You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
99 lines
4.7 KiB
99 lines
4.7 KiB
resource_registry: |
|
OS::TripleO::Network::Ports::RedisVipPort: ../network/ports/noop.yaml |
|
OS::TripleO::Network::Ports::ControlPlaneVipPort: ../deployed-server/deployed-neutron-port.yaml |
|
OS::TripleO::Undercloud::Net::SoftwareConfig: ../net-config-undercloud.yaml |
|
OS::TripleO::NodeExtraConfigPost: ../extraconfig/post_deploy/undercloud_post.yaml |
|
OS::TripleO::Services::DockerRegistry: ../puppet/services/docker-registry.yaml |
|
# Allows us to control the external VIP for Undercloud SSL |
|
OS::TripleO::Network::Ports::ExternalVipPort: ../network/ports/external_from_pool.yaml |
|
|
|
parameter_defaults: |
|
# ensure we enable ip_forward before docker gets run |
|
KernelIpForward: 1 |
|
KeystoneCorsAllowedOrigin: '*' |
|
EnablePackageInstall: true |
|
StackAction: CREATE |
|
SoftwareConfigTransport: POLL_SERVER_HEAT |
|
NeutronTunnelTypes: [] |
|
NeutronBridgeMappings: ctlplane:br-ctlplane |
|
NeutronAgentExtensions: [] |
|
NeutronFlatNetworks: '*' |
|
NovaSchedulerAvailableFilters: 'tripleo_common.filters.list.tripleo_filters' |
|
NovaSchedulerDefaultFilters: ['RetryFilter', 'TripleOCapabilitiesFilter', 'ComputeCapabilitiesFilter', 'AvailabilityZoneFilter', 'RamFilter', 'DiskFilter', 'ComputeFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter'] |
|
NovaSchedulerMaxAttempts: 30 |
|
# Disable compute auto disabling: |
|
# As part of Pike, nova introduced a change to have the nova-compute |
|
# process automatically disable the nova-compute instance in the case of |
|
# consecutive build failures. This can lead to odd errors when deploying |
|
# the ironic nodes on the undercloud as you end up with a ComputeFilter |
|
# error. This parameter disables this functionality for the undercloud since |
|
# we do not want the nova-compute instance running on the undercloud for |
|
# Ironic to be disabled in the case of multiple deployment failures. |
|
NovaAutoDisabling: '0' |
|
NeutronDhcpAgentsPerNetwork: 2 |
|
HeatConvergenceEngine: false |
|
HeatCorsAllowedOrigin: '*' |
|
HeatMaxResourcesPerStack: -1 |
|
HeatMaxJsonBodySize: 2097152 |
|
IronicCleaningDiskErase: 'metadata' |
|
IronicCorsAllowedOrigin: '*' |
|
IronicDefaultInspectInterface: 'inspector' |
|
IronicDefaultResourceClass: 'baremetal' |
|
IronicEnabledHardwareTypes: ['ipmi', 'redfish', 'idrac', 'ilo'] |
|
IronicEnabledBootInterfaces: ['pxe', 'ilo-pxe'] |
|
IronicEnabledConsoleInterfaces: ['ipmitool-socat', 'ilo', 'no-console'] |
|
# TODO(dtantsur): one day we may want to support the direct deploy too |
|
IronicEnabledDeployInterfaces: ['iscsi', 'ansible'] |
|
IronicEnabledInspectInterfaces: ['inspector', 'no-inspect'] |
|
IronicEnabledManagementInterfaces: ['ipmitool', 'redfish', 'idrac', 'ilo'] |
|
# NOTE(dtantsur): disabling advanced networking as it's not used (or |
|
# configured) in the undercloud |
|
IronicEnabledNetworkInterfaces: ['flat'] |
|
IronicEnabledPowerInterfaces: ['ipmitool', 'redfish', 'idrac', 'ilo'] |
|
# NOTE(dtantsur): disabling the "agent" RAID as our ramdisk does not contain |
|
# any vendor-specific RAID additions. |
|
IronicEnabledRaidInterfaces: ['no-raid'] |
|
# NOTE(dtantsur): we don't use boot-from-cinder on the undercloud |
|
IronicEnabledStorageInterfaces: ['noop'] |
|
IronicEnabledVendorInterfaces: ['ipmitool', 'idrac', 'no-vendor'] |
|
IronicEnableStagingDrivers: true |
|
IronicCleaningNetwork: 'ctlplane' |
|
IronicForcePowerStateDuringSync: false |
|
IronicInspectorCollectors: default,extra-hardware,numa-topology,logs |
|
IronicInspectorInterface: br-ctlplane |
|
IronicProvisioningNetwork: 'ctlplane' |
|
IronicInspectorSubnets: |
|
- ip_range: '192.168.24.100,192.168.24.200' |
|
ZaqarMessageStore: 'swift' |
|
ZaqarManagementStore: 'sqlalchemy' |
|
# our undercloud default eth1 for the control plane bridged interface |
|
NeutronPublicInterface: eth1 |
|
MistralCorsAllowedOrigin: '*' |
|
MistralExecutionFieldSizeLimit: 16384 |
|
NeutronServicePlugins: router,segments |
|
NeutronNetworkVLANRanges: 'physnet1:1000:2999' |
|
NeutronPluginExtensions: 'port_security' |
|
NeutronFirewallDriver: '' |
|
NeutronNetworkType: ['local','flat','vlan','gre','vxlan'] |
|
NeutronTunnelIdRanges: '20:100' |
|
NeutronTypeDrivers: ['local','flat','vlan','gre','vxlan'] |
|
NeutronVniRanges: '10:100' |
|
NeutronPortQuota: '-1' |
|
MigrateLegacyNeutronDb: true |
|
SwiftCorsAllowedOrigin: '*' |
|
# A list of static routes for the control plane network. Ensure traffic to |
|
# nodes on remote control plane networks use the correct network path. |
|
# Example: |
|
# ControlPlaneStaticRoutes: |
|
# - ip_netmask: 192.168.25.0/24 |
|
# next_hop: 192.168.24.1 |
|
# - ip_netmask: 192.168.26.0/24 |
|
# next_hop: 192.168.24.1 |
|
ControlPlaneStaticRoutes: [] |
|
UndercloudCtlplaneSubnets: |
|
ctlplane-subnet: |
|
NetworkCidr: '192.168.24.0/24' |
|
NetworkGateway: '192.168.24.1' |
|
DhcpRangeStart: '192.168.24.5' |
|
DhcpRangeEnd: '192.168.24.24' |
|
UndercloudCtlplaneLocalSubnet: 'ctlplane-subnet'
|
|
|