Nuage OSP Director 12 Integration - nuagenetworks/nuage-ospdirector GitHub Wiki
This document outlines the architecture of the integration project of using ML2 with Nuage as mechanism driver with OSP Director 12
This document will focus on providing the information required to add and configure ML2 and Nuage.
The OSP Director is an image based installer. It uses a single image (named overcloud-full.qcow2) that is deployed on the Controller and Compute machines belonging to the overcloud OpenStack cluster. This image contains all the packages that are needed during the deployment. The deployment will pull required container images and creates the configuration files and databases required to start the containers. Similar configuration files are required to start the services running on the hypervisor.
The OSP Director architecture allows partners to create new templates to expose parameters specific to their modules and then the templates can be passed to the openstack overcloud deploy
command during the deployment. Additionally, changes to the puppet manifests are required to handle the new values in the Hiera database and act on them to deploy the partner software. ML2 options will be added to the existing Nuage templates.
The OSP Director also allows partners to build their own custom container images and use their images instead of default container images in the overcloud deployment.
For OSP Director 12, few changes are required, both for the overcloud-full.qcow2 image and the undercloud codebase as well. These changes are mentioned below and have been separated out in terms of being patched by the script or to be done manually based on the diff provided.
Heat and Horizon requires some code to be present in tripleo-heat-templates. These changes are not present in OSP-Director 12 yet. The patch file will add the missing code to the tripleo-heat-templates.
The changes required to modify heat.conf for Nuage Heat Plugin, is upstreamed at this review. This review contains new code in manifests/heat directory with the associated tests and custom resources. ID: https://review.openstack.org/#/c/536628/. This change is not in OSP-Director 12 yet. The patching script mentioned below will take care of this change.
Additionally, Nuage VRS and metadata agent configuration files need to be created and populated with the required parameters. This can be achieved by a new puppet module, nuage-puppet-modules, that needs to be included on the overcloud image along with other required Nuage packages.
Since the typical deployment scenario of OSP Director assumes that all the packages are installed on the overcloud-full image, we need to patch the overcloud-full image with the following RPMs:
- nuage-openstack-neutron
- nuage-openstack-neutronclient
- nuage-metadata-agent
- selinux-policy-nuage
- nuage-puppet-modules-5.0 (link)
- nuage-openvswitch (Nuage VRS)
Also, we need to un-install OVS and Install VRS
- Un-install OVS
- Install VRS (nuage-openvswitch)
Some of the generic neutron.conf and nova.conf parameters need to be configured in the heat templates. Also, the metadata agent needs to be configured. The values of these parameters are dependent on the configuration of Nuage VSP. The "Sample Templates" section contains some 'probable' values for these parameters in files neutron-nuage-config.yaml and nova-nuage-config.yaml.
The undercloud deployment should proceed as per the OSP Director documentation. Follow all the steps before the openstack overcloud deploy
command.
Note: If planning on using remote-registry for overcloud container images, you have to NAT the brctl-plane cidr on the undercloud and this can be done in two ways.
-
This is the preferred way, in undercloud.conf, set masquerade_network=. For example if undercloud-ip is 192.0.2.1 then replace brctl-plane-cidr with 192.0.2.0/24
-
Or, if undercloud-ip is 192.0.2.1 then you can directly run the below command to add the iptable rule to NAT that overcloud IP's
iptables -A POSTROUTING -t nat -s 192.0.2.0/24 -j MASQUERADE
The upstream changes that are not in OSP Director 12 yet, need to be applied to the undercloud codebase. These changes are provided in the diff file at link. This contains multiple diff_OSPD12 file containing the differences that need to be applied. The steps for applying this patch are provided in the README here.
The installation of packages and un-installation of OVS can be done via this script.
Since the file required for configuring heat-plugin is not in the OSP-Director codebase the changes can be added to the image using the same script. Copy the directory containing the 12_files and the script at link.
The customer will receive all the RPMs and the script to patch the overcloud-full image with the RPMs. The user needs to create a local repo that is accessible from the machine that the script will run on and add all the RPMs to that repo. The machine also needs libguestfs-tools installed.
The script syntax is:
python nuage_overcloud_full_patch_12.py --RhelUserName='<value>' --RhelPassword='<value>' --RepoName=Nuage --RepoBaseUrl=http://IP/reponame --RhelPool='<value>' --ImageName='<value>' --Version=12
This script takes in following input parameters:
RhelUserName: User name for the RHEL subscription
RhelPassword: Password for the RHEL subscription
RhelPool: RHEL Pool to subscribe to for base packages
RepoName: Name for the local repo hosting the Nuage RPMs
RepoBaseUrl: Base URL for the repo hosting the Nuage RPMs
ImageName: Name of the qcow2 image (overcloud-full.qcow2 for example)
Version: OSP-Director version (12)
On Undercloud, create a directory named Nuage-OSPD-Dockerfiles on undercloud and copy all dockerfiles and nuage.repo file from this link to Nuage-OSPD-Dockerfiles.
On the undercloud, follow Red Hat documentation and configure overcloud to use a registry. Using the registry, generate /home/stack/templates/overcloud_images.yaml environment file, which contains container images location. Using this environment file, get the tag to which container images are pointed to.
DockerHeatEngineImage: registry.access.redhat.com/rhosp12/openstack-heat-engine:<tag>
example:
DockerHeatEngineImage: registry.access.redhat.com/rhosp12/openstack-heat-engine:12.0-20180104.2
For all dockerfiles in Nuage-OSPD-Dockerfiles, change the tag of the docker base image, to point to the same tag as in /home/stack/templates/overcloud_images.yaml. An example is shown below
FROM <docker-image-name>:<tag>
example:
FROM registry.access.redhat.com/rhosp12/openstack-heat-engine:12.0-20180104.2
Point the baseurl in nuage.repo to the url of Nuage repo which hosts all the required Nuage packages.
baseurl = <baseurl>
Run the below commands to build the Nuage docker images
By default on undercloud, local registry will be listening on port 8787.
Let us consider Undercloud IP as 192.0.2.1
#For Nuage Heat Engine
docker build -t <undercloud-ip>:8787/rhosp12/openstack-nuage-heat-engine:<tag> -f nuage-heat-engine-dockerfile .
Example:
docker build -t 192.0.2.1:8787/rhosp12/openstack-nuage-heat-engine:12.0-20180104.2 -f nuage-heat-engine-dockerfile .
#For Nuage Heat API and Heat API Cron because both these services point to the same docker image
docker build -t <undercloud-ip>:8787/rhosp12/openstack-nuage-heat-api:<tag> -f nuage-heat-api-dockerfile .
Example:
docker build -t 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api:12.0-20180104.2 -f nuage-heat-api-dockerfile .
#For Nuage Heat API-CFN
docker build -t <undercloud-ip>:8787/rhosp12/openstack-nuage-heat-api-cfn:<tag> -f nuage-heat-api-cfn-dockerfile .
Example:
docker build -t 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api-cfn:12.0-20180104.2 -f nuage-heat-api-cfn-dockerfile .
#For Nuage Horizon
docker build -t <undercloud-ip>:8787/rhosp12/openstack-nuage-horizon:<tag> -f nuage-horizon-dockerfile .
Example:
docker build -t 192.0.2.1:8787/rhosp12/openstack-nuage-horizon:12.0-20180104.2 -f nuage-horizon-dockerfile .
During the deployment, configure the Overcloud to use the Nuage container images instead of the Red Hat registry images by pushing the build Nuage container images to local registry.
docker push 192.0.2.1:8787/rhosp12/openstack-nuage-heat-engine:12.0-20180104.2
docker push 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api:12.0-20180104.2
docker push 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api-cfn:12.0-20180104.2
docker push 192.0.2.1:8787/rhosp12/openstack-nuage-horizon:12.0-20180104.2
Change the file /home/stack/templates/overcloud_images.yaml to point the heat, horizon and their config docker images to one in the local registry.
DockerHeatApiCfnConfigImage: 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api-cfn:12.0-20180104.2
DockerHeatApiCfnImage: 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api-cfn:12.0-20180104.2
DockerHeatApiConfigImage: 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api:12.0-20180104.2
DockerHeatApiImage: 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api:12.0-20180104.2
DockerHeatConfigImage: 192.0.2.1:8787/rhosp12/openstack-nuage-heat-api:12.0-20180104.2
DockerHeatEngineImage: 192.0.2.1:8787/rhosp12/openstack-nuage-heat-engine:12.0-20180104.2
DockerHorizonConfigImage: 192.0.2.1:8787/rhosp12/openstack-nuage-horizon:12.0-20180104.2
DockerHorizonImage: 192.0.2.1:8787/rhosp12/openstack-nuage-horizon:12.0-20180104.2
The undercloud deployment should proceed as per the OSP Director documentation. Follow all these steps before the openstack overcloud deploy
command.
For an Openstack installation, a CMS (Cloud Management System) ID needs to be generated to configure with Nuage VSD installation. The assumption is that Nuage VSD and Nuage VSC are already running before overcloud is deployed. Nuage VSD should be licensed.
Steps to generate it:
- Copy the folder to a machine that can reach VSD (typically the undercloud node)
- From the folder run the following command to generate CMS_ID:
python configure_vsd_cms_id.py --server <vsd-ip-address>:<vsd-port> --serverauth <vsd-username>:<vsd-password> --organization <vsd-organization> --auth_resource /me --serverssl True --base_uri /nuage/api/<vsp-version>"
example command :
python configure_vsd_cms_id.py --server 0.0.0.0:0 --serverauth username:password --organization organization --auth_resource /me --serverssl True --base_uri "/nuage/api/v5_0"
- The CMS ID will be displayed on the terminal as well as a copy of it will be stored in a file "cms_id.txt" in the same folder.
- This generated cms_id needs to be added to neutron-nuage-config.yaml template file for the parameter NeutronNuageCMSId.
Edit network-environment.yaml file in /usr/share/openstack-tripleo-heat-templates/environments/. The sample is provided in the "Sample Templates" section
Nuage uses default linux bridge and linux bonds. For this to take effect, following network files are changed.
/usr/share/openstack-tripleo-heat-templates/network/config/bond-with-vlans/controller.yaml
and
/usr/share/openstack-tripleo-heat-templates/network/config/bond-with-vlans/compute.yaml
The changes that are required are:
- Remove ovs_bridge and move the containing members one level up
- Change ovs_bond to linux_bond with the right bonding_options (For example, bonding_options: 'mode=active-backup')
- Change the interface names under network_config and linux_bond to reflect the interface names of the baremetal machines that are being used.
Example for /usr/share/openstack-tripleo-heat-templates/network/config/bond-with-vlans/controller.yaml
========
Original
========
properties:
group: script
config:
str_replace:
template:
get_file: ../../scripts/run-os-net-config.sh
params:
$network_config:
network_config:
- type: interface
name: nic1
use_dhcp: false
addresses:
- ip_netmask:
list_join:
- /
- - get_param: ControlPlaneIp
- get_param: ControlPlaneSubnetCidr
routes:
- ip_netmask: 169.254.169.254/32
next_hop:
get_param: EC2MetadataIp
- type: ovs_bridge
name: bridge_name
dns_servers:
get_param: DnsServers
members:
- type: ovs_bond
name: bond1
ovs_options:
get_param: BondInterfaceOvsOptions
members:
- type: interface
name: nic2
primary: true
- type: interface
name: nic3
- type: vlan
device: bond1
vlan_id:
get_param: ExternalNetworkVlanID
addresses:
- ip_netmask:
get_param: ExternalIpSubnet
routes:
- default: true
next_hop:
get_param: ExternalInterfaceDefaultRoute
- type: vlan
device: bond1
vlan_id:
get_param: InternalApiNetworkVlanID
addresses:
- ip_netmask:
get_param: InternalApiIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: StorageNetworkVlanID
addresses:
- ip_netmask:
get_param: StorageIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: StorageMgmtNetworkVlanID
addresses:
- ip_netmask:
get_param: StorageMgmtIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: TenantNetworkVlanID
addresses:
- ip_netmask:
get_param: TenantIpSubnet
==================================
Modified (changes are **marked**)
==================================
properties:
group: script
config:
str_replace:
template:
get_file: ../../scripts/run-os-net-config.sh
params:
$network_config:
network_config:
- type: interface
name: **eno1**
use_dhcp: false
addresses:
- ip_netmask:
list_join:
- /
- - get_param: ControlPlaneIp
- get_param: ControlPlaneSubnetCidr
routes:
- ip_netmask: 169.254.169.254/32
next_hop:
get_param: EC2MetadataIp
- type: **linux_bond**
name: bond1
dns_servers:
get_param: DnsServers
**bonding_options: 'mode=active-backup'**
members:
- type: interface
name: **eno2**
primary: true
- type: interface
name: **eno3**
- type: vlan
device: bond1
vlan_id:
get_param: ExternalNetworkVlanID
addresses:
- ip_netmask:
get_param: ExternalIpSubnet
routes:
- default: true
next_hop:
get_param: ExternalInterfaceDefaultRoute
- type: vlan
device: bond1
vlan_id:
get_param: InternalApiNetworkVlanID
addresses:
- ip_netmask:
get_param: InternalApiIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: StorageNetworkVlanID
addresses:
- ip_netmask:
get_param: StorageIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: StorageMgmtNetworkVlanID
addresses:
- ip_netmask:
get_param: StorageMgmtIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: TenantNetworkVlanID
addresses:
- ip_netmask:
get_param: TenantIpSubnet
Example for /usr/share/openstack-tripleo-heat-templates/network/config/bond-with-vlans/compute.yaml
========
Original
========
properties:
group: script
config:
str_replace:
template:
get_file: ../../scripts/run-os-net-config.sh
params:
$network_config:
network_config:
- type: interface
name: nic1
use_dhcp: false
dns_servers:
get_param: DnsServers
addresses:
- ip_netmask:
list_join:
- /
- - get_param: ControlPlaneIp
- get_param: ControlPlaneSubnetCidr
routes:
- ip_netmask: 169.254.169.254/32
next_hop:
get_param: EC2MetadataIp
- default: true
next_hop:
get_param: ControlPlaneDefaultRoute
- type: ovs_bridge
name: bridge_name
members:
- type: ovs_bond
name: bond1
ovs_options:
get_param: BondInterfaceOvsOptions
members:
- type: interface
name: nic2
primary: true
- type: interface
name: nic3
- type: vlan
device: bond1
vlan_id:
get_param: InternalApiNetworkVlanID
addresses:
- ip_netmask:
get_param: InternalApiIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: StorageNetworkVlanID
addresses:
- ip_netmask:
get_param: StorageIpSubnet
# Uncomment when including environments/hyperconverged-ceph.yaml
#- type: vlan
# device: bond1
# vlan_id: {get_param: StorageMgmtNetworkVlanID}
# addresses:
# - ip_netmask: {get_param: StorageMgmtIpSubnet}
- type: vlan
device: bond1
vlan_id:
get_param: TenantNetworkVlanID
addresses:
- ip_netmask:
get_param: TenantIpSubnet
# Uncomment when including environments/network-management.yaml
# If setting default route on the Management interface, comment
# out the default route on the Control Plane.
#- type: vlan
# device: bond1
# vlan_id: {get_param: ManagementNetworkVlanID}
# addresses:
# - ip_netmask: {get_param: ManagementIpSubnet}
# routes:
# - default: true
# next_hop: {get_param: ManagementInterfaceDefaultRoute}
==================================
Modified (changes are **marked**)
==================================
properties:
group: script
config:
str_replace:
template:
get_file: ../../scripts/run-os-net-config.sh
params:
$network_config:
network_config:
- type: interface
name: **eno1**
use_dhcp: false
dns_servers:
get_param: DnsServers
addresses:
- ip_netmask:
list_join:
- /
- - get_param: ControlPlaneIp
- get_param: ControlPlaneSubnetCidr
routes:
- ip_netmask: 169.254.169.254/32
next_hop:
get_param: EC2MetadataIp
- default: true
next_hop:
get_param: ControlPlaneDefaultRoute
- type: **linux_bond**
name: bond1
**bonding_options: 'mode=active-backup'**
members:
- type: interface
name: **eno2**
primary: true
- type: interface
name: **eno3**
- type: vlan
device: bond1
vlan_id:
get_param: InternalApiNetworkVlanID
addresses:
- ip_netmask:
get_param: InternalApiIpSubnet
- type: vlan
device: bond1
vlan_id:
get_param: StorageNetworkVlanID
addresses:
- ip_netmask:
get_param: StorageIpSubnet
# Uncomment when including environments/hyperconverged-ceph.yaml
#- type: vlan
# device: bond1
# vlan_id: {get_param: StorageMgmtNetworkVlanID}
# addresses:
# - ip_netmask: {get_param: StorageMgmtIpSubnet}
- type: vlan
device: bond1
vlan_id:
get_param: TenantNetworkVlanID
addresses:
- ip_netmask:
get_param: TenantIpSubnet
# Uncomment when including environments/network-management.yaml
# If setting default route on the Management interface, comment
# out the default route on the Control Plane.
#- type: vlan
# device: bond1
# vlan_id: {get_param: ManagementNetworkVlanID}
# addresses:
# - ip_netmask: {get_param: ManagementIpSubnet}
# routes:
# - default: true
# next_hop: {get_param: ManagementInterfaceDefaultRoute}
From OSPD 9 onwards, a verification step was added where the overcloud nodes will ping the gateway to verify connectivity on the external network vlan. Without this verification step the deployment would fail. This is the case in deployments with linux bonding and network isolation. For this verification step, the ExternalInterfaceDefaultRoute IP configured in the template network-environment.yaml should be reachable from the overcloud controller node(s) on the External API VLAN. This gateway can reside on the Undercloud as well. The gateway needs to be tagged with the same VLAN ID as that of the External API network of the controller.
Note: ExternalInterfaceDefaultRoute IP should be able to reach outside because overcloud controller uses this IP as default route to reach Red Hat Registry to pull the overcloud container images.
For OSP Director, tuskar deployment commands are recommended. But as part of Nuage integration effort, it was found that heat-templates provide more options and customization to overcloud deployment. The templates can be passed in "openstack overcloud deploy" command line options and can create or update an overcloud deployment.
For non-HA overcloud deployment, following command was used for deploying with Nuage:
openstack overcloud deploy --templates -e /home/stack/templates/overcloud_images.yaml -e /home/stack/templates/node-info.yaml -e /home/stack/templates/docker-insecure-registry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/neutron-nuage-config.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/nova-nuage-config.yaml --ntp-server ntp-server
For Virtual deployment, need to add --libvirt-type parameter as:
openstack overcloud deploy --templates --libvirt-type qemu -e /home/stack/templates/overcloud_images.yaml -e /home/stack/templates/node-info.yaml -e /home/stack/templates/docker-insecure-registry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/neutron-nuage-config.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/nova-nuage-config.yaml --ntp-server ntp-server
For HA overcloud deployment, following command was used for deploying with Nuage:
openstack overcloud deploy --templates -e /home/stack/templates/overcloud_images.yaml -e /home/stack/templates/node-info.yaml -e /home/stack/templates/docker-insecure-registry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/neutron-nuage-config.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/nova-nuage-config.yaml --ntp-server ntp-server
For Virtual deployment, need to add --libvirt-type parameter as:
openstack overcloud deploy --templates --libvirt-type qemu -e /home/stack/templates/overcloud_images.yaml -e /home/stack/templates/node-info.yaml -e /home/stack/templates/docker-insecure-registry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/neutron-nuage-config.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/nova-nuage-config.yaml --ntp-server ntp-server
where:
neutron-nuage-config.yaml is Controller specific parameter values
nova-nuage-config.yaml is Compute specific parameter values
docker-insecure-registry.yaml contains all local registry IPs and Ports for Insecure Registry parameter
node-info.yaml is Information specifies count and flavor for Controller and Compute nodes.
For linux bonding deployment with VLANs, following command was used for deploying with Nuage:
openstack overcloud deploy --templates -e /home/stack/templates/overcloud_images.yaml -e /home/stack/templates/docker-insecure-registry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/network-environment.yaml -e /home/stack/templates/node-info.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/network-isolation.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/net-bond-with-vlans.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/neutron-nuage-config.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/nova-nuage-config.yaml --ntp-server time1.gslb.alcatel-lucent.com
For linux bonding deployment with VLANs, following command was used for deploying with Nuage:
openstack overcloud deploy --templates -e /home/stack/templates/overcloud_images.yaml -e /home/stack/templates/docker-insecure-registry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/network-environment.yaml -e /home/stack/templates/node-info.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/network-isolation.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/net-bond-with-vlans.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/neutron-nuage-config.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/nova-nuage-config.yaml --ntp-server time1.gslb.alcatel-lucent.com
where:
network-environment.yaml: Configures additional network environment variables
network-isolation.yaml: Enables creation of networks for isolated overcloud traffic
net-bond-with-vlans.yaml: Configures an IP address and a pair of bonded nics on each network
neutron-nuage-config.yaml is Controller specific parameter values
nova-nuage-config.yaml is Compute specific parameter values
docker-insecure-registry.yaml contains all local registry IPs and Ports for Insecure Registry parameter
node-info.yaml is Information specifies count and flavor for Controller and Compute nodes.
network-environment.yaml
#This file is an example of an environment file for defining the isolated
#networks and related parameters.
resource_registry:
# Network Interface templates to use (these files must exist)
OS::TripleO::BlockStorage::Net::SoftwareConfig:
../network/config/bond-with-vlans/cinder-storage.yaml
OS::TripleO::Compute::Net::SoftwareConfig:
../network/config/bond-with-vlans/compute.yaml
OS::TripleO::Controller::Net::SoftwareConfig:
../network/config/bond-with-vlans/controller.yaml
OS::TripleO::ObjectStorage::Net::SoftwareConfig:
../network/config/bond-with-vlans/swift-storage.yaml
OS::TripleO::CephStorage::Net::SoftwareConfig:
../network/config/bond-with-vlans/ceph-storage.yaml
parameter_defaults:
# This section is where deployment-specific configuration is done
# CIDR subnet mask length for provisioning network
ControlPlaneSubnetCidr: '24'
# Gateway router for the provisioning network (or Undercloud IP)
ControlPlaneDefaultRoute: 192.0.2.1
EC2MetadataIp: 192.0.2.1 # Generally the IP of the Undercloud
# Customize the IP subnets to match the local environment
InternalApiNetCidr: 172.17.0.0/24
StorageNetCidr: 172.18.0.0/24
StorageMgmtNetCidr: 172.19.0.0/24
TenantNetCidr: 172.16.0.0/24
ExternalNetCidr: 10.0.0.0/24
# Customize the VLAN IDs to match the local environment
InternalApiNetworkVlanID: 20
StorageNetworkVlanID: 30
StorageMgmtNetworkVlanID: 40
TenantNetworkVlanID: 50
ExternalNetworkVlanID: 10
# Customize the IP ranges on each network to use for static IPs and VIPs
InternalApiAllocationPools: [{'start': '172.17.0.10', 'end': '172.17.0.200'}]
StorageAllocationPools: [{'start': '172.18.0.10', 'end': '172.18.0.200'}]
StorageMgmtAllocationPools: [{'start': '172.19.0.10', 'end': '172.19.0.200'}]
TenantAllocationPools: [{'start': '172.16.0.10', 'end': '172.16.0.200'}]
# Leave room if the external network is also used for floating IPs
ExternalAllocationPools: [{'start': '10.0.0.10', 'end': '10.0.0.50'}]
# Gateway router for the external network
ExternalInterfaceDefaultRoute: 10.0.0.1
# Uncomment if using the Management Network (see network-management.yaml)
# ManagementNetCidr: 10.0.1.0/24
# ManagementAllocationPools: [{'start': '10.0.1.10', 'end': '10.0.1.50'}]
# Use either this parameter or ControlPlaneDefaultRoute in the NIC templates
# ManagementInterfaceDefaultRoute: 10.0.1.1
# Define the DNS servers (maximum 2) for the overcloud nodes
DnsServers: ["135.1.1.111","135.227.146.166"]
# List of Neutron network types for tenant networks (will be used in order)
NeutronNetworkType: 'vxlan,vlan'
# The tunnel type for the tenant network (vxlan or gre). Set to '' to disable tunneling.
NeutronTunnelTypes: 'vxlan'
# Neutron VLAN ranges per network, for example 'datacentre:1:499,tenant:500:1000':
NeutronNetworkVLANRanges: 'datacentre:1:1000'
# Customize bonding options, e.g. "mode=4 lacp_rate=1 updelay=1000 miimon=100"
# for Linux bonds w/LACP, or "bond_mode=active-backup" for OVS active/backup.
BondInterfaceOvsOptions: "bond_mode=active-backup"
neutron-nuage-config.yaml
# A Heat environment file which can be used to enable a
# a Neutron Nuage backend on the controller, configured via puppet
resource_registry:
OS::TripleO::Services::NeutronDhcpAgent: OS::Heat::None
OS::TripleO::Services::NeutronL3Agent: OS::Heat::None
OS::TripleO::Services::NeutronMetadataAgent: OS::Heat::None
OS::TripleO::Services::NeutronOvsAgent: OS::Heat::None
OS::TripleO::Services::ComputeNeutronOvsAgent: OS::Heat::None
# Override the NeutronCorePlugin to use Nuage
OS::TripleO::Services::NeutronCorePlugin: OS::TripleO::Services::NeutronCorePluginML2Nuage
parameter_defaults:
NeutronNuageNetPartitionName: 'Nuage_Partition_12'
NeutronNuageVSDIp: '192.0.2.118:8443'
NeutronNuageVSDUsername: 'csproot'
NeutronNuageVSDPassword: 'csproot'
NeutronNuageVSDOrganization: 'csp'
NeutronNuageBaseURIVersion: 'v5_0'
NeutronNuageCMSId: 'a91a28b8-28de-436b-a665-6d08a9346464'
UseForwardedFor: true
NeutronServicePlugins: 'NuagePortAttributes,NuageAPI,NuageL3'
NeutronDBSyncExtraParams: '--config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/ml2_conf.ini --config-file /etc/neutron/plugins/nuage/plugin.ini'
NeutronTypeDrivers: 'vlan,vxlan,flat'
NeutronNetworkType: 'vxlan'
NeutronMechanismDrivers: 'nuage'
NeutronPluginExtensions: 'nuage_subnet,nuage_port,port_security'
NeutronFlatNetworks: '*'
NeutronTunnelIdRanges: ''
NeutronNetworkVLANRanges: ''
NeutronVniRanges: '1001:2000'
NovaOVSBridge: 'alubr0'
NeutronMetadataProxySharedSecret: 'NuageNetworksSharedSecret'
InstanceNameTemplate: 'inst-%08x'
HeatEnginePluginDirs: ['/usr/lib/python2.7/site-packages/nuage-heat/']
HorizonCustomizationModule: 'nuage_horizon.customization'
HorizonVhostExtraParams:
add_listen: true
priority: 10
access_log_format: '%a %l %u %t \"%r\" %>s %b \"%%{}{Referer}i\" \"%%{}{User-Agent}i\"'
aliases: [{'alias': '%{root_url}/static/nuage', 'path': '/usr/lib/python2.7/site-packages/nuage_horizon/static'}, {'alias': '%{root_url}/static', 'path': '/usr/share/openstack-dashboard/static'}]
directories: [{'path': '/usr/lib/python2.7/site-packages/nuage_horizon', 'options': ['FollowSymLinks'], 'allow_override': ['None'], 'require': 'all granted'}]
nova-nuage-config.yaml for Baremetal Setup
# A Heat environment file which can be used to enable
# Nuage backend on the compute, configured via puppet
resource_registry:
OS::TripleO::Services::ComputeNeutronCorePlugin: OS::TripleO::Services::ComputeNeutronCorePluginNuage
parameter_defaults:
NuageActiveController: '192.0.2.119'
NuageStandbyController: '0.0.0.0'
NovaPCIPassthrough: ""
NovaOVSBridge: 'alubr0'
NovaComputeLibvirtType: 'kvm'
NovaIPv6: False
NuageMetadataProxySharedSecret: 'NuageNetworksSharedSecret'
NuageNovaApiEndpoint: 'internalURL'
nova-nuage-config.yaml for Virtual Setup
# A Heat environment file which can be used to enable
# Nuage backend on the compute, configured via puppet
resource_registry:
OS::TripleO::Services::ComputeNeutronCorePlugin: OS::TripleO::Services::ComputeNeutronCorePluginNuage
parameter_defaults:
NuageActiveController: '192.0.2.119'
NuageStandbyController: '0.0.0.0'
NovaPCIPassthrough: ""
NovaOVSBridge: 'alubr0'
NovaComputeLibvirtType: 'qemu'
NovaIPv6: False
NuageMetadataProxySharedSecret: 'NuageNetworksSharedSecret'
NuageNovaApiEndpoint: 'internalURL'
docker-insecure-registry.yaml
parameter_defaults:
DockerInsecureRegistryAddress: ['192.0.2.1:8787']
node-info.yaml for Non-HA and Linux-bond Non-HA
# Compute and Controller count can be set here
parameter_defaults:
ControllerCount: 1
ComputeCount: 3
node-info.yaml for HA and Linux-bond HA
# Compute and Controller count can be set here
parameter_defaults:
ControllerCount: 3
ComputeCount: 1
This section described the details of the parameters specified in the template files. Also, the configuration files where these parameters are set and used. See OpenStack Pike user guide install section for more details.
The following parameters are mapped to values in /etc/neutron/plugins/nuage/plugin.ini file on the neutron controller
NeutronNuageNetPartitionName
Maps to default_net_partition_name parameter
NeutronNuageVSDIp
Maps to server parameter
NeutronNuageVSDUsername
NeutronNuageVSDPassword
Maps to serverauth as username:password
NeutronNuageVSDOrganization
Maps to organization parameter
NeutronNuageBaseURIVersion
Maps to the version in base_uri as /nuage/api/<version>
NeutronNuageCMSId
Maps to the cms_id parameter
The following parameters are mapped to values in /etc/neutron/neutron.conf file on the neutron controller
NeutronCorePlugin
Maps to core_plugin parameter in [DEFAULT] section
NeutronServicePlugins
Maps to service_plugins parameter in [DEFAULT] section
The following parameters are mapped to values in /etc/nova/nova.conf file on the neutron controller
UseForwardedFor
Maps to use_forwarded_for parameter in [DEFAULT] section
NeutronMetadataProxySharedSecret
Maps to metadata_proxy_shared_secret parameter in [neutron] section
InstanceNameTemplate
Maps to instance_name_template parameter in [DEFAULT] section
The following parameters are mapped to values in /etc/neutron/plugins/ml2/ml2_conf.ini file on the neutron controller
NeutronNetworkType
Maps to tenant_network_types in [ml2] section
NeutronPluginExtensions
Maps to extension_drivers in [ml2] section
NeutronTypeDrivers
Maps to type_drivers in [ml2] section
NeutronMechanismDrivers
Maps to mechanism_drivers in [ml2] section
NeutronFlatNetworks
Maps to flat_networks parameter in [ml2_type_flat] section
NeutronTunnelIdRanges
Maps to tunnel_id_ranges in [ml2_type_gre] section
NeutronNetworkVLANRanges
Maps to network_vlan_ranges in [ml2_type_vlan] section
NeutronVniRanges
Maps to vni_ranges in [ml2_type_vxlan] section
The following parameters are used for setting/disabling services in undercloud's puppet code
OS::TripleO::Services::NeutronDHCPAgent
OS::TripleO::Services::NeutronL3Agent
OS::TripleO::Services::NeutronMetadataAgent
OS::TripleO::Services::NeutronOVSAgent
These parameters are used to disable the OpenStack default services as these are not used with Nuage integrated OpenStack cluster
The following parameter is used for setting values on the Controller using puppet code
NeutronNuageDBSyncExtraParams
String of extra command line parameters to append to the neutron-db-manage upgrade head command
The following parameters are mapped to values in /etc/default/openvswitch file on the nova compute
NuageActiveController
Maps to ACTIVE_CONTROLLER parameter
NuageStandbyController
Maps to STANDBY_CONTROLLER parameter
The following parameters are mapped to values in /etc/nova/nova.conf file on the nova compute
NovaOVSBridge
Maps to ovs_bridge parameter in [neutron] section
NovaComputeLibvirtType
Maps to virt_type parameter in [libvirt] section
NovaIPv6
Maps to use_ipv6 in [DEFAULT] section
The following parameters are mapped to values in /etc/default/nuage-metadata-agent file on the nova compute
NuageMetadataProxySharedSecret
Maps to METADATA_PROXY_SHARED_SECRET parameter. This need to match the setting in neutron controller above
NuageNovaApiEndpoint
Maps to NOVA_API_ENDPOINT_TYPE parameter. This needs to correspond to the setting for the Nova API endpoint as configured by OSP Director
DockerInsecureRegistryAddress
The IP Address and Port of an insecure docker namespace that will be configured in /etc/sysconfig/docker.
The value can be multiple addresses separated by commas.
Then for the node that was shutdown
nova start <node_name> as in overcloud-controller-0
Once the node is up, execute the following on the node
pcs cluster start --all
pcs status
If the services do not come up, then try
pcs resource cleanup
virt-customize: error: libguestfs error: could not create appliance through
libvirt.
Try running qemu directly without libvirt using this environment variable:
export LIBGUESTFS_BACKEND=direct
Run the following command before executing the script
export LIBGUESTFS_BACKEND=direct
openstack baremetal import --json instackenv.json
No valid host was found. Reason: No conductor service registered which supports driver pxe_ipmitool. (HTTP 404)
Workaround: Install python package python-dracclient and restart ironic-conductor service. Then try the command again
sudo yum install -y python-dracclient
exit (go to root user)
systemctl restart openstack-ironic-conductor
su - stack (switch to stack user)
source stackrc (source stackrc)
[stack@instack ~]$ heat stack-list
WARNING (shell) "heat stack-list" is deprecated, please use "openstack stack list" instead
+----+------------+--------------+---------------+--------------+
| id | stack_name | stack_status | creation_time | updated_time |
+----+------------+--------------+---------------+--------------+
+----+------------+--------------+---------------+--------------+
[stack@instack ~]$ nova list
+----+------+--------+------------+-------------+----------+
| ID | Name | Status | Task State | Power State | Networks |
+----+------+--------+------------+-------------+----------+
+----+------+--------+------------+-------------+----------+
[stack@instack ~]$ ironic node-list
+--------------------------------------+------+--------------------------------------+-------------+--------------------+-------------+
| UUID | Name | Instance UUID | Power State | Provisioning State | Maintenance |
+--------------------------------------+------+--------------------------------------+-------------+--------------------+-------------+
| 9e57d620-3ec5-4b5e-96b1-bf56cce43411 | None | 1b7a6e50-3c15-4228-85d4-1f666a200ad5 | power off | available | False |
| 88b73085-1c8e-4b6d-bd0b-b876060e2e81 | None | 31196811-ee42-4df7-b8e2-6c83a716f5d9 | power off | available | False |
| d3ac9b50-bfe4-435b-a6f8-05545cd4a629 | None | 2b962287-6e1f-4f75-8991-46b3fa01e942 | power off | available | False |
+--------------------------------------+------+--------------------------------------+-------------+--------------------+-------------+
Workaround: Manually remove instance_uuid reference
ironic node-update <node_uuid> remove instance_uuid
E.g. ironic node-update 9e57d620-3ec5-4b5e-96b1-bf56cce43411 remove instance_uuid