2018-04-26 03:57:27 +08:00
|
|
|
---
|
2019-12-07 05:11:51 +08:00
|
|
|
- name: include check_system.yml
|
|
|
|
include_tasks: check_system.yml
|
|
|
|
|
2019-11-07 20:00:21 +08:00
|
|
|
- name: validate repository variables in non-containerized scenario
|
2021-08-05 23:47:10 +08:00
|
|
|
include_tasks: check_repository.yml
|
2019-11-07 20:00:21 +08:00
|
|
|
when: not containerized_deployment | bool
|
2019-10-11 23:42:36 +08:00
|
|
|
|
|
|
|
- name: validate osd_objectstore
|
|
|
|
fail:
|
|
|
|
msg: "osd_objectstore must be either 'bluestore' or 'filestore'"
|
|
|
|
when: osd_objectstore not in ['bluestore', 'filestore']
|
|
|
|
|
|
|
|
- name: validate monitor network configuration
|
|
|
|
fail:
|
|
|
|
msg: "Either monitor_address, monitor_address_block or monitor_interface must be provided"
|
|
|
|
when:
|
|
|
|
- mon_group_name in group_names
|
2019-12-10 01:23:15 +08:00
|
|
|
- monitor_address == 'x.x.x.x'
|
2019-10-11 23:42:36 +08:00
|
|
|
- monitor_address_block == 'subnet'
|
|
|
|
- monitor_interface == 'interface'
|
|
|
|
|
|
|
|
- name: validate radosgw network configuration
|
|
|
|
fail:
|
|
|
|
msg: "Either radosgw_address, radosgw_address_block or radosgw_interface must be provided"
|
|
|
|
when:
|
|
|
|
- rgw_group_name in group_names
|
2019-12-10 01:23:15 +08:00
|
|
|
- radosgw_address == 'x.x.x.x'
|
2019-10-11 23:42:36 +08:00
|
|
|
- radosgw_address_block == 'subnet'
|
|
|
|
- radosgw_interface == 'interface'
|
|
|
|
|
|
|
|
- name: validate osd nodes
|
|
|
|
when: osd_group_name in group_names
|
|
|
|
block:
|
|
|
|
- name: validate lvm osd scenario
|
|
|
|
fail:
|
|
|
|
msg: 'devices or lvm_volumes must be defined for lvm osd scenario'
|
|
|
|
when:
|
|
|
|
- not osd_auto_discovery | default(false) | bool
|
|
|
|
- devices is undefined
|
|
|
|
- lvm_volumes is undefined
|
|
|
|
|
|
|
|
- name: validate filestore lvm osd scenario
|
|
|
|
fail:
|
|
|
|
msg: 'data and journal keys must be defined in lvm_volumes'
|
|
|
|
when:
|
|
|
|
- osd_objectstore == 'filestore'
|
|
|
|
- not osd_auto_discovery | default(false) | bool
|
|
|
|
- lvm_volumes is defined
|
|
|
|
- lvm_volumes | length > 0
|
|
|
|
- item.data is undefined or item.journal is undefined
|
|
|
|
with_items: '{{ lvm_volumes }}'
|
|
|
|
|
|
|
|
- name: validate bluestore lvm osd scenario
|
|
|
|
fail:
|
|
|
|
msg: 'data key must be defined in lvm_volumes'
|
|
|
|
when:
|
|
|
|
- osd_objectstore == 'bluestore'
|
|
|
|
- not osd_auto_discovery | default(false) | bool
|
|
|
|
- lvm_volumes is defined
|
|
|
|
- lvm_volumes | length > 0
|
|
|
|
- item.data is undefined
|
|
|
|
with_items: '{{ lvm_volumes }}'
|
2018-04-26 03:59:54 +08:00
|
|
|
|
2018-09-07 20:45:43 +08:00
|
|
|
- name: debian based systems tasks
|
2021-03-03 22:43:50 +08:00
|
|
|
when: ansible_facts['os_family'] == 'Debian'
|
2018-09-07 20:45:43 +08:00
|
|
|
block:
|
|
|
|
- name: fail if local scenario is enabled on debian
|
|
|
|
fail:
|
|
|
|
msg: "'local' installation scenario not supported on Debian systems"
|
2019-04-01 23:46:15 +08:00
|
|
|
when: ceph_origin == 'local'
|
2020-03-27 05:39:09 +08:00
|
|
|
|
|
|
|
- name: fail if rhcs repository is enabled on debian
|
2018-09-07 20:45:43 +08:00
|
|
|
fail:
|
2020-03-27 05:39:09 +08:00
|
|
|
msg: "RHCS isn't supported anymore on Debian distribution"
|
2018-09-07 20:45:43 +08:00
|
|
|
when:
|
|
|
|
- ceph_origin == 'repository'
|
|
|
|
- ceph_repository == 'rhcs'
|
2018-04-27 00:15:02 +08:00
|
|
|
|
2019-08-22 02:56:36 +08:00
|
|
|
# SUSE/openSUSE Leap only supports the following:
|
|
|
|
# - ceph_origin == 'distro'
|
|
|
|
# - ceph_origin == 'repository' and ceph_repository == 'obs'
|
|
|
|
- name: SUSE/openSUSE Leap based system tasks
|
2021-03-03 22:43:50 +08:00
|
|
|
when: ansible_facts['os_family'] == 'Suse'
|
2019-08-22 02:56:36 +08:00
|
|
|
block:
|
|
|
|
- name: Check ceph_origin definition on SUSE/openSUSE Leap
|
|
|
|
fail:
|
|
|
|
msg: "Unsupported installation method origin:{{ ceph_origin }}"
|
|
|
|
when: ceph_origin not in ['distro', 'repository']
|
|
|
|
|
|
|
|
- name: Check ceph_repository definition on SUSE/openSUSE Leap
|
|
|
|
fail:
|
|
|
|
msg: "Unsupported installation method origin:{{ ceph_origin }} repo:{{ ceph_repository }}'
|
|
|
|
only valid combination is ceph_origin == 'repository' and ceph_repository == 'obs'"
|
|
|
|
when:
|
|
|
|
- ceph_origin == 'repository'
|
|
|
|
- ceph_repository != 'obs'
|
|
|
|
|
2018-09-06 00:59:50 +08:00
|
|
|
- name: validate ntp daemon type
|
|
|
|
fail:
|
|
|
|
msg: "ntp_daemon_type must be one of chronyd, ntpd, or timesyncd"
|
|
|
|
when:
|
2019-05-22 16:02:42 +08:00
|
|
|
- ntp_service_enabled | bool
|
2018-09-06 00:59:50 +08:00
|
|
|
- ntp_daemon_type not in ['chronyd', 'ntpd', 'timesyncd']
|
|
|
|
|
2019-02-05 17:26:03 +08:00
|
|
|
# Since NTPd can not be installed on Atomic...
|
2019-02-12 14:55:13 +08:00
|
|
|
- name: abort if ntp_daemon_type is ntpd on Atomic
|
2019-02-05 17:26:03 +08:00
|
|
|
fail:
|
|
|
|
msg: installation can't happen on Atomic and ntpd needs to be installed
|
|
|
|
when:
|
2019-05-22 16:02:42 +08:00
|
|
|
- is_atomic | default(False) | bool
|
2021-03-03 22:43:50 +08:00
|
|
|
- ansible_facts['os_family'] == 'RedHat'
|
2019-02-05 17:26:03 +08:00
|
|
|
- ntp_daemon_type == 'ntpd'
|
|
|
|
|
2018-04-26 23:09:47 +08:00
|
|
|
- name: make sure journal_size configured
|
|
|
|
debug:
|
|
|
|
msg: "WARNING: journal_size is configured to {{ journal_size }}, which is less than 5GB. This is not recommended and can lead to severe issues."
|
|
|
|
when:
|
|
|
|
- journal_size|int < 5120
|
|
|
|
- osd_objectstore == 'filestore'
|
|
|
|
- osd_group_name in group_names
|
|
|
|
|
2018-07-18 21:59:22 +08:00
|
|
|
- name: include check_devices.yml
|
2018-08-21 22:23:35 +08:00
|
|
|
include_tasks: check_devices.yml
|
2018-07-18 23:46:27 +08:00
|
|
|
when:
|
|
|
|
- osd_group_name in group_names
|
2019-05-22 16:02:42 +08:00
|
|
|
- not osd_auto_discovery | default(False) | bool
|
2018-07-23 22:02:43 +08:00
|
|
|
|
|
|
|
- name: include check_eth_mon.yml
|
2018-08-21 22:23:35 +08:00
|
|
|
include_tasks: check_eth_mon.yml
|
2018-07-23 22:02:43 +08:00
|
|
|
when:
|
|
|
|
- mon_group_name in group_names
|
|
|
|
- monitor_interface != "dummy"
|
2019-12-10 01:23:15 +08:00
|
|
|
- monitor_address == "x.x.x.x"
|
2018-07-23 22:02:43 +08:00
|
|
|
- monitor_address_block == "subnet"
|
|
|
|
|
2019-03-15 04:22:01 +08:00
|
|
|
- name: include check_ipaddr_mon.yml
|
|
|
|
include_tasks: check_ipaddr_mon.yml
|
|
|
|
when:
|
|
|
|
- mon_group_name in group_names
|
|
|
|
- monitor_interface == "interface"
|
2019-12-10 01:23:15 +08:00
|
|
|
- monitor_address == "x.x.x.x"
|
2019-03-15 04:22:01 +08:00
|
|
|
- monitor_address_block != "subnet"
|
|
|
|
|
2018-07-23 22:02:43 +08:00
|
|
|
- name: include check_eth_rgw.yml
|
2018-08-21 22:23:35 +08:00
|
|
|
include_tasks: check_eth_rgw.yml
|
2018-07-23 22:02:43 +08:00
|
|
|
when:
|
|
|
|
- rgw_group_name in group_names
|
|
|
|
- radosgw_interface != "dummy"
|
2019-12-10 01:23:15 +08:00
|
|
|
- radosgw_address == "x.x.x.x"
|
2018-08-04 00:15:58 +08:00
|
|
|
- radosgw_address_block == "subnet"
|
2018-09-29 05:23:10 +08:00
|
|
|
|
2019-09-11 06:01:48 +08:00
|
|
|
- name: include check_rgw_pools.yml
|
|
|
|
include_tasks: check_rgw_pools.yml
|
|
|
|
when:
|
|
|
|
- inventory_hostname in groups.get(rgw_group_name, [])
|
|
|
|
- rgw_create_pools is defined
|
|
|
|
|
2018-10-26 22:39:56 +08:00
|
|
|
- name: include check_rgw_multisite.yml
|
|
|
|
include_tasks: check_rgw_multisite.yml
|
2018-10-30 22:01:46 +08:00
|
|
|
when:
|
2018-10-26 22:39:56 +08:00
|
|
|
- inventory_hostname in groups.get(rgw_group_name, [])
|
2019-05-22 16:02:42 +08:00
|
|
|
- rgw_multisite | bool
|
2018-10-26 22:39:56 +08:00
|
|
|
|
2018-09-29 05:23:10 +08:00
|
|
|
- name: include check_iscsi.yml
|
2018-10-04 16:02:24 +08:00
|
|
|
include_tasks: check_iscsi.yml
|
2019-04-01 23:46:15 +08:00
|
|
|
when: iscsi_gw_group_name in group_names
|
2019-02-26 22:16:37 +08:00
|
|
|
|
2019-05-20 22:28:42 +08:00
|
|
|
- name: include check_nfs.yml
|
|
|
|
include_tasks: check_nfs.yml
|
|
|
|
when: inventory_hostname in groups.get(nfs_group_name, [])
|
2019-07-29 16:03:48 +08:00
|
|
|
|
2019-11-06 00:53:22 +08:00
|
|
|
- name: include check_rbdmirror.yml
|
|
|
|
include_tasks: check_rbdmirror.yml
|
|
|
|
when:
|
|
|
|
- rbdmirror_group_name in group_names
|
|
|
|
- ceph_rbd_mirror_configure | default(false) | bool
|
|
|
|
|
2019-07-29 16:03:48 +08:00
|
|
|
- block:
|
2020-07-25 06:05:41 +08:00
|
|
|
- name: fail if monitoring group doesn't exist
|
2019-07-29 16:03:48 +08:00
|
|
|
fail:
|
2020-07-25 06:05:41 +08:00
|
|
|
msg: "you must add a monitoring group and add at least one node."
|
|
|
|
when: groups[monitoring_group_name] is undefined
|
2019-07-29 16:03:48 +08:00
|
|
|
|
2020-07-25 06:05:41 +08:00
|
|
|
- name: fail when monitoring doesn't contain at least one node.
|
2019-07-29 16:03:48 +08:00
|
|
|
fail:
|
2020-07-25 06:05:41 +08:00
|
|
|
msg: "you must add at least one node in the monitoring hosts group"
|
|
|
|
when: groups[monitoring_group_name] | length < 1
|
2020-01-28 20:55:54 +08:00
|
|
|
|
|
|
|
- name: fail when dashboard_admin_password and/or grafana_admin_password are not set
|
|
|
|
fail:
|
|
|
|
msg: "you must set dashboard_admin_password and grafana_admin_password."
|
|
|
|
when:
|
|
|
|
- dashboard_admin_password is undefined
|
|
|
|
or grafana_admin_password is undefined
|
2019-08-22 02:56:36 +08:00
|
|
|
when: dashboard_enabled | bool
|
2019-09-11 03:33:44 +08:00
|
|
|
|
|
|
|
- name: validate container registry credentials
|
|
|
|
fail:
|
|
|
|
msg: 'ceph_docker_registry_username and/or ceph_docker_registry_password variables need to be set'
|
|
|
|
when:
|
|
|
|
- ceph_docker_registry_auth | bool
|
2019-10-21 23:09:31 +08:00
|
|
|
- (ceph_docker_registry_username is not defined or ceph_docker_registry_password is not defined) or
|
|
|
|
(ceph_docker_registry_username | length == 0 or ceph_docker_registry_password | length == 0)
|
2020-02-28 22:42:44 +08:00
|
|
|
|
2021-08-05 19:03:55 +08:00
|
|
|
- name: validate container service and container package
|
|
|
|
fail:
|
|
|
|
msg: 'both container_package_name and container_service_name should be defined'
|
|
|
|
when:
|
|
|
|
- (container_package_name is undefined and container_service_name is defined) or
|
|
|
|
(container_package_name is defined and container_service_name is undefined)
|
|
|
|
|
2020-02-28 22:42:44 +08:00
|
|
|
- name: validate openstack_keys key format
|
|
|
|
fail:
|
|
|
|
msg: '{{ item.name }} key format invalid'
|
|
|
|
with_items: '{{ openstack_keys }}'
|
|
|
|
when:
|
|
|
|
- osd_group_name in group_names
|
|
|
|
- openstack_keys is defined
|
|
|
|
- openstack_keys | length > 0
|
|
|
|
- item.key is defined
|
|
|
|
- item.key is not match("^[a-zA-Z0-9+/]{38}==$")
|
|
|
|
|
|
|
|
- name: validate clients keys key format
|
|
|
|
fail:
|
|
|
|
msg: '{{ item.name }} key format invalid'
|
|
|
|
with_items: '{{ keys }}'
|
|
|
|
when:
|
|
|
|
- client_group_name in group_names
|
|
|
|
- keys is defined
|
|
|
|
- keys | length > 0
|
|
|
|
- item.key is defined
|
|
|
|
- item.key is not match("^[a-zA-Z0-9+/]{38}==$")
|
2020-10-05 23:16:44 +08:00
|
|
|
|
|
|
|
- name: validate openstack_keys caps
|
|
|
|
fail:
|
|
|
|
msg: '{{ item.name }} key has no caps defined'
|
|
|
|
with_items: '{{ openstack_keys }}'
|
|
|
|
when:
|
|
|
|
- osd_group_name in group_names
|
|
|
|
- openstack_keys is defined
|
|
|
|
- openstack_keys | length > 0
|
|
|
|
- item.caps is not defined
|
|
|
|
|
|
|
|
- name: validate clients keys caps
|
|
|
|
fail:
|
|
|
|
msg: '{{ item.name }} key has no caps defined'
|
|
|
|
with_items: '{{ keys }}'
|
|
|
|
when:
|
|
|
|
- client_group_name in group_names
|
|
|
|
- keys is defined
|
|
|
|
- keys | length > 0
|
|
|
|
- item.caps is not defined
|
2021-01-11 17:06:08 +08:00
|
|
|
|
|
|
|
- name: check virtual_ips is defined
|
|
|
|
fail:
|
|
|
|
msg: "virtual_ips is not defined."
|
|
|
|
when:
|
|
|
|
- rgwloadbalancer_group_name in group_names
|
|
|
|
- groups[rgwloadbalancer_group_name] | length > 0
|
|
|
|
- virtual_ips is not defined
|
|
|
|
|
|
|
|
- name: validate virtual_ips length
|
|
|
|
fail:
|
|
|
|
msg: "There are more virual_ips defined than rgwloadbalancer nodes"
|
|
|
|
when:
|
|
|
|
- rgwloadbalancer_group_name in group_names
|
|
|
|
- (virtual_ips | length) > (groups[rgwloadbalancer_group_name] | length)
|