CI/CD

Concepts

The CI/CD system developed for managing Kayobe based OpenStack clouds is composed of three main components; workflows, runners and kayobe automation. Firstly, the workflows are files which describe a series of tasks to be performed in relation to the deployed cloud. These workflows are executed on request, on schedule or in response to an event such as a pull request being opened. The workflows are designed to carry out various day-to-day activites such as; running Tempest tests, configuring running services or displaying the change to configuration files if a pull request is merged. Secondly, in order for the workflows to run against a cloud we would need private runners present within the cloud positioned in such a way they can reach the internal network and public API. Deployment of private runners is supported by all major providers with the use of community developed Ansible roles. Finally, due to the requirement that we support various different platforms tooling in the form of Kayobe automation was developed. This tooling is not tied to any single CI/CD platform as all tasks are a series of shell script and Ansible playbooks which are designed to run in a purpose build kayobe container. This is complemented by the use of an Ansible collection known as stackhpc.kayobe_workflows which aims to provide users with a quick and easy way of customising all workflows to fit within a customer’s cloud.

Currently we support the creation and deployment of workflows for GitHub with Gitlab support being actively worked upon.

Kayobe Automation

Kayobe automation is a collection of scripts and tools that automate kayobe operations. It is deployed and controlled by CI/CD platforms such as GitHub actions and GitLab pipelines. Kayobe automation provides users with an easy process to perform tasks such as: overcloud service deploy, config-diff, tempest testing, and many more. With it being integrated into platforms such as GitHub or GitLab it builds a close relationship between the contents of the deployments kayobe configuration and what is currently deployed. This is because operations such as opening a pull request will trigger a config diff to be generated providing insight on what impact it might have on services or a tempest test that could be scheduled to run daily providing knowledge of faults earlier than before.

Workflows

Kayobe automation has been designed to be independent of any CI/CD platform with all tasks running inside of a purpose built Kayobe container. However, platform specific workflows need to be deployed to bridge the gap between the contents of Kayobe Automation and these CI/CD platforms. Workflows are templated for each Kayobe configuration repository, ensuring appropriate workflow input parameters are defined, and any necessary customisations can be applied. The templating of workflows is offered through the stackhpc.kayobe_workflows collection which currently supports GitHub workflows.

Runners

Runners are purpose built services tied to a particular service vendor such as GitHub Actions or GitLab CI. These services will listen for jobs which have been tagged appropriately and dispatched to these specific runners. The runners will need to be deployed using existing roles and playbooks whereby the binary/package is downloaded and registered using a special token. In some deployments runner hosts can be shared between environments however this is not always true and dedicated hosts will need to be used for each environment you intend to deploy kayobe automation within.

GitHub Actions

To enable CI/CD where GitHub Actions is used please follow the steps described below starting with the deployment of the runners.

Runner Deployment

  1. Identify a suitable host for hosting the runners.

    GitHub runners need to be deployed on a host which has not had Docker deployed using kolla. This is because GitHub runners cannot provide network options when running in a container.

    Ideally an Infra VM could be used here or failing that the control host. Wherever it is deployed the host will need access to the admin_network, public_network and the pulp registry on the seed.

  2. Edit the environment’s ${KAYOBE_CONFIG_PATH}/environments/${KAYOBE_ENVIRONMENT}/inventory/groups to add the predefined github-runners group to infra-vms

[infra-vms:children]
github-runners
  1. Edit the environment’s ${KAYOBE_CONFIG_PATH}/environments/${KAYOBE_ENVIRONMENT}/inventory/hosts to define the host(s) that will host the runners.

[github-runners]
prod-runner-01
  1. Provide all the relevant Kayobe group_vars for github-runners under ${KAYOBE_CONFIG_PATH}/environments/${KAYOBE_ENVIRONMENT}/inventory/group_vars/github-runners
    • infra-vms ensuring all required infra_vm_extra_network_interfaces are defined

    • network-interfaces

    • python-interpreter.yml ensuring that ansible_python_interpreter: /usr/bin/python3 has been set

  2. Edit the ${KAYOBE_CONFIG_PATH}/inventory/group_vars/github-runners/runners.yml file which will contain the variables required to deploy a series of runners. Below is a core set of variables that will require consideration and modification for successful deployment of the runners. The number of runners deployed can be configured by removing and extending the dict github-runners. As for how many runners present three is suitable number as this would prevent situations where long running jobs could halt progress other tasks whilst waiting for a free runner. You might want to increase the number of runners if usage demands it or new workflows make use of multiple parallel jobs.

    Note github_registry and the elements of the dict control the registry settings for pulling and pushing container images used by the workflows. In the example below the registry settings have been adapted to demonstrate what a shared registry between environments might look like. This values maybe suitable for your deployment providing all environments can reach the same registry. If the all of the environments use their own registry and nothing is shared between them then github_registry can omitted from the file and the template will expect environment specific secrets and variables to be added to the repository settings. This is discussed further in the next section.

---
runner_user: VM_USER_NAME_HERE
github_account: ORG_NAME_HERE
github_repo: KAYOBE_CONFIG_REPO_NAME_HERE
access_token: "{{ secrets_github_access_token }}"

default_runner_labels:
  - kayobe
  - openstack
  - "{{ kayobe_environment | default(omit) }}"

github_registry:
  url: pulp.example.com
  username: admin
  password: ${{ secrets.REGISTRY_PASSWORD }}
  share: true

github_runners:
  runner_01: {}
  runner_02: {}
  runner_03: {}
  1. Obtain a personal access token that would enable the registration of GitHub runners against the github_account and github_repo defined above.

    This token ideally should be fine-grained personal access token which may require the organisation to enable such tokens beforehand. Steps can be found here. The repository permissions for a fine-grained personal access token should be; Actions: R/W, Administration: R/W, Metadata: R Once the key has been obtained, add it to secrets.yml under secrets_github_access_token

  2. If the host is an actual Infra VM then please refer to upstream Infrastructure VMs documentation for additional configuration and steps.

  3. Run kayobe playbook run ${KAYOBE_CONFIG_PATH}/ansible/deploy-github-runner.yml

  4. Check runners have registered properly by visiting the repository’s Action tab -> Runners -> Self-hosted runners

  5. Repeat the above steps for each environment you intend to deploy runners within. You can share the fine-grained access token between environments.

Workflow Deployment

  1. Edit ${KAYOBE_CONFIG_PATH}/inventory/group_vars/github-writer/writer.yml in the base configuration making the appropriate changes to your deployments specific needs. See documentation for stackhpc.kayobe_workflows.github.

  2. Run kayobe playbook run ${KAYOBE_CONFIG_PATH}/ansible/write-github-workflows.yml

  3. Add all required secrets and variables to repository either via the GitHub UI or GitHub CLI (may require repository owner)

Secrets

Single Environment

Multiple Environments

KAYOBE_AUTOMATION_SSH_PRIVATE_KEY

<ENV_NAME>_KAYOBE_AUTOMATION_SSH_PRIVATE_KEY

KAYOBE_VAULT_PASSWORD

<ENV_NAME>_KAYOBE_VAULT_PASSWORD

REGISTRY_PASSWORD

<ENV_NAME>_REGISTRY_PASSWORD

TEMPEST_OPENRC

<ENV_NAME>_TEMPEST_OPENRC

VARIABLES

Single Environment

Multiple Environments

REGISTRY_URL

<ENV_NAME>_REGISTRY_URL

REGISTRY_USERNAME

<ENV_NAME>_REGISTRY_USERNAME

Note the above tables shows the secrets and variables one may need to add to GitHub for a successful deployment. When adding secrets and variables make sure to adhere to the naming standards and ensure the <ENV_NAME> is replaced with all supported kayobe environments in uppercase.

  1. Commit and push all newly generated workflows found under .github/workflows

Final Steps

Some final steps include the following: running config-diff will require that .automation.conf/config.sh contains a list KAYOBE_CONFIG_VAULTED_FILES_PATHS_EXTRA of all vaulted files contained within the config. All such files can be found with grep -r "$ANSIBLE_VAULT;1.1;AES256" . though make sure NOT to include kolla/passwords.yml and secrets.yml Also make sure tempest has been configured appropriately in .automation.conf/config.sh to meet the limitations of a given deployment such as not using a too high of TEMPEST_CONCURRENCY value and that overrides and load/skips lists are correct. Finally, once all the workflows and configuration has been pushed and reviewed you can build a kayobe image using the Build Kayobe Docker Image workflow. Once it is successfully built and pushed to a container registry, other workflows can be used.

Sometimes the kayobe docker image must be rebuilt the reasons for this include but are not limited to the following;

  • Change $KAYOBE_CONFIG_PATH/ansible/requirements.yml

  • Change to requirements.txt

  • Update Kayobe

  • Update kolla-ansible

  • UID/GID collision when deploying workflows to a new environment

  • Prior to deployment of new a OpenStack release