This chart deploys the various metal-toolbox/hollow services in docker KIND for development and testing.
- FleetDB with the CrDB backend.
- Conditionorc
- Alloy
- Flasher
- Flipflop
- NATS Jetstream and K/V
- Chaos mesh
The mctl utility can be used to interact with the various services running in the sandbox.
To understand more about the firmware install and how these services interact, check out the firmware install architecture doc.
- Install docker. Test with
docker run hello-world
- Install docker KIND
go install sigs.k8s.io/[email protected]
- Setup a local KIND cluster with a registry using the script here:
./kind-with-registry.sh
(from https://kind.sigs.k8s.io/docs/user/local-registry/) - Export
KUBECONFIG=~/.kube/config_kind
- Docker images for FleetDB, Conditionorc, Alloy
- Install mctl and use the configuration from here
- Install yq. (MacOS:
brew install yq
; Linux:snap install yq
)
Clone each of the repositories and run make push-image-devel
This will build and push the container images to the local container registry.
To point to local services/repositories, check out this.
If you checkouted the sandbox beside the other projects, go into the sandbox directory and run:
for i in fleetdb flasher alloy conditionorc flipflop ; do (cd ../${i}/ && make push-image-devel) ; done
Deploys the helm chart and bootstrap the NATS Jetstream, K/V store.
make install
To run set conditions on a server, they need to be enlisted in the sandbox Serverservice
.
Note: this assumes the KIND environment on your machine can connect to server BMC IPs.
- Make sure the
FleetDB
andCrDB
pods are running. - In separate terminals, run
make port-forward-fleetdb
,make port-forward-conditionorc-api
. - Import a server using
mctl
()
./mctl create server \
--bmc-addr 192.168.1.1 \
--bmc-user root \
--bmc-pass hunter2 \
--server ede81024-f62a-4288-8730-3fab8cceabcc \
--facility sandbox
2024/03/06 10:13:57 status=200
msg=condition set
conditionID=fccf1b78-c073-4897-96bd-8c03bc3bc807
serverID=ede81024-f62a-4288-8730-3fab8cceabcc
Importing a server with the mctl create server
command by default triggers an
inventory collection.
To collect inventory on demand, run
mctl collect inventory --server ede81024-f62a-4288-8730-3fab8cceabcc
Inventory collection status can be checked with,
mctl collect status --server ede81024-f62a-4288-8730-3fab8cceabcc
Inventory for a server can be listed with,
❯ ./mctl get server -s ede81024-f62a-4288-8730-3fab8cceab78 --list-components --table
+-------------------+---------+--------------------------------+------------------+-------------+--------+---------------+
| COMPONENT | VENDOR | MODEL | SERIAL | FW | STATUS | REPORTED |
+-------------------+---------+--------------------------------+------------------+-------------+--------+---------------+
| bios | - | - | 0 | 2.13.3 | - | 4 minutes ago |
| bmc | dell | PowerEdge R6515 | 0 | 6.10.30.20 | - | 4 minutes ago |
| cpld | - | - | 0 | 1.0.7 | - | 4 minutes ago |
| cpu | amd | AMD EPYC 7443P 24-Core | 0 | 0xA0011D1 | - | 4 minutes ago |
| | | Processor | | | | |
| drive | intel | SSDSCKKB240G8R | PHYH12430FOO | DL6R | - | 4 minutes ago |
| drive | samsung | MZ7LH480HBHQ0D3 | S5YJNA0R8BAR | HG58 | - | 4 minutes ago |
Power off server
❯ mctl power --server ede81024-f62a-4288-8730-3fab8cceab78 --action off
Check action status
mctl power --server ede81024-f62a-4288-8730-3fab8cceab78 --action-status | jq .status
{
"msg": "server power state set successful: off"
}
Note: replace ARTIFACTS_ENDPOINT
in firmwares.json with endpoint serving the firmware files.
Import firmware defs from sample file using mctl
.
mctl create firmware --from-file ./scripts/mctl/firmwares.json
List the firmware using mctl list firmware
and create a set that can be applied to a server.
mctl create firmware-set --firmware-ids 5e574c96-6ba4-4078-9650-c52a64cc8cba,a7e86975-11a4-433d-9170-af53fcfc79bd \
--labels vendor=dell,model=r6515,latest=true \
--name r6515
With the server added, you can now get flasher to set a firmwareInstall
condition,
make port-forward-conditionorc-api
mctl install firmware-set --server ede81024-f62a-4288-8730-3fab8cceabcc
Check condition status
mctl install status --server ede81024-f62a-4288-8730-3fab8cceabcc
To upgrade the helm install after changes to the templates,
make upgrade
To uninstall the helm chart
make clean
The chart configures a NATS Jetstream that Orchestrator and the controllers sends messages on, the NATS Jetstream configuration is specified in values.yaml.
Check out the cheatsheet to validate the Jetstream setup.
The utility exposes a cool dashboard to run chaos experiments like dropping packets from one app to another or such.
Install chaos mesh
helm install chaos-mesh chaos-mesh/chaos-mesh -n=default --version 2.5.1 -f values.yaml
forward the dashboard port and run an experiment ! http://localhost:2333/experiments
make port-forward-chaos-dash
Uninstall chaos mesh
helm delete chaos-mesh -n=default
A test environment for firmware-syncer can be deployed post installation.
Check out the setup guide for more information.
To enable the fleet-scheduler service, follow the steps in the notes.
To ensure the sandbox is self contained, make sure to update the helm chart depdendencies when there are new dependencies in the templates.
Update helm dependencies - this will fetch the dependency chart as a tarball
helm dependency update
Git add in the new chart tarball, and PR changes.
git add charts/prometheus-pushgateway-2.7.1.tgz
❯ make
Usage:
make <target>
Targets:
install install helm chart for the sandbox env
upgrade upgrade helm chart for the sandbox environment
clean uninstall helm chart
port-forward-conditionorc-api port forward condition orchestrator API (runs in foreground)
port-forward-alloy-pprof port forward condition Alloy pprof endpoint (runs in foreground)
port-forward-hss port forward hollow server service port (runs in foreground)
port-forward-crdb port forward crdb service port (runs in foreground)
port-forward-chaos-dash port forward chaos-mesh dashboard (runs in foreground)
port-forward-jaeger-dash port forward jaeger frontend
port-forward-minio port forward to the minio S3 port
firmware-syncer-env install extra services used to test firmware-syncer
firmware-syncer-env-clean Remove extra services installed for firmware-syncer testing
firmware-syncer-job create a firmware-syncer job
firmware-syncer-job-clean remove the firmware-syncer job
psql-crdb connect to crdb with psql (requires port-forward-crdb)
clean-nats purge nats app and storage pvcs
kubectl-ctx-kind set kube ctx to kind cluster
help Show help