原来是使用packstack --init-host=myip的方式部署,这样只能是单节点
http://blog.csdn.net/xiangpingli/article/details/51239832
为了使用packstack进行多节点的方式部署openstack,就需要先研究answer-file的方式来部署openstack环境
如下是使用packstack --answer-file的方式部署单节点openstack环境的过程:
Packstack –answer-file方式部署单节点openstack环境
1. 安装packstack:
# yum install openstack-packstack
日志:
[[email protected] ~]# whichpackstack
/usr/bin/packstack
# yum install -y openstack-packstack
2. 生成应答文件:
[[email protected] ~]# packstack--gen-answer-file=hcloud.txt
Packstack changed given value to required value /root/.ssh/id_rsa.pub
修改应答文件:
查看应答文件有效内容的方法:# more hcloud.txt |grep "^\s*[^# \g].*$"
暂时先什么都不改:
开始安装
# yum install screen
# screen packstack--answer-file=hcloud.txt
Welcome to the Packstack setup utility
The installation log file is available at:/var/tmp/packstack/20160506-210415-wXSguZ/openstack-setup.log
Installing:
Clean Up [ DONE ]
Discovering ip protocol version [ DONE ]
Setting up ssh keys [ DONE ]
Preparing servers [ DONE ]
该过程看起来和执行如下命令是一样的:
# packstack --install-hosts= myip
出错:
ERROR : Error appeared during Puppet run:192.168.11.16_provision_glance
Error: Execution of ‘/usr/bin/glance--os-tenant-name services --os-username glance --os-password 4ed1a12ca1774274--os-region-name RegionOne --os-auth-url http://192.168.11.16:35357/image-create --name=cirros --is-public=True --container-format=bare--disk-format=qcow2--copy-from=http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img‘returned
1: 400 Bad Request: The HTTP URL is invalid. (HTTP 400)
解决:修改answer-file,改为不下载镜像
CONFIG_PROVISION_DEMO=y改为n
部署成功
附录:应答文件hcloud.txt
[general] # Path to a public key to install on servers. If a usable key has not # been installed on the remote servers, the user is prompted for a # password and this key is installed so the password will not be # required again. CONFIG_SSH_KEY=/root/.ssh/id_rsa.pub # Default password to be used everywhere (overridden by passwords set # for individual services or users). CONFIG_DEFAULT_PASSWORD= # Specify 'y' to install MariaDB. ['y', 'n'] CONFIG_MARIADB_INSTALL=y # Specify 'y' to install OpenStack Image Service (glance). ['y', 'n'] CONFIG_GLANCE_INSTALL=y # Specify 'y' to install OpenStack Block Storage (cinder). ['y', 'n'] CONFIG_CINDER_INSTALL=y # Specify 'y' to install OpenStack Shared File System (manila). ['y', # 'n'] CONFIG_MANILA_INSTALL=n # Specify 'y' to install OpenStack Compute (nova). ['y', 'n'] CONFIG_NOVA_INSTALL=y # Specify 'y' to install OpenStack Networking (neutron); otherwise, # Compute Networking (nova) will be used. ['y', 'n'] CONFIG_NEUTRON_INSTALL=y # Specify 'y' to install OpenStack Dashboard (horizon). ['y', 'n'] CONFIG_HORIZON_INSTALL=y # Specify 'y' to install OpenStack Object Storage (swift). ['y', 'n'] CONFIG_SWIFT_INSTALL=y # Specify 'y' to install OpenStack Metering (ceilometer). ['y', 'n'] CONFIG_CEILOMETER_INSTALL=y # Specify 'y' to install OpenStack Orchestration (heat). ['y', 'n'] CONFIG_HEAT_INSTALL=n # Specify 'y' to install OpenStack Data Processing (sahara). ['y', # 'n'] CONFIG_SAHARA_INSTALL=n # Specify 'y' to install OpenStack Database (trove) ['y', 'n'] CONFIG_TROVE_INSTALL=n # Specify 'y' to install OpenStack Bare Metal Provisioning (ironic). # ['y', 'n'] CONFIG_IRONIC_INSTALL=n # Specify 'y' to install the OpenStack Client packages (command-line # tools). An admin "rc" file will also be installed. ['y', 'n'] CONFIG_CLIENT_INSTALL=y # Comma-separated list of NTP servers. Leave plain if Packstack # should not install ntpd on instances. CONFIG_NTP_SERVERS= # Specify 'y' to install Nagios to monitor OpenStack hosts. Nagios # provides additional tools for monitoring the OpenStack environment. # ['y', 'n'] CONFIG_NAGIOS_INSTALL=y # Comma-separated list of servers to be excluded from the # installation. This is helpful if you are running Packstack a second # time with the same answer file and do not want Packstack to # overwrite these server's configurations. Leave empty if you do not # need to exclude any servers. EXCLUDE_SERVERS= # Specify 'y' if you want to run OpenStack services in debug mode; # otherwise, specify 'n'. ['y', 'n'] CONFIG_DEBUG_MODE=n # IP address of the server on which to install OpenStack services # specific to the controller role (for example, API servers or # dashboard). CONFIG_CONTROLLER_HOST=192.168.11.16 # List of IP addresses of the servers on which to install the Compute # service. CONFIG_COMPUTE_HOSTS=192.168.11.16 # List of IP addresses of the server on which to install the network # service such as Compute networking (nova network) or OpenStack # Networking (neutron). CONFIG_NETWORK_HOSTS=192.168.11.16 # Specify 'y' if you want to use VMware vCenter as hypervisor and # storage; otherwise, specify 'n'. ['y', 'n'] CONFIG_VMWARE_BACKEND=n # Specify 'y' if you want to use unsupported parameters. This should # be used only if you know what you are doing. Issues caused by using # unsupported options will not be fixed before the next major release. # ['y', 'n'] CONFIG_UNSUPPORTED=n # Specify 'y' if you want to use subnet addresses (in CIDR format) # instead of interface names in following options: # CONFIG_NOVA_COMPUTE_PRIVIF, CONFIG_NOVA_NETWORK_PRIVIF, # CONFIG_NOVA_NETWORK_PUBIF, CONFIG_NEUTRON_OVS_BRIDGE_IFACES, # CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS, CONFIG_NEUTRON_OVS_TUNNEL_IF. # This is useful for cases when interface names are not same on all # installation hosts. CONFIG_USE_SUBNETS=n # IP address of the VMware vCenter server. CONFIG_VCENTER_HOST= # User name for VMware vCenter server authentication. CONFIG_VCENTER_USER= # Password for VMware vCenter server authentication. CONFIG_VCENTER_PASSWORD= # Name of the VMware vCenter cluster. CONFIG_VCENTER_CLUSTER_NAME= # (Unsupported!) IP address of the server on which to install # OpenStack services specific to storage servers such as Image or # Block Storage services. CONFIG_STORAGE_HOST=192.168.11.16 # (Unsupported!) IP address of the server on which to install # OpenStack services specific to OpenStack Data Processing (sahara). CONFIG_SAHARA_HOST=192.168.11.16 # Specify 'y' to enable the EPEL repository (Extra Packages for # Enterprise Linux). ['y', 'n'] CONFIG_USE_EPEL=n # Comma-separated list of URLs for any additional yum repositories, # to use for installation. CONFIG_REPO= # Specify 'y' to enable the RDO testing repository. ['y', 'n'] CONFIG_ENABLE_RDO_TESTING=n # To subscribe each server with Red Hat Subscription Manager, include # this with CONFIG_RH_PW. CONFIG_RH_USER= # To subscribe each server to receive updates from a Satellite # server, provide the URL of the Satellite server. You must also # provide a user name (CONFIG_SATELLITE_USERNAME) and password # (CONFIG_SATELLITE_PASSWORD) or an access key (CONFIG_SATELLITE_AKEY) # for authentication. CONFIG_SATELLITE_URL= # To subscribe each server with Red Hat Subscription Manager, include # this with CONFIG_RH_USER. CONFIG_RH_PW= # Specify 'y' to enable RHEL optional repositories. ['y', 'n'] CONFIG_RH_OPTIONAL=y # HTTP proxy to use with Red Hat Subscription Manager. CONFIG_RH_PROXY= # Port to use for Red Hat Subscription Manager's HTTP proxy. CONFIG_RH_PROXY_PORT= # User name to use for Red Hat Subscription Manager's HTTP proxy. CONFIG_RH_PROXY_USER= # Password to use for Red Hat Subscription Manager's HTTP proxy. CONFIG_RH_PROXY_PW= # User name to authenticate with the RHN Satellite server; if you # intend to use an access key for Satellite authentication, leave this # blank. CONFIG_SATELLITE_USER= # Password to authenticate with the RHN Satellite server; if you # intend to use an access key for Satellite authentication, leave this # blank. CONFIG_SATELLITE_PW= # Access key for the Satellite server; if you intend to use a user # name and password for Satellite authentication, leave this blank. CONFIG_SATELLITE_AKEY= # Certificate path or URL of the certificate authority to verify that # the connection with the Satellite server is secure. If you are not # using Satellite in your deployment, leave this blank. CONFIG_SATELLITE_CACERT= # Profile name that should be used as an identifier for the system in # RHN Satellite (if required). CONFIG_SATELLITE_PROFILE= # Comma-separated list of flags passed to the rhnreg_ks command. # Valid flags are: novirtinfo, norhnsd, nopackages ['novirtinfo', # 'norhnsd', 'nopackages'] CONFIG_SATELLITE_FLAGS= # HTTP proxy to use when connecting to the RHN Satellite server (if # required). CONFIG_SATELLITE_PROXY= # User name to authenticate with the Satellite-server HTTP proxy. CONFIG_SATELLITE_PROXY_USER= # User password to authenticate with the Satellite-server HTTP proxy. CONFIG_SATELLITE_PROXY_PW= # Specify filepath for CA cert file. If CONFIG_SSL_CACERT_SELFSIGN is # set to 'n' it has to be preexisting file. CONFIG_SSL_CACERT_FILE=/etc/pki/tls/certs/selfcert.crt # Specify filepath for CA cert key file. If # CONFIG_SSL_CACERT_SELFSIGN is set to 'n' it has to be preexisting # file. CONFIG_SSL_CACERT_KEY_FILE=/etc/pki/tls/private/selfkey.key # Enter the path to use to store generated SSL certificates in. CONFIG_SSL_CERT_DIR=~/packstackca/ # Specify 'y' if you want Packstack to pregenerate the CA # Certificate. CONFIG_SSL_CACERT_SELFSIGN=y # Enter the selfsigned CAcert subject country. CONFIG_SELFSIGN_CACERT_SUBJECT_C=-- # Enter the selfsigned CAcert subject state. CONFIG_SELFSIGN_CACERT_SUBJECT_ST=State # Enter the selfsigned CAcert subject location. CONFIG_SELFSIGN_CACERT_SUBJECT_L=City # Enter the selfsigned CAcert subject organization. CONFIG_SELFSIGN_CACERT_SUBJECT_O=openstack # Enter the selfsigned CAcert subject organizational unit. CONFIG_SELFSIGN_CACERT_SUBJECT_OU=packstack # Enter the selfsigned CAcert subject common name. CONFIG_SELFSIGN_CACERT_SUBJECT_CN=host-192-168-11-16 [email protected] # Service to be used as the AMQP broker. Allowed values are: qpid, # rabbitmq ['qpid', 'rabbitmq'] CONFIG_AMQP_BACKEND=rabbitmq # IP address of the server on which to install the AMQP service. CONFIG_AMQP_HOST=192.168.11.16 # Specify 'y' to enable SSL for the AMQP service. ['y', 'n'] CONFIG_AMQP_ENABLE_SSL=n # Specify 'y' to enable authentication for the AMQP service. ['y', # 'n'] CONFIG_AMQP_ENABLE_AUTH=n # Password for the NSS certificate database of the AMQP service. CONFIG_AMQP_NSS_CERTDB_PW=PW_PLACEHOLDER # User for AMQP authentication. CONFIG_AMQP_AUTH_USER=amqp_user # Password for AMQP authentication. CONFIG_AMQP_AUTH_PASSWORD=PW_PLACEHOLDER # IP address of the server on which to install MariaDB. If a MariaDB # installation was not specified in CONFIG_MARIADB_INSTALL, specify # the IP address of an existing database server (a MariaDB cluster can # also be specified). CONFIG_MARIADB_HOST=192.168.11.16 # User name for the MariaDB administrative user. CONFIG_MARIADB_USER=root # Password for the MariaDB administrative user. CONFIG_MARIADB_PW=0fbf4f3442974b3c # Password to use for the Identity service (keystone) to access the # database. CONFIG_KEYSTONE_DB_PW=1fbbe033b0ad4818 # Enter y if cron job for removing soft deleted DB rows should be # created. CONFIG_KEYSTONE_DB_PURGE_ENABLE=True # Default region name to use when creating tenants in the Identity # service. CONFIG_KEYSTONE_REGION=RegionOne # Token to use for the Identity service API. CONFIG_KEYSTONE_ADMIN_TOKEN=8c09bae389c842a8a7f44d548c16c26f # Email address for the Identity service 'admin' user. Defaults to [email protected] # User name for the Identity service 'admin' user. Defaults to # 'admin'. CONFIG_KEYSTONE_ADMIN_USERNAME=admin # Password to use for the Identity service 'admin' user. CONFIG_KEYSTONE_ADMIN_PW=436f3c4e8f304809 # Password to use for the Identity service 'demo' user. CONFIG_KEYSTONE_DEMO_PW=5344ba2c1484433c # Identity service API version string. ['v2.0', 'v3'] CONFIG_KEYSTONE_API_VERSION=v2.0 # Identity service token format (UUID or PKI). The recommended format # for new deployments is UUID. ['UUID', 'PKI'] CONFIG_KEYSTONE_TOKEN_FORMAT=UUID # Name of service to use to run the Identity service (keystone or # httpd). ['keystone', 'httpd'] CONFIG_KEYSTONE_SERVICE_NAME=keystone # Type of Identity service backend (sql or ldap). ['sql', 'ldap'] CONFIG_KEYSTONE_IDENTITY_BACKEND=sql # URL for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_URL=ldap://192.168.11.16 # User DN for the Identity service LDAP backend. Used to bind to the # LDAP server if the LDAP server does not allow anonymous # authentication. CONFIG_KEYSTONE_LDAP_USER_DN= # User DN password for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_PASSWORD= # Base suffix for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_SUFFIX= # Query scope for the Identity service LDAP backend. Use 'one' for # onelevel/singleLevel or 'sub' for subtree/wholeSubtree ('base' is # not actually used by the Identity service and is therefore # deprecated). ['base', 'one', 'sub'] CONFIG_KEYSTONE_LDAP_QUERY_SCOPE=one # Query page size for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_PAGE_SIZE=-1 # User subtree for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_SUBTREE= # User query filter for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_FILTER= # User object class for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_OBJECTCLASS= # User ID attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_ID_ATTRIBUTE= # User name attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_NAME_ATTRIBUTE= # User email address attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_MAIL_ATTRIBUTE= # User-enabled attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE= # Bit mask integer applied to user-enabled attribute for the Identity # service LDAP backend. Indicate the bit that the enabled value is # stored in if the LDAP server represents "enabled" as a bit on an # integer rather than a boolean. A value of "0" indicates the mask is # not used (default). If this is not set to "0", the typical value is # "2", typically used when # "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl". CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK=-1 # Value of enabled attribute which indicates user is enabled for the # Identity service LDAP backend. This should match an appropriate # integer value if the LDAP server uses non-boolean (bitmask) values # to indicate whether a user is enabled or disabled. If this is not # set as 'y', the typical value is "512". This is typically used when # "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl". CONFIG_KEYSTONE_LDAP_USER_ENABLED_DEFAULT=TRUE # Specify 'y' if users are disabled (not enabled) in the Identity # service LDAP backend (inverts boolean-enalbed values). Some LDAP # servers use a boolean lock attribute where "y" means an account is # disabled. Setting this to 'y' allows these lock attributes to be # used. This setting will have no effect if # "CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK" is in use. ['n', 'y'] CONFIG_KEYSTONE_LDAP_USER_ENABLED_INVERT=n # Comma-separated list of attributes stripped from LDAP user entry # upon update. CONFIG_KEYSTONE_LDAP_USER_ATTRIBUTE_IGNORE= # Identity service LDAP attribute mapped to default_project_id for # users. CONFIG_KEYSTONE_LDAP_USER_DEFAULT_PROJECT_ID_ATTRIBUTE= # Specify 'y' if you want to be able to create Identity service users # through the Identity service interface; specify 'n' if you will # create directly in the LDAP backend. ['n', 'y'] CONFIG_KEYSTONE_LDAP_USER_ALLOW_CREATE=n # Specify 'y' if you want to be able to update Identity service users # through the Identity service interface; specify 'n' if you will # update directly in the LDAP backend. ['n', 'y'] CONFIG_KEYSTONE_LDAP_USER_ALLOW_UPDATE=n # Specify 'y' if you want to be able to delete Identity service users # through the Identity service interface; specify 'n' if you will # delete directly in the LDAP backend. ['n', 'y'] CONFIG_KEYSTONE_LDAP_USER_ALLOW_DELETE=n # Identity service LDAP attribute mapped to password. CONFIG_KEYSTONE_LDAP_USER_PASS_ATTRIBUTE= # DN of the group entry to hold enabled LDAP users when using enabled # emulation. CONFIG_KEYSTONE_LDAP_USER_ENABLED_EMULATION_DN= # List of additional LDAP attributes for mapping additional attribute # mappings for users. The attribute-mapping format is # <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the # LDAP entry and user_attr is the Identity API attribute. CONFIG_KEYSTONE_LDAP_USER_ADDITIONAL_ATTRIBUTE_MAPPING= # Group subtree for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_SUBTREE= # Group query filter for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_FILTER= # Group object class for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_OBJECTCLASS= # Group ID attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_ID_ATTRIBUTE= # Group name attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_NAME_ATTRIBUTE= # Group member attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_MEMBER_ATTRIBUTE= # Group description attribute for the Identity service LDAP backend. CONFIG_KEYSTONE_LDAP_GROUP_DESC_ATTRIBUTE= # Comma-separated list of attributes stripped from LDAP group entry # upon update. CONFIG_KEYSTONE_LDAP_GROUP_ATTRIBUTE_IGNORE= # Specify 'y' if you want to be able to create Identity service # groups through the Identity service interface; specify 'n' if you # will create directly in the LDAP backend. ['n', 'y'] CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_CREATE=n # Specify 'y' if you want to be able to update Identity service # groups through the Identity service interface; specify 'n' if you # will update directly in the LDAP backend. ['n', 'y'] CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_UPDATE=n # Specify 'y' if you want to be able to delete Identity service # groups through the Identity service interface; specify 'n' if you # will delete directly in the LDAP backend. ['n', 'y'] CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_DELETE=n # List of additional LDAP attributes used for mapping additional # attribute mappings for groups. The attribute=mapping format is # <ldap_attr>:<group_attr>, where ldap_attr is the attribute in the # LDAP entry and group_attr is the Identity API attribute. CONFIG_KEYSTONE_LDAP_GROUP_ADDITIONAL_ATTRIBUTE_MAPPING= # Specify 'y' if the Identity service LDAP backend should use TLS. # ['n', 'y'] CONFIG_KEYSTONE_LDAP_USE_TLS=n # CA certificate directory for Identity service LDAP backend (if TLS # is used). CONFIG_KEYSTONE_LDAP_TLS_CACERTDIR= # CA certificate file for Identity service LDAP backend (if TLS is # used). CONFIG_KEYSTONE_LDAP_TLS_CACERTFILE= # Certificate-checking strictness level for Identity service LDAP # backend; valid options are: never, allow, demand. ['never', 'allow', # 'demand'] CONFIG_KEYSTONE_LDAP_TLS_REQ_CERT=demand # Password to use for the Image service (glance) to access the # database. CONFIG_GLANCE_DB_PW=17b3532e54524e35 # Password to use for the Image service to authenticate with the # Identity service. CONFIG_GLANCE_KS_PW=4ed1a12ca1774274 # Storage backend for the Image service (controls how the Image # service stores disk images). Valid options are: file or swift # (Object Storage). The Object Storage service must be enabled to use # it as a working backend; otherwise, Packstack falls back to 'file'. # ['file', 'swift'] CONFIG_GLANCE_BACKEND=file # Password to use for the Block Storage service (cinder) to access # the database. CONFIG_CINDER_DB_PW=d0b00bf98cf5437d # Enter y if cron job for removing soft deleted DB rows should be # created. CONFIG_CINDER_DB_PURGE_ENABLE=True # Password to use for the Block Storage service to authenticate with # the Identity service. CONFIG_CINDER_KS_PW=7243e6e62f1f4298 # Storage backend to use for the Block Storage service; valid options # are: lvm, gluster, nfs, vmdk, netapp. ['lvm', 'gluster', 'nfs', # 'vmdk', 'netapp'] CONFIG_CINDER_BACKEND=lvm # Specify 'y' to create the Block Storage volumes group. That is, # Packstack creates a raw disk image in /var/lib/cinder, and mounts it # using a loopback device. This should only be used for testing on a # proof-of-concept installation of the Block Storage service (a file- # backed volume group is not suitable for production usage). ['y', # 'n'] CONFIG_CINDER_VOLUMES_CREATE=y # Size of Block Storage volumes group. Actual volume size will be # extended with 3% more space for VG metadata. Remember that the size # of the volume group will restrict the amount of disk space that you # can expose to Compute instances, and that the specified amount must # be available on the device used for /var/lib/cinder. CONFIG_CINDER_VOLUMES_SIZE=20G # A single or comma-separated list of Red Hat Storage (gluster) # volume shares to mount. Example: 'ip-address:/vol-name', 'domain # :/vol-name' CONFIG_CINDER_GLUSTER_MOUNTS= # A single or comma-separated list of NFS exports to mount. Example: # 'ip-address:/export-name' CONFIG_CINDER_NFS_MOUNTS= # Administrative user account name used to access the NetApp storage # system or proxy server. CONFIG_CINDER_NETAPP_LOGIN= # Password for the NetApp administrative user account specified in # the CONFIG_CINDER_NETAPP_LOGIN parameter. CONFIG_CINDER_NETAPP_PASSWORD= # Hostname (or IP address) for the NetApp storage system or proxy # server. CONFIG_CINDER_NETAPP_HOSTNAME= # The TCP port to use for communication with the storage system or # proxy. If not specified, Data ONTAP drivers will use 80 for HTTP and # 443 for HTTPS; E-Series will use 8080 for HTTP and 8443 for HTTPS. # Defaults to 80. CONFIG_CINDER_NETAPP_SERVER_PORT=80 # Storage family type used on the NetApp storage system; valid # options are ontap_7mode for using Data ONTAP operating in 7-Mode, # ontap_cluster for using clustered Data ONTAP, or E-Series for NetApp # E-Series. Defaults to ontap_cluster. ['ontap_7mode', # 'ontap_cluster', 'eseries'] CONFIG_CINDER_NETAPP_STORAGE_FAMILY=ontap_cluster # The transport protocol used when communicating with the NetApp # storage system or proxy server. Valid values are http or https. # Defaults to 'http'. ['http', 'https'] CONFIG_CINDER_NETAPP_TRANSPORT_TYPE=http # Storage protocol to be used on the data path with the NetApp # storage system; valid options are iscsi, fc, nfs. Defaults to nfs. # ['iscsi', 'fc', 'nfs'] CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL=nfs # Quantity to be multiplied by the requested volume size to ensure # enough space is available on the virtual storage server (Vserver) to # fulfill the volume creation request. Defaults to 1.0. CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER=1.0 # Time period (in minutes) that is allowed to elapse after the image # is last accessed, before it is deleted from the NFS image cache. # When a cache-cleaning cycle begins, images in the cache that have # not been accessed in the last M minutes, where M is the value of # this parameter, are deleted from the cache to create free space on # the NFS share. Defaults to 720. CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES=720 # If the percentage of available space for an NFS share has dropped # below the value specified by this parameter, the NFS image cache is # cleaned. Defaults to 20. CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_START=20 # When the percentage of available space on an NFS share has reached # the percentage specified by this parameter, the driver stops # clearing files from the NFS image cache that have not been accessed # in the last M minutes, where M is the value of the # CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES parameter. Defaults to 60. CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_STOP=60 # Single or comma-separated list of NetApp NFS shares for Block # Storage to use. Format: ip-address:/export-name. Defaults to ''. CONFIG_CINDER_NETAPP_NFS_SHARES= # File with the list of available NFS shares. Defaults to # '/etc/cinder/shares.conf'. CONFIG_CINDER_NETAPP_NFS_SHARES_CONFIG=/etc/cinder/shares.conf # This parameter is only utilized when the storage protocol is # configured to use iSCSI or FC. This parameter is used to restrict # provisioning to the specified controller volumes. Specify the value # of this parameter to be a comma separated list of NetApp controller # volume names to be used for provisioning. Defaults to ''. CONFIG_CINDER_NETAPP_VOLUME_LIST= # The vFiler unit on which provisioning of block storage volumes will # be done. This parameter is only used by the driver when connecting # to an instance with a storage family of Data ONTAP operating in # 7-Mode Only use this parameter when utilizing the MultiStore feature # on the NetApp storage system. Defaults to ''. CONFIG_CINDER_NETAPP_VFILER= # The name of the config.conf stanza for a Data ONTAP (7-mode) HA # partner. This option is only used by the driver when connecting to # an instance with a storage family of Data ONTAP operating in 7-Mode, # and it is required if the storage protocol selected is FC. Defaults # to ''. CONFIG_CINDER_NETAPP_PARTNER_BACKEND_NAME= # This option specifies the virtual storage server (Vserver) name on # the storage cluster on which provisioning of block storage volumes # should occur. Defaults to ''. CONFIG_CINDER_NETAPP_VSERVER= # Restricts provisioning to the specified controllers. Value must be # a comma-separated list of controller hostnames or IP addresses to be # used for provisioning. This option is only utilized when the storage # family is configured to use E-Series. Defaults to ''. CONFIG_CINDER_NETAPP_CONTROLLER_IPS= # Password for the NetApp E-Series storage array. Defaults to ''. CONFIG_CINDER_NETAPP_SA_PASSWORD= # This option is used to define how the controllers in the E-Series # storage array will work with the particular operating system on the # hosts that are connected to it. Defaults to 'linux_dm_mp' CONFIG_CINDER_NETAPP_ESERIES_HOST_TYPE=linux_dm_mp # Path to the NetApp E-Series proxy application on a proxy server. # The value is combined with the value of the # CONFIG_CINDER_NETAPP_TRANSPORT_TYPE, CONFIG_CINDER_NETAPP_HOSTNAME, # and CONFIG_CINDER_NETAPP_HOSTNAME options to create the URL used by # the driver to connect to the proxy application. Defaults to # '/devmgr/v2'. CONFIG_CINDER_NETAPP_WEBSERVICE_PATH=/devmgr/v2 # Restricts provisioning to the specified storage pools. Only dynamic # disk pools are currently supported. The value must be a comma- # separated list of disk pool names to be used for provisioning. # Defaults to ''. CONFIG_CINDER_NETAPP_STORAGE_POOLS= # Password to use for the OpenStack File Share service (manila) to # access the database. CONFIG_MANILA_DB_PW=PW_PLACEHOLDER # Password to use for the OpenStack File Share service (manila) to # authenticate with the Identity service. CONFIG_MANILA_KS_PW=PW_PLACEHOLDER # Backend for the OpenStack File Share service (manila); valid # options are: generic, netapp, glusternative, or glusternfs. # ['generic', 'netapp', 'glusternative', 'glusternfs'] CONFIG_MANILA_BACKEND=generic # Denotes whether the driver should handle the responsibility of # managing share servers. This must be set to false if the driver is # to operate without managing share servers. Defaults to 'false' # ['true', 'false'] CONFIG_MANILA_NETAPP_DRV_HANDLES_SHARE_SERVERS=false # The transport protocol used when communicating with the storage # system or proxy server. Valid values are 'http' and 'https'. # Defaults to 'https'. ['https', 'http'] CONFIG_MANILA_NETAPP_TRANSPORT_TYPE=https # Administrative user account name used to access the NetApp storage # system. Defaults to ''. CONFIG_MANILA_NETAPP_LOGIN=admin # Password for the NetApp administrative user account specified in # the CONFIG_MANILA_NETAPP_LOGIN parameter. Defaults to ''. CONFIG_MANILA_NETAPP_PASSWORD= # Hostname (or IP address) for the NetApp storage system or proxy # server. Defaults to ''. CONFIG_MANILA_NETAPP_SERVER_HOSTNAME= # The storage family type used on the storage system; valid values # are ontap_cluster for clustered Data ONTAP. Defaults to # 'ontap_cluster'. ['ontap_cluster'] CONFIG_MANILA_NETAPP_STORAGE_FAMILY=ontap_cluster # The TCP port to use for communication with the storage system or # proxy server. If not specified, Data ONTAP drivers will use 80 for # HTTP and 443 for HTTPS. Defaults to '443'. CONFIG_MANILA_NETAPP_SERVER_PORT=443 # Pattern for searching available aggregates for NetApp provisioning. # Defaults to '(.*)'. CONFIG_MANILA_NETAPP_AGGREGATE_NAME_SEARCH_PATTERN=(.*) # Name of aggregate on which to create the NetApp root volume. This # option only applies when the option # CONFIG_MANILA_NETAPP_DRV_HANDLES_SHARE_SERVERS is set to True. CONFIG_MANILA_NETAPP_ROOT_VOLUME_AGGREGATE= # NetApp root volume name. Defaults to 'root'. CONFIG_MANILA_NETAPP_ROOT_VOLUME_NAME=root # This option specifies the storage virtual machine (previously # called a Vserver) name on the storage cluster on which provisioning # of shared file systems should occur. This option only applies when # the option driver_handles_share_servers is set to False. Defaults to # ''. CONFIG_MANILA_NETAPP_VSERVER= # Denotes whether the driver should handle the responsibility of # managing share servers. This must be set to false if the driver is # to operate without managing share servers. Defaults to 'true'. # ['true', 'false'] CONFIG_MANILA_GENERIC_DRV_HANDLES_SHARE_SERVERS=true # Volume name template for Manila service. Defaults to 'manila- # share-%s'. CONFIG_MANILA_GENERIC_VOLUME_NAME_TEMPLATE=manila-share-%s # Share mount path for Manila service. Defaults to '/shares'. CONFIG_MANILA_GENERIC_SHARE_MOUNT_PATH=/shares # Location of disk image for Manila service instance. Defaults to ' CONFIG_MANILA_SERVICE_IMAGE_LOCATION=https://www.dropbox.com/s/vi5oeh10q1qkckh/ubuntu_1204_nfs_cifs.qcow2 # User in Manila service instance. CONFIG_MANILA_SERVICE_INSTANCE_USER=ubuntu # Password to service instance user. CONFIG_MANILA_SERVICE_INSTANCE_PASSWORD=ubuntu # Type of networking that the backend will use. A more detailed # description of each option is available in the Manila docs. Defaults # to 'neutron'. ['neutron', 'nova-network', 'standalone'] CONFIG_MANILA_NETWORK_TYPE=neutron # Gateway IPv4 address that should be used. Required. Defaults to ''. CONFIG_MANILA_NETWORK_STANDALONE_GATEWAY= # Network mask that will be used. Can be either decimal like '24' or # binary like '255.255.255.0'. Required. Defaults to ''. CONFIG_MANILA_NETWORK_STANDALONE_NETMASK= # Set it if network has segmentation (VLAN, VXLAN, etc). It will be # assigned to share-network and share drivers will be able to use this # for network interfaces within provisioned share servers. Optional. # Example: 1001. Defaults to ''. CONFIG_MANILA_NETWORK_STANDALONE_SEG_ID= # Can be IP address, range of IP addresses or list of addresses or # ranges. Contains addresses from IP network that are allowed to be # used. If empty, then will be assumed that all host addresses from # network can be used. Optional. Examples: 10.0.0.10 or # 10.0.0.10-10.0.0.20 or # 10.0.0.10-10.0.0.20,10.0.0.30-10.0.0.40,10.0.0.50. Defaults to ''. CONFIG_MANILA_NETWORK_STANDALONE_IP_RANGE= # IP version of network. Optional. Defaults to '4'. ['4', '6'] CONFIG_MANILA_NETWORK_STANDALONE_IP_VERSION=4 # List of GlusterFS servers that can be used to create shares. Each # GlusterFS server should be of the form [[email protected]]<volserver>, and # they are assumed to belong to distinct Gluster clusters. CONFIG_MANILA_GLUSTERFS_SERVERS= # Path of Manila host's private SSH key file. CONFIG_MANILA_GLUSTERFS_NATIVE_PATH_TO_PRIVATE_KEY= # Regular expression template used to filter GlusterFS volumes for # share creation. The regex template can optionally (ie. with support # of the GlusterFS backend) contain the #{size} parameter which # matches an integer (sequence of digits) in which case the value # shall be intepreted as size of the volume in GB. Examples: "manila- # share-volume-d+$", "manila-share-volume-#{size}G-d+$"; with matching # volume names, respectively: "manila-share-volume-12", "manila-share- # volume-3G-13". In latter example, the number that matches "#{size}", # that is, 3, is an indication that the size of volume is 3G. CONFIG_MANILA_GLUSTERFS_VOLUME_PATTERN= # Specifies the GlusterFS volume to be mounted on the Manila host. # For e.g: [[email protected]]<volserver>:/<volid> CONFIG_MANILA_GLUSTERFS_TARGET= # Base directory containing mount points for Gluster volumes. CONFIG_MANILA_GLUSTERFS_MOUNT_POINT_BASE= # Type of NFS server that mediate access to the Gluster volumes # (Gluster or Ganesha). CONFIG_MANILA_GLUSTERFS_NFS_SERVER_TYPE=gluster # Path of Manila host's private SSH key file. CONFIG_MANILA_GLUSTERFS_PATH_TO_PRIVATE_KEY= # Remote Ganesha server node's IP address. CONFIG_MANILA_GLUSTERFS_GANESHA_SERVER_IP= # Password to use for OpenStack Bare Metal Provisioning (ironic) to # access the database. CONFIG_IRONIC_DB_PW=PW_PLACEHOLDER # Password to use for OpenStack Bare Metal Provisioning to # authenticate with the Identity service. CONFIG_IRONIC_KS_PW=PW_PLACEHOLDER # Enter y if cron job for removing soft deleted DB rows should be # created. CONFIG_NOVA_DB_PURGE_ENABLE=True # Password to use for the Compute service (nova) to access the # database. CONFIG_NOVA_DB_PW=f76caba44f8a4a60 # Password to use for the Compute service to authenticate with the # Identity service. CONFIG_NOVA_KS_PW=e619b91f7e484977 # Overcommitment ratio for virtual to physical CPUs. Specify 1.0 to # disable CPU overcommitment. CONFIG_NOVA_SCHED_CPU_ALLOC_RATIO=16.0 # Overcommitment ratio for virtual to physical RAM. Specify 1.0 to # disable RAM overcommitment. CONFIG_NOVA_SCHED_RAM_ALLOC_RATIO=1.5 # Protocol used for instance migration. Valid options are: tcp and # ssh. Note that by default, the Compute user is created with the # /sbin/nologin shell so that the SSH protocol will not work. To make # the SSH protocol work, you must configure the Compute user on # compute hosts manually. ['tcp', 'ssh'] CONFIG_NOVA_COMPUTE_MIGRATE_PROTOCOL=tcp # Manager that runs the Compute service. CONFIG_NOVA_COMPUTE_MANAGER=nova.compute.manager.ComputeManager # PEM encoded certificate to be used for ssl on the https server, # leave blank if one should be generated, this certificate should not # require a passphrase. If CONFIG_HORIZON_SSL is set to 'n' this # parameter is ignored. CONFIG_VNC_SSL_CERT= # SSL keyfile corresponding to the certificate if one was entered. If # CONFIG_HORIZON_SSL is set to 'n' this parameter is ignored. CONFIG_VNC_SSL_KEY= # Private interface for flat DHCP on the Compute servers. CONFIG_NOVA_COMPUTE_PRIVIF=eth1 # Compute Network Manager. ['^nova\.network\.manager\.\w+Manager$'] CONFIG_NOVA_NETWORK_MANAGER=nova.network.manager.FlatDHCPManager # Public interface on the Compute network server. CONFIG_NOVA_NETWORK_PUBIF=eth0 # Private interface for flat DHCP on the Compute network server. CONFIG_NOVA_NETWORK_PRIVIF=eth1 # IP Range for flat DHCP. ['^[\:\.\da-fA-f]+(\/\d+){0,1}$'] CONFIG_NOVA_NETWORK_FIXEDRANGE=192.168.32.0/22 # IP Range for floating IP addresses. ['^[\:\.\da- # fA-f]+(\/\d+){0,1}$'] CONFIG_NOVA_NETWORK_FLOATRANGE=10.3.4.0/22 # Specify 'y' to automatically assign a floating IP to new instances. # ['y', 'n'] CONFIG_NOVA_NETWORK_AUTOASSIGNFLOATINGIP=n # First VLAN for private networks (Compute networking). CONFIG_NOVA_NETWORK_VLAN_START=100 # Number of networks to support (Compute networking). CONFIG_NOVA_NETWORK_NUMBER=1 # Number of addresses in each private subnet (Compute networking). CONFIG_NOVA_NETWORK_SIZE=255 # Password to use for OpenStack Networking (neutron) to authenticate # with the Identity service. CONFIG_NEUTRON_KS_PW=6fe4a8a74d0c423a # The password to use for OpenStack Networking to access the # database. CONFIG_NEUTRON_DB_PW=a002789abb6d42c7 # The name of the Open vSwitch bridge (or empty for linuxbridge) for # the OpenStack Networking L3 agent to use for external traffic. # Specify 'provider' if you intend to use a provider network to handle # external traffic. CONFIG_NEUTRON_L3_EXT_BRIDGE=br-ex # Password for the OpenStack Networking metadata agent. CONFIG_NEUTRON_METADATA_PW=0c5423278fd5473e # Specify 'y' to install OpenStack Networking's Load-Balancing- # as-a-Service (LBaaS). ['y', 'n'] CONFIG_LBAAS_INSTALL=n # Specify 'y' to install OpenStack Networking's L3 Metering agent # ['y', 'n'] CONFIG_NEUTRON_METERING_AGENT_INSTALL=n # Specify 'y' to configure OpenStack Networking's Firewall- # as-a-Service (FWaaS). ['y', 'n'] CONFIG_NEUTRON_FWAAS=n # Specify 'y' to configure OpenStack Networking's VPN-as-a-Service # (VPNaaS). ['y', 'n'] CONFIG_NEUTRON_VPNAAS=n # Comma-separated list of network-type driver entry points to be # loaded from the neutron.ml2.type_drivers namespace. ['local', # 'flat', 'vlan', 'gre', 'vxlan'] CONFIG_NEUTRON_ML2_TYPE_DRIVERS=vxlan # Comma-separated, ordered list of network types to allocate as # tenant networks. The 'local' value is only useful for single-box # testing and provides no connectivity between hosts. ['local', # 'vlan', 'gre', 'vxlan'] CONFIG_NEUTRON_ML2_TENANT_NETWORK_TYPES=vxlan # Comma-separated ordered list of networking mechanism driver entry # points to be loaded from the neutron.ml2.mechanism_drivers # namespace. ['logger', 'test', 'linuxbridge', 'openvswitch', # 'hyperv', 'ncs', 'arista', 'cisco_nexus', 'mlnx', 'l2population'] CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS=openvswitch # Comma-separated list of physical_network names with which flat # networks can be created. Use * to allow flat networks with arbitrary # physical_network names. CONFIG_NEUTRON_ML2_FLAT_NETWORKS=* # Comma-separated list of <physical_network>:<vlan_min>:<vlan_max> or # <physical_network> specifying physical_network names usable for VLAN # provider and tenant networks, as well as ranges of VLAN tags on each # available for allocation to tenant networks. CONFIG_NEUTRON_ML2_VLAN_RANGES= # Comma-separated list of <tun_min>:<tun_max> tuples enumerating # ranges of GRE tunnel IDs that are available for tenant-network # allocation. A tuple must be an array with tun_max +1 - tun_min > # 1000000. CONFIG_NEUTRON_ML2_TUNNEL_ID_RANGES= # Comma-separated list of addresses for VXLAN multicast group. If # left empty, disables VXLAN from sending allocate broadcast traffic # (disables multicast VXLAN mode). Should be a Multicast IP (v4 or v6) # address. CONFIG_NEUTRON_ML2_VXLAN_GROUP= # Comma-separated list of <vni_min>:<vni_max> tuples enumerating # ranges of VXLAN VNI IDs that are available for tenant network # allocation. Minimum value is 0 and maximum value is 16777215. CONFIG_NEUTRON_ML2_VNI_RANGES=10:100 # Name of the L2 agent to be used with OpenStack Networking. # ['linuxbridge', 'openvswitch'] CONFIG_NEUTRON_L2_AGENT=openvswitch # Comma-separated list of interface mappings for the OpenStack # Networking linuxbridge plugin. Each tuple in the list must be in the # format <physical_network>:<net_interface>. Example: # physnet1:eth1,physnet2:eth2,physnet3:eth3. CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS= # Comma-separated list of bridge mappings for the OpenStack # Networking Open vSwitch plugin. Each tuple in the list must be in # the format <physical_network>:<ovs_bridge>. Example: physnet1:br- # eth1,physnet2:br-eth2,physnet3:br-eth3 CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS= # Comma-separated list of colon-separated Open vSwitch # <bridge>:<interface> pairs. The interface will be added to the # associated bridge. If you desire the bridge to be persistent a value # must be added to this directive, also # CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS must be set in order to create # the proper port. This can be achieved from the command line by # issuing the following command: packstack --allinone --os-neutron- # ovs-bridge-mappings=ext-net:br-ex --os-neutron-ovs-bridge-interfaces # =br-ex:eth0 CONFIG_NEUTRON_OVS_BRIDGE_IFACES= # Interface for the Open vSwitch tunnel. Packstack overrides the IP # address used for tunnels on this hypervisor to the IP found on the # specified interface (for example, eth1). CONFIG_NEUTRON_OVS_TUNNEL_IF= # VXLAN UDP port. CONFIG_NEUTRON_OVS_VXLAN_UDP_PORT=4789 # Specify 'y' to set up Horizon communication over https. ['y', 'n'] CONFIG_HORIZON_SSL=n # Secret key to use for Horizon Secret Encryption Key. CONFIG_HORIZON_SECRET_KEY=102fc3e924404b818252cd7078e60cf9 # PEM-encoded certificate to be used for SSL connections on the https # server. To generate a certificate, leave blank. CONFIG_HORIZON_SSL_CERT= # SSL keyfile corresponding to the certificate if one was specified. # The certificate should not require a passphrase. CONFIG_HORIZON_SSL_KEY= CONFIG_HORIZON_SSL_CACERT= # Password to use for the Object Storage service to authenticate with # the Identity service. CONFIG_SWIFT_KS_PW=595a28ec0eec4869 # Comma-separated list of devices to use as storage device for Object # Storage. Each entry must take the format /path/to/dev (for example, # specifying /dev/vdb installs /dev/vdb as the Object Storage storage # device; Packstack does not create the filesystem, you must do this # first). If left empty, Packstack creates a loopback device for test # setup. CONFIG_SWIFT_STORAGES= # Number of Object Storage storage zones; this number MUST be no # larger than the number of configured storage devices. CONFIG_SWIFT_STORAGE_ZONES=1 # Number of Object Storage storage replicas; this number MUST be no # larger than the number of configured storage zones. CONFIG_SWIFT_STORAGE_REPLICAS=1 # File system type for storage nodes. ['xfs', 'ext4'] CONFIG_SWIFT_STORAGE_FSTYPE=ext4 # Custom seed number to use for swift_hash_path_suffix in # /etc/swift/swift.conf. If you do not provide a value, a seed number # is automatically generated. CONFIG_SWIFT_HASH=f6e2e46e7d0a4e93 # Size of the Object Storage loopback file storage device. CONFIG_SWIFT_STORAGE_SIZE=2G # Password used by Orchestration service user to authenticate against # the database. CONFIG_HEAT_DB_PW=PW_PLACEHOLDER # Encryption key to use for authentication in the Orchestration # database (16, 24, or 32 chars). CONFIG_HEAT_AUTH_ENC_KEY=b881c29656754c37 # Password to use for the Orchestration service to authenticate with # the Identity service. CONFIG_HEAT_KS_PW=PW_PLACEHOLDER # Specify 'y' to install the Orchestration CloudWatch API. ['y', 'n'] CONFIG_HEAT_CLOUDWATCH_INSTALL=n # Specify 'y' to install the Orchestration CloudFormation API. ['y', # 'n'] CONFIG_HEAT_CFN_INSTALL=n # Name of the Identity domain for Orchestration. CONFIG_HEAT_DOMAIN=heat # Name of the Identity domain administrative user for Orchestration. CONFIG_HEAT_DOMAIN_ADMIN=heat_admin # Password for the Identity domain administrative user for # Orchestration. CONFIG_HEAT_DOMAIN_PASSWORD=PW_PLACEHOLDER # Specify 'y' to provision for demo usage and testing. ['y', 'n'] CONFIG_PROVISION_DEMO=n # Specify 'y' to configure the OpenStack Integration Test Suite # (tempest) for testing. The test suite requires OpenStack Networking # to be installed. ['y', 'n'] CONFIG_PROVISION_TEMPEST=n # CIDR network address for the floating IP subnet. CONFIG_PROVISION_DEMO_FLOATRANGE=172.24.4.224/28 # The name to be assigned to the demo image in Glance (default # "cirros"). CONFIG_PROVISION_IMAGE_NAME=cirros # A URL or local file location for an image to download and provision # in Glance (defaults to a URL for a recent "cirros" image). CONFIG_PROVISION_IMAGE_URL=http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img # Format for the demo image (default "qcow2"). CONFIG_PROVISION_IMAGE_FORMAT=qcow2 # User to use when connecting to instances booted from the demo # image. CONFIG_PROVISION_IMAGE_SSH_USER=cirros # Name of the Integration Test Suite provisioning user. If you do not # provide a user name, Tempest is configured in a standalone mode. CONFIG_PROVISION_TEMPEST_USER= # Password to use for the Integration Test Suite provisioning user. CONFIG_PROVISION_TEMPEST_USER_PW=PW_PLACEHOLDER # CIDR network address for the floating IP subnet. CONFIG_PROVISION_TEMPEST_FLOATRANGE=172.24.4.224/28 # URI of the Integration Test Suite git repository. CONFIG_PROVISION_TEMPEST_REPO_URI=https://github.com/openstack/tempest.git # Revision (branch) of the Integration Test Suite git repository. CONFIG_PROVISION_TEMPEST_REPO_REVISION=master # Specify 'y' to configure the Open vSwitch external bridge for an # all-in-one deployment (the L3 external bridge acts as the gateway # for virtual machines). ['y', 'n'] CONFIG_PROVISION_ALL_IN_ONE_OVS_BRIDGE=n # Secret key for signing Telemetry service (ceilometer) messages. CONFIG_CEILOMETER_SECRET=af9f7013f3be4131 # Password to use for Telemetry to authenticate with the Identity # service. CONFIG_CEILOMETER_KS_PW=21432ffd74074fbc # Backend driver for Telemetry's group membership coordination. # ['redis', 'none'] CONFIG_CEILOMETER_COORDINATION_BACKEND=redis # IP address of the server on which to install MongoDB. CONFIG_MONGODB_HOST=192.168.11.16 # IP address of the server on which to install the Redis master # server. CONFIG_REDIS_MASTER_HOST=192.168.11.16 # Port on which the Redis server(s) listens. CONFIG_REDIS_PORT=6379 # Specify 'y' to have Redis try to use HA. ['y', 'n'] CONFIG_REDIS_HA=n # Hosts on which to install Redis slaves. CONFIG_REDIS_SLAVE_HOSTS= # Hosts on which to install Redis sentinel servers. CONFIG_REDIS_SENTINEL_HOSTS= # Host to configure as the Redis coordination sentinel. CONFIG_REDIS_SENTINEL_CONTACT_HOST= # Port on which Redis sentinel servers listen. CONFIG_REDIS_SENTINEL_PORT=26379 # Quorum value for Redis sentinel servers. CONFIG_REDIS_SENTINEL_QUORUM=2 # Name of the master server watched by the Redis sentinel. ['[a-z]+'] CONFIG_REDIS_MASTER_NAME=mymaster # Password to use for OpenStack Data Processing (sahara) to access # the database. CONFIG_SAHARA_DB_PW=PW_PLACEHOLDER # Password to use for OpenStack Data Processing to authenticate with # the Identity service. CONFIG_SAHARA_KS_PW=PW_PLACEHOLDER # Password to use for OpenStack Database-as-a-Service (trove) to # access the database. CONFIG_TROVE_DB_PW=PW_PLACEHOLDER # Password to use for OpenStack Database-as-a-Service to authenticate # with the Identity service. CONFIG_TROVE_KS_PW=PW_PLACEHOLDER # User name to use when OpenStack Database-as-a-Service connects to # the Compute service. CONFIG_TROVE_NOVA_USER=trove # Tenant to use when OpenStack Database-as-a-Service connects to the # Compute service. CONFIG_TROVE_NOVA_TENANT=services # Password to use when OpenStack Database-as-a-Service connects to # the Compute service. CONFIG_TROVE_NOVA_PW=PW_PLACEHOLDER # Password of the nagiosadmin user on the Nagios server. CONFIG_NAGIOS_PW=1928791c33aa4cd6
附录:安装过程log:
[[email protected] ~]# screen packstack --answer-file=hcloud.txt Welcome to the Packstack setup utility The installation log file is available at: /var/tmp/packstack/20160506-213527-2SD4F7/openstack-setup.log Installing: Clean Up [ DONE ] Discovering ip protocol version [ DONE ] Setting up ssh keys [ DONE ] Preparing servers [ DONE ] Pre installing Puppet and discovering hosts' details [ DONE ] Adding pre install manifest entries [ DONE ] Setting up CACERT [ DONE ] Adding AMQP manifest entries [ DONE ] Adding MariaDB manifest entries [ DONE ] Fixing Keystone LDAP config parameters to be undef if empty[ DONE ] Adding Keystone manifest entries [ DONE ] Adding Glance Keystone manifest entries [ DONE ] Adding Glance manifest entries [ DONE ] Adding Cinder Keystone manifest entries [ DONE ] Checking if the Cinder server has a cinder-volumes vg[ DONE ] Adding Cinder manifest entries [ DONE ] Adding Nova API manifest entries [ DONE ] Adding Nova Keystone manifest entries [ DONE ] Adding Nova Cert manifest entries [ DONE ] Adding Nova Conductor manifest entries [ DONE ] Creating ssh keys for Nova migration [ DONE ] Gathering ssh host keys for Nova migration [ DONE ] Adding Nova Compute manifest entries [ DONE ] Adding Nova Scheduler manifest entries [ DONE ] Adding Nova VNC Proxy manifest entries [ DONE ] Adding OpenStack Network-related Nova manifest entries[ DONE ] Adding Nova Common manifest entries [ DONE ] Adding Neutron VPNaaS Agent manifest entries [ DONE ] Adding Neutron FWaaS Agent manifest entries [ DONE ] Adding Neutron LBaaS Agent manifest entries [ DONE ] Adding Neutron API manifest entries [ DONE ] Adding Neutron Keystone manifest entries [ DONE ] Adding Neutron L3 manifest entries [ DONE ] Adding Neutron L2 Agent manifest entries [ DONE ] Adding Neutron DHCP Agent manifest entries [ DONE ] Adding Neutron Metering Agent manifest entries [ DONE ] Adding Neutron Metadata Agent manifest entries [ DONE ] Checking if NetworkManager is enabled and running [ DONE ] Adding OpenStack Client manifest entries [ DONE ] Adding Horizon manifest entries [ DONE ] Adding Swift Keystone manifest entries [ DONE ] Adding Swift builder manifest entries [ DONE ] Adding Swift proxy manifest entries [ DONE ] Adding Swift storage manifest entries [ DONE ] Adding Swift common manifest entries [ DONE ] Adding MongoDB manifest entries [ DONE ] Adding Redis manifest entries [ DONE ] Adding Ceilometer manifest entries [ DONE ] Adding Ceilometer Keystone manifest entries [ DONE ] Adding Nagios server manifest entries [ DONE ] Adding Nagios host manifest entries [ DONE ] Adding post install manifest entries [ DONE ] Copying Puppet modules and manifests [ DONE ] Applying 192.168.11.16_prescript.pp 192.168.11.16_prescript.pp: [ DONE ] Applying 192.168.11.16_amqp.pp Applying 192.168.11.16_mariadb.pp 192.168.11.16_amqp.pp: [ DONE ] 192.168.11.16_mariadb.pp: [ DONE ] Applying 192.168.11.16_keystone.pp Applying 192.168.11.16_glance.pp Applying 192.168.11.16_cinder.pp 192.168.11.16_keystone.pp: [ DONE ] 192.168.11.16_glance.pp: [ DONE ] 192.168.11.16_cinder.pp: [ DONE ] Applying 192.168.11.16_api_nova.pp 192.168.11.16_api_nova.pp: [ DONE ] Applying 192.168.11.16_nova.pp 192.168.11.16_nova.pp: [ DONE ] Applying 192.168.11.16_neutron.pp 192.168.11.16_neutron.pp: [ DONE ] Applying 192.168.11.16_osclient.pp Applying 192.168.11.16_horizon.pp 192.168.11.16_osclient.pp: [ DONE ] 192.168.11.16_horizon.pp: [ DONE ] Applying 192.168.11.16_ring_swift.pp 192.168.11.16_ring_swift.pp: [ DONE ] Applying 192.168.11.16_swift.pp 192.168.11.16_swift.pp: [ DONE ] Applying 192.168.11.16_mongodb.pp Applying 192.168.11.16_redis.pp 192.168.11.16_mongodb.pp: [ DONE ] 192.168.11.16_redis.pp: [ DONE ] Applying 192.168.11.16_ceilometer.pp 192.168.11.16_ceilometer.pp: [ DONE ] Applying 192.168.11.16_nagios.pp Applying 192.168.11.16_nagios_nrpe.pp 192.168.11.16_nagios.pp: [ DONE ] 192.168.11.16_nagios_nrpe.pp: [ DONE ] Applying 192.168.11.16_postscript.pp 192.168.11.16_postscript.pp: [ DONE ] Applying Puppet manifests [ DONE ] Finalizing [ DONE ] **** Installation completed successfully ****** Additional information: * Time synchronization installation was skipped. Please note that unsynchronized time on server instances might be problem for some OpenStack components. * Warning: NetworkManager is active on 192.168.11.16. OpenStack networking currently does not work on systems that have the Network Manager service enabled. * File /root/keystonerc_admin has been created on OpenStack client host 192.168.11.16. To use the command line tools you need to source the file. * To access the OpenStack Dashboard browse to http://192.168.11.16/dashboard . Please, find your login credentials stored in the keystonerc_admin in your home directory. * To use Nagios, browse to http://192.168.11.16/nagios username: nagiosadmin, password: 1928791c33aa4cd6 * The installation log file is available at: /var/tmp/packstack/20160506-213527-2SD4F7/openstack-setup.log * The generated manifests are available at: /var/tmp/packstack/20160506-213527-2SD4F7/manifests [screen is terminating]