Introduction of Juju charms
Juju deploy and Provider
In this article, we have demonstrated how Juju deploys a charm, including what makes a node eligible as a target and what files will be put on by the deployer.If you recall, there were four steps in a deploy process:
- Add a new machine to the cloud environment. In ...
Juju charm deployment
We have covered Juju's bootstrap phase. In this article, we will continue our research into another important function — juju deploy.
Deploy will command a node to pull down requested charm and install whatever needed based the charm's instruction. As the bootstrap research, I'm interested in the internal ...
Juju bootstrap process
The very first command user will encounter is the
juju bootstrap. It
createa a special machine — state controller,
control node, etc. — naming convention aside, it is the brain
that tracks others nodes in the cloud, applications installed and
Through research I want to learn about its ...
Juju charm model
This article is a high level view of Juju's internal modelings. For me it was fairly confusing when looking at its document which has an army of these concepts: charm, bundle, model, unit.... of course, each of them makes sense after a while. Its terminology page helps on understanding ...
Targets in MAAS lab
After setting up the MAAS server and its subnet, bringing up a target node is simple.
All nodes must be on the same 192.168.8.0/24 subnet, and they must support PXE boot.
The MAAS machine functions as both the DHCP server and the TFTP server ...