Provide a script for interpreting the "only" directives and splitting the existing content up into standalone files for each OS to make it easier for project teams to copy the parts they need into their own project documentation trees without requiring separate platform builds. The files have been hand-edited to pass the niceness check and to allow the install guide to build. The script for building the guide has been changed to not build separate copies per OS. Change-Id: Ib88f373190e2a4fbf14186418852d971b33dca85 Signed-off-by: Doug Hellmann <doug@doughellmann.com>
7.1 KiB
Networking Option 1: Provider networks
Install and configure the Networking components on the controller node.
Install the components
# apt install neutron-server neutron-plugin-ml2 \
neutron-linuxbridge-agent neutron-dhcp-agent \
neutron-metadata-agent
Configure the server component
The Networking server component configuration includes the database, authentication mechanism, message queue, topology change notifications, and plug-in.
- Edit the
/etc/neutron/neutron.conffile and complete the following actions:In the
[database]section, configure database access:[database] # ... connection = mysql+pymysql://neutron:NEUTRON_DBPASS@controller/neutronReplace
NEUTRON_DBPASSwith the password you chose for the database.Note
Comment out or remove any other
connectionoptions in the[database]section.In the
[DEFAULT]section, enable the Modular Layer 2 (ML2) plug-in and disable additional plug-ins:[DEFAULT] # ... core_plugin = ml2 service_plugins =In the
[DEFAULT]section, configureRabbitMQmessage queue access:[DEFAULT] # ... transport_url = rabbit://openstack:RABBIT_PASS@controllerReplace
RABBIT_PASSwith the password you chose for theopenstackaccount in RabbitMQ.In the
[DEFAULT]and[keystone_authtoken]sections, configure Identity service access:[DEFAULT] # ... auth_strategy = keystone [keystone_authtoken] # ... auth_uri = http://controller:5000 auth_url = http://controller:35357 memcached_servers = controller:11211 auth_type = password project_domain_name = default user_domain_name = default project_name = service username = neutron password = NEUTRON_PASSReplace
NEUTRON_PASSwith the password you chose for theneutronuser in the Identity service.Note
Comment out or remove any other options in the
[keystone_authtoken]section.In the
[DEFAULT]and[nova]sections, configure Networking to notify Compute of network topology changes:[DEFAULT] # ... notify_nova_on_port_status_changes = true notify_nova_on_port_data_changes = true [nova] # ... auth_url = http://controller:35357 auth_type = password project_domain_name = default user_domain_name = default region_name = RegionOne project_name = service username = nova password = NOVA_PASSReplace
NOVA_PASSwith the password you chose for thenovauser in the Identity service.
Configure the Modular Layer 2 (ML2) plug-in
The ML2 plug-in uses the Linux bridge mechanism to build layer-2 (bridging and switching) virtual networking infrastructure for instances.
- Edit the
/etc/neutron/plugins/ml2/ml2_conf.inifile and complete the following actions:In the
[ml2]section, enable flat and VLAN networks:[ml2] # ... type_drivers = flat,vlanIn the
[ml2]section, disable self-service networks:[ml2] # ... tenant_network_types =In the
[ml2]section, enable the Linux bridge mechanism:[ml2] # ... mechanism_drivers = linuxbridgeWarning
After you configure the ML2 plug-in, removing values in the
type_driversoption can lead to database inconsistency.In the
[ml2]section, enable the port security extension driver:[ml2] # ... extension_drivers = port_securityIn the
[ml2_type_flat]section, configure the provider virtual network as a flat network:[ml2_type_flat] # ... flat_networks = providerIn the
[securitygroup]section, enableipsetto increase efficiency of security group rules:[securitygroup] # ... enable_ipset = true
Configure the Linux bridge agent
The Linux bridge agent builds layer-2 (bridging and switching) virtual networking infrastructure for instances and handles security groups.
- Edit the
/etc/neutron/plugins/ml2/linuxbridge_agent.inifile and complete the following actions:In the
[linux_bridge]section, map the provider virtual network to the provider physical network interface:[linux_bridge] physical_interface_mappings = provider:PROVIDER_INTERFACE_NAMEReplace
PROVIDER_INTERFACE_NAMEwith the name of the underlying provider physical network interface. Seeenvironment-networkingfor more information.In the
[vxlan]section, disable VXLAN overlay networks:[vxlan] enable_vxlan = falseIn the
[securitygroup]section, enable security groups and configure the Linux bridgeiptablesfirewall driver:[securitygroup] # ... enable_security_group = true firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver
Configure the DHCP agent
The DHCP agent
provides DHCP services for virtual networks.
- Edit the
/etc/neutron/dhcp_agent.inifile and complete the following actions:In the
[DEFAULT]section, configure the Linux bridge interface driver, Dnsmasq DHCP driver, and enable isolated metadata so instances on provider networks can access metadata over the network:[DEFAULT] # ... interface_driver = linuxbridge dhcp_driver = neutron.agent.linux.dhcp.Dnsmasq enable_isolated_metadata = true
Return to Networking controller node configuration.