48a935d7c8
Neutron team has reportedly addressed issues with uWSGI for the service including OVN within [1]. Solution requires deployment of 2 new services while one should be running whenever WSGI is used, where second is needed specifically for OVN scenario. neutron-ovn-maintenance-worker is conditionally enabled to avoid systemd service deployment for non-OVN scenarios, as we do not support switching neutron_plugin_type back and force at the moment. [1] https://bugs.launchpad.net/neutron/+bug/1912359 Depends-On: https://review.opendev.org/c/openstack/openstack-ansible/+/935664 Change-Id: I9340d1dc94a6aa1a962bdc10b97439aa1fdc8658
705 lines
29 KiB
YAML
705 lines
29 KiB
YAML
---
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
###
|
|
### Verbosity Options
|
|
###
|
|
|
|
debug: False
|
|
|
|
|
|
###
|
|
### Service setup options
|
|
###
|
|
|
|
# Set the host which will execute the shade modules
|
|
# for the service setup. The host must already have
|
|
# clouds.yaml properly configured.
|
|
neutron_service_setup_host: "{{ openstack_service_setup_host | default('localhost') }}"
|
|
neutron_service_setup_host_python_interpreter: >-
|
|
{{
|
|
openstack_service_setup_host_python_interpreter | default(
|
|
(neutron_service_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable']))
|
|
}}
|
|
|
|
###
|
|
### Packages Options
|
|
###
|
|
|
|
# Set the package install state for distribution
|
|
# Options are 'present' and 'latest'
|
|
neutron_package_state: "{{ package_state | default('latest') }}"
|
|
|
|
# Set installation method.
|
|
neutron_install_method: "{{ service_install_method | default('source') }}"
|
|
neutron_venv_python_executable: "{{ openstack_venv_python_executable | default('python3') }}"
|
|
|
|
###
|
|
### Python code details
|
|
###
|
|
|
|
# Set the package install state for pip_package
|
|
# Options are 'present' and 'latest'
|
|
neutron_pip_package_state: "latest"
|
|
|
|
# Source git repo/branch settings
|
|
neutron_git_repo: https://opendev.org/openstack/neutron
|
|
neutron_git_install_branch: master
|
|
neutron_fwaas_git_repo: https://opendev.org/openstack/neutron-fwaas
|
|
neutron_fwaas_git_install_branch: master
|
|
neutron_vpnaas_git_repo: https://opendev.org/openstack/neutron-vpnaas
|
|
neutron_vpnaas_git_install_branch: master
|
|
neutron_dynamic_routing_git_repo: https://opendev.org/openstack/neutron-dynamic-routing
|
|
neutron_dynamic_routing_git_install_branch: master
|
|
networking_odl_git_repo: https://opendev.org/openstack/networking-odl
|
|
networking_odl_git_install_branch: master
|
|
networking_ovn_bgp_git_repo: https://opendev.org/openstack/ovn-bgp-agent
|
|
networking_ovn_bgp_install_branch: master
|
|
networking_sfc_git_repo: https://opendev.org/openstack/networking-sfc
|
|
networking_sfc_git_install_branch: master
|
|
networking_bgpvpn_git_repo: https://opendev.org/openstack/networking-bgpvpn
|
|
networking_bgpvpn_git_install_branch: master
|
|
ceilometer_git_repo: https://opendev.org/openstack/ceilometer
|
|
ceilometer_git_install_branch: master
|
|
networking_baremetal_git_repo: https://opendev.org/openstack/networking-baremetal
|
|
networking_baremetal_git_install_branch: master
|
|
networking_generic_switch_git_repo: https://opendev.org/openstack/networking-generic-switch
|
|
networking_generic_switch_git_install_branch: master
|
|
networking_nsx_git_repo: https://opendev.org/x/vmware-nsx
|
|
networking_nsx_git_install_branch: master
|
|
networking_nsxlib_git_repo: https://opendev.org/x/vmware-nsxlib
|
|
networking_nsxlib_git_install_branch: master
|
|
|
|
neutron_upper_constraints_url: >-
|
|
{{ requirements_git_url | default('https://releases.openstack.org/constraints/upper/' ~ requirements_git_install_branch | default('master')) }}
|
|
neutron_git_constraints:
|
|
- "--constraint {{ neutron_upper_constraints_url }}"
|
|
|
|
neutron_pip_install_args: "{{ pip_install_options | default('') }}"
|
|
|
|
# Name of the virtual env to deploy into
|
|
neutron_venv_tag: "{{ venv_tag | default('untagged') }}"
|
|
|
|
###
|
|
### Generic Neutron Config
|
|
###
|
|
|
|
# Fatal Deprecations
|
|
neutron_fatal_deprecations: False
|
|
|
|
# If ``neutron_api_workers`` is unset the system will use half the number of available VCPUs to
|
|
# compute the number of api workers to use with a default capping value of 16.
|
|
# neutron_api_workers: 16
|
|
|
|
## Cap the maximun number of threads / workers when a user value is unspecified.
|
|
neutron_api_threads_max: 16
|
|
neutron_api_threads: "{{ [[ansible_facts['processor_vcpus'] | default(2) // 2, 1] | max, neutron_api_threads_max] | min }}"
|
|
|
|
neutron_agent_down_time: 120
|
|
neutron_agent_polling_interval: 5
|
|
neutron_report_interval: "{{ neutron_agent_down_time | int / 2 | int }}"
|
|
|
|
neutron_dns_domain: "{{ dhcp_domain | default('openstacklocal.') }}"
|
|
|
|
# If ``neutron_num_sync_threads`` is unset, the system will use the value of
|
|
# neutron_api_threads in templates/dhcp_agent.ini.j2 for num_sync_threads.
|
|
# neutron_num_sync_threads: 4
|
|
|
|
###
|
|
### DNSMasq configuration
|
|
###
|
|
# Dnsmasq doesn't work with config_template override, a deployer
|
|
# should instead configure its own neutron_dhcp_config key/values like this:
|
|
# neutron_dhcp_config:
|
|
# dhcp-option-force: "26,1500"
|
|
neutron_dhcp_config: {}
|
|
|
|
# Dnsmasq has furthermore some options in its configuration that are not
|
|
# key/value pairs but just options. A deployer can configure those with this
|
|
# list:
|
|
neutron_dhcp_config_list: []
|
|
|
|
# Disable dnsmasq to resolve DNS via local resolv.conf.
|
|
# When dnsmasq_dns_servers are not set,
|
|
# and neutron_dnsmasq_noresolv is set to True, dnsmasq will reply with
|
|
# empty respose on DNS requests.
|
|
neutron_dnsmasq_noresolv: False
|
|
|
|
###
|
|
### Tunable Overrides (Sorted alphabetically)
|
|
###
|
|
|
|
# These variables facilitate adding config file entries
|
|
# for anything supported by the service. See the section
|
|
# 'Overriding OpenStack configuration defaults' in the
|
|
# 'Advanced configuration' appendix of the Deploy Guide.
|
|
neutron_api_paste_ini_overrides: {}
|
|
neutron_bgp_dragent_ini_overrides: {}
|
|
neutron_bgp_dragent_init_overrides: {}
|
|
neutron_dhcp_agent_ini_overrides: {}
|
|
neutron_dhcp_agent_init_overrides: {}
|
|
neutron_ironic_neutron_agent_ini_overrides: {}
|
|
neutron_ironic_neutron_agent_init_overrides: {}
|
|
neutron_l3_agent_ini_overrides: {}
|
|
neutron_l3_agent_init_overrides: {}
|
|
neutron_linuxbridge_agent_ini_overrides: {}
|
|
neutron_linuxbridge_agent_init_overrides: {}
|
|
neutron_metadata_agent_ini_overrides: {}
|
|
neutron_metadata_agent_init_overrides: {}
|
|
neutron_metering_agent_ini_overrides: {}
|
|
neutron_metering_agent_init_overrides: {}
|
|
neutron_ml2_conf_ini_overrides: {}
|
|
neutron_ml2_conf_genericswitch_ini_overrides: {}
|
|
neutron_neutron_conf_overrides: {}
|
|
neutron_nuage_conf_ini_overrides: {}
|
|
neutron_openvswitch_agent_ini_overrides: {}
|
|
neutron_openvswitch_agent_init_overrides: {}
|
|
neutron_ovn_bgp_agent_ini_overrides: {}
|
|
neutron_ovn_bgp_agent_init_overrides: {}
|
|
neutron_nsx_conf_ini_overrides: {}
|
|
# Provide a list of access controls to update the default policy.json with.
|
|
# These changes will be merged
|
|
# with the access controls in the default policy.json. E.g.
|
|
# neutron_policy_overrides:
|
|
# "create_subnet": "rule:admin_or_network_owner"
|
|
# "get_subnet": "rule:admin_or_owner or rule:shared"
|
|
neutron_policy_overrides: {}
|
|
_neutron_rootwrap_conf_overrides:
|
|
DEFAULT:
|
|
filters_path: "{{ neutron_conf_dir }}/rootwrap.d,/usr/share/neutron/rootwrap"
|
|
exec_dirs: "{{ neutron_bin }},/sbin,/usr/sbin,/bin,/usr/bin,/usr/local/bin,/usr/local/sbin,/etc/neutron/kill_scripts"
|
|
neutron_rootwrap_conf_overrides: {}
|
|
|
|
neutron_api_uwsgi_ini_overrides: {}
|
|
neutron_periodic_workers_init_overrides: {}
|
|
neutron_rpc_server_init_overrides: {}
|
|
neutron_server_init_overrides: {}
|
|
neutron_sriov_nic_agent_ini_overrides: {}
|
|
neutron_sriov_nic_agent_init_overrides: {}
|
|
neutron_ovn_maintenance_init_overrides: {}
|
|
neutron_ovn_metadata_agent_ini_overrides: {}
|
|
neutron_ovn_metadata_agent_init_overrides: {}
|
|
|
|
###
|
|
### UWSGI
|
|
###
|
|
neutron_use_uwsgi: True
|
|
neutron_wsgi_processes_max: 16
|
|
neutron_wsgi_processes: "{{ [[ansible_facts['processor_vcpus'] | default(1), 1] | max * 2, neutron_wsgi_processes_max] | min }}"
|
|
neutron_wsgi_threads: 1
|
|
neutron_uwsgi_tls:
|
|
crt: "{{ neutron_ssl_cert }}"
|
|
key: "{{ neutron_ssl_key }}"
|
|
|
|
###
|
|
### Quotas
|
|
###
|
|
|
|
neutron_default_quota: -1
|
|
neutron_quota_floatingip: 50
|
|
neutron_quota_health_monitor: -1
|
|
neutron_quota_member: -1
|
|
neutron_quota_network: 100
|
|
neutron_quota_network_gateway: 5
|
|
neutron_quota_packet_filter: 100
|
|
neutron_quota_pool: 10
|
|
neutron_quota_port: 500
|
|
neutron_quota_router: 10
|
|
neutron_quota_security_group: 10
|
|
neutron_quota_security_group_rule: 100
|
|
neutron_quota_subnet: 100
|
|
neutron_quota_vip: 10
|
|
neutron_quota_firewall: 10
|
|
neutron_quota_firewall_policy: 10
|
|
neutron_quota_firewall_rule: 100
|
|
|
|
###
|
|
### DB (Galera) integration
|
|
###
|
|
|
|
neutron_db_setup_host: "{{ openstack_db_setup_host | default('localhost') }}"
|
|
neutron_db_setup_python_interpreter: >-
|
|
{{
|
|
openstack_db_setup_python_interpreter | default(
|
|
(neutron_db_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable']))
|
|
}}
|
|
neutron_galera_address: "{{ galera_address | default('127.0.0.1') }}"
|
|
neutron_galera_user: neutron
|
|
neutron_galera_database: neutron
|
|
neutron_db_max_overflow: "{{ openstack_db_max_overflow | default('50') }}"
|
|
neutron_db_max_pool_size: "{{ openstack_db_max_pool_size | default('5') }}"
|
|
neutron_db_pool_timeout: "{{ openstack_db_pool_timeout | default('30') }}"
|
|
neutron_db_connection_recycle_time: "{{ openstack_db_connection_recycle_time | default('600') }}"
|
|
neutron_galera_use_ssl: "{{ galera_use_ssl | default(False) }}"
|
|
neutron_galera_ssl_ca_cert: "{{ galera_ssl_ca_cert | default('') }}"
|
|
neutron_galera_port: "{{ galera_port | default('3306') }}"
|
|
|
|
###
|
|
### Oslo Messaging
|
|
###
|
|
|
|
# RabbitMQ
|
|
|
|
neutron_oslomsg_heartbeat_in_pthread: "{{ oslomsg_heartbeat_in_pthread | default(False) }}"
|
|
|
|
# RPC
|
|
|
|
neutron_oslomsg_rpc_host_group: "{{ oslomsg_rpc_host_group | default('rabbitmq_all') }}"
|
|
neutron_oslomsg_rpc_setup_host: "{{ (neutron_oslomsg_rpc_host_group in groups) | ternary(groups[neutron_oslomsg_rpc_host_group][0], 'localhost') }}"
|
|
neutron_oslomsg_rpc_transport: "{{ oslomsg_rpc_transport | default('rabbit') }}"
|
|
neutron_oslomsg_rpc_servers: "{{ oslomsg_rpc_servers | default('127.0.0.1') }}"
|
|
neutron_oslomsg_rpc_port: "{{ oslomsg_rpc_port | default('5672') }}"
|
|
neutron_oslomsg_rpc_use_ssl: "{{ oslomsg_rpc_use_ssl | default(False) }}"
|
|
neutron_oslomsg_rpc_userid: neutron
|
|
neutron_oslomsg_rpc_policies: []
|
|
neutron_oslomsg_rpc_vhost:
|
|
- name: /neutron
|
|
state: "{{ neutron_oslomsg_rabbit_quorum_queues | ternary('absent', 'present') }}"
|
|
- name: neutron
|
|
state: "{{ neutron_oslomsg_rabbit_quorum_queues | ternary('present', 'absent') }}"
|
|
neutron_oslomsg_rpc_ssl_version: "{{ oslomsg_rpc_ssl_version | default('TLSv1_2') }}"
|
|
neutron_oslomsg_rpc_ssl_ca_file: "{{ oslomsg_rpc_ssl_ca_file | default('') }}"
|
|
|
|
# Notify
|
|
neutron_oslomsg_notify_configure: "{{ oslomsg_notify_configure | default(neutron_ceilometer_enabled) }}"
|
|
neutron_oslomsg_notify_host_group: "{{ oslomsg_notify_host_group | default('rabbitmq_all') }}"
|
|
neutron_oslomsg_notify_setup_host: >-
|
|
{{ (neutron_oslomsg_notify_host_group in groups) | ternary(groups[neutron_oslomsg_notify_host_group][0], 'localhost') }}
|
|
neutron_oslomsg_notify_transport: "{{ oslomsg_notify_transport | default('rabbit') }}"
|
|
neutron_oslomsg_notify_servers: "{{ oslomsg_notify_servers | default('127.0.0.1') }}"
|
|
neutron_oslomsg_notify_port: "{{ oslomsg_notify_port | default('5672') }}"
|
|
neutron_oslomsg_notify_use_ssl: "{{ oslomsg_notify_use_ssl | default(False) }}"
|
|
neutron_oslomsg_notify_userid: "{{ neutron_oslomsg_rpc_userid }}"
|
|
neutron_oslomsg_notify_password: "{{ neutron_oslomsg_rpc_password }}"
|
|
neutron_oslomsg_notify_vhost: "{{ neutron_oslomsg_rpc_vhost }}"
|
|
neutron_oslomsg_notify_ssl_version: "{{ oslomsg_notify_ssl_version | default('TLSv1_2') }}"
|
|
neutron_oslomsg_notify_ssl_ca_file: "{{ oslomsg_notify_ssl_ca_file | default('') }}"
|
|
neutron_oslomsg_notify_policies: []
|
|
|
|
###
|
|
### (Qdrouterd) integration
|
|
###
|
|
# TODO(evrardjp): Change structure when more backends will be supported
|
|
neutron_oslomsg_amqp1_enabled: "{{ neutron_oslomsg_rpc_transport == 'amqp' }}"
|
|
|
|
###
|
|
### (RabbitMQ) integration
|
|
###
|
|
neutron_oslomsg_rabbit_quorum_queues: "{{ oslomsg_rabbit_quorum_queues | default(True) }}"
|
|
neutron_oslomsg_rabbit_stream_fanout: "{{ oslomsg_rabbit_stream_fanout | default(neutron_oslomsg_rabbit_quorum_queues) }}"
|
|
neutron_oslomsg_rabbit_transient_quorum_queues: "{{ oslomsg_rabbit_transient_quorum_queues | default(neutron_oslomsg_rabbit_stream_fanout) }}"
|
|
neutron_oslomsg_rabbit_qos_prefetch_count: "{{ oslomsg_rabbit_qos_prefetch_count | default(neutron_oslomsg_rabbit_stream_fanout | ternary(10, 0)) }}"
|
|
neutron_oslomsg_rabbit_queue_manager: "{{ oslomsg_rabbit_queue_manager | default(neutron_oslomsg_rabbit_quorum_queues) }}"
|
|
neutron_oslomsg_rabbit_quorum_delivery_limit: "{{ oslomsg_rabbit_quorum_delivery_limit | default(0) }}"
|
|
neutron_oslomsg_rabbit_quorum_max_memory_bytes: "{{ oslomsg_rabbit_quorum_max_memory_bytes | default(0) }}"
|
|
neutron_rpc_thread_pool_size: 64
|
|
neutron_rpc_conn_pool_size: 30
|
|
neutron_rpc_response_timeout: 60
|
|
neutron_rpc_workers_max: 16
|
|
neutron_rpc_workers: >-
|
|
{{ [[(ansible_facts['processor_vcpus'] // ansible_facts['processor_threads_per_core']) | default(1), 1] | max * 2, neutron_rpc_workers_max] | min }}
|
|
|
|
###
|
|
### Identity (Keystone) integration
|
|
###
|
|
|
|
neutron_service_project_name: service
|
|
neutron_service_project_domain_id: default
|
|
neutron_service_user_domain_id: default
|
|
neutron_service_role_names:
|
|
- admin
|
|
- service
|
|
neutron_service_token_roles:
|
|
- service
|
|
neutron_service_token_roles_required: "{{ openstack_service_token_roles_required | default(True) }}"
|
|
neutron_service_user_name: neutron
|
|
neutron_service_name: neutron
|
|
neutron_service_type: network
|
|
neutron_service_description: "OpenStack Networking"
|
|
neutron_api_bind_address: "{{ openstack_service_bind_address | default('0.0.0.0') }}"
|
|
neutron_service_port: 9696
|
|
neutron_service_proto: http
|
|
neutron_service_publicuri_proto: "{{ openstack_service_publicuri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_adminuri_proto: "{{ openstack_service_adminuri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_internaluri_proto: "{{ openstack_service_internaluri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_publicuri: "{{ neutron_service_publicuri_proto }}://{{ external_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_publicurl: "{{ neutron_service_publicuri }}"
|
|
neutron_service_adminuri: "{{ neutron_service_adminuri_proto }}://{{ internal_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_adminurl: "{{ neutron_service_adminuri }}"
|
|
neutron_service_internaluri: "{{ neutron_service_internaluri_proto }}://{{ internal_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_internalurl: "{{ neutron_service_internaluri }}"
|
|
neutron_service_region: "{{ service_region | default('RegionOne') }}"
|
|
neutron_keystone_auth_plugin: "{{ neutron_keystone_auth_type }}"
|
|
neutron_keystone_auth_type: password
|
|
neutron_service_in_ldap: "{{ service_ldap_backend_enabled | default(False) }}"
|
|
|
|
###
|
|
### Availability zones
|
|
###
|
|
# Availability zone defines current AZ of the component. For OVN you can define
|
|
# multiple AZs separated with a colon, ie "az1:az2"
|
|
neutron_availability_zone: nova
|
|
|
|
# Default availability zones do define a list of zones to where routers/agents
|
|
# will be scheduled by default. This is a list, since a deployment might stretch
|
|
# networks across AZs.
|
|
# Default: Neutron will attempt scheduling across all defined AZs for Neutron hosts.
|
|
neutron_default_availability_zones: >-
|
|
{{
|
|
groups['neutron_all'] | map(
|
|
'extract', hostvars, 'neutron_availability_zone') | map(
|
|
'default', neutron_availability_zone) | map('split', ':') | flatten | unique
|
|
}}
|
|
|
|
###
|
|
### Telemetry integration
|
|
###
|
|
|
|
neutron_ceilometer_enabled: "{{ (groups['ceilometer_all'] is defined) and (groups['ceilometer_all'] | length > 0) }}"
|
|
|
|
###
|
|
### Designate integration
|
|
###
|
|
|
|
neutron_designate_enabled: "{{ (groups['designate_all'] is defined) and (groups['designate_all'] | length > 0) }}"
|
|
neutron_allow_reverse_dns_lookup: True
|
|
neutron_ipv4_ptr_zone_prefix_size: 24
|
|
neutron_ipv6_ptr_zone_prefix_size: 116
|
|
|
|
###
|
|
### Plugins Loading
|
|
###
|
|
|
|
# Other plugins can be added to the system by simply extending the list `neutron_plugin_base`.
|
|
# neutron_plugin_base:
|
|
# - router
|
|
# - firewall_v2
|
|
# - neutron_dynamic_routing.services.bgp.bgp_plugin.BgpPlugin
|
|
# - vpnaas
|
|
# - metering
|
|
# - qos
|
|
# - dns/dns_domain_ports/subnet_dns_publish_fixed_ip either one or the other, not both
|
|
# - port_forwarding
|
|
neutron_plugin_base:
|
|
- ovn-router
|
|
|
|
###
|
|
### Memcache override
|
|
###
|
|
neutron_memcached_servers: "{{ memcached_servers }}"
|
|
|
|
###
|
|
### ML2 Plugin Configuration
|
|
###
|
|
|
|
# The neutron core plugin (ML2) is defined with neutron_plugin_type,
|
|
# you can not load multiple ML2 plugins as core.
|
|
neutron_plugin_type: 'ml2.ovn'
|
|
|
|
# Additional ML2 plugins can be loaded with neutron_plugin_types (as list)
|
|
neutron_plugin_types: []
|
|
|
|
# ml2 network type drivers to load
|
|
neutron_ml2_drivers_type: "geneve,vlan,flat"
|
|
|
|
# Enable or disable L2 Population.
|
|
# When using ovs dvr it must be enabled
|
|
neutron_l2_population: "{{ neutron_plugin_type == 'ml2.ovs.dvr' }}"
|
|
|
|
neutron_vxlan_enabled: true
|
|
|
|
## The neutron multicast group address. This should be set as a host variable if used.
|
|
neutron_vxlan_group: "239.1.1.1"
|
|
|
|
# The neutron multicast time-to-live. Number of L3 hops before routers will drop the traffic
|
|
neutron_vxlan_ttl: 32
|
|
|
|
neutron_sriov_excluded_devices: ""
|
|
|
|
# neutron_local_ip is used for the VXLAN local tunnel endpoint
|
|
neutron_local_ip: "{{ tunnel_address | default('127.0.0.1') }}"
|
|
|
|
## Set this variable to configure the provider networks that will be available
|
|
## When setting up networking in things like the ml2_conf.ini file. Normally
|
|
## this will be defined as a host variable used within neutron as network configuration
|
|
## are likely to differ in between hosts.
|
|
# neutron_provider_networks:
|
|
# network_flat_networks: "flat"
|
|
# network_mappings: "flat:eth12,vlan:eth11"
|
|
# network_types: "vxlan,flat,vlan"
|
|
# network_vlan_ranges: "vlan:1:1,vlan:1024:1025"
|
|
# network_vxlan_ranges: "1:1000"
|
|
# network_geneve_ranges: "1:1000"
|
|
# network_sriov_mappings: "vlan:p4p1"
|
|
|
|
###
|
|
### L3 Agent Plugin Configuration
|
|
###
|
|
|
|
# L3HA configuration options
|
|
neutron_ha_vrrp_auth_type: PASS
|
|
neutron_l3_ha_net_cidr: 169.254.192.0/18
|
|
|
|
neutron_l3_cleanup_on_shutdown: False
|
|
|
|
## List of extensions enabled for L3
|
|
## The list can be extended by operator if needed, ie in user_variables.yml:
|
|
# neutron_l3_agent_extensions: "{{ _neutron_l3_agent_extensions + ['neutron_fip_qos'] }}"
|
|
neutron_l3_agent_extensions: "{{ _neutron_l3_agent_extensions }}"
|
|
|
|
# Specify the maximum number of L3 agents per tenant network. Defaults to the total number of agents deployed
|
|
# neutron_l3_agents_max: 2
|
|
|
|
###
|
|
### DHCP Agent Plugin Configuration
|
|
###
|
|
|
|
# Comma-separated list of DNS servers which will be used by dnsmasq as forwarders.
|
|
neutron_dnsmasq_dns_servers: ""
|
|
|
|
# Limit number of leases to prevent a denial-of-service.
|
|
neutron_dnsmasq_lease_max: 16777216
|
|
|
|
# Specify if dnsmasq should send a route to metadata server through DHCP 121 message to VM
|
|
neutron_dnsmasq_force_metadata: False
|
|
|
|
# Specify the maximum number of DHCP agents per tenant network. Defaults to the total number of agents deployed
|
|
# neutron_dhcp_agents_max: 2
|
|
|
|
###
|
|
### Metadata Agent Plugin Configuration
|
|
###
|
|
|
|
# If ``neutron_metadata_workers`` is unset the system will use half the number of available VCPUs to
|
|
# compute the number of api workers to use with a default capping value of 16.
|
|
# neutron_metadata_workers: 16
|
|
neutron_metadata_backlog: 4096
|
|
|
|
# The port used by neutron to access the nova metadata service.
|
|
neutron_nova_metadata_port: "{{ nova_metadata_port | default(8775) }}"
|
|
|
|
# The protocol used by neutron to access the nova metadata service.
|
|
neutron_nova_metadata_protocol: "{{ nova_metadata_protocol | default('http') }}"
|
|
|
|
# If the nova_metadata_protocol is using a self-signed cert, then
|
|
# this flag should be set to a boolean True.
|
|
neutron_nova_metadata_insecure: "{{ nova_metadata_insecure | default(False) }}"
|
|
|
|
###
|
|
### FWaaS Configuration
|
|
###
|
|
|
|
neutron_driver_fwaasv2: iptables_v2
|
|
neutron_fwaasv2_service_provider: FIREWALL_V2:fwaas_db:neutron_fwaas.services.firewall.service_drivers.agents.agents.FirewallAgentDriver:default
|
|
|
|
###
|
|
### VPNaaS Configuration
|
|
###
|
|
|
|
# See VPNaaS documentation for driver/service provider selection
|
|
# in case you want to override it.
|
|
neutron_driver_vpnaas: "{{ _neutron_driver_vpnaas }}"
|
|
neutron_vpnaas_service_provider: "{{ _neutron_vpnaas_service_provider }}"
|
|
|
|
# Set this variable to use custom config file for strongswan/openswan
|
|
# neutron_vpnaas_custom_config:
|
|
# - src: "/etc/openstack_deploy/strongswan/strongswan.conf.template"
|
|
# dest: "{{ neutron_conf_dir }}/strongswan.conf.template"
|
|
# condition: "{{ ansible_facts['os_family'] | lower == 'debian' }}"
|
|
|
|
neutron_vpnaas_custom_config: []
|
|
neutron_ovn_vpn_agent_overrides: {}
|
|
neutron_ovn_vpn_agent_init_overrides: {}
|
|
|
|
# OVN Defaults
|
|
neutron_ovn_ssl: True
|
|
ovn_proto: "{{ (neutron_ovn_ssl) | ternary('ssl', 'tcp') }}"
|
|
neutron_ovn_primary_cluster_node: "{{ groups[neutron_services['neutron-ovn-northd']['group']] | first }}"
|
|
neutron_ovn_northd_service_name: ovn-northd
|
|
neutron_ovn_controller_service_name: ovn-controller
|
|
neutron_ovn_l3_scheduler: leastloaded
|
|
neutron_ovn_distributed_fip: False
|
|
neutron_ovn_nb_connection: >-
|
|
{{ ovn_proto }}:{{ groups['neutron_ovn_northd'] | map('extract', hostvars, ['ansible_host']) | join(':6641,' + ovn_proto + ':') }}:6641
|
|
neutron_ovn_sb_connection: >-
|
|
{{ ovn_proto }}:{{ groups['neutron_ovn_northd'] | map('extract', hostvars, ['ansible_host']) | join(':6642,' + ovn_proto + ':') }}:6642
|
|
neutron_ovsdb_manager_host: 127.0.0.1
|
|
neutron_ovsdb_manager_port: 6640
|
|
neutron_ovsdb_manager_proto: tcp
|
|
neutron_ovsdb_manager: "p{{ [neutron_ovsdb_manager_proto, neutron_ovsdb_manager_port, neutron_ovsdb_manager_host] | select | join(':') }}"
|
|
neutron_ovsdb_manager_connection: "{{ [neutron_ovsdb_manager_proto, neutron_ovsdb_manager_host, neutron_ovsdb_manager_port] | select | join(':') }}"
|
|
neutron_ovn_sb_inactivity_probe: 60000
|
|
neutron_ovn_nb_inactivity_probe: 60000
|
|
|
|
# OVN BGP Agent
|
|
neutron_ovn_bgp_enable: False
|
|
neutron_ovn_bgp_agent_group: "{{ neutron_ovn_distributed_fip | ternary('neutron_ovn_controller', 'neutron_ovn_gateway') }}"
|
|
neutron_ovn_bgp_agent_driver: nb_ovn_bgp_driver
|
|
neutron_ovn_bgp_exposing_method: underlay
|
|
neutron_ovn_bgp_expose_tenant_networks: False
|
|
neutron_ovn_bgp_expose_ipv6_gua_tenant_networks: False
|
|
# Provide config needed for BGP peering
|
|
# neutron_ovn_bgp_config:
|
|
# AS: 64999
|
|
# nic: bgp-nic
|
|
# vrf: bgp-vrf
|
|
# vrf_table_id: 10
|
|
neutron_ovn_bgp_config: {}
|
|
neutron_frr_bgp_config: []
|
|
neutron_frr_staticd_routes: []
|
|
|
|
# This section is used when neutron_ovn_bgp_exposing_method
|
|
# is set to "ovn".
|
|
# This requires a standalone "local" cluster per node where
|
|
# ovn-bgp-agent runs.
|
|
neutron_ovn_bgp_local_nbdb: tcp:127.0.0.1:6641
|
|
neutron_ovn_bgp_local_nics: []
|
|
neutron_ovn_bgp_local_peers: []
|
|
neutron_ovn_bgp_provider_networks_prefixes: []
|
|
|
|
# Storage location for SSL certificate authority
|
|
neutron_ovn_pki_dir: "{{ openstack_pki_dir }}"
|
|
# Delegated host for operating the certificate authority
|
|
neutron_ovn_pki_setup_host: "{{ openstack_pki_setup_host | default('localhost') }}"
|
|
# The local address used for the neutron_ovn node
|
|
neutron_ovn_node_address: "{{ management_address | default('127.0.0.1') }}"
|
|
# neutron OVN server certificate
|
|
neutron_ovn_pki_keys_path: "{{ neutron_ovn_pki_dir ~ '/certs/private/' }}"
|
|
neutron_ovn_pki_certs_path: "{{ neutron_ovn_pki_dir ~ '/certs/certs/' }}"
|
|
neutron_ovn_pki_intermediate_cert_name: "{{ openstack_pki_service_intermediate_cert_name }}"
|
|
neutron_ovn_pki_intermediate_chain_path: >-
|
|
{{ neutron_ovn_pki_dir ~ '/roots/' ~ neutron_ovn_pki_intermediate_cert_name ~ '/certs/' ~ neutron_ovn_pki_intermediate_cert_name ~ '-chain.crt' }}
|
|
neutron_ovn_pki_regen_cert: ""
|
|
neutron_ovn_pki_certificates:
|
|
- name: "neutron_ovn_{{ ansible_facts['hostname'] }}"
|
|
provider: ownca
|
|
cn: "{{ ansible_facts['hostname'] }}"
|
|
san: "{{ 'DNS:' ~ ansible_facts['hostname'] ~ ',IP:' ~ neutron_ovn_node_address }}"
|
|
signed_by: "{{ neutron_ovn_pki_intermediate_cert_name }}"
|
|
|
|
# OVN destination files for SSL certificates
|
|
neutron_ovn_ssl_cert: "neutron_ovn.pem"
|
|
neutron_ovn_ssl_key: "neutron_ovn.key"
|
|
neutron_ovn_ssl_ca_cert: "neutron_ovn-ca.pem"
|
|
neutron_ovn_conf_dir: "/etc/openvswitch"
|
|
# Installation details for SSL certificates
|
|
neutron_ovn_pki_install_certificates:
|
|
- src: "{{ neutron_ovn_user_ssl_cert | default(neutron_ovn_pki_certs_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_cert] | join('/') }}"
|
|
owner: "{{ neutron_ovn_system_user_name }}"
|
|
group: "{{ neutron_ovn_system_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch and neutron_plugin_type == 'ml2.ovn') }}"
|
|
- src: "{{ neutron_ovn_user_ssl_key | default(neutron_ovn_pki_keys_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_key] | join('/') }}"
|
|
owner: "{{ neutron_ovn_system_user_name }}"
|
|
group: "{{ neutron_ovn_system_user_name }}"
|
|
mode: "0600"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_ca_cert | default(neutron_ovn_pki_intermediate_chain_path) }}"
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_ca_cert] | join('/') }}"
|
|
owner: "{{ (neutron_services['neutron-server']['group'] in group_names) | ternary(neutron_service_user_name, neutron_ovn_system_user_name) }}"
|
|
group: "{{ (neutron_services['neutron-server']['group'] in group_names) | ternary(neutron_service_user_name, neutron_ovn_system_user_name) }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch and neutron_plugin_type == 'ml2.ovn') }}"
|
|
- src: "{{ neutron_ovn_user_ssl_cert | default(neutron_ovn_pki_certs_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_cert] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services | length + uwsgi_neutron_services | length) > 0) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_key | default(neutron_ovn_pki_keys_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_key] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0600"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services | length + uwsgi_neutron_services | length) > 0) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_ca_cert | default(neutron_ovn_pki_intermediate_chain_path) }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_ca_cert] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services | length + uwsgi_neutron_services | length) > 0) }}"
|
|
|
|
# Define user-provided SSL certificates in:
|
|
# /etc/openstack_deploy/user_variables.yml
|
|
# neutron_ovnnb_user_ssl_cert: <path to cert on ansible deployment host>
|
|
# neutron_ovnnb_user_ssl_key: <path to cert on ansible deployment host>
|
|
# neutron_ovnsb_user_ssl_cert: <path to cert on ansible deployment host>
|
|
# neutron_ovnsb_user_ssl_key: <path to cert on ansible deployment host>
|
|
|
|
###
|
|
### DPDK Configuration
|
|
###
|
|
|
|
ovs_datapath: "netdev"
|
|
ovs_dpdk_pci_addresses: []
|
|
ovs_dpdk_driver: vfio-pci
|
|
ovs_dpdk_support: False
|
|
ovs_dpdk_lcore_mask: 1
|
|
ovs_dpdk_pmd_cpu_mask: 2
|
|
ovs_dpdk_socket_mem: "1024"
|
|
ovs_dpdk_nr_1g_pages: 0
|
|
ovs_dpdk_nr_2m_pages: 0
|
|
|
|
###
|
|
### Backend TLS
|
|
###
|
|
|
|
# Define if communication between haproxy and service backends should be
|
|
# encrypted with TLS.
|
|
neutron_backend_ssl: "{{ openstack_service_backend_ssl | default(False) }}"
|
|
|
|
# Storage location for SSL certificate authority
|
|
neutron_pki_dir: "{{ openstack_pki_dir | default('/etc/openstack_deploy/pki') }}"
|
|
|
|
# Delegated host for operating the certificate authority
|
|
neutron_pki_setup_host: "{{ openstack_pki_setup_host | default('localhost') }}"
|
|
|
|
# neutron server certificate
|
|
neutron_pki_keys_path: "{{ neutron_pki_dir ~ '/certs/private/' }}"
|
|
neutron_pki_certs_path: "{{ neutron_pki_dir ~ '/certs/certs/' }}"
|
|
neutron_pki_intermediate_cert_name: "{{ openstack_pki_service_intermediate_cert_name | default('ExampleCorpIntermediate') }}"
|
|
neutron_pki_regen_cert: ''
|
|
neutron_pki_san: "{{ openstack_pki_san | default('DNS:' ~ ansible_facts['hostname'] ~ ',IP:' ~ management_address) }}"
|
|
neutron_pki_certificates:
|
|
- name: "neutron_{{ ansible_facts['hostname'] }}"
|
|
provider: ownca
|
|
cn: "{{ ansible_facts['hostname'] }}"
|
|
san: "{{ neutron_pki_san }}"
|
|
signed_by: "{{ neutron_pki_intermediate_cert_name }}"
|
|
|
|
# neutron destination files for SSL certificates
|
|
neutron_ssl_cert: "{{ neutron_conf_version_dir }}/neutron.pem"
|
|
neutron_ssl_key: "{{ neutron_conf_version_dir }}/neutron.key"
|
|
|
|
# Installation details for SSL certificates
|
|
neutron_pki_install_certificates:
|
|
- src: "{{ neutron_user_ssl_cert | default(neutron_pki_certs_path ~ 'neutron_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
dest: "{{ neutron_ssl_cert }}"
|
|
owner: "{{ neutron_system_user_name }}"
|
|
group: "{{ neutron_system_user_name }}"
|
|
mode: "0644"
|
|
- src: "{{ neutron_user_ssl_key | default(neutron_pki_keys_path ~ 'neutron_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ neutron_ssl_key }}"
|
|
owner: "{{ neutron_system_user_name }}"
|
|
group: "{{ neutron_system_user_name }}"
|
|
mode: "0600"
|
|
|
|
# Define user-provided SSL certificates
|
|
# neutron_user_ssl_cert: <path to cert on ansible deployment host>
|
|
# neutron_user_ssl_key: <path to cert on ansible deployment host>
|