@ -23,18 +23,10 @@ parameters:
...
}
type : json
CorosyncIPv6:
default : false
description : Enable IPv6 in Corosync
type : boolean
Debug:
default : ''
description : Set to True to enable debugging on all services.
type : string
EnableFencing:
default : false
description : Whether to enable fencing in Pacemaker or not.
type : boolean
EnableLoadBalancer:
default : true
description : Whether to deploy a LoadBalancer on the Controller
@ -45,38 +37,6 @@ parameters:
Additional hieradata to inject into the cluster, note that
ControllerExtraConfig takes precedence over ExtraConfig.
type : json
FencingConfig:
default : {}
description : |
Pacemaker fencing configuration. The JSON should have
the following structure:
{
"devices": [
{
"agent": "AGENT_NAME" ,
"host_mac": "HOST_MAC_ADDRESS" ,
"params": {"PARAM_NAME": "PARAM_VALUE" }
}
]
}
For instance:
{
"devices": [
{
"agent": "fence_xvm" ,
"host_mac": "52:54:00:aa:bb:cc" ,
"params": {
"multicast_address": "225.0.0.12" ,
"port": "baremetal_0" ,
"manage_fw": true ,
"manage_key_file": true ,
"key_file": "/etc/fence_xvm.key" ,
"key_file_password": "abcdef"
}
}
]
}
type : json
OvercloudControlFlavor:
description : Flavor for control nodes to request when deploying.
default : baremetal
@ -98,33 +58,13 @@ parameters:
type : string
constraints:
- custom_constraint : nova.keypair
ManageFirewall:
default : false
description : Whether to manage IPtables rules.
type : boolean
PurgeFirewallRules:
default : false
description : Whether IPtables rules should be purged before setting up the new ones.
type : boolean
NeutronPublicInterface:
default : nic1
description : What interface to bridge onto br-ex for network nodes.
type : string
PcsdPassword:
type : string
description : The password for the 'pcsd' user.
hidden : true
RedisPassword:
description : The password for Redis
type : string
hidden : true
RedisVirtualIP:
type : string
default : '' # Has to be here because of the ignored empty value bug
RedisVirtualIPUri:
type : string
default : '' # Has to be here because of the ignored empty value bug
description : An IP address which is wrapped in brackets in case of IPv6
SwiftRawDisks:
default : {}
description : 'A hash of additional raw devices to use as Swift backend (eg. {sdb: {}})'
@ -358,17 +298,9 @@ resources:
server : {get_resource : Controller}
input_values:
bootstack_nodeid : {get_attr : [ Controller, name]}
debug : {get_param : Debug}
enable_fencing : {get_param : EnableFencing}
enable_load_balancer : {get_param : EnableLoadBalancer}
manage_firewall : {get_param : ManageFirewall}
purge_firewall_rules : {get_param : PurgeFirewallRules}
corosync_ipv6 : {get_param : CorosyncIPv6}
fencing_config : {get_param : FencingConfig}
pcsd_password : {get_param : PcsdPassword}
enable_package_upgrade : {get_attr : [ UpdateDeployment, update_managed_packages]}
redis_vip : {get_param : RedisVirtualIP}
ironic_api_network : {get_attr : [ NetIpMap, net_ip_map, {get_param: [ServiceNetMap, IronicApiNetwork]}]}
# Map heat metadata into hiera datafiles
ControllerConfig:
@ -421,17 +353,10 @@ resources:
bootstack_nodeid : {get_input : bootstack_nodeid}
# Pacemaker
enable_fencing : {get_input : enable_fencing}
enable_load_balancer : {get_input : enable_load_balancer}
hacluster_pwd : {get_input : pcsd_password}
corosync_ipv6 : {get_input : corosync_ipv6}
tripleo::fencing::config : {get_input : fencing_config}
# Redis
redis_vip : {get_input : redis_vip}
# Firewall
tripleo::firewall::manage_firewall : {get_input : manage_firewall}
tripleo::firewall::purge_firewall_rules : {get_input : purge_firewall_rules}
# Misc
tripleo::haproxy::service_certificate : {get_attr : [ NodeTLSData, deployed_ssl_certificate_path]}
tripleo::packages::enable_upgrade : {get_input : enable_package_upgrade}