resource_registry: OS::TripleO::Network::Ports::RedisVipPort: ../network/ports/noop.yaml OS::TripleO::Network::Ports::ControlPlaneVipPort: ../deployed-server/deployed-neutron-port.yaml OS::TripleO::Undercloud::Net::SoftwareConfig: ../net-config-undercloud.yaml OS::TripleO::NodeExtraConfigPost: ../extraconfig/post_deploy/undercloud_post.yaml OS::TripleO::Services::DockerRegistry: ../puppet/services/docker-registry.yaml # Allows us to control the external VIP for Undercloud SSL OS::TripleO::Network::Ports::ExternalVipPort: ../network/ports/external_from_pool.yaml parameter_defaults: # ensure we enable ip_forward before docker gets run KernelIpForward: 1 KeystoneCorsAllowedOrigin: '*' EnablePackageInstall: true StackAction: CREATE SoftwareConfigTransport: POLL_SERVER_HEAT NeutronTunnelTypes: [] NeutronBridgeMappings: ctlplane:br-ctlplane NeutronAgentExtensions: [] NeutronFlatNetworks: '*' NovaSchedulerAvailableFilters: 'tripleo_common.filters.list.tripleo_filters' NovaSchedulerDefaultFilters: ['RetryFilter', 'TripleOCapabilitiesFilter', 'ComputeCapabilitiesFilter', 'AvailabilityZoneFilter', 'RamFilter', 'DiskFilter', 'ComputeFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter'] NovaSchedulerMaxAttempts: 30 # Disable compute auto disabling: # As part of Pike, nova introduced a change to have the nova-compute # process automatically disable the nova-compute instance in the case of # consecutive build failures. This can lead to odd errors when deploying # the ironic nodes on the undercloud as you end up with a ComputeFilter # error. This parameter disables this functionality for the undercloud since # we do not want the nova-compute instance running on the undercloud for # Ironic to be disabled in the case of multiple deployment failures. NovaAutoDisabling: '0' NeutronDhcpAgentsPerNetwork: 2 HeatConvergenceEngine: false HeatCorsAllowedOrigin: '*' HeatMaxResourcesPerStack: -1 HeatMaxJsonBodySize: 2097152 IronicCleaningDiskErase: 'metadata' IronicCorsAllowedOrigin: '*' IronicDefaultInspectInterface: 'inspector' IronicDefaultResourceClass: 'baremetal' IronicEnabledHardwareTypes: ['ipmi', 'redfish', 'idrac', 'ilo'] IronicEnabledBootInterfaces: ['pxe', 'ilo-pxe'] IronicEnabledConsoleInterfaces: ['ipmitool-socat', 'ilo', 'no-console'] # TODO(dtantsur): one day we may want to support the direct deploy too IronicEnabledDeployInterfaces: ['iscsi', 'ansible'] IronicEnabledInspectInterfaces: ['inspector', 'no-inspect'] IronicEnabledManagementInterfaces: ['ipmitool', 'redfish', 'idrac', 'ilo'] # NOTE(dtantsur): disabling advanced networking as it's not used (or # configured) in the undercloud IronicEnabledNetworkInterfaces: ['flat'] IronicEnabledPowerInterfaces: ['ipmitool', 'redfish', 'idrac', 'ilo'] # NOTE(dtantsur): disabling the "agent" RAID as our ramdisk does not contain # any vendor-specific RAID additions. IronicEnabledRaidInterfaces: ['no-raid'] # NOTE(dtantsur): we don't use boot-from-cinder on the undercloud IronicEnabledStorageInterfaces: ['noop'] IronicEnabledVendorInterfaces: ['ipmitool', 'idrac', 'no-vendor'] IronicEnableStagingDrivers: true IronicCleaningNetwork: 'ctlplane' IronicForcePowerStateDuringSync: false IronicInspectorCollectors: default,extra-hardware,numa-topology,logs IronicInspectorInterface: br-ctlplane IronicProvisioningNetwork: 'ctlplane' IronicInspectorSubnets: - ip_range: '192.168.24.100,192.168.24.200' ZaqarMessageStore: 'swift' ZaqarManagementStore: 'sqlalchemy' # our undercloud default eth1 for the control plane bridged interface NeutronPublicInterface: eth1 MistralCorsAllowedOrigin: '*' MistralExecutionFieldSizeLimit: 16384 NeutronServicePlugins: router,segments NeutronNetworkVLANRanges: 'physnet1:1000:2999' NeutronPluginExtensions: 'port_security' NeutronFirewallDriver: '' NeutronNetworkType: ['local','flat','vlan','gre','vxlan'] NeutronTunnelIdRanges: '20:100' NeutronTypeDrivers: ['local','flat','vlan','gre','vxlan'] NeutronVniRanges: '10:100' NeutronPortQuota: '-1' MigrateLegacyNeutronDb: true SwiftCorsAllowedOrigin: '*' # A list of static routes for the control plane network. Ensure traffic to # nodes on remote control plane networks use the correct network path. # Example: # ControlPlaneStaticRoutes: # - ip_netmask: 192.168.25.0/24 # next_hop: 192.168.24.1 # - ip_netmask: 192.168.26.0/24 # next_hop: 192.168.24.1 ControlPlaneStaticRoutes: [] UndercloudCtlplaneSubnets: ctlplane-subnet: NetworkCidr: '192.168.24.0/24' NetworkGateway: '192.168.24.1' DhcpRangeStart: '192.168.24.5' DhcpRangeEnd: '192.168.24.24' UndercloudCtlplaneLocalSubnet: 'ctlplane-subnet'