Buildbot Setup for VM host

This page documents the general setup process for a server that is acting as virtual machine host, like those documented in the Buildbot Setup for Virtual Machines section.

  1. Provision hardware with most recent Ubuntu LTS release

  2. Add host to DNS

  3. Apply updates (replace <host> with hostname)

ssh <host>.mariadb.net
sudo apt-get update
sudo apt-get dist-upgrade
  1. install some favorite packages (these aren't necessarily required, but I like them)

sudo apt-get install tree renameutils vim-nox
  1. a buildbot admin needs to add the new host to the allowed list of rsync clients on the VM master (whichever host is the official host of VM files) The VM master changes periodically, so check to make sure you have the correct one.

vi /etc/rsyncd.conf
  1. make a /kvm/ dir and rsync it with the VM master above. The dir often resides at /home/kvm/ (or wherever the storage drive is) and is then linked to /kvm/. The VMs rely on the /kvm/vms/ path, so the /kvm/ location is required.

vm_master="hostname"      # ask for this from a buildbot admin
mkdir /home/kvm
ln -sv /home/kvm /kvm
rsync --dry-run --delete --exclude=deprecated \\
  --exclude=iso --exclude=lost+found -avPL ${vm_master}::kvm/ /home/kvm/
# assuming the dry-run looks good, start the "real" rsync in a screen session
screen
rsync --delete --exclude=deprecated --exclude=iso --exclude=lost+found -avPL ${vm_master}::kvm/ /home/kvm/
  1. detatch from screen session with Ctrl+a d

  2. Configure vim.basic as the default editor (optional)

  1. install buildbot-slave, bzr, and kvm

  1. add a default user, and then add the user to the appropriate groups

  1. logout then back in as the default user and change the password

  2. set up the /.ssh/authorized_keys file so you can login that way

  3. create other standard users and set up their ssh keys (optional)

  4. turn off password login (WARNING: be sure to have your ssh key setup before doing this!) and disallow all root logins and password logins (it is safer to only allow logins using ssh keys with regular users):

  1. checkout mariadb-tools

  1. put runvm in the right place

  1. add the buildbot user to the kvm and tty groups

  1. A buildbot admin will need to add this builder to the maria-master-private.cfg file on the ${buildmaster} and also add it to the c['slaves'] array in maria-master.cfg then create the buildslave using the hostname and whatever ${password} was agreed upon by you and the buildbot admin:

  1. add the following to /etc/default/buildslave (replace ${hostname} with the name of the host)

  1. edit the admin and host files and add contact information and details on the builder:

  1. copy over the buildbot .ssh dir from terrier:

  1. Edit /etc/passwd and change the buildbot user's shell from /bin/false to /bin/bash

  2. su to the buildbot user and copy in the /etc/skel files

  1. change ownership of the buildbot/slaves dir to buildbot:buildbot

  1. move the /var/lib/buildbot directory to /home (or whatever location you want to use to store things) and then link it back

  1. update /etc/default/locale and change it to: LANG=en_US.UTF-8

  1. monitor the rsync, wait for it to finish

  2. once the rsync is finished, test the runvm script

  1. Remove the "testtest" VMs we created above

  1. Start the buildslave

  1. ssh to ${buildmaster} and add this new host to kvm_slaves in the maria-master.cfg file

  1. still on ${buildmaster}, test and then reload buildbot

This page is licensed: CC BY-SA / Gnu FDL

Last updated

Was this helpful?