c4b74f4801
In some cases it may be desirable to run libvirt daemon on the host. For example, when mixing host and container OS distributions. This change makes it possible to disable the nova_libvirt container, by setting kolla_enable_nova_libvirt_container to false. The stackhpc.libvirt-host role is used in order to install and configure a libvirt daemon on compute hosts when kolla_enable_nova_libvirt_container is false. Depends-On: https://review.opendev.org/c/openstack/kolla-ansible/+/825357 Depends-On: https://review.opendev.org/c/openstack/kayobe-config-dev/+/829225 Depends-On: https://github.com/stackhpc/ansible-role-libvirt-host/pull/51 Story: 2009858 Task: 44495 Change-Id: I73fef63fb886a9d543d2f4231fb009523495edb3
27 lines
909 B
Django/Jinja
27 lines
909 B
Django/Jinja
---
|
|
# Use HTTPS opendev quay.io registry proxy.
|
|
docker_registry_insecure: no
|
|
|
|
# Most development environments will use nested virtualisation, and we can't
|
|
# guarantee that nested KVM support is available. Use QEMU as a lowest common
|
|
# denominator.
|
|
nova_compute_virt_type: qemu
|
|
|
|
# Reduce the control plane's memory footprint by limiting the number of worker
|
|
# processes to one per-service.
|
|
openstack_service_workers: "1"
|
|
openstack_service_rpc_workers: "1"
|
|
|
|
# Reduce size of libvirt logs when OpenStack debug logging is enabled
|
|
nova_libvirt_logging_debug: False
|
|
|
|
{% if tls_enabled %}
|
|
# TLS
|
|
kolla_copy_ca_into_containers: "yes"
|
|
kolla_enable_tls_backend: "yes"
|
|
openstack_cacert: "/etc/pki/tls/certs/ca-bundle.crt"
|
|
kolla_admin_openrc_cacert: "/etc/pki/tls/certs/ca-bundle.crt"
|
|
libvirt_tls: "yes"
|
|
certificates_libvirt_output_dir: "{% raw %}{{ kayobe_env_config_path }}{% endraw %}/certificates/libvirt"
|
|
{% endif %}
|