On 01/14/2014 12:23 AM, Prasad Vellanki wrote:
On Thu, Jan 9, 2014 at 6:14 AM, Steven Dake <sd...@redhat.com
<mailto:sd...@redhat.com>> wrote:
that
Steve
Thanks for detailed email. Apologize for the delayed response but we
have been thinking about how does software config fit into configuring
network and service function devices. I agree with you that in general
it is best to get appliance vendors to put cloudinit into their images
and thus get on board with what every cloud is doing. I thought I
would get some feedback on the direction of Heat for configuring
network devices and appliances.
I am thinking there are few things to consider for configuring Network
and Network Service devices/Virtual Appliances.
Neutron APIs along with the service APIs provide a way to configure
network devices by abstracting the APIs and have a plugin model for
individual devices. These APIs include Neutron core apis, Service API
such as LBaaS, FWaaS, VPNaaS. Though these are currently for physical
devices, there is a movement towards configuring Virtual Appliances
too. These APIs will be addressed via Heat Neutron resources.
While *aaS do address configuring the supported service, they do not
address the bootstrapping of the device. Generally for most devices
bootstrapping is done via rest API and/or SSH. And for unsupported
services that do not have these APIs one needs to use custom way to
configure where Heat can really help. Bootstrapping includes
installing licences, configuring admin password, upgrade software and
some with more than that. For this our thought is it would be great to
have Heat software config/deployment do bootstrapping, upgrade etc.
While I agree long term is to have vendors to implement cloudinit
framework, we were wondering if there is an intermediate solution that
will allow configuration without requiring agent and cloudinit, If
there is enough critical mass behind such a requirement we can have
further discussions on the design and implementation options.
Prasad,
The crux of the problem is how do you obtain critical mass for custom
one-off solutions? Lets assume two possible solutions to this problem
that these vendors could take. If there are more, please feel free to
explain them:
1) Implement a ReST server which the vendor's image talks to ReST server
to obtain bootstrapping information
2) SSH into the machine from an external configuration server process
In both of these cases, these would be one-off solutions for each
particular vendor. Now assume you take this to the natural conclusion
of hundreds of application images - you end up with hundreds of these
daemons to handle all the various application images. What is worse,
they would have to documented, HA-ified, scale-ified, secure-ified, and
deployed. I am doubtful the SSH model would work fitting your
constraints (not modifying the image) since some type of SSH key
injection would need to be done. I further doubt service providers are
really going to want to deal with an extra server in their environment
that is not specifically required for OpenStack unless the value offered
by the cloud application is tremendous. There are enough daemons
already to deal with :)
I get that a whole bunch of different cloud application vendor
bootstrapping tools could be merged into "one" daemon and then this one
master daemon could be documented, HA-ified, scale-ified, secureified,
and deployed. Perhaps there is some sort of financial incentive to make
that happen and maybe someone can make a business out of it but my
personal feeling is it is the wrong approach. If this is the approach
your proposing, it does not fit in with the mission of Heat program
specifically, and TBH I'm not certain your goals fit with an existing
program to "solve" this particular problem.
Frankly, I don't believe there is a intermediate step application
vendors can take here. If they want their images to run in cloud
environments because they are cloud workload applications, they need to
commit to cloudinit. Cloud application vendors need to balance the
position of "We don't want cloudinit because we want our own custom
bootstrapping" with "The entire cloud community has made a decision to
handle bootstrapping with cloudinit". On balance, the cloud application
vendors should follow the lead of the cloud community in general. The
cloud community has chosen cloudinit for a reason - it wasn't some
random act.
Any other option IMNSHO harms the application vendor's SAM, the
OpenStack ecosystem, the architectural clarity of OpenStack and is
detrimental to other cloud environments as well.
In this thread I have seen no rationale for *why* cloudinit can't be
added to cloud vendor's images by the cloud vendor. We just added
heat-cfntools to the RHEL6.5 cloud image, and it cost money to make that
happen, but investment in core engineering is a normal activity of any
technology business. Are there other rationale beyond the investment
expense?
There really is no winner to a custom bootstrapping system, other then
the team who make the custom bootstrapping system and sell/support it
;) Even the application vendor loses because their SAM is reduced to
the number of customers who purchase this special-purpose bootstrapping
service.
When we take on new work with OpenStack, we want everyone to have the
potential to be winners.
Regards
-steve
BTW puppet seems to use similar proxy way to network device
configuration. See link below
https://puppetlabs.com/blog/managing-f5-big-ip-network-devices-with-puppet
thanks
prasadv
_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev