| |
| .. highlight:: yaml |
| |
| Examples |
| ======== |
| |
| Example I |
| --------- |
| |
| This example will show how to use most of the types in this plugin, |
| as well as how to make the relationships between them. |
| |
| We'll see how to create a server with a security group set on it and a floating_ip associated to it, |
| on a subnet in a network. |
| |
| |
| The following is an excerpt from the blueprint's `blueprint`.`nodes` section:: |
| |
| my_floating_ip: |
| type: cloudify.openstack.nodes.FloatingIP |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| floating_network_name: Ext-Net |
| |
| |
| my_network: |
| type: cloudify.openstack.nodes.Network |
| properties: |
| resource_id: my_network_openstack_name |
| |
| |
| my_subnet: |
| type: cloudify.openstack.nodes.Subnet |
| properties: |
| resource_id: my_subnet_openstack_name |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| cidr: 1.2.3.0/24 |
| ip_version: 4 |
| cloudify.interfaces.validation: |
| creation: |
| inputs: |
| args: |
| cidr: 1.2.3.0/24 |
| ip_version: 4 |
| relationships: |
| - target: my_network |
| type: cloudify.relationships.contained_in |
| |
| |
| my_security_group: |
| type: cloudify.openstack.nodes.SecurityGroup |
| properties: |
| resource_id: my_security_group_openstack_name |
| rules: |
| - remote_ip_prefix: 0.0.0.0/0 |
| port: 8080 |
| |
| |
| my_server: |
| type: cloudify.openstack.nodes.Server |
| properties: |
| resource_id: my_server_openstack_name |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| cloudify.interfaces.validation: |
| creation: |
| inputs: |
| args: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| relationships: |
| - target: my_network |
| type: cloudify.relationships.connected_to |
| - target: my_subnet |
| type: cloudify.relationships.depends_on |
| - target: my_floating_ip |
| type: cloudify.openstack.server_connected_to_floating_ip |
| - target: my_security_group |
| type: cloudify.openstack.server_connected_to_security_group |
| |
| |
| 1. Creates a floating IP, whose node name is ``my_floating_ip``, and whose floating_network_name is ``Ext-Net`` (This value represents the name of the external network). |
| 2. Creates a network, whose node name is ``my_network``, and whose name on Openstack is ``my_network_openstack_name``. |
| 3. Creates a subnet, whose node name is ``my_subnet``, and whose name on Openstack is ``my_subnet_openstack_name``. The subnet's address range is defined to be 1.2.3.0 - 1.2.3.255 using the ``cidr`` parameter, and the subnet's IP version is set to version 4. The subnet will be set on the ``my_network_openstack_name`` network because of the relationship to the ``my_network`` node. |
| 4. Creates a security_group, whose node name is ``my_security_group``, and whose name on Openstack is ``my_security_group_openstack_Name``. The security group is set with a single rule, which allows all traffic (since we use the address range ``0.0.0.0/0``) to port ``8080`` (default direction is *ingress*). |
| 5. Creates a server, whose node name is ``my_server``, and whose name on openstack is ``my_server_openstack_name``. The server is set with an image and flavor IDs. The server is set with multiple relationships: |
| |
| - A relationship to the ``my_network`` node: Through this relationship, |
| the server will be automatically placed on the ``my_network_openstack_name`` network. |
| - A relationship to the ``my_subnet`` node: |
| This relationship is strictly for ensuring the order of creation is correct, |
| as the server requires the ``my_subnet_openstack_name`` subnet to exist before it can be created on it. |
| - A relationship to the ``my_floating_ip`` node: |
| This designated relationship type will take care of associating the server with the floating IP represented by the ``my_floating_ip`` node. |
| - A relationship with the ``my_security_group`` node: |
| This relationship will take care of setting the server up with the security group represented by the ``my_security_group`` node. |
| |
| |
| Example II |
| ---------- |
| |
| This example will show how to use the ``router`` and ``port`` types, as well as some of the relationships that were missing from Example I. |
| |
| We'll see how to create a server connected to a port, where the port is set on a subnet in a network, and has a security group set on it. Finally, we'll see how this subnet connects to a router and from there to the external network. |
| |
| |
| The following is an excerpt from the blueprint's ``blueprint``.``node_templates`` section:: |
| |
| my_network: |
| type: cloudify.openstack.nodes.Network |
| properties: |
| resource_id: my_network_openstack_name |
| |
| |
| my_security_group: |
| type: cloudify.openstack.nodes.SecurityGroup |
| properties: |
| resource_id: my_security_group_openstack_name |
| rules: |
| - remote_ip_prefix: 0.0.0.0/0 |
| port: 8080 |
| |
| |
| my_subnet: |
| type: cloudify.openstack.nodes.Subnet |
| properties: |
| resource_id: my_subnet_openstack_name |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| cidr: 1.2.3.0/24 |
| ip_version: 4 |
| cloudify.interfaces.validation: |
| creation: |
| inputs: |
| args: |
| cidr: 1.2.3.0/24 |
| ip_version: 4 |
| relationships: |
| - target: my_network |
| type: cloudify.relationships.contained_in |
| - target: my_router |
| type: cloudify.openstack.subnet_connected_to_router |
| |
| |
| my_port: |
| type: cloudify.openstack.nodes.Port |
| properties: |
| resource_id: my_port_openstack_name |
| relationships: |
| - target: my_network |
| type: cloudify.relationships.contained_in |
| - target: my_subnet |
| type: cloudify.relationships.depends_on |
| - target: my_security_group |
| type: cloudify.openstack.port_connected_to_security_group |
| |
| |
| my_router: |
| type: cloudify.openstack.nodes.Router |
| properties: |
| resource_id: my_router_openstack_Name |
| |
| |
| my_server: |
| type: cloudify.openstack.nodes.Server |
| properties: |
| cloudify_agent: |
| user: ubuntu |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| cloudify.interfaces.validation: |
| creation: |
| inputs: |
| args: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| relationships: |
| - target: my_port |
| type: cloudify.openstack.server_connected_to_port |
| |
| |
| 1. Creates a network. See Example I for more information. |
| |
| 2. Creates a security group. See Example I for more information. |
| |
| 3. Creates a subnet. This is again similar to what we've done in Example I. The difference here is that the subnet has an extra relationship set towards a router. |
| |
| 4. Creates a port, whose node name is ``my_port``, and whose name on Openstack is ``my_port_openstack_name``. The port is set with multiple relationships: |
| |
| - A relationship to the ``my_network`` node: Through this relationship, the port will be automatically placed on the ``my_network_openstack_name`` network. |
| - A relationship to the ``my_subnet`` node: This relationship is strictly for ensuring the order of creation is correct, as the port requires the ``my_subnet_openstack_name`` subnet to exist before it can be created on it. |
| - A relationship to the ``my_security_group`` node: This designated relationship type will take care of setting the ``my_security_group_openstack_name`` security group on the port. |
| |
| 5. Creates a router, whose node name is ``my_router``, and whose name on Openstack is ``my_router_openstack_name``. The router will automatically have an interface in the external network. |
| |
| 6. Creates a server, whose node name is ``my_server``, and whose name on Openstack is **the node's ID** (since no ``name`` parameter was supplied under the ``server`` property). The server is set with an image and flavor IDs. It also overrides the ``cloudify_agent`` property of its parent type to set the username that will be used to connect to the server for installing the Cloudify agent on it. Finally, it is set with a relationship to the ``my_port`` node: This designated relationship type will take care of connecting the server to ``my_port_openstack_name``. |
| |
| |
| Example III |
| ----------- |
| |
| This example will show how to use the ``volume`` type, as well as ``volume_attached_to_server`` relationship. |
| |
| The following is an excerpt from the blueprint's ``blueprint``.``node_templates`` section:: |
| |
| my_server: |
| type: cloudify.openstack.nodes.Server |
| properties: |
| cloudify_agent: |
| user: ubuntu |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| cloudify.interfaces.validation: |
| creation: |
| inputs: |
| args: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| |
| my_volume: |
| type: cloudify.openstack.nodes.Volume |
| properties: |
| resource_id: my_openstack_volume_name |
| device_name: /dev/vdb |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| size: 1 |
| relationships: |
| - target: my_server |
| type: cloudify.openstack.volume_attached_to_server |
| |
| |
| 1. Creates a server, with name ``my_server``, and with name on Openstack **the node's ID** (since no ``name`` parameter was supplied under the ``server`` property). The server is set with an image and flavor IDs. |
| 2. Creates a volume. It is set with a relationship to the ``my_server`` node: This designated relationship type will take care of attaching the volume to Openstack server node. |
| |
| |
| |
| Example IV |
| ---------- |
| |
| This example will show how to use a Windows server with a Cloudify agent on it. |
| |
| |
| The following is an excerpt from the blueprint's ``blueprint``.``node_templates`` section:: |
| |
| my_keypair: |
| type: cloudify.openstack.nodes.KeyPair |
| properties: |
| private_key_path: /tmp/windows-test.pem |
| |
| my_server: |
| type: cloudify.openstack.nodes.WindowsServer |
| relationships: |
| - type: cloudify.openstack.server_connected_to_keypair |
| target: keypair |
| interfaces: |
| cloudify.interfaces.lifecycle: |
| create: |
| inputs: |
| args: |
| server: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| name: my-server |
| userdata: | |
| #ps1_sysnative |
| winrm quickconfig -q |
| winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="300"}' |
| winrm set winrm/config '@{MaxTimeoutms="1800000"}' |
| winrm set winrm/config/service '@{AllowUnencrypted="true"}' |
| winrm set winrm/config/service/auth '@{Basic="true"}' |
| &netsh advfirewall firewall add rule name="WinRM 5985" protocol=TCP dir=in localport=5985 action=allow |
| &netsh advfirewall firewall add rule name="WinRM 5986" protocol=TCP dir=in localport=5986 action=allow |
| |
| msiexec /i https://www.python.org/ftp/python/2.7.6/python-2.7.6.msi TARGETDIR=C:\Python27 ALLUSERS=1 /qn |
| cloudify.interfaces.validation: |
| creation: |
| inputs: |
| args: |
| server: |
| image: 8672f4c6-e33d-46f5-b6d8-ebbeba12fa02 |
| flavor: 101 |
| name: my-server |
| userdata: | |
| #ps1_sysnative |
| winrm quickconfig -q |
| winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="300"}' |
| winrm set winrm/config '@{MaxTimeoutms="1800000"}' |
| winrm set winrm/config/service '@{AllowUnencrypted="true"}' |
| winrm set winrm/config/service/auth '@{Basic="true"}' |
| &netsh advfirewall firewall add rule name="WinRM 5985" protocol=TCP dir=in localport=5985 action=allow |
| &netsh advfirewall firewall add rule name="WinRM 5986" protocol=TCP dir=in localport=5986 action=allow |
| |
| msiexec /i https://www.python.org/ftp/python/2.7.6/python-2.7.6.msi TARGETDIR=C:\Python27 ALLUSERS=1 /qn |
| cloudify.interfaces.worker_installer: |
| install: |
| inputs: |
| cloudify_agent: |
| user: Admin |
| password: { get_attribute: [SELF, password] } |
| |
| |
| 1. Creates a keypair. the private key will be saved under ``/tmp/windows-test.pem``. |
| 2. Creates a Windows server: |
| |
| * It is set with a relationship to the ``my_keypair`` node, which will make the server use the it as a public key for authentication, and also use this public key to encrypt its password before posting it to the Openstack metadata service. |
| * The worker-installer interface operations are given values for the user and password for the ``cloudify_agent`` input - the password uses the [get_attribute]({{< relref "blueprints/spec-intrinsic-functions.md#get-attribute" >}}) feature to retrieve the decrypted password from the Server's runtime properties (Note that in this example, only the ``install`` operation was given with this input, but all of the worker installer operations as well as the plugin installer operations should be given with it). |
| * We define custom userdata which configures WinRM and installs Python on the machine (Windows Server 2012 in this example) once it's up. This is required for the Cloudify agent to be installed on the machine. |
| |
| |