From patchwork Mon Mar 10 14:18:00 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 14010076 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 954EF2236E4 for ; Mon, 10 Mar 2025 14:18:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741616297; cv=none; b=bCmJVMIlT4hVKr0499iiHr89VBo2q1hkX+NrTNMbvxi7mSf/JQlOzOfcxQx3LnQCHeXFrS5p4EUW6YRil0/+qJ4JfTbS53fyP47GRG8LotZUUbOGNH01ziqllwMPJP7or5H2Ht7tBII0gIWCLiSNfR5x8hTyLMORht2CoGecBN0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1741616297; c=relaxed/simple; bh=RrCmPRrYLGxOpF4cRPnqZg36AAWS0rnxhfB1WZVd1yk=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=pNmwdVfWfCZkFRNWfL6UX57FvCdxc1z7eb5cB7ib7HZK3lCtSChUSeqsf/XeY2T/ToLezh7LZuj7oWledh/a121/ixEYkHv9m/c0i7Xv3lQmd8GmcLLBbqYqpr4yK8BZIm7y1SWtjGCxJZKWthUayvZ4Nr0XKG+RZ7mz1hKv8ow= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Eqdh46V+; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Eqdh46V+" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C6702C4CEE5; Mon, 10 Mar 2025 14:18:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1741616296; bh=RrCmPRrYLGxOpF4cRPnqZg36AAWS0rnxhfB1WZVd1yk=; h=From:To:Cc:Subject:Date:From; b=Eqdh46V+VDVXSL7Hn+wIbvyR6mi/ChOkd7YGbi1E+hnKPigd2crGcSRVOOvOAK0RV gtdsLGdgjdp3N7NfWqeqeQAvNbEZGfDHaGR8/kYBgT+5R9Out3mPwh71pJbn23P53Q hLY2i/YxsJhmN7x/3OVlnrZd1QA4w0lJOSxS5mHKwMKvdKgd35mXQJB9HrLc2rsHjy pxgUevocWQxouD1YTJZqO7R2vkaEp/U/d0oh5c3qxxTFF/drtoyTZSKfP9lgIYGISz h4NahYQ8BYg7QOjnmmkU5zXdegYXWSqUZP7t3FneocGzCsBtUatiiij/nBN7kx34fl tryKiClEE1D2Q== From: cel@kernel.org To: Luis Chamberlain , Chandan Babu R , Jeff Layton Cc: , Chuck Lever Subject: [PATCH v1 00/13] Block device provisioning for storage nodes Date: Mon, 10 Mar 2025 10:18:00 -0400 Message-ID: <20250310141813.969325-1-cel@kernel.org> X-Mailer: git-send-email 2.48.1 Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Chuck Lever Hi - Sorry for the length of the series. I'm posting the series as a whole to provide context for each of the individual changes. Feel free to focus on whichever patch or patches in this series are most interesting to you. All review comments are welcome. The high-level goal is to enable testing NFS / SMB / iSCSI with kdevops in the cloud. These workflows are already operational for guestfs. The basic challenge is each cloud provider has a distinct way of provisioning and attaching block devices. This series can be considered in two sections: - the first four patches wrangle the terraform for some of the cloud providers to make them provision a set of extra block volumes, each of the same size, just as guestfs and AWS currently do. - the second half of the series adds a new playbook that: - de-duplicates the scripting that creates an LVM volume group, because three different roles each implement this the same way - replaces the "skip one device" method for determining which extra block volume the /data partition should live on. AWS still needs some work here because NVMe devices can get renamed after every instance reboot - adds LVM support that handles the differences amongst the cloud providers, tucked away in the new playbook GCE and OpenStack are not yet updated, but they are in plan. Chuck Lever (13): terraform/AWS: Upgrade the EBS volume type to "gp3" terraform/Azure: Remove managed_disk_type selection terraform/Azure: Create a set of multiple generic block devices terraform/OCI: Create a set of multiple generic block devices guestfs: Set storage options consistently playbooks: Add a role to create an LVM volume group volume_group: Detect the /data partition directly volume_group: Prepare to support cloud providers volume_group: Create volume group on terraform/AWS nodes volume_group: Create a volume group on Azure nodes volume_group: Create a volume group on GCE nodes volume_group: Create a volume group on OCI nodes volume_group: Create a volume group on OpenStack public clouds kconfigs/Kconfig.iscsi | 22 --- kconfigs/Kconfig.libvirt | 3 + kconfigs/Kconfig.nfsd | 27 +-- kconfigs/Kconfig.smbd | 17 -- playbooks/roles/gen_nodes/defaults/main.yml | 2 +- playbooks/roles/gen_tfvars/defaults/main.yml | 1 - .../templates/azure/terraform.tfvars.j2 | 4 +- .../templates/oci/terraform.tfvars.j2 | 6 + playbooks/roles/iscsi/defaults/main.yml | 2 - playbooks/roles/iscsi/tasks/main.yml | 23 +-- playbooks/roles/iscsi/vars/Debian.yml | 1 - playbooks/roles/iscsi/vars/RedHat.yml | 1 - playbooks/roles/iscsi/vars/Suse.yml | 1 - playbooks/roles/nfsd/defaults/main.yml | 3 - playbooks/roles/nfsd/tasks/main.yml | 21 +-- playbooks/roles/smbd/defaults/main.yml | 3 - playbooks/roles/smbd/tasks/main.yml | 21 +-- playbooks/roles/volume_group/README.md | 42 +++++ .../roles/volume_group/defaults/main.yml | 4 + .../roles/volume_group/tasks/guestfs.yml | 59 ++++++ playbooks/roles/volume_group/tasks/main.yml | 42 +++++ .../volume_group/tasks/terraform/aws.yml | 54 ++++++ .../volume_group/tasks/terraform/azure.yml | 40 +++++ .../volume_group/tasks/terraform/gce.yml | 4 + .../volume_group/tasks/terraform/oci.yml | 38 ++++ .../tasks/terraform/openstack.yml | 4 + scripts/gen-nodes.Makefile | 10 -- scripts/iscsi.Makefile | 2 - scripts/nfsd.Makefile | 2 - scripts/smbd.Makefile | 2 - scripts/terraform.Makefile | 10 +- terraform/aws/main.tf | 3 +- terraform/azure/Kconfig | 168 ++++++++++++++++-- terraform/azure/main.tf | 48 ++--- terraform/azure/managed_disks/main.tf | 20 +++ terraform/azure/managed_disks/vars.tf | 29 +++ terraform/azure/vars.tf | 17 +- terraform/oci/Kconfig | 153 ++++++++++++++++ terraform/oci/main.tf | 28 ++- terraform/oci/vars.tf | 17 ++ 40 files changed, 744 insertions(+), 210 deletions(-) create mode 100644 playbooks/roles/volume_group/README.md create mode 100644 playbooks/roles/volume_group/defaults/main.yml create mode 100644 playbooks/roles/volume_group/tasks/guestfs.yml create mode 100644 playbooks/roles/volume_group/tasks/main.yml create mode 100644 playbooks/roles/volume_group/tasks/terraform/aws.yml create mode 100644 playbooks/roles/volume_group/tasks/terraform/azure.yml create mode 100644 playbooks/roles/volume_group/tasks/terraform/gce.yml create mode 100644 playbooks/roles/volume_group/tasks/terraform/oci.yml create mode 100644 playbooks/roles/volume_group/tasks/terraform/openstack.yml create mode 100644 terraform/azure/managed_disks/main.tf create mode 100644 terraform/azure/managed_disks/vars.tf Reviewed-by: Luis Chamberlain