Commit c2f6d5bf authored by Jan Siersch's avatar Jan Siersch
Browse files

modified computenode & controlnode for CentOS 7

- also added opendaylight installation guides for further reference
parent 83eed324
[DEFAULT]
rootwrap_config = /etc/cinder/rootwrap.conf
api_paste_confg = /etc/cinder/api-paste.ini
iscsi_helper = tgtadm
volume_name_template = volume-%s
volume_group = vg_cinder
# logging
verbose = True
auth_strategy = keystone
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
# local paths
state_path = /var/lib/cinder
lock_path = /var/lock/cinder
volumes_dir = /var/lib/cinder/volumes
rootwrap_config = /etc/cinder/rootwrap.conf
api_paste_confg = /etc/cinder/api-paste.ini
# auth & message queue
auth_strategy = keystone
notification_driver = cinder.openstack.common.notifier.rpc_notifier
rpc_backend = qpid
glance_host = controlnode
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
control_exchange = cinder
notification_driver = cinder.openstack.common.notifier.rpc_notifier
# glance
glance_host = controlnode
# volumes
volume_group = vg_cinder
volume_name_template = volume-%s
iscsi_helper = lioadm
# misc
my_ip = ${COMPUTENODE_IP_CTRL}
[database]
connection = mysql://cinder:${CINDER_DBPASS}@controlnode/cinder
[keystone_authtoken]
auth_uri = http://controlnode:5000
auth_host = controlnode
auth_protocol = http
auth_port = 35357
admin_user = cinder
auth_uri = http://controlnode:5000/v2.0
identity_uri = http://controlnode:35357
admin_tenant_name = service
admin_user = cinder
admin_password = ${CINDER_PASS}
[DEFAULT]
# logging
verbose = True
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
# local paths
state_path = /var/lib/neutron
lock_path = /var/lock/neutron
api_paste_confg = /etc/neutron/api-paste.ini
core_plugin = ml2
service_plugins = router
agent_down_time = 75
# auth & message queue
auth_strategy = keystone
auth_host = controlnode
auth_port = 35357
auth_protocol = http
auth_url = http://controlnode:35357/v2.0
admin_user = neutron
admin_password = ${NEUTRON_PASS}
admin_tenant_name = service
notification_driver = neutron.openstack.common.notifier.rpc_notifier
rpc_backend = neutron.openstack.common.rpc.impl_qpid
rpc_backend = qpid
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
# plugins & drivers
core_plugin = ml2
service_plugins = router
allow_overlapping_ips = True
agent_down_time = 75
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
report_interval = 5
[database]
connection = mysql://neutron:${NEUTRON_DBPASS}@controlnode/neutron
[keystone_authtoken]
auth_host = controlnode
auth_port = 35357
auth_protocol = http
auth_uri = http://controlnode:5000
auth_uri = http://controlnode:5000/v2.0
identity_uri = http://controlnode:35357
admin_tenant_name = service
admin_user = neutron
admin_password = ${NEUTRON_PASS}
admin_tenant_name = service
[database]
connection = mysql://neutron:${NEUTRON_DBPASS}@controlnode/neutron
[quotas]
[service_providers]
service_provider=LOADBALANCER:Haproxy:neutron.services.loadbalancer.drivers.haproxy.plugin_driver.HaproxyOnHostPluginDriver:default
service_provider = LOADBALANCER:Haproxy:neutron.services.loadbalancer.drivers.haproxy.plugin_driver.HaproxyOnHostPluginDriver:default
plugin.ini.odl
\ No newline at end of file
[ml2]
type_drivers = vlan
tenant_network_types = vlan
mechanism_drivers = openvswitch
[ml2_type_flat]
[ml2_type_gre]
[ml2_type_vlan]
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
tenant_network_type = vlan
bridge_mappings = physnet1:br-data
enable_tunneling = false
[ml2_type_vxlan]
[ml2_odl]
url = http://${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron
username = admin
password = admin
session_timeout = 30
timeout = 10
[securitygroup]
enable_security_group = True
enable_ipset = True
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
[ovs]
enable_tunneling = false
tenant_network_type = vlan
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
bridge_mappings = physnet1:br-data
[odl]
controllers = ${SDNCONTROL_IP_CTRL}:6633:admin:admin
integration_bridge = br-int
tenant_network_type = vlan
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
[ml2]
type_drivers = vlan
tenant_network_types = vlan
mechanism_drivers = ofagent
[ml2_type_vlan]
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
tenant_network_type = vlan
bridge_mappings = physnet1:br-data
enable_tunneling = false
[securitygroup]
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
enable_security_group = True
[ovs]
enable_tunneling = false
tenant_network_type = vlan
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
bridge_mappings = physnet1:br-data
integration_bridge = br-int
#openflow_rest_api = ${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron/
openflow_rest_api = ${SDNCONTROL_IP_CTRL}:8080
tunnel_key_min = $(${SDN_VLAN_RANGES} | cut -d ":" -f 1)
tunnel_key_max = $(${SDN_VLAN_RANGES} | cut -d ":" -f 2)
tunnel_interface = ${COMPUTENODE_IF_DATA}
ovsdb_interface = ${COMPUTENODE_IF_CTRL}
ovsdb_port = 6634
[ml2_odl]
url = http://${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron
username = admin
password = admin
session_timeout = 30
timeout = 10
[odl]
controllers = ${SDNCONTROL_IP_CTRL}:6633:admin:admin
integration_bridge = br-int
tenant_network_type = vlan
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
polling_interval = 2
get_datapath_retry_times = 60
physical_interface_mappings = physnet1:${COMPUTENODE_IF_DATA}
[ml2_type_flat]
[ml2_type_gre]
[ml2_type_vxlan]
[ml2]
type_drivers = vlan
tenant_network_types = vlan
mechanism_drivers = opendaylight,openvswitch
#mechanism_drivers = opendaylight,linuxbridge
# (ListOpt) List of network type driver entrypoints to be loaded from
# the neutron.ml2.type_drivers namespace.
#
# type_drivers = local,flat,vlan,gre,vxlan
# Example: type_drivers = flat,vlan,gre,vxlan
# (ListOpt) Ordered list of network_types to allocate as tenant
# networks. The default value 'local' is useful for single-box testing
# but provides no connectivity between hosts.
#
# tenant_network_types = local
# Example: tenant_network_types = vlan,gre,vxlan
# (ListOpt) Ordered list of networking mechanism driver entrypoints
# to be loaded from the neutron.ml2.mechanism_drivers namespace.
# mechanism_drivers =
# Example: mechanism_drivers = openvswitch,mlnx
# Example: mechanism_drivers = arista
# Example: mechanism_drivers = cisco,logger
# Example: mechanism_drivers = openvswitch,brocade
# Example: mechanism_drivers = linuxbridge,brocade
[ml2_type_flat]
# (ListOpt) List of physical_network names with which flat networks
# can be created. Use * to allow flat networks with arbitrary
# physical_network names.
#
# flat_networks =
# Example:flat_networks = physnet1,physnet2
# Example:flat_networks = *
[ml2_type_vlan]
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
tenant_network_type = vlan
bridge_mappings = physnet1:br-data
enable_tunneling = false
# (ListOpt) List of <physical_network>[:<vlan_min>:<vlan_max>] tuples
# specifying physical_network names usable for VLAN provider and
# tenant networks, as well as ranges of VLAN tags on each
# physical_network available for allocation as tenant networks.
#
# network_vlan_ranges =
# Example: network_vlan_ranges = physnet1:1000:2999,physnet2
[ml2_type_gre]
# (ListOpt) Comma-separated list of <tun_min>:<tun_max> tuples enumerating ranges of GRE tunnel IDs that are available for tenant network allocation
# tunnel_id_ranges =
[ml2_type_vxlan]
# (ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating
# ranges of VXLAN VNI IDs that are available for tenant network allocation.
#
# vni_ranges =
# (StrOpt) Multicast group for the VXLAN interface. When configured, will
# enable sending all broadcast traffic to this multicast group. When left
# unconfigured, will disable multicast VXLAN mode.
#
# vxlan_group =
# Example: vxlan_group = 239.1.1.1
[securitygroup]
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
enable_security_group = True
# Controls if neutron security group is enabled or not.
# It should be false when you use nova security group.
# enable_security_group = True
[ovs]
enable_tunneling = false
tenant_network_type = vlan
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
bridge_mappings = physnet1:br-data
[ml2_odl]
url = http://${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron
username = admin
password = admin
session_timeout = 30
timeout = 10
[odl]
controllers = ${SDNCONTROL_IP_CTRL}:6633:admin:admin
integration_bridge = br-int
tenant_network_type = vlan
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
[DEFAULT]
compute_driver=libvirt.LibvirtDriver
# logging
verbose = True
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
instance_usage_audit = True
instance_usage_audit_period = hour
notify_on_state_change = vm_and_task_state
# local paths
logdir = /var/log/nova
state_path = /var/lib/nova
lock_path = /var/lock/nova
volumes_path = /var/lib/nova/volumes
api_paste_config = /etc/nova/api-paste.ini
root_helper = sudo nova-rootwrap /etc/nova/rootwrap.conf
# auth & message queue
auth_strategy = keystone
notification_driver = ceilometer.compute.nova_notifier
notification_driver = nova.openstack.common.notifier.rpc_notifier
dhcpbridge_flagfile=/etc/nova/nova.conf
dhcpbridge=/usr/bin/nova-dhcpbridge
logdir=/var/log/nova
state_path=/var/lib/nova
lock_path=/var/lock/nova
force_dhcp_release=True
iscsi_helper=tgtadm
libvirt_use_virtio_for_bridges=True
connection_type=libvirt
root_helper=sudo nova-rootwrap /etc/nova/rootwrap.conf
verbose=True
ec2_private_dns_show_ip=True
api_paste_config=/etc/nova/api-paste.ini
volumes_path=/var/lib/nova/volumes
enabled_apis=ec2,osapi_compute,metadata
auth_strategy=keystone
rpc_backend = qpid
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
my_ip=${COMPUTENODE_IP_CTRL}
vnc_enabled=true
vncserver_listen=0.0.0.0
vncserver_proxyclient_address=${COMPUTENODE_IP_CTRL}
#novnc_enabled=true
#novncproxy_port=6080
#novncproxy_base_url=http://${CONTROLNODE_IP_PBLC}:6080/vnc_auto.html
novncproxy_base_url=http://omistack.e-technik.uni-ulm.de:6080/vnc_auto.html
# DHCP
dhcpbridge_flagfile = /etc/nova/nova.conf
dhcpbridge = /usr/bin/nova-dhcpbridge
force_dhcp_release = True
glance_host=controlnode
# VNC web console
my_ip = ${COMPUTENODE_IP_CTRL}
vnc_enabled = true
vncserver_listen = 0.0.0.0
vncserver_proxyclient_address = ${COMPUTENODE_IP_CTRL}
novncproxy_base_url = http://${CONTROLNODE_DNS_NAME}:6080/vnc_auto.html
#### NOVA NETWORKING
#network_manager=nova.network.manager.FlatDHCPManager
#firewall_driver=nova.virt.libvirt.firewall.IptablesFirewallDriver
#network_size=254
#allow_same_net_traffic=False
#multi_host=True
#send_arp_for_ha=True
#share_dhcp_address=True
#force_dhcp_release=True
#flat_network_bridge=br100
#flat_interface=eth0
#public_interface=eth0
# virtualization
connection_type = libvirt
compute_driver = libvirt.LibvirtDriver
libvirt_use_virtio_for_bridges = True
libvirt_vif_driver = nova.virt.libvirt.vif.LibvirtGenericVIFDriver
#libvirt_vif_driver = nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver
vif_plugging_is_fatal = False
vif_plugging_timeout = 0
# neutron networking
network_api_class=nova.network.neutronv2.api.API
neutron_url=http://controlnode:9696
neutron_auth_strategy=keystone
neutron_admin_tenant_name=service
neutron_admin_username=neutron
neutron_admin_password=${NEUTRON_PASS}
neutron_admin_auth_url=http://controlnode:35357/v2.0
security_group_api = neutron
network_api_class = nova.network.neutronv2.api.API
linuxnet_interface_driver = nova.network.linux_net.LinuxOVSInterfaceDriver
#libvirt_vif_driver=nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver
libvirt_vif_driver=nova.virt.libvirt.vif.LibvirtGenericVIFDriver
firewall_driver = nova.virt.firewall.NoopFirewallDriver
neutron_metadata_proxy_shared_secret = ${METADATA_SECRET}
service_neutron_metadata_proxy = true
vif_plugging_is_fatal = False
vif_plugging_timeout = 0
firewall_driver=nova.virt.firewall.NoopFirewallDriver
security_group_api=neutron
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
instance_usage_audit = True
instance_usage_audit_period = hour
notify_on_state_change = vm_and_task_state
# misc
iscsi_helper = tgtadm
ec2_private_dns_show_ip = True
enabled_apis = ec2,osapi_compute,metadata
[database]
connection = mysql://nova:${NOVA_DBPASS}@controlnode/nova
[glance]
host = controlnode
[keystone_authtoken]
auth_uri = http://controlnode:5000
auth_host = controlnode
auth_protocol = http
auth_port = 35357
admin_user = nova
auth_uri = http://controlnode:5000/v2.0
identity_uri = http://controlnode:35357
admin_tenant_name = service
admin_user = nova
admin_password = ${NOVA_PASS}
[libvirt]
virt_type = kvm
[neutron]
auth_strategy = keystone
url = http://controlnode:9696
admin_auth_url = http://controlnode:35357/v2.0
admin_tenant_name = service
admin_username = neutron
admin_password = ${NEUTRON_PASS}
[DEFAULT]
# logging
verbose = True
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
# message queue
notification_driver = messaging
rpc_backend = qpid
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
# swift
swift_store_auth_address = http://controlnode:5000/v2.0/
swift_store_user = swift
swift_store_key = ${SWIFT_PASS}
notification_driver = messaging
[database]
connection = mysql://glance:${GLANCE_DBPASS}@controlnode/glance
[keystone_authtoken]
auth_uri = http://controlnode:5000
auth_host = controlnode
auth_port = 35357
auth_protocol = http
auth_uri = http://controlnode:5000/v2.0
identity_uri = http://controlnode:35357
admin_tenant_name = service
admin_user = glance
admin_password = ${GLANCE_PASS}
......
[DEFAULT]
# logging
verbose = True
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
[database]
connection = mysql://glance:${GLANCE_DBPASS}@controlnode/glance
[keystone_authtoken]
auth_uri = http://controlnode:5000
auth_host = controlnode
auth_port = 35357
auth_protocol = http
auth_uri = http://controlnode:5000/v2.0
identity_uri = http://controlnode:35357
admin_tenant_name = service
admin_user = glance
admin_password = ${GLANCE_PASS}
......
[DEFAULT]
# A "shared secret" between keystone and other openstack services
# openstack services shared secret
admin_token = ${ADMIN_TOKEN}
# === Logging Options ===
# logging
log_file = keystone.log
log_dir = /var/log/keystone
# message queue
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
......
[DEFAULT]
# logging
verbose = True
debug = True
use_syslog = True
syslog_log_facility = LOG_LOCAL0
auth_strategy = keystone
# local paths
state_path = /var/lib/neutron
lock_path = /var/lock/neutron
api_paste_confg = /etc/neutron/api-paste.ini
rpc_backend = neutron.openstack.common.rpc.impl_qpid
# auth & message queue
auth_strategy = keystone
notification_driver = neutron.openstack.common.notifier.rpc_notifier
rpc_backend = qpid
qpid_hostname = controlnode
qpid_username = guest
qpid_password = ${QPID_PASS}
notify_nova_on_port_status_changes = True
notify_nova_on_port_data_changes = True
# plugins & drivers
core_plugin = ml2
service_plugins = router
allow_overlapping_ips = True
agent_down_time = 75
# nova
nova_url = http://controlnode:8774/v2
nova_admin_username = nova
nova_admin_tenant_id = THIS_MUST_BE_SET_LATER
nova_admin_password = ${NOVA_PASS}
nova_admin_auth_url = http://controlnode:35357/v2.0
nova_region_name = regionOne
core_plugin = ml2
service_plugins = router
allow_overlapping_ips = True
[quotas]
notify_nova_on_port_status_changes = True
notify_nova_on_port_data_changes = True
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
report_interval = 5
[database]
connection = mysql://neutron:${NEUTRON_DBPASS}@controlnode/neutron
[keystone_authtoken]
auth_uri = http://controlnode:5000/v2.0
identity_uri = http://controlnode:35357
auth_uri = http://controlnode:5000