a68fe97981
By overriding the variable `neutron_backend_ssl: True` HTTPS will be enabled, disabling HTTP support on the neutron backend api. The ansible-role-pki is used to generate the required TLS certificates if this functionality is enabled. Depends-On: https://review.opendev.org/c/openstack/openstack-ansible/+/879085 Change-Id: I9f16f916d1ef3e5937c91f6b09a3d4073594ecb4
617 lines
25 KiB
YAML
617 lines
25 KiB
YAML
---
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
###
|
|
### Verbosity Options
|
|
###
|
|
|
|
debug: False
|
|
|
|
|
|
###
|
|
### Service setup options
|
|
###
|
|
|
|
# Set the host which will execute the shade modules
|
|
# for the service setup. The host must already have
|
|
# clouds.yaml properly configured.
|
|
neutron_service_setup_host: "{{ openstack_service_setup_host | default('localhost') }}"
|
|
neutron_service_setup_host_python_interpreter: "{{ openstack_service_setup_host_python_interpreter | default((neutron_service_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable'])) }}"
|
|
|
|
###
|
|
### Packages Options
|
|
###
|
|
|
|
# Set the package install state for distribution
|
|
# Options are 'present' and 'latest'
|
|
neutron_package_state: "{{ package_state | default('latest') }}"
|
|
|
|
# Set installation method.
|
|
neutron_install_method: "{{ service_install_method | default('source') }}"
|
|
neutron_venv_python_executable: "{{ openstack_venv_python_executable | default('python3') }}"
|
|
|
|
###
|
|
### Python code details
|
|
###
|
|
|
|
# Set the package install state for pip_package
|
|
# Options are 'present' and 'latest'
|
|
neutron_pip_package_state: "latest"
|
|
|
|
# Source git repo/branch settings
|
|
neutron_git_repo: https://opendev.org/openstack/neutron
|
|
neutron_git_install_branch: master
|
|
neutron_fwaas_git_repo: https://opendev.org/openstack/neutron-fwaas
|
|
neutron_fwaas_git_install_branch: master
|
|
neutron_vpnaas_git_repo: https://opendev.org/openstack/neutron-vpnaas
|
|
neutron_vpnaas_git_install_branch: master
|
|
neutron_dynamic_routing_git_repo: https://opendev.org/openstack/neutron-dynamic-routing
|
|
neutron_dynamic_routing_git_install_branch: master
|
|
networking_odl_git_repo: https://opendev.org/openstack/networking-odl
|
|
networking_odl_git_install_branch: master
|
|
networking_sfc_git_repo: https://opendev.org/openstack/networking-sfc
|
|
networking_sfc_git_install_branch: master
|
|
networking_bgpvpn_git_repo: https://opendev.org/openstack/networking-bgpvpn
|
|
networking_bgpvpn_git_install_branch: master
|
|
ceilometer_git_repo: https://opendev.org/openstack/ceilometer
|
|
ceilometer_git_install_branch: master
|
|
networking_baremetal_git_repo: https://opendev.org/openstack/networking-baremetal
|
|
networking_baremetal_git_install_branch: master
|
|
networking_generic_switch_git_repo: https://opendev.org/openstack/networking-generic-switch
|
|
networking_generic_switch_git_install_branch: master
|
|
networking_nsx_git_repo: https://opendev.org/x/vmware-nsx
|
|
networking_nsx_git_install_branch: master
|
|
networking_nsxlib_git_repo: https://opendev.org/x/vmware-nsxlib
|
|
networking_nsxlib_git_install_branch: master
|
|
|
|
neutron_upper_constraints_url: "{{ requirements_git_url | default('https://releases.openstack.org/constraints/upper/' ~ requirements_git_install_branch | default('master')) }}"
|
|
neutron_git_constraints:
|
|
- "--constraint {{ neutron_upper_constraints_url }}"
|
|
|
|
neutron_pip_install_args: "{{ pip_install_options | default('') }}"
|
|
|
|
# Name of the virtual env to deploy into
|
|
neutron_venv_tag: "{{ venv_tag | default('untagged') }}"
|
|
|
|
###
|
|
### Generic Neutron Config
|
|
###
|
|
|
|
# Fatal Deprecations
|
|
neutron_fatal_deprecations: False
|
|
|
|
# If ``neutron_api_workers`` is unset the system will use half the number of available VCPUs to
|
|
# compute the number of api workers to use with a default capping value of 16.
|
|
# neutron_api_workers: 16
|
|
|
|
## Cap the maximun number of threads / workers when a user value is unspecified.
|
|
neutron_api_threads_max: 16
|
|
neutron_api_threads: "{{ [[ansible_facts['processor_vcpus']|default(2) // 2, 1] | max, neutron_api_threads_max] | min }}"
|
|
|
|
neutron_agent_down_time: 120
|
|
neutron_agent_polling_interval: 5
|
|
neutron_report_interval: "{{ neutron_agent_down_time | int / 2 | int }}"
|
|
|
|
neutron_dns_domain: "{{ dhcp_domain | default('openstacklocal.') }}"
|
|
|
|
# If ``neutron_num_sync_threads`` is unset, the system will use the value of
|
|
# neutron_api_threads in templates/dhcp_agent.ini.j2 for num_sync_threads.
|
|
# neutron_num_sync_threads: 4
|
|
|
|
###
|
|
### DNSMasq configuration
|
|
###
|
|
# Dnsmasq doesn't work with config_template override, a deployer
|
|
# should instead configure its own neutron_dhcp_config key/values like this:
|
|
#neutron_dhcp_config:
|
|
# dhcp-option-force: "26,1500"
|
|
neutron_dhcp_config: {}
|
|
|
|
# Dnsmasq has furthermore some options in its configuration that are not
|
|
# key/value pairs but just options. A deployer can configure those with this
|
|
# list:
|
|
neutron_dhcp_config_list: []
|
|
|
|
# Disable dnsmasq to resolve DNS via local resolv.conf.
|
|
# When dnsmasq_dns_servers are not set,
|
|
# and neutron_dnsmasq_noresolv is set to True, dnsmasq will reply with
|
|
# empty respose on DNS requests.
|
|
neutron_dnsmasq_noresolv: False
|
|
|
|
###
|
|
### Tunable Overrides (Sorted alphabetically)
|
|
###
|
|
|
|
# These variables facilitate adding config file entries
|
|
# for anything supported by the service. See the section
|
|
# 'Overriding OpenStack configuration defaults' in the
|
|
# 'Advanced configuration' appendix of the Deploy Guide.
|
|
neutron_api_paste_ini_overrides: {}
|
|
neutron_bgp_dragent_ini_overrides: {}
|
|
neutron_bgp_dragent_init_overrides: {}
|
|
neutron_dhcp_agent_ini_overrides: {}
|
|
neutron_dhcp_agent_init_overrides: {}
|
|
neutron_ironic_neutron_agent_ini_overrides: {}
|
|
neutron_ironic_neutron_agent_init_overrides: {}
|
|
neutron_l3_agent_ini_overrides: {}
|
|
neutron_l3_agent_init_overrides: {}
|
|
neutron_linuxbridge_agent_ini_overrides: {}
|
|
neutron_linuxbridge_agent_init_overrides: {}
|
|
neutron_metadata_agent_ini_overrides: {}
|
|
neutron_metadata_agent_init_overrides: {}
|
|
neutron_metering_agent_ini_overrides: {}
|
|
neutron_metering_agent_init_overrides: {}
|
|
neutron_ml2_conf_ini_overrides: {}
|
|
neutron_ml2_conf_genericswitch_ini_overrides: {}
|
|
neutron_neutron_conf_overrides: {}
|
|
neutron_nuage_conf_ini_overrides: {}
|
|
neutron_opendaylight_conf_ini_overrides: {}
|
|
neutron_openvswitch_agent_ini_overrides: {}
|
|
neutron_openvswitch_agent_init_overrides: {}
|
|
neutron_nsx_conf_ini_overrides: {}
|
|
# Provide a list of access controls to update the default policy.json with.
|
|
# These changes will be merged
|
|
# with the access controls in the default policy.json. E.g.
|
|
#neutron_policy_overrides:
|
|
# "create_subnet": "rule:admin_or_network_owner"
|
|
# "get_subnet": "rule:admin_or_owner or rule:shared"
|
|
neutron_policy_overrides: {}
|
|
_neutron_rootwrap_conf_overrides:
|
|
DEFAULT:
|
|
filters_path: "{{ neutron_conf_dir }}/rootwrap.d,/usr/share/neutron/rootwrap"
|
|
exec_dirs: "{{ neutron_bin }},/sbin,/usr/sbin,/bin,/usr/bin,/usr/local/bin,/usr/local/sbin,/etc/neutron/kill_scripts"
|
|
neutron_rootwrap_conf_overrides: {}
|
|
|
|
neutron_api_uwsgi_ini_overrides: {}
|
|
neutron_server_init_overrides: {}
|
|
neutron_rpc_server_init_overrides: {}
|
|
neutron_sriov_nic_agent_ini_overrides: {}
|
|
neutron_sriov_nic_agent_init_overrides: {}
|
|
neutron_ovn_metadata_agent_ini_overrides: {}
|
|
neutron_ovn_metadata_agent_init_overrides: {}
|
|
|
|
###
|
|
### UWSGI
|
|
###
|
|
# NOTE(noonedeadpunk): uWSGI is still not fully supported. See: https://bugs.launchpad.net/neutron/+bug/1912359
|
|
neutron_use_uwsgi: "{{ (neutron_plugin_type not in ['ml2.ovn']) }}"
|
|
neutron_wsgi_processes_max: 16
|
|
neutron_wsgi_processes: "{{ [[ansible_processor_vcpus|default(1), 1] | max * 2, neutron_wsgi_processes_max] | min }}"
|
|
neutron_wsgi_threads: 1
|
|
neutron_uwsgi_tls:
|
|
crt: "{{ neutron_ssl_cert }}"
|
|
key: "{{ neutron_ssl_key }}"
|
|
|
|
###
|
|
### Quotas
|
|
###
|
|
|
|
neutron_default_quota: -1
|
|
neutron_quota_floatingip: 50
|
|
neutron_quota_health_monitor: -1
|
|
neutron_quota_member: -1
|
|
neutron_quota_network: 100
|
|
neutron_quota_network_gateway: 5
|
|
neutron_quota_packet_filter: 100
|
|
neutron_quota_pool: 10
|
|
neutron_quota_port: 500
|
|
neutron_quota_router: 10
|
|
neutron_quota_security_group: 10
|
|
neutron_quota_security_group_rule: 100
|
|
neutron_quota_subnet: 100
|
|
neutron_quota_vip: 10
|
|
neutron_quota_firewall: 10
|
|
neutron_quota_firewall_policy: 10
|
|
neutron_quota_firewall_rule: 100
|
|
|
|
###
|
|
### DB (Galera) integration
|
|
###
|
|
|
|
neutron_db_setup_host: "{{ openstack_db_setup_host | default('localhost') }}"
|
|
neutron_db_setup_python_interpreter: "{{ openstack_db_setup_python_interpreter | default((neutron_db_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable'])) }}"
|
|
neutron_galera_address: "{{ galera_address | default('127.0.0.1') }}"
|
|
neutron_galera_user: neutron
|
|
neutron_galera_database: neutron
|
|
neutron_db_max_overflow: "{{ openstack_db_max_overflow | default('50') }}"
|
|
neutron_db_max_pool_size: "{{ openstack_db_max_pool_size | default('5') }}"
|
|
neutron_db_pool_timeout: "{{ openstack_db_pool_timeout | default('30') }}"
|
|
neutron_db_connection_recycle_time: "{{ openstack_db_connection_recycle_time | default('600') }}"
|
|
neutron_galera_use_ssl: "{{ galera_use_ssl | default(False) }}"
|
|
neutron_galera_ssl_ca_cert: "{{ galera_ssl_ca_cert | default('') }}"
|
|
neutron_galera_port: "{{ galera_port | default('3306') }}"
|
|
|
|
###
|
|
### Oslo Messaging
|
|
###
|
|
|
|
# RabbitMQ
|
|
|
|
neutron_oslomsg_heartbeat_in_pthread: "{{ oslomsg_heartbeat_in_pthread | default(False) }}"
|
|
|
|
# RPC
|
|
|
|
neutron_oslomsg_rpc_host_group: "{{ oslomsg_rpc_host_group | default('rabbitmq_all') }}"
|
|
neutron_oslomsg_rpc_setup_host: "{{ (neutron_oslomsg_rpc_host_group in groups) | ternary(groups[neutron_oslomsg_rpc_host_group][0], 'localhost') }}"
|
|
neutron_oslomsg_rpc_transport: "{{ oslomsg_rpc_transport | default('rabbit') }}"
|
|
neutron_oslomsg_rpc_servers: "{{ oslomsg_rpc_servers | default('127.0.0.1') }}"
|
|
neutron_oslomsg_rpc_port: "{{ oslomsg_rpc_port | default('5672') }}"
|
|
neutron_oslomsg_rpc_use_ssl: "{{ oslomsg_rpc_use_ssl | default(False) }}"
|
|
neutron_oslomsg_rpc_userid: neutron
|
|
neutron_oslomsg_rpc_vhost: /neutron
|
|
neutron_oslomsg_rpc_ssl_version: "{{ oslomsg_rpc_ssl_version | default('TLSv1_2') }}"
|
|
neutron_oslomsg_rpc_ssl_ca_file: "{{ oslomsg_rpc_ssl_ca_file | default('') }}"
|
|
|
|
# Notify
|
|
|
|
neutron_oslomsg_notify_host_group: "{{ oslomsg_notify_host_group | default('rabbitmq_all') }}"
|
|
neutron_oslomsg_notify_setup_host: "{{ (neutron_oslomsg_notify_host_group in groups) | ternary(groups[neutron_oslomsg_notify_host_group][0], 'localhost') }}"
|
|
neutron_oslomsg_notify_transport: "{{ oslomsg_notify_transport | default('rabbit') }}"
|
|
neutron_oslomsg_notify_servers: "{{ oslomsg_notify_servers | default('127.0.0.1') }}"
|
|
neutron_oslomsg_notify_port: "{{ oslomsg_notify_port | default('5672') }}"
|
|
neutron_oslomsg_notify_use_ssl: "{{ oslomsg_notify_use_ssl | default(False) }}"
|
|
neutron_oslomsg_notify_userid: "{{ neutron_oslomsg_rpc_userid }}"
|
|
neutron_oslomsg_notify_password: "{{ neutron_oslomsg_rpc_password }}"
|
|
neutron_oslomsg_notify_vhost: "{{ neutron_oslomsg_rpc_vhost }}"
|
|
neutron_oslomsg_notify_ssl_version: "{{ oslomsg_notify_ssl_version | default('TLSv1_2') }}"
|
|
neutron_oslomsg_notify_ssl_ca_file: "{{ oslomsg_notify_ssl_ca_file | default('') }}"
|
|
|
|
###
|
|
### (Qdrouterd) integration
|
|
###
|
|
# TODO(evrardjp): Change structure when more backends will be supported
|
|
neutron_oslomsg_amqp1_enabled: "{{ neutron_oslomsg_rpc_transport == 'amqp' }}"
|
|
|
|
###
|
|
### (RabbitMQ) integration
|
|
###
|
|
|
|
neutron_rpc_thread_pool_size: 64
|
|
neutron_rpc_conn_pool_size: 30
|
|
neutron_rpc_response_timeout: 60
|
|
neutron_rpc_workers_max: 16
|
|
neutron_rpc_workers: "{{ [[(ansible_facts['processor_vcpus']//ansible_facts['processor_threads_per_core'])|default(1), 1] | max * 2, neutron_rpc_workers_max] | min }}"
|
|
|
|
###
|
|
### Identity (Keystone) integration
|
|
###
|
|
|
|
neutron_service_project_name: service
|
|
neutron_service_project_domain_id: default
|
|
neutron_service_user_domain_id: default
|
|
neutron_service_role_names:
|
|
- admin
|
|
- service
|
|
neutron_service_token_roles:
|
|
- service
|
|
neutron_service_token_roles_required: "{{ openstack_service_token_roles_required | default(True) }}"
|
|
neutron_service_user_name: neutron
|
|
neutron_service_name: neutron
|
|
neutron_service_type: network
|
|
neutron_service_description: "OpenStack Networking"
|
|
neutron_api_bind_address: "{{ openstack_service_bind_address | default('0.0.0.0') }}"
|
|
neutron_service_port: 9696
|
|
neutron_service_proto: http
|
|
neutron_service_publicuri_proto: "{{ openstack_service_publicuri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_adminuri_proto: "{{ openstack_service_adminuri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_internaluri_proto: "{{ openstack_service_internaluri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_publicuri: "{{ neutron_service_publicuri_proto }}://{{ external_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_publicurl: "{{ neutron_service_publicuri }}"
|
|
neutron_service_adminuri: "{{ neutron_service_adminuri_proto }}://{{ internal_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_adminurl: "{{ neutron_service_adminuri }}"
|
|
neutron_service_internaluri: "{{ neutron_service_internaluri_proto }}://{{ internal_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_internalurl: "{{ neutron_service_internaluri }}"
|
|
neutron_service_region: "{{ service_region | default('RegionOne') }}"
|
|
neutron_keystone_auth_plugin: "{{ neutron_keystone_auth_type }}"
|
|
neutron_keystone_auth_type: password
|
|
neutron_service_in_ldap: "{{ service_ldap_backend_enabled | default(False) }}"
|
|
|
|
###
|
|
### Telemetry integration
|
|
###
|
|
|
|
neutron_ceilometer_enabled: "{{ (groups['ceilometer_all'] is defined) and (groups['ceilometer_all'] | length > 0) }}"
|
|
|
|
###
|
|
### Designate integration
|
|
###
|
|
|
|
neutron_designate_enabled: "{{ (groups['designate_all'] is defined) and (groups['designate_all'] | length > 0) }}"
|
|
neutron_allow_reverse_dns_lookup: True
|
|
neutron_ipv4_ptr_zone_prefix_size: 24
|
|
neutron_ipv6_ptr_zone_prefix_size: 116
|
|
|
|
###
|
|
### Plugins Loading
|
|
###
|
|
|
|
# Other plugins can be added to the system by simply extending the list `neutron_plugin_base`.
|
|
# neutron_plugin_base:
|
|
# - router
|
|
# - firewall_v2
|
|
# - neutron_dynamic_routing.services.bgp.bgp_plugin.BgpPlugin
|
|
# - vpnaas
|
|
# - metering
|
|
# - qos
|
|
# - dns/dns_domain_ports/subnet_dns_publish_fixed_ip either one or the other, not both
|
|
# - port_forwarding
|
|
neutron_plugin_base:
|
|
- ovn-router
|
|
|
|
###
|
|
### Memcache override
|
|
###
|
|
neutron_memcached_servers: "{{ memcached_servers }}"
|
|
|
|
###
|
|
### ML2 Plugin Configuration
|
|
###
|
|
|
|
# The neutron core plugin (ML2) is defined with neutron_plugin_type,
|
|
# you can not load multiple ML2 plugins as core.
|
|
neutron_plugin_type: 'ml2.ovn'
|
|
|
|
# Additional ML2 plugins can be loaded with neutron_plugin_types (as list)
|
|
neutron_plugin_types: []
|
|
|
|
# ml2 network type drivers to load
|
|
neutron_ml2_drivers_type: "geneve,vlan,flat"
|
|
|
|
# Enable or disable L2 Population.
|
|
# When using ovs dvr it must be enabled
|
|
neutron_l2_population: "{{ neutron_plugin_type == 'ml2.ovs.dvr' }}"
|
|
|
|
neutron_vxlan_enabled: true
|
|
|
|
## The neutron multicast group address. This should be set as a host variable if used.
|
|
neutron_vxlan_group: "239.1.1.1"
|
|
|
|
# The neutron multicast time-to-live. Number of L3 hops before routers will drop the traffic
|
|
neutron_vxlan_ttl: 32
|
|
|
|
neutron_sriov_excluded_devices: ""
|
|
|
|
# neutron_local_ip is used for the VXLAN local tunnel endpoint
|
|
neutron_local_ip: "{{ tunnel_address | default('127.0.0.1') }}"
|
|
|
|
## Set this variable to configure the provider networks that will be available
|
|
## When setting up networking in things like the ml2_conf.ini file. Normally
|
|
## this will be defined as a host variable used within neutron as network configuration
|
|
## are likely to differ in between hosts.
|
|
# neutron_provider_networks:
|
|
# network_flat_networks: "flat"
|
|
# network_mappings: "flat:eth12,vlan:eth11"
|
|
# network_types: "vxlan,flat,vlan"
|
|
# network_vlan_ranges: "vlan:1:1,vlan:1024:1025"
|
|
# network_vxlan_ranges: "1:1000"
|
|
# network_geneve_ranges: "1:1000"
|
|
# network_sriov_mappings: "vlan:p4p1"
|
|
|
|
###
|
|
### L3 Agent Plugin Configuration
|
|
###
|
|
|
|
# L3HA configuration options
|
|
neutron_ha_vrrp_auth_type: PASS
|
|
neutron_l3_ha_net_cidr: 169.254.192.0/18
|
|
|
|
neutron_l3_cleanup_on_shutdown: False
|
|
|
|
# Specify the maximum number of L3 agents per tenant network. Defaults to the total number of agents deployed
|
|
# neutron_l3_agents_max: 2
|
|
|
|
###
|
|
### DHCP Agent Plugin Configuration
|
|
###
|
|
|
|
# Comma-separated list of DNS servers which will be used by dnsmasq as forwarders.
|
|
neutron_dnsmasq_dns_servers: ""
|
|
|
|
# Limit number of leases to prevent a denial-of-service.
|
|
neutron_dnsmasq_lease_max: 16777216
|
|
|
|
# Specify if dnsmasq should send a route to metadata server through DHCP 121 message to VM
|
|
neutron_dnsmasq_force_metadata: False
|
|
|
|
# Specify the maximum number of DHCP agents per tenant network. Defaults to the total number of agents deployed
|
|
# neutron_dhcp_agents_max: 2
|
|
|
|
###
|
|
### Metadata Agent Plugin Configuration
|
|
###
|
|
|
|
# If ``neutron_metadata_workers`` is unset the system will use half the number of available VCPUs to
|
|
# compute the number of api workers to use with a default capping value of 16.
|
|
# neutron_metadata_workers: 16
|
|
neutron_metadata_backlog: 4096
|
|
|
|
# The port used by neutron to access the nova metadata service.
|
|
neutron_nova_metadata_port: "{{ nova_metadata_port | default(8775) }}"
|
|
|
|
# The protocol used by neutron to access the nova metadata service.
|
|
neutron_nova_metadata_protocol: "{{ nova_metadata_protocol | default('http') }}"
|
|
|
|
# If the nova_metadata_protocol is using a self-signed cert, then
|
|
# this flag should be set to a boolean True.
|
|
neutron_nova_metadata_insecure: "{{ nova_metadata_insecure | default(False) }}"
|
|
|
|
###
|
|
### FWaaS Configuration
|
|
###
|
|
|
|
neutron_driver_fwaasv2: iptables_v2
|
|
neutron_fwaasv2_service_provider: FIREWALL_V2:fwaas_db:neutron_fwaas.services.firewall.service_drivers.agents.agents.FirewallAgentDriver:default
|
|
|
|
###
|
|
### VPNaaS Configuration
|
|
###
|
|
|
|
# See VPNaaS documentation for driver/service provider selection
|
|
# in case you want to override it.
|
|
neutron_driver_vpnaas: "{{ _neutron_driver_vpnaas }}"
|
|
neutron_vpnaas_service_provider: "{{ _neutron_vpnaas_service_provider }}"
|
|
|
|
#Set this variable to use custom config file for strongswan/openswan
|
|
# neutron_vpnaas_custom_config:
|
|
# - src: "/etc/openstack_deploy/strongswan/strongswan.conf.template"
|
|
# dest: "{{ neutron_conf_dir }}/strongswan.conf.template"
|
|
# condition: "{{ ansible_facts['os_family'] | lower == 'debian' }}"
|
|
|
|
neutron_vpnaas_custom_config: []
|
|
|
|
# OVN Defaults
|
|
neutron_ovn_ssl: True
|
|
ovn_proto: "{{ (neutron_ovn_ssl) | ternary('ssl','tcp') }}"
|
|
neutron_ovn_primary_cluster_node: "{{ groups[neutron_services['neutron-ovn-northd']['group']] | first }}"
|
|
neutron_ovn_northd_service_name: ovn-northd
|
|
neutron_ovn_controller_service_name: ovn-controller
|
|
neutron_ovn_l3_scheduler: leastloaded
|
|
neutron_ovn_nb_connection: "{{ ovn_proto }}:{{ groups['neutron_ovn_northd'] | map('extract', hostvars, ['ansible_host']) | join(':6641,'+ ovn_proto + ':') }}:6641"
|
|
neutron_ovn_sb_connection: "{{ ovn_proto }}:{{ groups['neutron_ovn_northd'] | map('extract', hostvars, ['ansible_host']) | join(':6642,' + ovn_proto + ':') }}:6642"
|
|
neutron_ovsdb_manager: ptcp:6640:127.0.0.1
|
|
|
|
# Storage location for SSL certificate authority
|
|
neutron_ovn_pki_dir: "{{ openstack_pki_dir }}"
|
|
# Delegated host for operating the certificate authority
|
|
neutron_ovn_pki_setup_host: "{{ openstack_pki_setup_host | default('localhost') }}"
|
|
# The local address used for the neutron_ovn node
|
|
neutron_ovn_node_address: "{{ management_address | default('127.0.0.1') }}"
|
|
# neutron OVN server certificate
|
|
neutron_ovn_pki_keys_path: "{{ neutron_ovn_pki_dir ~ '/certs/private/' }}"
|
|
neutron_ovn_pki_certs_path: "{{ neutron_ovn_pki_dir ~ '/certs/certs/' }}"
|
|
neutron_ovn_pki_intermediate_cert_name: "{{ openstack_pki_service_intermediate_cert_name }}"
|
|
neutron_ovn_pki_intermediate_chain_path: "{{ neutron_ovn_pki_dir ~ '/roots/' ~ neutron_ovn_pki_intermediate_cert_name ~ '/certs/' ~ neutron_ovn_pki_intermediate_cert_name ~ '-chain.crt' }}"
|
|
neutron_ovn_pki_regen_cert: ""
|
|
neutron_ovn_pki_certificates:
|
|
- name: "neutron_ovn_{{ ansible_facts['hostname'] }}"
|
|
provider: ownca
|
|
cn: "{{ ansible_facts['hostname'] }}"
|
|
san: "{{ 'DNS:' ~ ansible_facts['hostname'] ~ ',IP:' ~ neutron_ovn_node_address }}"
|
|
signed_by: "{{ neutron_ovn_pki_intermediate_cert_name }}"
|
|
|
|
# OVN destination files for SSL certificates
|
|
neutron_ovn_ssl_cert: "neutron_ovn.pem"
|
|
neutron_ovn_ssl_key: "neutron_ovn.key"
|
|
neutron_ovn_ssl_ca_cert: "neutron_ovn-ca.pem"
|
|
neutron_ovn_conf_dir: "/etc/openvswitch"
|
|
# Installation details for SSL certificates
|
|
neutron_ovn_pki_install_certificates:
|
|
- src: "{{ neutron_ovn_user_ssl_cert | default(neutron_ovn_pki_certs_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_cert] | join('/') }}"
|
|
owner: "{{ neutron_ovn_system_user_name }}"
|
|
group: "{{ neutron_ovn_system_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch and neutron_plugin_type == 'ml2.ovn') }}"
|
|
- src: "{{ neutron_ovn_user_ssl_key | default(neutron_ovn_pki_keys_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_key] | join('/') }}"
|
|
owner: "{{ neutron_ovn_system_user_name }}"
|
|
group: "{{ neutron_ovn_system_user_name }}"
|
|
mode: "0600"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_ca_cert | default(neutron_ovn_pki_intermediate_chain_path) }}"
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_ca_cert] | join('/') }}"
|
|
owner: "{{ (neutron_services['neutron-server']['group'] in group_names) | ternary( neutron_service_user_name, neutron_ovn_system_user_name) }}"
|
|
group: "{{ (neutron_services['neutron-server']['group'] in group_names) | ternary( neutron_service_user_name, neutron_ovn_system_user_name) }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch and neutron_plugin_type == 'ml2.ovn') }}"
|
|
- src: "{{ neutron_ovn_user_ssl_cert | default(neutron_ovn_pki_certs_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_cert] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services |length + uwsgi_neutron_services | length ) > 0) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_key | default(neutron_ovn_pki_keys_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_key] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0600"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services |length + uwsgi_neutron_services | length ) > 0) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_ca_cert | default(neutron_ovn_pki_intermediate_chain_path) }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_ca_cert] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services |length + uwsgi_neutron_services | length ) > 0) }}"
|
|
|
|
# Define user-provided SSL certificates in:
|
|
# /etc/openstack_deploy/user_variables.yml
|
|
#neutron_ovnnb_user_ssl_cert: <path to cert on ansible deployment host>
|
|
#neutron_ovnnb_user_ssl_key: <path to cert on ansible deployment host>
|
|
#neutron_ovnsb_user_ssl_cert: <path to cert on ansible deployment host>
|
|
#neutron_ovnsb_user_ssl_key: <path to cert on ansible deployment host>
|
|
|
|
###
|
|
### DPDK Configuration
|
|
###
|
|
|
|
ovs_datapath: "netdev"
|
|
ovs_dpdk_pci_addresses: []
|
|
ovs_dpdk_driver: vfio-pci
|
|
ovs_dpdk_support: False
|
|
ovs_dpdk_lcore_mask: 1
|
|
ovs_dpdk_pmd_cpu_mask: 2
|
|
ovs_dpdk_socket_mem: "1024"
|
|
ovs_dpdk_nr_1g_pages: 0
|
|
ovs_dpdk_nr_2m_pages: 0
|
|
|
|
###
|
|
### Backend TLS
|
|
###
|
|
|
|
# Define if communication between haproxy and service backends should be
|
|
# encrypted with TLS.
|
|
neutron_backend_ssl: "{{ openstack_service_backend_ssl | default(False) }}"
|
|
|
|
# Storage location for SSL certificate authority
|
|
neutron_pki_dir: "{{ openstack_pki_dir | default('/etc/openstack_deploy/pki') }}"
|
|
|
|
# Delegated host for operating the certificate authority
|
|
neutron_pki_setup_host: "{{ openstack_pki_setup_host | default('localhost') }}"
|
|
|
|
# neutron server certificate
|
|
neutron_pki_keys_path: "{{ neutron_pki_dir ~ '/certs/private/' }}"
|
|
neutron_pki_certs_path: "{{ neutron_pki_dir ~ '/certs/certs/' }}"
|
|
neutron_pki_intermediate_cert_name: "{{ openstack_pki_service_intermediate_cert_name | default('ExampleCorpIntermediate') }}"
|
|
neutron_pki_regen_cert: ''
|
|
neutron_pki_san: "{{ openstack_pki_san | default('DNS:' ~ ansible_facts['hostname'] ~ ',IP:' ~ management_address) }}"
|
|
neutron_pki_certificates:
|
|
- name: "neutron_{{ ansible_facts['hostname'] }}"
|
|
provider: ownca
|
|
cn: "{{ ansible_facts['hostname'] }}"
|
|
san: "{{ neutron_pki_san }}"
|
|
signed_by: "{{ neutron_pki_intermediate_cert_name }}"
|
|
|
|
# neutron destination files for SSL certificates
|
|
neutron_ssl_cert: "{{ neutron_conf_version_dir }}/neutron.pem"
|
|
neutron_ssl_key: "{{ neutron_conf_version_dir }}/neutron.key"
|
|
|
|
# Installation details for SSL certificates
|
|
neutron_pki_install_certificates:
|
|
- src: "{{ neutron_user_ssl_cert | default(neutron_pki_certs_path ~ 'neutron_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
dest: "{{ neutron_ssl_cert }}"
|
|
owner: "{{ neutron_system_user_name }}"
|
|
group: "{{ neutron_system_user_name }}"
|
|
mode: "0644"
|
|
- src: "{{ neutron_user_ssl_key | default(neutron_pki_keys_path ~ 'neutron_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ neutron_ssl_key }}"
|
|
owner: "{{ neutron_system_user_name }}"
|
|
group: "{{ neutron_system_user_name }}"
|
|
mode: "0600"
|
|
|
|
# Define user-provided SSL certificates
|
|
#neutron_user_ssl_cert: <path to cert on ansible deployment host>
|
|
#neutron_user_ssl_key: <path to cert on ansible deployment host>
|