Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
Christopher Hauser
OpenStack-Cloud
Commits
c2f6d5bf
Commit
c2f6d5bf
authored
Nov 10, 2014
by
Jan Siersch
Browse files
modified computenode & controlnode for CentOS 7
- also added opendaylight installation guides for further reference
parent
83eed324
Changes
17
Hide whitespace changes
Inline
Side-by-side
Showing
17 changed files
with
416 additions
and
549 deletions
+416
-549
config/computenode/etc/cinder/cinder.conf
config/computenode/etc/cinder/cinder.conf
+25
-17
config/computenode/etc/neutron/neutron.conf
config/computenode/etc/neutron/neutron.conf
+19
-21
config/computenode/etc/neutron/plugin.ini
config/computenode/etc/neutron/plugin.ini
+43
-1
config/computenode/etc/neutron/plugin.ini
config/computenode/etc/neutron/plugin.ini
+43
-1
config/computenode/etc/neutron/plugin.ini.odl
config/computenode/etc/neutron/plugin.ini.odl
+0
-54
config/computenode/etc/neutron/plugin.ini.ovs
config/computenode/etc/neutron/plugin.ini.ovs
+0
-96
config/computenode/etc/nova/nova.conf
config/computenode/etc/nova/nova.conf
+63
-67
config/controlnode/etc/glance/glance-api.conf
config/controlnode/etc/glance/glance-api.conf
+9
-7
config/controlnode/etc/glance/glance-registry.conf
config/controlnode/etc/glance/glance-registry.conf
+6
-5
config/controlnode/etc/keystone/keystone.conf
config/controlnode/etc/keystone/keystone.conf
+3
-2
config/controlnode/etc/neutron/neutron.conf
config/controlnode/etc/neutron/neutron.conf
+27
-16
config/controlnode/etc/neutron/plugin.ini
config/controlnode/etc/neutron/plugin.ini
+10
-13
config/controlnode/etc/nova/nova.conf
config/controlnode/etc/nova/nova.conf
+63
-45
documentation/manuals/OpenDaylight Helium Installation Guide.pdf
...tation/manuals/OpenDaylight Helium Installation Guide.pdf
+0
-0
documentation/manuals/OpenDaylight Helium User Guide.pdf
documentation/manuals/OpenDaylight Helium User Guide.pdf
+0
-0
installation/computenode/sub-install.sh
installation/computenode/sub-install.sh
+89
-193
installation/controlnode/sub-install.sh
installation/controlnode/sub-install.sh
+16
-11
No files found.
config/computenode/etc/cinder/cinder.conf
View file @
c2f6d5bf
[
DEFAULT
]
rootwrap_config
= /
etc
/
cinder
/
rootwrap
.
conf
api_paste_confg
= /
etc
/
cinder
/
api
-
paste
.
ini
iscsi_helper
=
tgtadm
volume_name_template
=
volume
-%
s
volume_group
=
vg_cinder
# logging
verbose
=
True
auth_strategy
=
keystone
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
# local paths
state_path
= /
var
/
lib
/
cinder
lock_path
= /
var
/
lock
/
cinder
volumes_dir
= /
var
/
lib
/
cinder
/
volumes
rootwrap_config
= /
etc
/
cinder
/
rootwrap
.
conf
api_paste_confg
= /
etc
/
cinder
/
api
-
paste
.
ini
# auth & message queue
auth_strategy
=
keystone
notification_driver
=
cinder
.
openstack
.
common
.
notifier
.
rpc_notifier
rpc_backend
=
qpid
glance_host
=
controlnode
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
control_exchange
=
cinder
notification_driver
=
cinder
.
openstack
.
common
.
notifier
.
rpc_notifier
# glance
glance_host
=
controlnode
# volumes
volume_group
=
vg_cinder
volume_name_template
=
volume
-%
s
iscsi_helper
=
lioadm
# misc
my_ip
= ${
COMPUTENODE_IP_CTRL
}
[
database
]
connection
=
mysql
://
cinder
:${
CINDER_DBPASS
}@
controlnode
/
cinder
[
keystone_authtoken
]
auth_uri
=
http
://
controlnode
:
5000
auth_host
=
controlnode
auth_protocol
=
http
auth_port
=
35357
admin_user
=
cinder
auth_uri
=
http
://
controlnode
:
5000
/
v2
.
0
identity_uri
=
http
://
controlnode
:
35357
admin_tenant_name
=
service
admin_user
=
cinder
admin_password
= ${
CINDER_PASS
}
config/computenode/etc/neutron/neutron.conf
View file @
c2f6d5bf
[
DEFAULT
]
# logging
verbose
=
True
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
# local paths
state_path
= /
var
/
lib
/
neutron
lock_path
= /
var
/
lock
/
neutron
api_paste_confg
= /
etc
/
neutron
/
api
-
paste
.
ini
core_plugin
=
ml2
service_plugins
=
router
agent_down_time
=
75
# auth & message queue
auth_strategy
=
keystone
auth_host
=
controlnode
auth_port
=
35357
auth_protocol
=
http
auth_url
=
http
://
controlnode
:
35357
/
v2
.
0
admin_user
=
neutron
admin_password
= ${
NEUTRON_PASS
}
admin_tenant_name
=
service
notification_driver
=
neutron
.
openstack
.
common
.
notifier
.
rpc_notifier
rpc_backend
=
neutron
.
openstack
.
common
.
rpc
.
impl_
qpid
rpc_backend
=
qpid
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
# plugins & drivers
core_plugin
=
ml2
service_plugins
=
router
allow_overlapping_ips
=
True
agent_down_time
=
75
[
agent
]
root_helper
=
sudo
/
usr
/
bin
/
neutron
-
rootwrap
/
etc
/
neutron
/
rootwrap
.
conf
report_interval
=
5
[
database
]
connection
=
mysql
://
neutron
:${
NEUTRON_DBPASS
}@
controlnode
/
neutron
[
keystone_authtoken
]
auth_host
=
controlnode
auth_port
=
35357
auth_protocol
=
http
auth_uri
=
http
://
controlnode
:
5000
auth_uri
=
http
://
controlnode
:
5000
/
v2
.
0
identity_uri
=
http
://
controlnode
:
35357
admin_tenant_name
=
service
admin_user
=
neutron
admin_password
= ${
NEUTRON_PASS
}
admin_tenant_name
=
service
[
database
]
connection
=
mysql
://
neutron
:${
NEUTRON_DBPASS
}@
controlnode
/
neutron
[
quotas
]
[
service_providers
]
service_provider
=
LOADBALANCER
:
Haproxy
:
neutron
.
services
.
loadbalancer
.
drivers
.
haproxy
.
plugin_driver
.
HaproxyOnHostPluginDriver
:
default
service_provider
=
LOADBALANCER
:
Haproxy
:
neutron
.
services
.
loadbalancer
.
drivers
.
haproxy
.
plugin_driver
.
HaproxyOnHostPluginDriver
:
default
config/computenode/etc/neutron/plugin.ini
deleted
120000 → 0
View file @
83eed324
plugin.ini.odl
\ No newline at end of file
config/computenode/etc/neutron/plugin.ini
0 → 100644
View file @
c2f6d5bf
[ml2]
type_drivers
=
vlan
tenant_network_types
=
vlan
mechanism_drivers
=
openvswitch
[ml2_type_flat]
[ml2_type_gre]
[ml2_type_vlan]
network_vlan_ranges
=
physnet1:${SDN_VLAN_RANGES}
tenant_network_type
=
vlan
bridge_mappings
=
physnet1:br-data
enable_tunneling
=
false
[ml2_type_vxlan]
[ml2_odl]
url
=
http://${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron
username
=
admin
password
=
admin
session_timeout
=
30
timeout
=
10
[securitygroup]
enable_security_group
=
True
enable_ipset
=
True
firewall_driver
=
neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
[ovs]
enable_tunneling
=
false
tenant_network_type
=
vlan
network_vlan_ranges
=
physnet1:${SDN_VLAN_RANGES}
bridge_mappings
=
physnet1:br-data
[odl]
controllers
=
${SDNCONTROL_IP_CTRL}:6633:admin:admin
integration_bridge
=
br-int
tenant_network_type
=
vlan
[agent]
root_helper
=
sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
config/computenode/etc/neutron/plugin.ini.odl
deleted
100644 → 0
View file @
83eed324
[ml2]
type_drivers = vlan
tenant_network_types = vlan
mechanism_drivers = ofagent
[ml2_type_vlan]
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
tenant_network_type = vlan
bridge_mappings = physnet1:br-data
enable_tunneling = false
[securitygroup]
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
enable_security_group = True
[ovs]
enable_tunneling = false
tenant_network_type = vlan
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
bridge_mappings = physnet1:br-data
integration_bridge = br-int
#openflow_rest_api = ${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron/
openflow_rest_api = ${SDNCONTROL_IP_CTRL}:8080
tunnel_key_min = $(${SDN_VLAN_RANGES} | cut -d ":" -f 1)
tunnel_key_max = $(${SDN_VLAN_RANGES} | cut -d ":" -f 2)
tunnel_interface = ${COMPUTENODE_IF_DATA}
ovsdb_interface = ${COMPUTENODE_IF_CTRL}
ovsdb_port = 6634
[ml2_odl]
url = http://${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron
username = admin
password = admin
session_timeout = 30
timeout = 10
[odl]
controllers = ${SDNCONTROL_IP_CTRL}:6633:admin:admin
integration_bridge = br-int
tenant_network_type = vlan
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
polling_interval = 2
get_datapath_retry_times = 60
physical_interface_mappings = physnet1:${COMPUTENODE_IF_DATA}
[ml2_type_flat]
[ml2_type_gre]
[ml2_type_vxlan]
config/computenode/etc/neutron/plugin.ini.ovs
deleted
100644 → 0
View file @
83eed324
[ml2]
type_drivers = vlan
tenant_network_types = vlan
mechanism_drivers = opendaylight,openvswitch
#mechanism_drivers = opendaylight,linuxbridge
# (ListOpt) List of network type driver entrypoints to be loaded from
# the neutron.ml2.type_drivers namespace.
#
# type_drivers = local,flat,vlan,gre,vxlan
# Example: type_drivers = flat,vlan,gre,vxlan
# (ListOpt) Ordered list of network_types to allocate as tenant
# networks. The default value 'local' is useful for single-box testing
# but provides no connectivity between hosts.
#
# tenant_network_types = local
# Example: tenant_network_types = vlan,gre,vxlan
# (ListOpt) Ordered list of networking mechanism driver entrypoints
# to be loaded from the neutron.ml2.mechanism_drivers namespace.
# mechanism_drivers =
# Example: mechanism_drivers = openvswitch,mlnx
# Example: mechanism_drivers = arista
# Example: mechanism_drivers = cisco,logger
# Example: mechanism_drivers = openvswitch,brocade
# Example: mechanism_drivers = linuxbridge,brocade
[ml2_type_flat]
# (ListOpt) List of physical_network names with which flat networks
# can be created. Use * to allow flat networks with arbitrary
# physical_network names.
#
# flat_networks =
# Example:flat_networks = physnet1,physnet2
# Example:flat_networks = *
[ml2_type_vlan]
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
tenant_network_type = vlan
bridge_mappings = physnet1:br-data
enable_tunneling = false
# (ListOpt) List of <physical_network>[:<vlan_min>:<vlan_max>] tuples
# specifying physical_network names usable for VLAN provider and
# tenant networks, as well as ranges of VLAN tags on each
# physical_network available for allocation as tenant networks.
#
# network_vlan_ranges =
# Example: network_vlan_ranges = physnet1:1000:2999,physnet2
[ml2_type_gre]
# (ListOpt) Comma-separated list of <tun_min>:<tun_max> tuples enumerating ranges of GRE tunnel IDs that are available for tenant network allocation
# tunnel_id_ranges =
[ml2_type_vxlan]
# (ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating
# ranges of VXLAN VNI IDs that are available for tenant network allocation.
#
# vni_ranges =
# (StrOpt) Multicast group for the VXLAN interface. When configured, will
# enable sending all broadcast traffic to this multicast group. When left
# unconfigured, will disable multicast VXLAN mode.
#
# vxlan_group =
# Example: vxlan_group = 239.1.1.1
[securitygroup]
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
enable_security_group = True
# Controls if neutron security group is enabled or not.
# It should be false when you use nova security group.
# enable_security_group = True
[ovs]
enable_tunneling = false
tenant_network_type = vlan
network_vlan_ranges = physnet1:${SDN_VLAN_RANGES}
bridge_mappings = physnet1:br-data
[ml2_odl]
url = http://${SDNCONTROL_IP_CTRL}:8080/controller/nb/v2/neutron
username = admin
password = admin
session_timeout = 30
timeout = 10
[odl]
controllers = ${SDNCONTROL_IP_CTRL}:6633:admin:admin
integration_bridge = br-int
tenant_network_type = vlan
[agent]
root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
config/computenode/etc/nova/nova.conf
View file @
c2f6d5bf
[
DEFAULT
]
compute_driver
=
libvirt
.
LibvirtDriver
# logging
verbose
=
True
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
instance_usage_audit
=
True
instance_usage_audit_period
=
hour
notify_on_state_change
=
vm_and_task_state
# local paths
logdir
= /
var
/
log
/
nova
state_path
= /
var
/
lib
/
nova
lock_path
= /
var
/
lock
/
nova
volumes_path
= /
var
/
lib
/
nova
/
volumes
api_paste_config
= /
etc
/
nova
/
api
-
paste
.
ini
root_helper
=
sudo
nova
-
rootwrap
/
etc
/
nova
/
rootwrap
.
conf
# auth & message queue
auth_strategy
=
keystone
notification_driver
=
ceilometer
.
compute
.
nova_notifier
notification_driver
=
nova
.
openstack
.
common
.
notifier
.
rpc_notifier
dhcpbridge_flagfile
=/
etc
/
nova
/
nova
.
conf
dhcpbridge
=/
usr
/
bin
/
nova
-
dhcpbridge
logdir
=/
var
/
log
/
nova
state_path
=/
var
/
lib
/
nova
lock_path
=/
var
/
lock
/
nova
force_dhcp_release
=
True
iscsi_helper
=
tgtadm
libvirt_use_virtio_for_bridges
=
True
connection_type
=
libvirt
root_helper
=
sudo
nova
-
rootwrap
/
etc
/
nova
/
rootwrap
.
conf
verbose
=
True
ec2_private_dns_show_ip
=
True
api_paste_config
=/
etc
/
nova
/
api
-
paste
.
ini
volumes_path
=/
var
/
lib
/
nova
/
volumes
enabled_apis
=
ec2
,
osapi_compute
,
metadata
auth_strategy
=
keystone
rpc_backend
=
qpid
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
my_ip
=${
COMPUTENODE_IP_CTRL
}
vnc_enabled
=
true
vncserver_listen
=
0
.
0
.
0
.
0
vncserver_proxyclient_address
=${
COMPUTENODE_IP_CTRL
}
#novnc_enabled=true
#novncproxy_port=6080
#novncproxy_base_url=http://${CONTROLNODE_IP_PBLC}:6080/vnc_auto.html
novncproxy_base_url
=
http
://
omistack
.
e
-
technik
.
uni
-
ulm
.
de
:
6080
/
vnc_auto
.
html
# DHCP
dhcpbridge_flagfile
= /
etc
/
nova
/
nova
.
conf
dhcpbridge
= /
usr
/
bin
/
nova
-
dhcpbridge
force_dhcp_release
=
True
glance_host
=
controlnode
# VNC web console
my_ip
= ${
COMPUTENODE_IP_CTRL
}
vnc_enabled
=
true
vncserver_listen
=
0
.
0
.
0
.
0
vncserver_proxyclient_address
= ${
COMPUTENODE_IP_CTRL
}
novncproxy_base_url
=
http
://${
CONTROLNODE_DNS_NAME
}:
6080
/
vnc_auto
.
html
#### NOVA NETWORKING
#network_manager=nova.network.manager.FlatDHCPManager
#firewall_driver=nova.virt.libvirt.firewall.IptablesFirewallDriver
#network_size=254
#allow_same_net_traffic=False
#multi_host=True
#send_arp_for_ha=True
#share_dhcp_address=True
#force_dhcp_release=True
#flat_network_bridge=br100
#flat_interface=eth0
#public_interface=eth0
# virtualization
connection_type
=
libvirt
compute_driver
=
libvirt
.
LibvirtDriver
libvirt_use_virtio_for_bridges
=
True
libvirt_vif_driver
=
nova
.
virt
.
libvirt
.
vif
.
LibvirtGenericVIFDriver
#libvirt_vif_driver = nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver
vif_plugging_is_fatal
=
False
vif_plugging_timeout
=
0
# neutron networking
network_api_class
=
nova
.
network
.
neutronv2
.
api
.
API
neutron_url
=
http
://
controlnode
:
9696
neutron_auth_strategy
=
keystone
neutron_admin_tenant_name
=
service
neutron_admin_username
=
neutron
neutron_admin_password
=${
NEUTRON_PASS
}
neutron_admin_auth_url
=
http
://
controlnode
:
35357
/
v2
.
0
security_group_api
=
neutron
network_api_class
=
nova
.
network
.
neutronv2
.
api
.
API
linuxnet_interface_driver
=
nova
.
network
.
linux_net
.
LinuxOVSInterfaceDriver
#libvirt_vif_driver=nova.virt.libvirt.vif.LibvirtHybridOVSBridgeDriver
libvirt_vif_driver
=
nova
.
virt
.
libvirt
.
vif
.
LibvirtGenericVIFDriver
firewall_driver
=
nova
.
virt
.
firewall
.
NoopFirewallDriver
neutron_metadata_proxy_shared_secret
= ${
METADATA_SECRET
}
service_neutron_metadata_proxy
=
true
vif_plugging_is_fatal
=
False
vif_plugging_timeout
=
0
firewall_driver
=
nova
.
virt
.
firewall
.
NoopFirewallDriver
security_group_api
=
neutron
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
instance_usage_audit
=
True
instance_usage_audit_period
=
hour
notify_on_state_change
=
vm_and_task_state
# misc
iscsi_helper
=
tgtadm
ec2_private_dns_show_ip
=
True
enabled_apis
=
ec2
,
osapi_compute
,
metadata
[
database
]
connection
=
mysql
://
nova
:${
NOVA_DBPASS
}@
controlnode
/
nova
[
glance
]
host
=
controlnode
[
keystone_authtoken
]
auth_uri
=
http
://
controlnode
:
5000
auth_host
=
controlnode
auth_protocol
=
http
auth_port
=
35357
admin_user
=
nova
auth_uri
=
http
://
controlnode
:
5000
/
v2
.
0
identity_uri
=
http
://
controlnode
:
35357
admin_tenant_name
=
service
admin_user
=
nova
admin_password
= ${
NOVA_PASS
}
[
libvirt
]
virt_type
=
kvm
[
neutron
]
auth_strategy
=
keystone
url
=
http
://
controlnode
:
9696
admin_auth_url
=
http
://
controlnode
:
35357
/
v2
.
0
admin_tenant_name
=
service
admin_username
=
neutron
admin_password
= ${
NEUTRON_PASS
}
config/controlnode/etc/glance/glance-api.conf
View file @
c2f6d5bf
[
DEFAULT
]
# logging
verbose
=
True
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
# message queue
notification_driver
=
messaging
rpc_backend
=
qpid
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
# swift
swift_store_auth_address
=
http
://
controlnode
:
5000
/
v2
.
0
/
swift_store_user
=
swift
swift_store_key
= ${
SWIFT_PASS
}
notification_driver
=
messaging
[
database
]
connection
=
mysql
://
glance
:${
GLANCE_DBPASS
}@
controlnode
/
glance
[
keystone_authtoken
]
auth_uri
=
http
://
controlnode
:
5000
auth_host
=
controlnode
auth_port
=
35357
auth_protocol
=
http
auth_uri
=
http
://
controlnode
:
5000
/
v2
.
0
identity_uri
=
http
://
controlnode
:
35357
admin_tenant_name
=
service
admin_user
=
glance
admin_password
= ${
GLANCE_PASS
}
...
...
config/controlnode/etc/glance/glance-registry.conf
View file @
c2f6d5bf
[
DEFAULT
]
# logging
verbose
=
True
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
[
database
]
connection
=
mysql
://
glance
:${
GLANCE_DBPASS
}@
controlnode
/
glance
[
keystone_authtoken
]
auth_uri
=
http
://
controlnode
:
5000
auth_host
=
controlnode
auth_port
=
35357
auth_protocol
=
http
auth_uri
=
http
://
controlnode
:
5000
/
v2
.
0
identity_uri
=
http
://
controlnode
:
35357
admin_tenant_name
=
service
admin_user
=
glance
admin_password
= ${
GLANCE_PASS
}
...
...
config/controlnode/etc/keystone/keystone.conf
View file @
c2f6d5bf
[
DEFAULT
]
#
A "shared secret" between keystone and other
openstack services
# openstack services
shared secret
admin_token
= ${
ADMIN_TOKEN
}
#
=== L
ogging
Options ===
#
l
ogging
log_file
=
keystone
.
log
log_dir
= /
var
/
log
/
keystone
# message queue
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
...
...
config/controlnode/etc/neutron/neutron.conf
View file @
c2f6d5bf
[
DEFAULT
]
# logging
verbose
=
True
debug
=
True
use_syslog
=
True
syslog_log_facility
=
LOG_LOCAL0
auth_strategy
=
keystone
# local paths
state_path
= /
var
/
lib
/
neutron
lock_path
= /
var
/
lock
/
neutron
api_paste_confg
= /
etc
/
neutron
/
api
-
paste
.
ini
rpc_backend
=
neutron
.
openstack
.
common
.
rpc
.
impl_qpid
# auth & message queue
auth_strategy
=
keystone
notification_driver
=
neutron
.
openstack
.
common
.
notifier
.
rpc_notifier
rpc_backend
=
qpid
qpid_hostname
=
controlnode
qpid_username
=
guest
qpid_password
= ${
QPID_PASS
}
notify_nova_on_port_status_changes
=
True
notify_nova_on_port_data_changes
=
True
# plugins & drivers
core_plugin
=
ml2
service_plugins
=
router
allow_overlapping_ips
=
True
agent_down_time
=
75
# nova
nova_url
=
http
://
controlnode
:
8774
/
v2
nova_admin_username
=
nova
nova_admin_tenant_id
=
THIS_MUST_BE_SET_LATER
nova_admin_password
= ${
NOVA_PASS
}
nova_admin_auth_url
=
http
://
controlnode
:
35357
/
v2
.
0
nova_region_name
=
regionOne
core_plugin
=
ml2
service_plugins
=
router
allow_overlapping_ips
=
True
[
quotas
]
notify_nova_on_port_status_changes
=
True
notify_nova_on_port_data_changes
=
True
[
agent
]
root_helper
=
sudo
/
usr
/
bin
/
neutron
-
rootwrap
/
etc
/
neutron
/
rootwrap
.
conf
report_interval
=
5
[
database
]
connection
=
mysql
://
neutron
:${
NEUTRON_DBPASS
}@
controlnode
/
neutron
[
keystone_authtoken
]
auth_uri
=
http
://
controlnode
:
5000
/
v2
.
0
identity_uri
=
http
://
controlnode
:
35357
auth_uri
=
http
://
controlnode
:
5000