Signed-off-by: michal.gubricky <[email protected]> * Add section how to use csctl tool with a plugin Signed-off-by: michal.gubricky <[email protected]> --------- Signed-off-by: michal.gubricky <[email protected]>
- Loading branch information
1 parent
e8dc966
commit fe62f24
Showing
4 changed files
with
109 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
# CSCTL plugin for OpenStack | ||
|
||
## Table of Contents | ||
|
||
- [CSCTL plugin for OpenStack](#csctl-plugin-for-openstack) | ||
- [Table of Contents](#table-of-contents) | ||
- [Introduction](#introduction) | ||
- [Features of csctl plugin for OpenStack](#features-of-csctl-plugin-for-openstack) | ||
- [Docs](#docs) | ||
|
||
## Introduction | ||
|
||
Cluster Stacks are intended to be well-tested bundles of Kubernetes manifests designed to bootstrap productive Kubernetes clusters using the CAPI approach. | ||
|
||
In the case of OpenStack as the infrastructure layer, several custom components, in addition to the CAPI and CAPO (Cluster API provider OpenStack) operators, are involved in the Kubernetes cluster lifecycle management (LCM): | ||
|
||
- CSO (Cluster Stack Operator) | ||
- CSPO (Cluster Stack Provider OpenStack) | ||
- CSCTL (CLI for Cluster Stacks management) | ||
|
||
**CSO** is the provider-agnostic component that handles the core processes. | ||
|
||
**CSPO** is the provider-specific component responsible for uploading the node images to the OpenStack project, for later consumption by the CAPO. | ||
|
||
**CSCTL** facilitates the Cluster Stack creation and versioning process. | ||
|
||
This project facilitates building node images that can be used with the Cluster Stack Operator. | ||
|
||
## Features of csctl plugin for OpenStack | ||
|
||
1. The fully automated building and uploading process for node images, which can be referenced in the Cluster Stack. | ||
2. Generating `node-images.yaml` file, which is needed when you want to use images in the Cluster Stack that are not in your OpenStack Glance service. | ||
|
||
## Docs | ||
[Docs](./docs/README.md) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
# CSCTL plugin for OpenStack documentation | ||
|
||
## Using csctl plugin for OpenStack | ||
Do you already have Cluster Stack configured and [csctl](https://github.com/SovereignCloudStack/csctl) installed? Then check out [how to use](./how_to_use_csctl_plugin_openstack.md) this plugin! |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
# Using the csctl plugin for OpenStack | ||
|
||
## What does the csctl plugin for OpenStack do? | ||
|
||
As a user, you can create clusters based on Cluster Stacks with the help of the Cluster Stack Operators (CSO and CSPO). The operators need certain files, such as those required to apply the necessary Helm charts and to obtain information about the versions in the cluster stack. | ||
|
||
To avoid generating these files manually, you can use [CSCTL](https://github.com/SovereignCloudStack/csctl). In the case of provider-specific Cluster Stacks, the `CSCTL` tool invokes the provider-specific CSCTL plugin. Therefore, the CSCTL plugin for OpenStack is essential if the user intends to build, upload node images to an S3 bucket, and then import them into Glance. | ||
|
||
## Different methods of csctl plugin for OpenStack | ||
|
||
The csctl plugin for OpenStack offers two methods that can be used for different use cases. You can configure them in `csctl.yaml` at `config.provider.config.method`, see [example of the csctl.yaml](../example/cluster-stacks/openstack/ferrol/csctl.yaml) file. | ||
|
||
> [!NOTE] | ||
> Please note that in both methods you need to specify the `config.yaml` file in the `node-images` folder similar to a provided [example](../example/cluster-stacks/openstack/ferrol/node-images/config.yaml). | ||
### Get method | ||
|
||
This method can be used when the creator of the cluster-stacks has already built and stored image(s) in some S3 storage. Then, they need to insert the URL to those image(s) in the `config.yaml`. The plugin, based on the configuration file, then generates `node-images.yaml` file in the release directory. | ||
|
||
### Build method | ||
|
||
The use case for this method is the opposite of the `Get` method. It means that the cluster-stack creator intends to use an image that has not yet been built. The plugin then builds image(s) based on Packer scripts in the `node-images` folder and pushes these image(s) to an S3 bucket. In this mode, you need to provide the path to your S3 storage credentials using the `--node-image-registry` flag, see [registry.yaml](../example/cluster-stacks/openstack/ferrol/node-images/registry.yaml). The URL does not need to be set in `config.yaml`, plugin can creates for you based on this pattern: | ||
|
||
```bash | ||
https://<endpoint>/<bucket-name>/<image-dir-name> | ||
``` | ||
|
||
Be aware of that in this method you need to specify `imageDir` in `config.yaml` file. | ||
|
||
> [!NOTE] | ||
> URL creation does not work for OpenStack Swift. | ||
## Installing csctl plugin for OpenStack | ||
|
||
You can click on the respective release of the csctl plugin for OpenStack on GitHub and download the binary. | ||
|
||
Assuming, you have downloaded the `<release-name>` binary in your Downloads directory, you will need the following commands to rename the binary and to give it executable permissions. | ||
|
||
```bash | ||
sudo chmod u+x ~/Downloads/<release-name> | ||
sudo mv ~/Downloads/<release-name> /usr/local/bin/csctl-openstack # or use any bin directory from your PATH | ||
``` | ||
|
||
If you're using `gh` CLI then you can also use the following to download it. | ||
|
||
```bash | ||
gh release download -p <release-name> -R SovereignCloudStack/csctl-plugin-openstack | ||
``` | ||
|
||
## Creating node-images file in release directory of cluster-stacks | ||
|
||
The most important subcommand is `create-node-images`. This command takes a path to the directory where you configured your Cluster Stack and generates the `node-images.yaml` file in the output directory. | ||
|
||
```bash | ||
csctl-openstack create-node-images cluster-stack-directory cluster-stack-release-directory | ||
``` | ||
|
||
If you choose `build` method you need to provide the path to your node image registry credentials like this: | ||
|
||
```bash | ||
csctl-openstack create-node-images cluster-stack-directory cluster-stack-release-directory node-image-registry-path | ||
``` | ||
|
||
Then the plugin build and push created node image(s) to the appropriate S3 bucket. | ||
|
||
## Use csctl plugin for OpenStack with csctl | ||
|
||
[CSCTL](https://github.com/SovereignCloudStack/csctl) contains a plugin mechanism for providers. This means csctl automatically invokes the plugin for OpenStack if the `csctl.yaml` file contains a configuration for the OpenStack, i.e., `config.provider.config`. In this case, csctl looks for an executable (binary) with a certain name: `csctl- + config.provider.type`. Please take a look at the example of a [csctl.yaml](../example/cluster-stacks/openstack/ferrol/csctl.yaml) file to understand how the configuration for the OpenStack plugin should be set up for csctl to be able to invoke the plugin. Then, you can use basic csctl commands to create cluster stacks. See [csctl documentation](https://github.com/SovereignCloudStack/csctl/blob/main/docs/how_to_use_csctl.md#creating-cluster-stacks) for more details. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters