Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found

Target

Select target project
  • rc/hpc-factory
  • louistw/hpc-factory
  • jpr/hpc-factory
  • krish94/hpc-factory
  • atlurie/hpc-factory
  • dwheel7/hpc-factory
6 results
Show changes
Commits on Source (3)
  • Eesaan Atluri's avatar
    feat: Create multi homed proxy with fixed internal IP · 494f22d8
    Eesaan Atluri authored
    We wanted to create a multi-homed instance connected to proxy-net and
    internal-net because the nfs-mounts are shared via internal net by the server.
    However, the NIC on internal-net wasn’t getting an IP assigned automatically
    and this was creating an issue for NFS server to communicate with the clients.
    So we created a port and assigned that port during instance creation
    494f22d8
  • Eesaan Atluri's avatar
    feat: Replace default gateway to allow login · fa2ce373
    Eesaan Atluri authored
    The instance creation with internal port attached was causing issues
    with login because the default gateway was set to internal network
    gateway. This will only allow login via headnode but not the host.
    This commit will fix that issue by giving a way to define the gw ip
    for default route.
    fa2ce373
  • Eesaan Atluri's avatar
    feat: Remove fixed IP assignment · 56050bcf
    Eesaan Atluri authored
    Avoids error that the IP has already been assigned while trying multiple
    proxy deploys
    56050bcf
...@@ -149,16 +149,23 @@ deploy_http_proxy_node: ...@@ -149,16 +149,23 @@ deploy_http_proxy_node:
cat > user_data.txt <<EOF cat > user_data.txt <<EOF
#!/bin/bash #!/bin/bash
echo "$DEV_KEY" >> /root/.ssh/authorized_keys echo "$DEV_KEY" >> /root/.ssh/authorized_keys
ip route replace default via ${DEFAULT_GATEWAY_IP} dev eth0
git clone ${CI_REPOSITORY_URL} /tmp/${CI_PROJECT_NAME} git clone ${CI_REPOSITORY_URL} /tmp/${CI_PROJECT_NAME}
cd /tmp/${CI_PROJECT_NAME} cd /tmp/${CI_PROJECT_NAME}
git checkout ${CI_COMMIT_REF_NAME} git checkout ${CI_COMMIT_REF_NAME}
ansible-playbook -c local -i 127.0.0.1, ansible/cheaha.yml | tee -a ansible.log ansible-playbook -c local -i 127.0.0.1, ansible/cheaha.yml | tee -a ansible.log
rm -rf /tmp/${CI_PROJECT_NAME} rm -rf /tmp/${CI_PROJECT_NAME}
EOF EOF
- >
export HTTP_PROXY_INSTANCE_PORT=$(openstack port create
-c id -f value --network $INTERNALNET
--disable-port-security
${HTTP_PROXY_INSTANCE_NAME}_internal_port)
- > - >
export HTTP_PROXY_INSTANCE_ID=$(openstack server create export HTTP_PROXY_INSTANCE_ID=$(openstack server create
-c id -f value --image $HTTP_PROXY_IMAGE_ID -c id -f value --image $HTTP_PROXY_IMAGE_ID
--network $PROXY_NETWORK --network $PROXY_NETWORK
--port $HTTP_PROXY_INSTANCE_PORT
--security-group webserver_sec_group --security-group webserver_sec_group
--security-group allow-ssh --security-group allow-ssh
--user-data user_data.txt --user-data user_data.txt
...@@ -190,16 +197,23 @@ deploy_ssh_proxy_node: ...@@ -190,16 +197,23 @@ deploy_ssh_proxy_node:
cat > user_data.txt <<EOF cat > user_data.txt <<EOF
#!/bin/bash #!/bin/bash
echo "$DEV_KEY" >> /root/.ssh/authorized_keys echo "$DEV_KEY" >> /root/.ssh/authorized_keys
ip route replace default via ${DEFAULT_GATEWAY_IP} dev eth0
git clone ${CI_REPOSITORY_URL} /tmp/${CI_PROJECT_NAME} git clone ${CI_REPOSITORY_URL} /tmp/${CI_PROJECT_NAME}
cd /tmp/${CI_PROJECT_NAME} cd /tmp/${CI_PROJECT_NAME}
git checkout ${CI_COMMIT_REF_NAME} git checkout ${CI_COMMIT_REF_NAME}
ansible-playbook -c local -i 127.0.0.1, ansible/cheaha.yml | tee -a ansible.log ansible-playbook -c local -i 127.0.0.1, ansible/cheaha.yml | tee -a ansible.log
rm -rf /tmp/${CI_PROJECT_NAME} rm -rf /tmp/${CI_PROJECT_NAME}
EOF EOF
- >
export SSH_PROXY_INSTANCE_PORT=$(openstack port create
-c id -f value --network $INTERNALNET
--disable-port-security
$SSH_PROXY_INSTANCE_NAME_internal_port)
- > - >
export SSH_PROXY_INSTANCE_ID=$(openstack server create export SSH_PROXY_INSTANCE_ID=$(openstack server create
-c id -f value --image $SSH_PROXY_IMAGE_ID -c id -f value --image $SSH_PROXY_IMAGE_ID
--network $PROXY_NETWORK --network $PROXY_NETWORK
--port $SSH_PROXY_INSTANCE_PORT
--security-group allow-ssh --security-group allow-ssh
--user-data user_data.txt --user-data user_data.txt
--flavor $INSTANCE_FLAVOR --flavor $INSTANCE_FLAVOR
......