70bb847605
At the moment the only way to configure multi-AZ support in Neutron were config overrides, which work quite nicely with LXB/OVS scenarios. However, with OVN changing configuration is not enough, and command that sets up OVN Gateway should provide extra CMS option. In order to improve AZ support in Neutron role, we add couple of variables that control behaviour and allow to perform required configuration without config overrides for OVS/LXB/OVN. Co-Authored-By: Danila Balagansky <dbalagansky@me.com> Closes-Bug: #2002040 Change-Id: Ic964329c06765176692f7b0c32f33ec46360a3fb
650 lines
26 KiB
YAML
650 lines
26 KiB
YAML
---
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
###
|
|
### Verbosity Options
|
|
###
|
|
|
|
debug: False
|
|
|
|
|
|
###
|
|
### Service setup options
|
|
###
|
|
|
|
# Set the host which will execute the shade modules
|
|
# for the service setup. The host must already have
|
|
# clouds.yaml properly configured.
|
|
neutron_service_setup_host: "{{ openstack_service_setup_host | default('localhost') }}"
|
|
neutron_service_setup_host_python_interpreter: >-
|
|
{{
|
|
openstack_service_setup_host_python_interpreter | default(
|
|
(neutron_service_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable']))
|
|
}}
|
|
|
|
###
|
|
### Packages Options
|
|
###
|
|
|
|
# Set the package install state for distribution
|
|
# Options are 'present' and 'latest'
|
|
neutron_package_state: "{{ package_state | default('latest') }}"
|
|
|
|
# Set installation method.
|
|
neutron_install_method: "{{ service_install_method | default('source') }}"
|
|
neutron_venv_python_executable: "{{ openstack_venv_python_executable | default('python3') }}"
|
|
|
|
###
|
|
### Python code details
|
|
###
|
|
|
|
# Set the package install state for pip_package
|
|
# Options are 'present' and 'latest'
|
|
neutron_pip_package_state: "latest"
|
|
|
|
# Source git repo/branch settings
|
|
neutron_git_repo: https://opendev.org/openstack/neutron
|
|
neutron_git_install_branch: master
|
|
neutron_fwaas_git_repo: https://opendev.org/openstack/neutron-fwaas
|
|
neutron_fwaas_git_install_branch: master
|
|
neutron_vpnaas_git_repo: https://opendev.org/openstack/neutron-vpnaas
|
|
neutron_vpnaas_git_install_branch: master
|
|
neutron_dynamic_routing_git_repo: https://opendev.org/openstack/neutron-dynamic-routing
|
|
neutron_dynamic_routing_git_install_branch: master
|
|
networking_odl_git_repo: https://opendev.org/openstack/networking-odl
|
|
networking_odl_git_install_branch: master
|
|
networking_sfc_git_repo: https://opendev.org/openstack/networking-sfc
|
|
networking_sfc_git_install_branch: master
|
|
networking_bgpvpn_git_repo: https://opendev.org/openstack/networking-bgpvpn
|
|
networking_bgpvpn_git_install_branch: master
|
|
ceilometer_git_repo: https://opendev.org/openstack/ceilometer
|
|
ceilometer_git_install_branch: master
|
|
networking_baremetal_git_repo: https://opendev.org/openstack/networking-baremetal
|
|
networking_baremetal_git_install_branch: master
|
|
networking_generic_switch_git_repo: https://opendev.org/openstack/networking-generic-switch
|
|
networking_generic_switch_git_install_branch: master
|
|
networking_nsx_git_repo: https://opendev.org/x/vmware-nsx
|
|
networking_nsx_git_install_branch: master
|
|
networking_nsxlib_git_repo: https://opendev.org/x/vmware-nsxlib
|
|
networking_nsxlib_git_install_branch: master
|
|
|
|
neutron_upper_constraints_url: >-
|
|
{{ requirements_git_url | default('https://releases.openstack.org/constraints/upper/' ~ requirements_git_install_branch | default('master')) }}
|
|
neutron_git_constraints:
|
|
- "--constraint {{ neutron_upper_constraints_url }}"
|
|
|
|
neutron_pip_install_args: "{{ pip_install_options | default('') }}"
|
|
|
|
# Name of the virtual env to deploy into
|
|
neutron_venv_tag: "{{ venv_tag | default('untagged') }}"
|
|
|
|
###
|
|
### Generic Neutron Config
|
|
###
|
|
|
|
# Fatal Deprecations
|
|
neutron_fatal_deprecations: False
|
|
|
|
# If ``neutron_api_workers`` is unset the system will use half the number of available VCPUs to
|
|
# compute the number of api workers to use with a default capping value of 16.
|
|
# neutron_api_workers: 16
|
|
|
|
## Cap the maximun number of threads / workers when a user value is unspecified.
|
|
neutron_api_threads_max: 16
|
|
neutron_api_threads: "{{ [[ansible_facts['processor_vcpus'] | default(2) // 2, 1] | max, neutron_api_threads_max] | min }}"
|
|
|
|
neutron_agent_down_time: 120
|
|
neutron_agent_polling_interval: 5
|
|
neutron_report_interval: "{{ neutron_agent_down_time | int / 2 | int }}"
|
|
|
|
neutron_dns_domain: "{{ dhcp_domain | default('openstacklocal.') }}"
|
|
|
|
# If ``neutron_num_sync_threads`` is unset, the system will use the value of
|
|
# neutron_api_threads in templates/dhcp_agent.ini.j2 for num_sync_threads.
|
|
# neutron_num_sync_threads: 4
|
|
|
|
###
|
|
### DNSMasq configuration
|
|
###
|
|
# Dnsmasq doesn't work with config_template override, a deployer
|
|
# should instead configure its own neutron_dhcp_config key/values like this:
|
|
# neutron_dhcp_config:
|
|
# dhcp-option-force: "26,1500"
|
|
neutron_dhcp_config: {}
|
|
|
|
# Dnsmasq has furthermore some options in its configuration that are not
|
|
# key/value pairs but just options. A deployer can configure those with this
|
|
# list:
|
|
neutron_dhcp_config_list: []
|
|
|
|
# Disable dnsmasq to resolve DNS via local resolv.conf.
|
|
# When dnsmasq_dns_servers are not set,
|
|
# and neutron_dnsmasq_noresolv is set to True, dnsmasq will reply with
|
|
# empty respose on DNS requests.
|
|
neutron_dnsmasq_noresolv: False
|
|
|
|
###
|
|
### Tunable Overrides (Sorted alphabetically)
|
|
###
|
|
|
|
# These variables facilitate adding config file entries
|
|
# for anything supported by the service. See the section
|
|
# 'Overriding OpenStack configuration defaults' in the
|
|
# 'Advanced configuration' appendix of the Deploy Guide.
|
|
neutron_api_paste_ini_overrides: {}
|
|
neutron_bgp_dragent_ini_overrides: {}
|
|
neutron_bgp_dragent_init_overrides: {}
|
|
neutron_dhcp_agent_ini_overrides: {}
|
|
neutron_dhcp_agent_init_overrides: {}
|
|
neutron_ironic_neutron_agent_ini_overrides: {}
|
|
neutron_ironic_neutron_agent_init_overrides: {}
|
|
neutron_l3_agent_ini_overrides: {}
|
|
neutron_l3_agent_init_overrides: {}
|
|
neutron_linuxbridge_agent_ini_overrides: {}
|
|
neutron_linuxbridge_agent_init_overrides: {}
|
|
neutron_metadata_agent_ini_overrides: {}
|
|
neutron_metadata_agent_init_overrides: {}
|
|
neutron_metering_agent_ini_overrides: {}
|
|
neutron_metering_agent_init_overrides: {}
|
|
neutron_ml2_conf_ini_overrides: {}
|
|
neutron_ml2_conf_genericswitch_ini_overrides: {}
|
|
neutron_neutron_conf_overrides: {}
|
|
neutron_nuage_conf_ini_overrides: {}
|
|
neutron_openvswitch_agent_ini_overrides: {}
|
|
neutron_openvswitch_agent_init_overrides: {}
|
|
neutron_nsx_conf_ini_overrides: {}
|
|
# Provide a list of access controls to update the default policy.json with.
|
|
# These changes will be merged
|
|
# with the access controls in the default policy.json. E.g.
|
|
# neutron_policy_overrides:
|
|
# "create_subnet": "rule:admin_or_network_owner"
|
|
# "get_subnet": "rule:admin_or_owner or rule:shared"
|
|
neutron_policy_overrides: {}
|
|
_neutron_rootwrap_conf_overrides:
|
|
DEFAULT:
|
|
filters_path: "{{ neutron_conf_dir }}/rootwrap.d,/usr/share/neutron/rootwrap"
|
|
exec_dirs: "{{ neutron_bin }},/sbin,/usr/sbin,/bin,/usr/bin,/usr/local/bin,/usr/local/sbin,/etc/neutron/kill_scripts"
|
|
neutron_rootwrap_conf_overrides: {}
|
|
|
|
neutron_api_uwsgi_ini_overrides: {}
|
|
neutron_server_init_overrides: {}
|
|
neutron_rpc_server_init_overrides: {}
|
|
neutron_sriov_nic_agent_ini_overrides: {}
|
|
neutron_sriov_nic_agent_init_overrides: {}
|
|
neutron_ovn_metadata_agent_ini_overrides: {}
|
|
neutron_ovn_metadata_agent_init_overrides: {}
|
|
|
|
###
|
|
### UWSGI
|
|
###
|
|
# NOTE(noonedeadpunk): uWSGI is still not fully supported. See: https://bugs.launchpad.net/neutron/+bug/1912359
|
|
neutron_use_uwsgi: "{{ (neutron_plugin_type not in ['ml2.ovn']) }}"
|
|
neutron_wsgi_processes_max: 16
|
|
neutron_wsgi_processes: "{{ [[ansible_processor_vcpus | default(1), 1] | max * 2, neutron_wsgi_processes_max] | min }}"
|
|
neutron_wsgi_threads: 1
|
|
neutron_uwsgi_tls:
|
|
crt: "{{ neutron_ssl_cert }}"
|
|
key: "{{ neutron_ssl_key }}"
|
|
|
|
###
|
|
### Quotas
|
|
###
|
|
|
|
neutron_default_quota: -1
|
|
neutron_quota_floatingip: 50
|
|
neutron_quota_health_monitor: -1
|
|
neutron_quota_member: -1
|
|
neutron_quota_network: 100
|
|
neutron_quota_network_gateway: 5
|
|
neutron_quota_packet_filter: 100
|
|
neutron_quota_pool: 10
|
|
neutron_quota_port: 500
|
|
neutron_quota_router: 10
|
|
neutron_quota_security_group: 10
|
|
neutron_quota_security_group_rule: 100
|
|
neutron_quota_subnet: 100
|
|
neutron_quota_vip: 10
|
|
neutron_quota_firewall: 10
|
|
neutron_quota_firewall_policy: 10
|
|
neutron_quota_firewall_rule: 100
|
|
|
|
###
|
|
### DB (Galera) integration
|
|
###
|
|
|
|
neutron_db_setup_host: "{{ openstack_db_setup_host | default('localhost') }}"
|
|
neutron_db_setup_python_interpreter: >-
|
|
{{
|
|
openstack_db_setup_python_interpreter | default(
|
|
(neutron_db_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable']))
|
|
}}
|
|
neutron_galera_address: "{{ galera_address | default('127.0.0.1') }}"
|
|
neutron_galera_user: neutron
|
|
neutron_galera_database: neutron
|
|
neutron_db_max_overflow: "{{ openstack_db_max_overflow | default('50') }}"
|
|
neutron_db_max_pool_size: "{{ openstack_db_max_pool_size | default('5') }}"
|
|
neutron_db_pool_timeout: "{{ openstack_db_pool_timeout | default('30') }}"
|
|
neutron_db_connection_recycle_time: "{{ openstack_db_connection_recycle_time | default('600') }}"
|
|
neutron_galera_use_ssl: "{{ galera_use_ssl | default(False) }}"
|
|
neutron_galera_ssl_ca_cert: "{{ galera_ssl_ca_cert | default('') }}"
|
|
neutron_galera_port: "{{ galera_port | default('3306') }}"
|
|
|
|
###
|
|
### Oslo Messaging
|
|
###
|
|
|
|
# RabbitMQ
|
|
|
|
neutron_oslomsg_heartbeat_in_pthread: "{{ oslomsg_heartbeat_in_pthread | default(False) }}"
|
|
|
|
# RPC
|
|
|
|
neutron_oslomsg_rpc_host_group: "{{ oslomsg_rpc_host_group | default('rabbitmq_all') }}"
|
|
neutron_oslomsg_rpc_setup_host: "{{ (neutron_oslomsg_rpc_host_group in groups) | ternary(groups[neutron_oslomsg_rpc_host_group][0], 'localhost') }}"
|
|
neutron_oslomsg_rpc_transport: "{{ oslomsg_rpc_transport | default('rabbit') }}"
|
|
neutron_oslomsg_rpc_servers: "{{ oslomsg_rpc_servers | default('127.0.0.1') }}"
|
|
neutron_oslomsg_rpc_port: "{{ oslomsg_rpc_port | default('5672') }}"
|
|
neutron_oslomsg_rpc_use_ssl: "{{ oslomsg_rpc_use_ssl | default(False) }}"
|
|
neutron_oslomsg_rpc_userid: neutron
|
|
neutron_oslomsg_rpc_vhost:
|
|
- name: /neutron
|
|
state: "{{ neutron_oslomsg_rabbit_quorum_queues | ternary('absent', 'present') }}"
|
|
- name: neutron
|
|
state: "{{ neutron_oslomsg_rabbit_quorum_queues | ternary('present', 'absent') }}"
|
|
neutron_oslomsg_rpc_ssl_version: "{{ oslomsg_rpc_ssl_version | default('TLSv1_2') }}"
|
|
neutron_oslomsg_rpc_ssl_ca_file: "{{ oslomsg_rpc_ssl_ca_file | default('') }}"
|
|
|
|
# Notify
|
|
|
|
neutron_oslomsg_notify_host_group: "{{ oslomsg_notify_host_group | default('rabbitmq_all') }}"
|
|
neutron_oslomsg_notify_setup_host: >-
|
|
{{ (neutron_oslomsg_notify_host_group in groups) | ternary(groups[neutron_oslomsg_notify_host_group][0], 'localhost') }}
|
|
neutron_oslomsg_notify_transport: "{{ oslomsg_notify_transport | default('rabbit') }}"
|
|
neutron_oslomsg_notify_servers: "{{ oslomsg_notify_servers | default('127.0.0.1') }}"
|
|
neutron_oslomsg_notify_port: "{{ oslomsg_notify_port | default('5672') }}"
|
|
neutron_oslomsg_notify_use_ssl: "{{ oslomsg_notify_use_ssl | default(False) }}"
|
|
neutron_oslomsg_notify_userid: "{{ neutron_oslomsg_rpc_userid }}"
|
|
neutron_oslomsg_notify_password: "{{ neutron_oslomsg_rpc_password }}"
|
|
neutron_oslomsg_notify_vhost: "{{ neutron_oslomsg_rpc_vhost }}"
|
|
neutron_oslomsg_notify_ssl_version: "{{ oslomsg_notify_ssl_version | default('TLSv1_2') }}"
|
|
neutron_oslomsg_notify_ssl_ca_file: "{{ oslomsg_notify_ssl_ca_file | default('') }}"
|
|
|
|
###
|
|
### (Qdrouterd) integration
|
|
###
|
|
# TODO(evrardjp): Change structure when more backends will be supported
|
|
neutron_oslomsg_amqp1_enabled: "{{ neutron_oslomsg_rpc_transport == 'amqp' }}"
|
|
|
|
###
|
|
### (RabbitMQ) integration
|
|
###
|
|
neutron_oslomsg_rabbit_quorum_queues: "{{ oslomsg_rabbit_quorum_queues | default(True) }}"
|
|
neutron_oslomsg_rabbit_quorum_delivery_limit: "{{ oslomsg_rabbit_quorum_delivery_limit | default(0) }}"
|
|
neutron_oslomsg_rabbit_quorum_max_memory_bytes: "{{ oslomsg_rabbit_quorum_max_memory_bytes | default(0) }}"
|
|
neutron_rpc_thread_pool_size: 64
|
|
neutron_rpc_conn_pool_size: 30
|
|
neutron_rpc_response_timeout: 60
|
|
neutron_rpc_workers_max: 16
|
|
neutron_rpc_workers: >-
|
|
{{ [[(ansible_facts['processor_vcpus'] // ansible_facts['processor_threads_per_core']) | default(1), 1] | max * 2, neutron_rpc_workers_max] | min }}
|
|
|
|
###
|
|
### Identity (Keystone) integration
|
|
###
|
|
|
|
neutron_service_project_name: service
|
|
neutron_service_project_domain_id: default
|
|
neutron_service_user_domain_id: default
|
|
neutron_service_role_names:
|
|
- admin
|
|
- service
|
|
neutron_service_token_roles:
|
|
- service
|
|
neutron_service_token_roles_required: "{{ openstack_service_token_roles_required | default(True) }}"
|
|
neutron_service_user_name: neutron
|
|
neutron_service_name: neutron
|
|
neutron_service_type: network
|
|
neutron_service_description: "OpenStack Networking"
|
|
neutron_api_bind_address: "{{ openstack_service_bind_address | default('0.0.0.0') }}"
|
|
neutron_service_port: 9696
|
|
neutron_service_proto: http
|
|
neutron_service_publicuri_proto: "{{ openstack_service_publicuri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_adminuri_proto: "{{ openstack_service_adminuri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_internaluri_proto: "{{ openstack_service_internaluri_proto | default(neutron_service_proto) }}"
|
|
neutron_service_publicuri: "{{ neutron_service_publicuri_proto }}://{{ external_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_publicurl: "{{ neutron_service_publicuri }}"
|
|
neutron_service_adminuri: "{{ neutron_service_adminuri_proto }}://{{ internal_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_adminurl: "{{ neutron_service_adminuri }}"
|
|
neutron_service_internaluri: "{{ neutron_service_internaluri_proto }}://{{ internal_lb_vip_address }}:{{ neutron_service_port }}"
|
|
neutron_service_internalurl: "{{ neutron_service_internaluri }}"
|
|
neutron_service_region: "{{ service_region | default('RegionOne') }}"
|
|
neutron_keystone_auth_plugin: "{{ neutron_keystone_auth_type }}"
|
|
neutron_keystone_auth_type: password
|
|
neutron_service_in_ldap: "{{ service_ldap_backend_enabled | default(False) }}"
|
|
|
|
###
|
|
### Availability zones
|
|
###
|
|
# Default availability zones do define a list of zones to where routers/agents
|
|
# will be scheduled by default. This is a list, since a deployment might stretch
|
|
# networks across AZs
|
|
neutron_default_availability_zones: []
|
|
|
|
# Availability zone defines current AZ of the component. For OVN you can define
|
|
# multiple AZs separated with a colon, ie "az1:az2"
|
|
neutron_availability_zone: nova
|
|
|
|
###
|
|
### Telemetry integration
|
|
###
|
|
|
|
neutron_ceilometer_enabled: "{{ (groups['ceilometer_all'] is defined) and (groups['ceilometer_all'] | length > 0) }}"
|
|
|
|
###
|
|
### Designate integration
|
|
###
|
|
|
|
neutron_designate_enabled: "{{ (groups['designate_all'] is defined) and (groups['designate_all'] | length > 0) }}"
|
|
neutron_allow_reverse_dns_lookup: True
|
|
neutron_ipv4_ptr_zone_prefix_size: 24
|
|
neutron_ipv6_ptr_zone_prefix_size: 116
|
|
|
|
###
|
|
### Plugins Loading
|
|
###
|
|
|
|
# Other plugins can be added to the system by simply extending the list `neutron_plugin_base`.
|
|
# neutron_plugin_base:
|
|
# - router
|
|
# - firewall_v2
|
|
# - neutron_dynamic_routing.services.bgp.bgp_plugin.BgpPlugin
|
|
# - vpnaas
|
|
# - metering
|
|
# - qos
|
|
# - dns/dns_domain_ports/subnet_dns_publish_fixed_ip either one or the other, not both
|
|
# - port_forwarding
|
|
neutron_plugin_base:
|
|
- ovn-router
|
|
|
|
###
|
|
### Memcache override
|
|
###
|
|
neutron_memcached_servers: "{{ memcached_servers }}"
|
|
|
|
###
|
|
### ML2 Plugin Configuration
|
|
###
|
|
|
|
# The neutron core plugin (ML2) is defined with neutron_plugin_type,
|
|
# you can not load multiple ML2 plugins as core.
|
|
neutron_plugin_type: 'ml2.ovn'
|
|
|
|
# Additional ML2 plugins can be loaded with neutron_plugin_types (as list)
|
|
neutron_plugin_types: []
|
|
|
|
# ml2 network type drivers to load
|
|
neutron_ml2_drivers_type: "geneve,vlan,flat"
|
|
|
|
# Enable or disable L2 Population.
|
|
# When using ovs dvr it must be enabled
|
|
neutron_l2_population: "{{ neutron_plugin_type == 'ml2.ovs.dvr' }}"
|
|
|
|
neutron_vxlan_enabled: true
|
|
|
|
## The neutron multicast group address. This should be set as a host variable if used.
|
|
neutron_vxlan_group: "239.1.1.1"
|
|
|
|
# The neutron multicast time-to-live. Number of L3 hops before routers will drop the traffic
|
|
neutron_vxlan_ttl: 32
|
|
|
|
neutron_sriov_excluded_devices: ""
|
|
|
|
# neutron_local_ip is used for the VXLAN local tunnel endpoint
|
|
neutron_local_ip: "{{ tunnel_address | default('127.0.0.1') }}"
|
|
|
|
## Set this variable to configure the provider networks that will be available
|
|
## When setting up networking in things like the ml2_conf.ini file. Normally
|
|
## this will be defined as a host variable used within neutron as network configuration
|
|
## are likely to differ in between hosts.
|
|
# neutron_provider_networks:
|
|
# network_flat_networks: "flat"
|
|
# network_mappings: "flat:eth12,vlan:eth11"
|
|
# network_types: "vxlan,flat,vlan"
|
|
# network_vlan_ranges: "vlan:1:1,vlan:1024:1025"
|
|
# network_vxlan_ranges: "1:1000"
|
|
# network_geneve_ranges: "1:1000"
|
|
# network_sriov_mappings: "vlan:p4p1"
|
|
|
|
###
|
|
### L3 Agent Plugin Configuration
|
|
###
|
|
|
|
# L3HA configuration options
|
|
neutron_ha_vrrp_auth_type: PASS
|
|
neutron_l3_ha_net_cidr: 169.254.192.0/18
|
|
|
|
neutron_l3_cleanup_on_shutdown: False
|
|
|
|
# Specify the maximum number of L3 agents per tenant network. Defaults to the total number of agents deployed
|
|
# neutron_l3_agents_max: 2
|
|
|
|
###
|
|
### DHCP Agent Plugin Configuration
|
|
###
|
|
|
|
# Comma-separated list of DNS servers which will be used by dnsmasq as forwarders.
|
|
neutron_dnsmasq_dns_servers: ""
|
|
|
|
# Limit number of leases to prevent a denial-of-service.
|
|
neutron_dnsmasq_lease_max: 16777216
|
|
|
|
# Specify if dnsmasq should send a route to metadata server through DHCP 121 message to VM
|
|
neutron_dnsmasq_force_metadata: False
|
|
|
|
# Specify the maximum number of DHCP agents per tenant network. Defaults to the total number of agents deployed
|
|
# neutron_dhcp_agents_max: 2
|
|
|
|
###
|
|
### Metadata Agent Plugin Configuration
|
|
###
|
|
|
|
# If ``neutron_metadata_workers`` is unset the system will use half the number of available VCPUs to
|
|
# compute the number of api workers to use with a default capping value of 16.
|
|
# neutron_metadata_workers: 16
|
|
neutron_metadata_backlog: 4096
|
|
|
|
# The port used by neutron to access the nova metadata service.
|
|
neutron_nova_metadata_port: "{{ nova_metadata_port | default(8775) }}"
|
|
|
|
# The protocol used by neutron to access the nova metadata service.
|
|
neutron_nova_metadata_protocol: "{{ nova_metadata_protocol | default('http') }}"
|
|
|
|
# If the nova_metadata_protocol is using a self-signed cert, then
|
|
# this flag should be set to a boolean True.
|
|
neutron_nova_metadata_insecure: "{{ nova_metadata_insecure | default(False) }}"
|
|
|
|
###
|
|
### FWaaS Configuration
|
|
###
|
|
|
|
neutron_driver_fwaasv2: iptables_v2
|
|
neutron_fwaasv2_service_provider: FIREWALL_V2:fwaas_db:neutron_fwaas.services.firewall.service_drivers.agents.agents.FirewallAgentDriver:default
|
|
|
|
###
|
|
### VPNaaS Configuration
|
|
###
|
|
|
|
# See VPNaaS documentation for driver/service provider selection
|
|
# in case you want to override it.
|
|
neutron_driver_vpnaas: "{{ _neutron_driver_vpnaas }}"
|
|
neutron_vpnaas_service_provider: "{{ _neutron_vpnaas_service_provider }}"
|
|
|
|
# Set this variable to use custom config file for strongswan/openswan
|
|
# neutron_vpnaas_custom_config:
|
|
# - src: "/etc/openstack_deploy/strongswan/strongswan.conf.template"
|
|
# dest: "{{ neutron_conf_dir }}/strongswan.conf.template"
|
|
# condition: "{{ ansible_facts['os_family'] | lower == 'debian' }}"
|
|
|
|
neutron_vpnaas_custom_config: []
|
|
|
|
# OVN Defaults
|
|
neutron_ovn_ssl: True
|
|
ovn_proto: "{{ (neutron_ovn_ssl) | ternary('ssl', 'tcp') }}"
|
|
neutron_ovn_primary_cluster_node: "{{ groups[neutron_services['neutron-ovn-northd']['group']] | first }}"
|
|
neutron_ovn_northd_service_name: ovn-northd
|
|
neutron_ovn_controller_service_name: ovn-controller
|
|
neutron_ovn_l3_scheduler: leastloaded
|
|
neutron_ovn_nb_connection: >-
|
|
{{ ovn_proto }}:{{ groups['neutron_ovn_northd'] | map('extract', hostvars, ['ansible_host']) | join(':6641,' + ovn_proto + ':') }}:6641
|
|
neutron_ovn_sb_connection: >-
|
|
{{ ovn_proto }}:{{ groups['neutron_ovn_northd'] | map('extract', hostvars, ['ansible_host']) | join(':6642,' + ovn_proto + ':') }}:6642
|
|
neutron_ovsdb_manager: ptcp:6640:127.0.0.1
|
|
neutron_ovn_sb_inactivity_probe: 60000
|
|
neutron_ovn_nb_inactivity_probe: 60000
|
|
|
|
# Storage location for SSL certificate authority
|
|
neutron_ovn_pki_dir: "{{ openstack_pki_dir }}"
|
|
# Delegated host for operating the certificate authority
|
|
neutron_ovn_pki_setup_host: "{{ openstack_pki_setup_host | default('localhost') }}"
|
|
# The local address used for the neutron_ovn node
|
|
neutron_ovn_node_address: "{{ management_address | default('127.0.0.1') }}"
|
|
# neutron OVN server certificate
|
|
neutron_ovn_pki_keys_path: "{{ neutron_ovn_pki_dir ~ '/certs/private/' }}"
|
|
neutron_ovn_pki_certs_path: "{{ neutron_ovn_pki_dir ~ '/certs/certs/' }}"
|
|
neutron_ovn_pki_intermediate_cert_name: "{{ openstack_pki_service_intermediate_cert_name }}"
|
|
neutron_ovn_pki_intermediate_chain_path: >-
|
|
{{ neutron_ovn_pki_dir ~ '/roots/' ~ neutron_ovn_pki_intermediate_cert_name ~ '/certs/' ~ neutron_ovn_pki_intermediate_cert_name ~ '-chain.crt' }}
|
|
neutron_ovn_pki_regen_cert: ""
|
|
neutron_ovn_pki_certificates:
|
|
- name: "neutron_ovn_{{ ansible_facts['hostname'] }}"
|
|
provider: ownca
|
|
cn: "{{ ansible_facts['hostname'] }}"
|
|
san: "{{ 'DNS:' ~ ansible_facts['hostname'] ~ ',IP:' ~ neutron_ovn_node_address }}"
|
|
signed_by: "{{ neutron_ovn_pki_intermediate_cert_name }}"
|
|
|
|
# OVN destination files for SSL certificates
|
|
neutron_ovn_ssl_cert: "neutron_ovn.pem"
|
|
neutron_ovn_ssl_key: "neutron_ovn.key"
|
|
neutron_ovn_ssl_ca_cert: "neutron_ovn-ca.pem"
|
|
neutron_ovn_conf_dir: "/etc/openvswitch"
|
|
# Installation details for SSL certificates
|
|
neutron_ovn_pki_install_certificates:
|
|
- src: "{{ neutron_ovn_user_ssl_cert | default(neutron_ovn_pki_certs_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_cert] | join('/') }}"
|
|
owner: "{{ neutron_ovn_system_user_name }}"
|
|
group: "{{ neutron_ovn_system_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch and neutron_plugin_type == 'ml2.ovn') }}"
|
|
- src: "{{ neutron_ovn_user_ssl_key | default(neutron_ovn_pki_keys_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_key] | join('/') }}"
|
|
owner: "{{ neutron_ovn_system_user_name }}"
|
|
group: "{{ neutron_ovn_system_user_name }}"
|
|
mode: "0600"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_ca_cert | default(neutron_ovn_pki_intermediate_chain_path) }}"
|
|
dest: "{{ [neutron_ovn_conf_dir, neutron_ovn_ssl_ca_cert] | join('/') }}"
|
|
owner: "{{ (neutron_services['neutron-server']['group'] in group_names) | ternary(neutron_service_user_name, neutron_ovn_system_user_name) }}"
|
|
group: "{{ (neutron_services['neutron-server']['group'] in group_names) | ternary(neutron_service_user_name, neutron_ovn_system_user_name) }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_needs_openvswitch and neutron_plugin_type == 'ml2.ovn') }}"
|
|
- src: "{{ neutron_ovn_user_ssl_cert | default(neutron_ovn_pki_certs_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_cert] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services | length + uwsgi_neutron_services | length) > 0) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_key | default(neutron_ovn_pki_keys_path ~ 'neutron_ovn_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_key] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0600"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services | length + uwsgi_neutron_services | length) > 0) }}"
|
|
- src: "{{ neutron_ovn_user_ssl_ca_cert | default(neutron_ovn_pki_intermediate_chain_path) }}"
|
|
dest: "{{ [neutron_conf_version_dir, neutron_ovn_ssl_ca_cert] | join('/') }}"
|
|
owner: "{{ neutron_service_user_name }}"
|
|
group: "{{ neutron_service_user_name }}"
|
|
mode: "0644"
|
|
condition: "{{ (neutron_ovn_ssl and neutron_plugin_type == 'ml2.ovn' and (filtered_neutron_services | length + uwsgi_neutron_services | length) > 0) }}"
|
|
|
|
# Define user-provided SSL certificates in:
|
|
# /etc/openstack_deploy/user_variables.yml
|
|
# neutron_ovnnb_user_ssl_cert: <path to cert on ansible deployment host>
|
|
# neutron_ovnnb_user_ssl_key: <path to cert on ansible deployment host>
|
|
# neutron_ovnsb_user_ssl_cert: <path to cert on ansible deployment host>
|
|
# neutron_ovnsb_user_ssl_key: <path to cert on ansible deployment host>
|
|
|
|
###
|
|
### DPDK Configuration
|
|
###
|
|
|
|
ovs_datapath: "netdev"
|
|
ovs_dpdk_pci_addresses: []
|
|
ovs_dpdk_driver: vfio-pci
|
|
ovs_dpdk_support: False
|
|
ovs_dpdk_lcore_mask: 1
|
|
ovs_dpdk_pmd_cpu_mask: 2
|
|
ovs_dpdk_socket_mem: "1024"
|
|
ovs_dpdk_nr_1g_pages: 0
|
|
ovs_dpdk_nr_2m_pages: 0
|
|
|
|
###
|
|
### Backend TLS
|
|
###
|
|
|
|
# Define if communication between haproxy and service backends should be
|
|
# encrypted with TLS.
|
|
neutron_backend_ssl: "{{ openstack_service_backend_ssl | default(False) }}"
|
|
|
|
# Storage location for SSL certificate authority
|
|
neutron_pki_dir: "{{ openstack_pki_dir | default('/etc/openstack_deploy/pki') }}"
|
|
|
|
# Delegated host for operating the certificate authority
|
|
neutron_pki_setup_host: "{{ openstack_pki_setup_host | default('localhost') }}"
|
|
|
|
# neutron server certificate
|
|
neutron_pki_keys_path: "{{ neutron_pki_dir ~ '/certs/private/' }}"
|
|
neutron_pki_certs_path: "{{ neutron_pki_dir ~ '/certs/certs/' }}"
|
|
neutron_pki_intermediate_cert_name: "{{ openstack_pki_service_intermediate_cert_name | default('ExampleCorpIntermediate') }}"
|
|
neutron_pki_regen_cert: ''
|
|
neutron_pki_san: "{{ openstack_pki_san | default('DNS:' ~ ansible_facts['hostname'] ~ ',IP:' ~ management_address) }}"
|
|
neutron_pki_certificates:
|
|
- name: "neutron_{{ ansible_facts['hostname'] }}"
|
|
provider: ownca
|
|
cn: "{{ ansible_facts['hostname'] }}"
|
|
san: "{{ neutron_pki_san }}"
|
|
signed_by: "{{ neutron_pki_intermediate_cert_name }}"
|
|
|
|
# neutron destination files for SSL certificates
|
|
neutron_ssl_cert: "{{ neutron_conf_version_dir }}/neutron.pem"
|
|
neutron_ssl_key: "{{ neutron_conf_version_dir }}/neutron.key"
|
|
|
|
# Installation details for SSL certificates
|
|
neutron_pki_install_certificates:
|
|
- src: "{{ neutron_user_ssl_cert | default(neutron_pki_certs_path ~ 'neutron_' ~ ansible_facts['hostname'] ~ '-chain.crt') }}"
|
|
dest: "{{ neutron_ssl_cert }}"
|
|
owner: "{{ neutron_system_user_name }}"
|
|
group: "{{ neutron_system_user_name }}"
|
|
mode: "0644"
|
|
- src: "{{ neutron_user_ssl_key | default(neutron_pki_keys_path ~ 'neutron_' ~ ansible_facts['hostname'] ~ '.key.pem') }}"
|
|
dest: "{{ neutron_ssl_key }}"
|
|
owner: "{{ neutron_system_user_name }}"
|
|
group: "{{ neutron_system_user_name }}"
|
|
mode: "0600"
|
|
|
|
# Define user-provided SSL certificates
|
|
# neutron_user_ssl_cert: <path to cert on ansible deployment host>
|
|
# neutron_user_ssl_key: <path to cert on ansible deployment host>
|