Ignition user_data breaks openstack VM

222 views
Skip to first unread message

vincent.g...@gmail.com

unread,
Jul 25, 2017, 12:10:23 PM7/25/17
to CoreOS User
Hi all,
I am willing to use container linux on openstack but I cannot inject an Ignition file in user_data without breaking the VM. I have tried with 2 different cloud providers based on Openstack (Cloudwatt and Huawei FusionSphere) and get the same behavior.
Here is my detailed issue:

If I put this configuration in the user_data field of my Openstack VM, I cannot log in anymore with the private SSH key, the VM is asking for a password...


{

    "ignition": {

      "version": "2.0.0",

      "config": {}

    },

    "storage": {},

    "systemd": {

      "units": [

        {

          "name": "docker.service",

          "enable": true,

          "dropins": [

            {

              "name": "10-dockeropts.conf",

              "contents": "[Service]\nEnvironment=\"DOCKER_OPTS=--log-opt max-size=50m --log-opt max-file=3\"\n"

            }

          ]

        }

      ]

    },

    "networkd": {},

    "passwd": {

      "users": [

        {

          "name": "core",

          "sshAuthorizedKeys": [

            "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDuc1QbcMF+Ldmp3iUNR2okabiRYQBzO/W7laejUfrxDEQ9GUIWuC1H7EEQXeEmxG2a6laNj2XS23CPFl26aLNifC6h+4bk0zvjxgP8SMaUDw9QpNUjtyq4r66HoKgSA2AWaKdpjnT0bzSt05WmN5D8LQ93Lrri0x0HZo43pe3H1z7480euIL0P9DBrvD73uYJpdQaV5JP3N3Z8z1JaFiTUZD+5kHGyWCG90UJQ0aPKYwVbCiVFACLh4unQLopIqGvuIKYcyLz82/hxhVVzmHD6Q5uPZlnXOIplBlCWtHOolwNDIdIBryD0BTMTmQ4+jMdZxWXiges4c6dAIqtytRiL\n}"

          ]

        }

      ]

    }

  }



If I put this configuration in the user_data field, I can still log in using the SSH key provided during the VM creation but I get the following message 

Failed Units: 1
  oem
-cloudinit.service

And my ignition isn't working as I can't find any docker config file corresponding to my Ignition...


{

    "ignition": {

      "version": "2.0.0",

      "config": {}

    },

    "storage": {},

    "systemd": {

      "units": [

        {

          "name": "docker.service",

          "enable": true,

          "dropins": [

            {

              "name": "10-dockeropts.conf",

              "contents": "[Service]\nEnvironment=\"DOCKER_OPTS=--log-opt max-size=50m --log-opt max-file=3\"\n"

            }

          ]

        }

      ]

    },

    "networkd": {},

    "passwd": {123}

  }


I know that Ignition support in openstack is beta but lots of interesting project like tectonic are using ignition and target openstack clouds...

Does someone already make it works ?

Regards


VG

Alex Crawford

unread,
Jul 25, 2017, 12:51:00 PM7/25/17
to vincent.g...@gmail.com, CoreOS User
If you are able to get to a password prompt, it means that Ignition
completed. It looks like your key has some trailing characters that
don't belong: \n}


> If I put this configuration in the user_data field, I can still log in
> using the SSH key provided during the VM creation but I get the following
> message
> Failed Units: 1
> oem-cloudinit.service
>
> And my ignition isn't working as I can't find any docker config file
> corresponding to my Ignition...
>
>
> {
> "ignition": {
> "version": "2.0.0",
> "config": {}
> },
> "storage": {},
> "systemd": {
> "units": [
> {
> "name": "docker.service",
> "enable": true,
> "dropins": [
> {
> "name": "10-dockeropts.conf",
> "contents": "[Service]\nEnvironment=\"DOCKER_OPTS=--log-opt
> max-size=50m --log-opt max-file=3\"\n"
> }
> ]
> }
> ]
> },
> "networkd": {},
> "passwd": {123}
> }

This is a confusing result. Ignition is trying to parse this config and
sees that it is invalid JSON and punts on it, hoping that
coreos-cloudinit will pick it up. coreos-cloudinit also fails to parse
that config which is why you are seeing that failure. You can use the
online validator [1] to double check the config.

To further complicate the situation, you are able to log in in this case
because coreos-cloudinit reads keys from the first-available datasource
(config-drive vs the network metadata service). Ignition does not read
these locations for keys, only the userdata. After the boot,
coreos-metadata normally fetches keys for you. This isn't the case on
OpenStack because it doesn't know where to fetch the keys from. You need
to enable the service and specify where it should look (currently, only
config-drive is supported). You'll need something like the following to
enable and configure coreos-metadata:

{
"ignition": { "version": "2.0.0" },
"systemd": {
"units": [{
"name": "coreos-metadata-sshkeys@.service",
"enable": true,
"dropins": [{
"name": "20-provider-override.conf",
"contents": "[Service]\nEnvironment=COREOS_METADATA_OPT_PROVIDER=--provider=openstack-metadata"
}]
}]
}
}

As I was writing this, I attempted to use CT [2], but ran into a few
issues. We'll have to clean that up a bit more before it will be useful.

That was long-winded, but I hope that helps.

-Alex

[1]: https://coreos.com/validate
[2]: https://coreos.com/os/docs/latest/provisioning.html
signature.asc

vincent.g...@gmail.com

unread,
Jul 26, 2017, 3:21:11 AM7/26/17
to CoreOS User, vincent.g...@gmail.com
Thanks for your answer. I precise I am using Tectonic-installer project which use Terraform to generate the ignitions.
So if I understand well I had to modify the SSH key output to remover the "\n" and add the metadata service configuration. Finally I get the same issue with the following Ignition

{
    "ignition": {
      "version": "2.0.0",
      "config": {}
    },
    "storage": {
      "files": [
        {
          "filesystem": "root",
          "path": "/etc/kubernetes/kubeconfig",
          "contents": {
            "source": "data:text/plain;charset=utf-8;base64,apiVersion: v1
kind: Config
clusters:
- name: test
  cluster:
    server: https://test-k8s.cluster.local:443
    certificate-authority-data: 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
users:
- name: kubelet
  user:
    client-certificate-data: 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
    client-key-data: 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
contexts:
- context:
    cluster: test
    user: kubelet
",
            "verification": {}
          },
          "mode": 420,
          "user": {},
          "group": {}
        },
        {
          "filesystem": "root",
          "path": "/etc/kubernetes/kubelet.env",
          "contents": {
            "source": "data:text/plain;charset=utf-8;base64,S1VCRUxFVF9JTUFHRV9VUkw9cXVheS5pby9jb3Jlb3MvaHlwZXJrdWJlCktVQkVMRVRfSU1BR0VfVEFHPSJ2MS43LjFfY29yZW9zLjAiCg==",
            "verification": {}
          },
          "mode": 420,
          "user": {},
          "group": {}
        },
        {
          "filesystem": "root",
          "path": "/etc/sysctl.d/max-user-watches.conf",
          "contents": {
            "source": "data:text/plain;charset=utf-8;base64,ZnMuaW5vdGlmeS5tYXhfdXNlcl93YXRjaGVzPTE2MTg0",
            "verification": {}
          },
          "mode": 420,
          "user": {},
          "group": {}
        },
        {
          "filesystem": "root",
          "path": "/etc/resolv.conf",
          "contents": {
            "source": "data:text/plain;charset=utf-8;base64,c2VhcmNoIGNsdXN0ZXIubG9jYWwKbmFtZXNlcnZlciA4LjguOC44Cm5hbWVzZXJ2ZXIgOC44LjQuNAo=",
            "verification": {}
          },
          "mode": 420,
          "user": {},
          "group": {}
        },
        {
          "filesystem": "root",
          "path": "/etc/hostname",
          "contents": {
            "source": "data:text/plain;charset=utf-8;base64,dGVzdC1tYXN0ZXItMA==",
            "verification": {}
          },
          "mode": 420,
          "user": {},
          "group": {}
        }
      ]
    },
    "systemd": {
      "units": [
        {
          "name": "docker.service",
          "enable": true,
          "dropins": [
            {
              "name": "10-dockeropts.conf",
              "contents": "[Service]\nEnvironment=\"DOCKER_OPTS=--log-opt max-size=50m --log-opt max-file=3\"\n"
            }
          ]
        },
        {
          "name": "coreos-metadata-sshkeys@.service",
          "enable": true,
          "dropins": [
            {
              "name": "20-provider-override.conf",
              "contents": "[Service]\nEnvironment=COREOS_METADATA_OPT_PROVIDER=--provider=openstack-metadata"
            }
          ]
        },
        {
          "name": "locksmithd.service",
          "enable": true,
          "mask": true
        },
        {
          "name": "kubelet.service",
          "enable": true,
          "contents": "[Unit]\nDescription=Kubelet via Hyperkube ACI\n\n[Service]\nEnvironment=\"RKT_RUN_ARGS=--uuid-file-save=/var/cache/kubelet-pod.uuid \\\n  --volume=resolv,kind=host,source=/etc/resolv.conf \\\n  --mount volume=resolv,target=/etc/resolv.conf \\\n  --volume var-lib-cni,kind=host,source=/var/lib/cni \\\n  --mount volume=var-lib-cni,target=/var/lib/cni \\\n  --volume var-log,kind=host,source=/var/log \\\n  --mount volume=var-log,target=/var/log\"\nEnvironmentFile=/etc/kubernetes/kubelet.env\nExecStartPre=/bin/mkdir -p /etc/kubernetes/manifests\nExecStartPre=/bin/mkdir -p /srv/kubernetes/manifests\nExecStartPre=/bin/mkdir -p /etc/kubernetes/checkpoint-secrets\nExecStartPre=/bin/mkdir -p /etc/kubernetes/cni/net.d\nExecStartPre=/bin/mkdir -p /var/lib/cni\nExecStartPre=/usr/bin/bash -c \"grep 'certificate-authority-data' /etc/kubernetes/kubeconfig | awk '{print $2}' | base64 -d \u003e /etc/kubernetes/ca.crt\"\nExecStartPre=-/usr/bin/rkt rm --uuid-file=/var/cache/kubelet-pod.uuid\nExecStart=/usr/lib/coreos/kubelet-wrapper \\\n  --kubeconfig=/etc/kubernetes/kubeconfig \\\n  --require-kubeconfig \\\n  --cni-conf-dir=/etc/kubernetes/cni/net.d \\\n  --network-plugin=cni \\\n  --lock-file=/var/run/lock/kubelet.lock \\\n  --exit-on-lock-contention \\\n  --pod-manifest-path=/etc/kubernetes/manifests \\\n  --allow-privileged \\\n  --node-labels=node-role.kubernetes.io/master \\\n  --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n   \\\n  --minimum-container-ttl-duration=6m0s \\\n  --cluster_dns=10.3.0.10 \\\n  --cluster_domain=cluster.local \\\n  --client-ca-file=/etc/kubernetes/ca.crt \\\n  --anonymous-auth=false\nExecStop=-/usr/bin/rkt stop --uuid-file=/var/cache/kubelet-pod.uuid\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n"
        },
        {
          "name": "bootkube.service",
          "enable": true,
          "contents": "[Unit]\nDescription=Bootstrap a Kubernetes cluster\nConditionPathExists=!/opt/tectonic/init_bootkube.done\n\n[Service]\nType=oneshot\nRemainAfterExit=true\nWorkingDirectory=/opt/tectonic\n\nUser=root\nGroup=root\n\nExecStart=/usr/bin/bash /opt/tectonic/bootkube.sh\nExecStartPost=/bin/touch /opt/tectonic/init_bootkube.done\n\n[Install]\nWantedBy=multi-user.target"
        },
        {
          "name": "tectonic.service",
          "contents": "[Unit]\nDescription=Bootstrap a Tectonic cluster\nConditionPathExists=!/opt/tectonic/init_tectonic.done\nRequires=bootkube.service\nAfter=bootkube.service\n\n[Service]\nType=oneshot\nRemainAfterExit=true\nWorkingDirectory=/opt/tectonic\n\nUser=root\nGroup=root\n\nExecStart=/usr/bin/bash /opt/tectonic/tectonic-rkt.sh\nExecStartPost=/bin/touch /opt/tectonic/init_tectonic.done\n\n[Install]\nWantedBy=multi-user.target"
        }
      ]
    },
    "networkd": {},
    "passwd": {
      "users": [
        {
          "name": "core",
          "sshAuthorizedKeys": [
            "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCthodDkQwDCzf1FZS+KgfSehk/goF9xuo6erh7AJCxWeW89TBWMhccrrbNpaB6WC/V7UEr3DsdOzfQ9SC6R21aj2iZ4P3XmCOIcW21xKqavc0k+Jp2Jyg+/m68b/6tMhfnSDvM0gKplE6MV6wF7/x6LfGomJR2yuG1VKCWhHMkkZF7IDp3QGLAw/lmTbY7LTb778v9yRWKxKjrC5ZVfzkgLVAeIgH5Vv1PkYXudOtg7peyXY+GjxwjUYWuJMwdTKNeQLeZQItR7hgWSdddrQTlBoRpwTLrk9DQtRVkWKdXQIhYLbV7wTz5HQekGHlYfniCHdWmIhvnUQsQKmvlwid3"
          ]
        }
      ]
    }
  }


This is a valid ignition from the validator perspective.
Do you have any other lead ?

vincent.g...@gmail.com

unread,
Aug 2, 2017, 12:19:17 PM8/2/17
to CoreOS User, vincent.g...@gmail.com
Does someone already succeed in using Ignition on Openstack ?

Alex Crawford

unread,
Aug 7, 2017, 8:40:02 PM8/7/17
to vincent.g...@gmail.com, CoreOS User
On 07/26, vincent.g...@gmail.com wrote:
> Thanks for your answer. I precise I am using Tectonic-installer project
> which use Terraform to generate the ignitions.
> So if I understand well I had to modify the SSH key output to remover the
> "\n" and add the metadata service configuration. Finally I get the same
> issue with the following Ignition

FYI, that config has your kubeconfig secrets in it. You won't want to
use those in production now. I'm sure you're aware, but I just wanted to
remind you.

> This is a valid ignition from the validator perspective.
> Do you have any other lead ?

That looked fine to me. Can you try adding the `coreos.autologin` kernel
parameter so you can log in (you will need console access) and look
around? I'm curious to see the Ignition logs as well as a listing of
`.ssh/authorized_keys.d`.

-Alex
signature.asc
Reply all
Reply to author
Forward
0 new messages