vsm #2

  • By charmers
  • Latest version (#2)
  • precise
  • Stable
  • Edge

Description

This charm automates the installation of Nexus1K VSM(Virtual
Supervisor Module). It can deploy both primary and secondary
VSM in a single domain.


Overview

There are two major components in a Cisco Nexus 1000V environment:
VSM (Virtual Switch Supervisor) and VEM (Virtual Ethernet Module).
VSM is a virtual machine on a baremetal server. VEM runs inside each host.
VSM, as the name goes, supervises and manages multiple VEMs.

In the OpenStack deployment environment, VSM prepares north
bound REST APIs that communicate with OpenStack Nova Cloud
Controller for network profile configuration, policy profile
notification, network creation, subnet creation, and virtual
machine workload administration.

VSM charm installs the Nexus 1000V virtual switch Supervisor
Module virtual machine onto a MaaS cluster node. A cluster can
have up to 2 VSM in active/standby mode (generally in two different servers).
When the active one fails, the standby will take over within bounded time.

VSM charm is not directly dependent of other OpenStack nodes,
unlike other Cisco charms like VEM or VXGW (VLAN Extended Gateway),
which are subordinate charms.

Once the VSM charm is deployed it creates a VSM Virtual Machine (VM)
in the MaaS node. Hence a requirement for VSM to communicate with other
Openstack/Cisco charms is to have L3 connectivity with the rest of
the MaaS cluster nodes.

Usage

In order to use Cisco Openstack solution we would need to install
VSM on a cluster node as well as VEM module that goes into each
host. As today the VSM charm needs to be network reachable to other
nodes using the regular mgmt host interface. (This interface is
specified by the n1kv-phy-intf-bridge configuration parameter of
the charm).

In order to provide High Availability for VSM you'll need to deploy
two VSMs (one will be the primary and another the secondary)
in two different hosts.

In order to deploy the VSMs (both primary and secondary), you will
need to create a configuration file where you need to provide specific
configuration of your VSM. To differentiate the different primary
and secondary VSM configuration, we create separate sections for them
on the configuration file and also you deploy as two different service
names.

The VSM charm will automatically create the VSM VM. For that, you'll
provide (as a minimum):
- a static IP, netmask and gateway address for network reachability
of this VM (by specifiying the n1kv-vsm-mgmt-ip, n1kv-vsm-mgmt-netmask and
n1kv-vsm-mgmt-gateway configuration parameters). This VM uses the
interface specified in n1kv-phy-intf-bridge as external network
interface.
- domain id that the VSM operates (by the n1kv-vsm-domain-id configuration parameter)
- password for the administrator to ssh to the VSM VM (n1kv-vsm-password)
- role which specifies if the VSM will be primary or secondary (n1kv-vsm-role)

For example, you create a myconfig.yaml configuration file with the
following the minimal mandatory information:

vsm-primary:
    n1kv-vsm-domain-id: 101
    n1kv-vsm-password: passw0rd
    n1kv-vsm-name: vsm-p
    n1kv-vsm-role: primary
    n1kv-vsm-mgmt-ip: 10.10.10.10
    n1kv-vsm-mgmt-netmask: 255.255.255.0
    n1kv-vsm-mgmt-gateway: 10.10.10.1
    n1kv-phy-intf-bridge: eth0
    .....

vsm-secondary:
    n1kv-vsm-domain-id: 101
    n1kv-vsm-password: passw0rd
    n1kv-vsm-name: vsm-s
    n1kv-vsm-role: secondary
    n1kv-phy-intf-bridge: eth0
    .....

Check the config.yaml file for default configuration values and other
configurable parameters of the VSM charm.

Then you deploy the primary VSM with the following command:

juju deploy --config myconfig.yaml vsm vsm-primary

Then you deploy the secondary VSM with the following command:

juju deploy --config myconfig.yaml vsm vsm-secondary

To put VEM into VSM supervision, you need to do the following:

juju add-relation vsm vem

Testing

Prior to submit changes to the charm store for this charm you need to run
the automatic testing implemented in the charm.

IMPORTANT Notice that there are some requirements for the VSM charm to
run the testing scripts. Hence, prior to execute them you need to prepare
and environment with the following nodes available for charm testing
deployment:
- A least two nodes
- Nodes need to be physical (not virtual machines)
- Nodes need to had a tag called "physical"

Then you need a YAML file which will be use by the testing suite to verify
the changes you made for the VSM charm. You can reuse the existing file
(myconfig.yaml) used for deployment of the VSM charm or create another one
specific for testing. The testing scripts expects the following parameters:

vsm-primary:
       n1kv-source: ppa:cisco-ppa/vsm
       n1kv-vsm-domain-id: 101
       n1kv-vsm-password: mypassw0rd
       n1kv-vsm-mgmt-ip: 10.10.10.10
       n1kv-vsm-mgmt-netmask: "255.255.255.0
       n1kv-vsm-mgmt-gateway: 10.10.10.1
       n1kv-phy-intf-bridge: eth0

Also, you need to set an environment variable called VSM_AMULET_FILE with
the location and name of the yaml file use for testing.
Example:

export VSM_AMULET_FILE="./amulet.yaml"

Then execute the following command to verify the testing scripts:

make tests

Contact Information

Author: Marga Millet millet@cisco.com
Report bugs at: http://bugs.launchpad.net/charms/+source/vsm
Location
: http://jujucharms.com/

Configuration

n1kv-vsm-domain-id
(int) Domain id this Nexus1000v VSM will control
101
n1kv-local-repo
(string) (Optional) Provide the local address of VSM iso package
n1kv-vsm-console-pts
(int) VSM virtual machine console port
2
n1kv-vsm-ctrl-interface
(string) Control tap interface name for the VSM VM
vsm-ctrl0
n1kv-vsm-mgmt-gateway
(string) (Mandatory) VSM virtual machines management gateway
n1kv-vsm-mgmt-netmask
(string) (Mandatory) VSM virtual machines management netmask
n1kv-vsm-password
(string) (Mandatory) Password of the admin user for the VSM VM
n1kv-vsm-vcpu-pin
(boolean) Indicates if VSM VM will do vcpu pinning
True
n1kv-vsm-disk-size
(int) Disk size (in GB) for the VSM VM
4
n1kv-vsm-mgmt-mac
(string) Mac address of Management interface from VSM. By default is assigned randomly.
n1kv-vsm-vnc-port
(int) VNC port number to of the VSM console
8901
n1kv-source
(string) Additinal sources: ppa:myteam/ppa, deb http://my.archive.com/ubuntu main|KEYID
distro
n1kv-bridge-name
(string) Bridge name behind which the VSM will be attached
br-int
n1kv-vsm-pkt-mac
(string) Mac address of Packet interface from VSM. By default is assigned randomly.
n1kv-vsm-mgmt-interface
(string) Management tap interface name for the VSM VM
vsm-mgmt0
n1kv-version
(string) (Optional) Indicates VSM version. By default picks up the latest
n1kv-vsm-name
(string) Nexus1000v VSM virtual machine (VM) name
vsm-p
n1kv-vsm-memory-size
(int) Memory size (in KiB) for the VSM VM
4
n1kv-vsm-mgmt-ip
(string) (Mandatory) VSM virtual machine management ip address
n1kv-phy-intf-bridge
(string) Physical uplink interface for the bridge
eth0
n1kv-vsm-pkt-interface
(string) Packet tap interface name for the VSM VM
vsm-pkt0
n1kv-vsm-ctrl-mac
(string) Mac address of Control interface from VSM. By default is assigned randomly.
n1kv-vsm-role
(string) Nexus1000v VSMs role - primary or secondary
primary