set proper prx01 address in devops template
diff --git a/tcp_tests/settings_oslo.py b/tcp_tests/settings_oslo.py
index 6ba5b3c..bde95c4 100644
--- a/tcp_tests/settings_oslo.py
+++ b/tcp_tests/settings_oslo.py
@@ -24,7 +24,15 @@
 
 
 _default_conf = pkg_resources.resource_filename(
-    __name__, 'templates/tcpcloud-default.yaml')
+    __name__, 'templates/underlay/mk22-lab-advanced.yaml')
+
+_default_salt_steps = pkg_resources.resource_filename(
+    __name__, 'templates/salt/mk22-lab-advanced-salt.yaml')
+_default_common_services_steps = pkg_resources.resource_filename(
+    __name__,
+    'templates/common-services/mk22-lab-advanced-common-services.yaml')
+_default_openstack_steps = pkg_resources.resource_filename(
+    __name__, 'templates/openstack/mk22-lab-advanced-openstack.yaml')
 
 
 hardware_opts = [
@@ -64,26 +72,36 @@
            help="LVM settings for Underlay", default={}),
 ]
 
-# Deploy options for a new TCPCloud deployment
-tcp_deploy_opts = [
-    ct.Cfg('reclass_settings', ct.JSONDict(),
-           help="", default={}),
+
+salt_deploy_opts = [
+    ct.Cfg('salt_steps_path', ct.String(),
+           help="Path to YAML with steps to deploy salt",
+           default=_default_salt_steps),
 ]
-
-
-# Access credentials to a ready TCP cluster
-tcp_opts = [
-    ct.Cfg('tcp_host', ct.IPAddress(),
+salt_opts = [
+    ct.Cfg('salt_master_host', ct.IPAddress(),
            help="", default='0.0.0.0'),
 ]
 
-
-os_deploy_opts = [
-    # ct.Cfg('stacklight_enable', ct.Boolean(),
-    #        help="", default=False),
+common_services_deploy_opts = [
+    ct.Cfg('common_services_steps_path', ct.String(),
+           help="Path to YAML with steps to deploy common services",
+           default=_default_common_services_steps),
 ]
 
-os_opts = [
+common_services_opts = [
+    ct.Cfg('installed', ct.Boolean(),
+           help="", default=False),
+]
+
+openstack_deploy_opts = [
+    ct.Cfg('openstack_steps_path', ct.String(),
+           help="Path to YAML with steps to deploy openstack",
+           default=_default_openstack_steps),
+]
+openstack_opts = [
+    ct.Cfg('installed', ct.Boolean(),
+           help="", default=False),
     ct.Cfg('keystone_endpoint', ct.String(),
            help="", default=''),
 ]
@@ -92,10 +110,12 @@
 _group_opts = [
     ('hardware', hardware_opts),
     ('underlay', underlay_opts),
-    ('tcp_deploy', tcp_deploy_opts),
-    ('tcp', tcp_opts),
-    ('os_deploy', os_deploy_opts),
-    ('os', os_opts),
+    ('salt_deploy', salt_deploy_opts),
+    ('salt', salt_opts),
+    ('common_services_deploy', common_services_deploy_opts),
+    ('common_services', common_services_opts),
+    ('openstack_deploy', openstack_deploy_opts),
+    ('openstack', openstack_opts),
 ]
 
 
@@ -108,22 +128,34 @@
                           title="Underlay configuration", help=""))
     config.register_opts(group='underlay', opts=underlay_opts)
 
-    config.register_group(cfg.OptGroup(name='tcp_deploy',
-                          title="tcp deploy configuration", help=""))
-    config.register_opts(group='tcp_deploy', opts=tcp_deploy_opts)
+    config.register_group(cfg.OptGroup(name='salt_deploy',
+                          title="salt deploy configuration", help=""))
+    config.register_opts(group='salt_deploy', opts=salt_deploy_opts)
 
-    config.register_group(cfg.OptGroup(name='tcp',
-                          title="tcp config and credentials", help=""))
-    config.register_opts(group='tcp', opts=tcp_opts)
+    config.register_group(cfg.OptGroup(name='salt',
+                          title="salt config and credentials", help=""))
+    config.register_opts(group='salt', opts=salt_opts)
 
-    config.register_group(cfg.OptGroup(name='os',
-                          title="Openstack config and credentials", help=""))
-    config.register_opts(group='os', opts=os_opts)
+    config.register_group(cfg.OptGroup(name='common_services',
+                          title="Common services for Openstack", help=""))
+    config.register_opts(group='common_services', opts=common_services_opts)
+
     config.register_group(
-        cfg.OptGroup(name='os_deploy',
+        cfg.OptGroup(name='common_services_deploy',
+                     title="Common services for Openstack deploy config",
+                     help=""))
+    config.register_opts(group='common_services_deploy',
+                         opts=common_services_deploy_opts)
+
+    config.register_group(cfg.OptGroup(name='openstack',
+                          title="Openstack config and credentials", help=""))
+    config.register_opts(group='openstack', opts=openstack_opts)
+
+    config.register_group(
+        cfg.OptGroup(name='openstack_deploy',
                      title="Openstack deploy config and credentials",
                      help=""))
-    config.register_opts(group='os_deploy', opts=os_deploy_opts)
+    config.register_opts(group='openstack_deploy', opts=openstack_deploy_opts)
     return config
 
 
diff --git a/tcp_tests/templates/underlay/mk22-lab-advanced--user-data-cfg01.yaml.bak b/tcp_tests/templates/underlay/mk22-lab-advanced--user-data-cfg01.yaml.bak
deleted file mode 100644
index ee37d88..0000000
--- a/tcp_tests/templates/underlay/mk22-lab-advanced--user-data-cfg01.yaml.bak
+++ /dev/null
@@ -1,181 +0,0 @@
-| # All the data below will be stored as a string object
-  #cloud-config, see http://cloudinit.readthedocs.io/en/latest/topics/examples.html
-
-  ssh_pwauth: True
-  users:
-   - name: root
-     sudo: ALL=(ALL) NOPASSWD:ALL
-     shell: /bin/bash
-     ssh_authorized_keys:
-      - ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGwjUlYn9UsmWmAGSuEA2sICad7WqxgsJR0HKcMbbxi0tn96h4Cq2iGYmzlJ48egLm5R5pxyWnFvL4b/2zb+kKTPCMwRc9nv7xEGosEFNQEoSDd+gYu2CO0dgS2bX/7m2DXmzvhqPjxWQUXXsb0OYAS1r9Es65FE8y4rLaegz8V35xfH45bTCA0W8VSKh264XtGz12hacqsttE/UvyjJTZe+/XV+xJy3WAWxe8J/MuW1VqbqNewTmpTE/LJU8i6pG4msU6+wH99UvsGAOKQOduynUHKWG3VZg5YCjpbbV/t/pfW/vHB3b3jiifQmNhulyiG/CNnSQ5BahtV/7qPsYt vagrant@cfg01
-
-  disable_root: false
-  chpasswd:
-   list: |
-    root:r00tme
-   expire: False
-
-  bootcmd:
-   # Block access to SSH while node is preparing
-   - cloud-init-per once sudo iptables -A INPUT -p tcp --dport 22 -j DROP
-   # Enable root access
-   - sed -i -e '/^PermitRootLogin/s/^.*$/PermitRootLogin yes/' /etc/ssh/sshd_config
-   - service sshd restart
-  output:
-    all: '| tee -a /var/log/cloud-init-output.log /dev/tty0'
-
-  runcmd:
-   # Configure dhclient
-   - sudo echo "nameserver {gateway}" >> /etc/resolvconf/resolv.conf.d/base
-   - sudo resolvconf -u
-
-   # Prepare network connection
-   - sudo ifup ens3
-   #- sudo route add default gw {gateway} {interface_name}
-   - sudo ifup ens4
-
-#   ############## TCP Cloud cfg01 node ##################
-#   - echo "Preparing base OS"
-#   - which wget >/dev/null || (apt-get update; apt-get install -y wget)
-
-#   - echo "deb [arch=amd64] http://apt.tcpcloud.eu/nightly/ xenial main security extra tcp tcp-salt" > /etc/apt/sources.list
-#   # 'tcp-salt' from trusty is for temporary workaround until formulas will be fixed in xenial
-#   - echo "deb [arch=amd64] http://apt.tcpcloud.eu/nightly/ trusty tcp-salt" >> /etc/apt/sources.list
-#   - wget -O - http://apt.tcpcloud.eu/public.gpg | apt-key add -
-
-#   - apt-get clean
-#   - apt-get update
-#   - apt-get -y upgrade
-#
-#   # Install common packages
-#   - apt-get install -y python-pip
-#   - apt-get install -y curl tmux byobu iputils-ping traceroute htop tree
-#
-#   - echo "Configuring salt master ..."
-#   - apt-get install -y salt-master reclass
-#   - apt-get install -y salt-formula-*
-#
-#   - |
-#       cat << 'EOF' >> /etc/salt/master.d/master.conf
-#       file_roots:
-#         base:
-#         - /usr/share/salt-formulas/env
-#       pillar_opts: False
-#       open_mode: True
-#       reclass: &reclass
-#         storage_type: yaml_fs
-#         inventory_base_uri: /srv/salt/reclass
-#       ext_pillar:
-#         - reclass: *reclass
-#       master_tops:
-#         reclass: *reclass
-#       EOF
-#
-#   - echo "Configure git settings and certificate"
-#   - touch /root/.git_trusted_certs.pem
-#   - for server in git.tcpcloud.eu github.com; do openssl s_client -showcerts -connect $server:443 </dev/null | openssl x509 -outform PEM >> /root/.git_trusted_certs.pem; done
-#   - HOME=/root git config --global http.sslCAInfo /root/.git_trusted_certs.pem
-#   - HOME=/root git config --global user.email "tcp-qa@example.com"
-#   - HOME=/root git config --global user.name "TCP QA"
-#
-#   - echo "Configuring reclass ..."
-#   - git clone https://github.com/Mirantis/mk-lab-salt-model.git /srv/salt/reclass -b dash
-#   - sed -i 's/ master/ dash/' /srv/salt/reclass/classes/cluster/mk20_lab_advanced/openstack_config.yml
-#   - |
-#       cat << 'EOF' >> /srv/salt/reclass/nodes/control/{hostname}.yml
-#       # local storage
-#         reclass:
-#           storage:
-#             data_source:
-#               engine: local
-#       EOF
-#   - cd /srv/salt/reclass; git add -A;git commit -m"use dash repo"
-
-#   - mkdir -p /srv/salt/reclass/classes/service
-#   - for i in /usr/share/salt-formulas/reclass/service/*; do ln -s $i /srv/salt/reclass/classes/service/; done
-
-#   - '[ ! -d /etc/reclass ] && mkdir /etc/reclass'
-#   - |
-#       cat << 'EOF' >> /etc/reclass/reclass-config.yml
-#       storage_type: yaml_fs
-#       pretty_print: True
-#       output: yaml
-#       inventory_base_uri: /srv/salt/reclass
-#       EOF
-
-#   - echo "Configuring salt minion ..."
-#   - apt-get install -y salt-minion
-#   - '[ ! -d /etc/salt/minion.d ] && mkdir -p /etc/salt/minion.d'
-
-#   - |
-#       cat << "EOF" >> /etc/salt/minion.d/minion.conf
-#       id: {hostname}
-#       master: localhost
-#       EOF
-
-#   - echo "Restarting services with workarounds..."
-#   - service salt-master restart
-#   - sleep 60
-#   - rm -f /etc/salt/pki/minion/minion_master.pub
-#   - service salt-minion restart
-
-#   - echo "Showing system info and metadata ..."
-#   - salt-call --no-color grains.items
-#   - salt-call --no-color pillar.data
-#   - reclass -n {hostname}
-
-   ########################################################
-   # Node is ready, allow SSH access
-   - echo "Allow SSH access ..."
-   - sudo iptables -D INPUT -p tcp --dport 22 -j DROP
-   ########################################################
-
-  write_files:
-   - path: /etc/network/interfaces.d/99-tcp-tests.cfg
-     content: |
-          auto ens3
-          iface ens3 inet dhcp
-          auto ens4
-          iface ens4 inet dhcp
-
-   - path: /root/.ssh/id_rsa
-     owner: root:root
-     permissions: '0600'
-     content: |
-         -----BEGIN RSA PRIVATE KEY-----
-         MIIEpAIBAAKCAQEAxsI1JWJ/VLJlpgBkrhANrCAmne1qsYLCUdBynDG28YtLZ/eo
-         eAqtohmJs5SePHoC5uUeacclpxby+G/9s2/pCkzwjMEXPZ7+8RBqLBBTUBKEg3fo
-         GLtgjtHYEtm1/+5tg15s74aj48VkFF17G9DmAEta/RLOuRRPMuKy2noM/Fd+cXx+
-         OW0wgNFvFUioduuF7Rs9doWnKrLbRP1L8oyU2Xvv11fsSct1gFsXvCfzLltVam6j
-         XsE5qUxPyyVPIuqRuJrFOvsB/fVL7BgDikDnbsp1Bylht1WYOWAo6W21f7f6X1v7
-         xwd2944on0JjYbpcohvwjZ0kOQWobVf+6j7GLQIDAQABAoIBAF0tAAMlmLGY7CQU
-         /R3IctBlRhU1DpZmyTfXc1MbzzqO5Wu44yZbQyjBthcUrdWGEUQy1r4Z2OHq1T54
-         KcPry6DDjuU9Q+rkVXmnC07a3GOmOq7zEEA/3zU01ImJvFNdb8NtCb6ELOKDT7Zo
-         WGUi2h/7M41+OqDzD2m4csYO/3Vvr12sMhn9BfwU4OPpL44A4PJiEryEAw9o5/j/
-         73eyPvgf6tkC4l0mMtfHB9tg/F++iH8fiEr1SMvHGIc9gZNmFYMrs2XfLkAejPfH
-         XrOyw6eqd+kluqw51gHhdeQYwBx6mfOkbhPHWU79FzpH5M1ikdfImZmPCxVf3Ykj
-         nxLoK9UCgYEA4c9agPb/OFyN00nnUMBxzQt1pErpOf/7QhnvNZThomzSV7PyefxF
-         H6G/VlS3gCcrWBCh7mqOSxGcNQwgudVqzUm7QXruQeg4nWcCGSxg7lGYSEf0MyWL
-         5wrd+f9MoV/VV8udIPENjp96o5kwQEVRfsTBNwmk54kup2+br5q8re8CgYEA4VT8
-         UeIN+plP6FjZYITI+SO/ou5goKIhfBrqa5gOXXPc2y6sIu9wBWCr+T7FAF/2gGhS
-         rpVx76zcmx05nwkxIlJh58+G3MVyUDFoWnrtL38vdkBSuOGgNfzcBsFpQvFs8WaW
-         otbuTtkPcXbVdYRr32/C620MxXhUO+svo3CLaaMCgYEA1rjlF8NHl+Gy31rkQg5t
-         aIxgFpVBR+zZkNa2d94V3Ozb65fqmALB/D1Dg6VVROB6P+i5AsyCeHHLd0oMCIof
-         YAyfqrlpvHRE+bAM98ESfyxJwVnipYwrh8z2nZYd2UoWxcCRrtRpjtipts2ha0w/
-         HWudS2e5To5NNdxUT9y1VDMCgYEAxkQiE+ZkyGiXv+hVtLCBqX4EA9fdm9msvudr
-         9qn/kcj9vrntanvlxEWQbCoH61GEsu2YOtdyPiKKpc1sQvwyiHGWhgK7NoxhDiC7
-         IknhYxZ064ajgtu8PWS1MRiDhwypACt1Rej6HNSu2vZl0hZnWF2dU8tLHoHHFEXX
-         T+caNCMCgYBZpD6XBiiEXf0ikXYnXKOmbsyVG80V+yqfLo85qb2RW9TaviOSP43g
-         nB22ReMSHq2cOrs6VTTgfhxefBwzdDFbfKMf6ZU82jCNlpetAZOrhdMHUvcsjSQk
-         XKI6Ldfq6TU3xKujRHfGP+oQ6GLwVCL/kjGxOuSRLFGfRiiqYI3nww==
-         -----END RSA PRIVATE KEY-----
-
-   - path: /root/.ssh/config
-     owner: root:root
-     permissions: '0600'
-     content: |
-          Host *
-            ServerAliveInterval 300
-            ServerAliveCountMax 10
-            StrictHostKeyChecking no
-            UserKnownHostsFile /dev/null
diff --git a/tcp_tests/templates/underlay/mk22-lab-advanced.yaml b/tcp_tests/templates/underlay/mk22-lab-advanced.yaml
index e7195db..350aac0 100644
--- a/tcp_tests/templates/underlay/mk22-lab-advanced.yaml
+++ b/tcp_tests/templates/underlay/mk22-lab-advanced.yaml
@@ -21,7 +21,7 @@
             default_ctl01.mk22-lab-advanced.local: +101
             default_ctl02.mk22-lab-advanced.local: +102
             default_ctl03.mk22-lab-advanced.local: +103
-            default_prx01.mk22-lab-advanced.local: +104
+            default_prx01.mk22-lab-advanced.local: +121
             default_cmp01.mk22-lab-advanced.local: +105
           ip_ranges:
             dhcp: [+100, -2]
@@ -36,7 +36,7 @@
             default_ctl01.mk22-lab-advanced.local: +101
             default_ctl02.mk22-lab-advanced.local: +102
             default_ctl03.mk22-lab-advanced.local: +103
-            default_prx01.mk22-lab-advanced.local: +104
+            default_prx01.mk22-lab-advanced.local: +121
             default_cmp01.mk22-lab-advanced.local: +105
           ip_ranges:
             dhcp: [+100, -2]
diff --git a/tcp_tests/templates/underlay/mk22-lab-advanced.yaml.bak b/tcp_tests/templates/underlay/mk22-lab-advanced.yaml.bak
deleted file mode 100644
index 4c011eb..0000000
--- a/tcp_tests/templates/underlay/mk22-lab-advanced.yaml.bak
+++ /dev/null
@@ -1,254 +0,0 @@
----
-aliases:
-  dynamic_addresses_pool:
-    - &pool_default !os_env POOL_DEFAULT, 172.16.10.0/24:24
-
-  default_interface_model:
-    - &interface_model !os_env INTERFACE_MODEL, virtio
-
-template:
-  devops_settings:
-    env_name: !os_env ENV_NAME, tcpcloud-mk22
-
-    address_pools:
-      public-pool01:
-        net: 172.16.10.0/24:24
-        params:
-          ip_reserved:
-            gateway: +1
-            l2_network_device: +1
-            default_cfg01.mk22-lab-advanced.local: +100
-            default_ctl01.mk22-lab-advanced.local: +101
-            default_ctl02.mk22-lab-advanced.local: +102
-            default_ctl03.mk22-lab-advanced.local: +103
-            default_prx01.mk22-lab-advanced.local: +104
-            default_cmp01.mk22-lab-advanced.local: +105
-          ip_ranges:
-            dhcp: [+100, -2]
-
-      private-pool01:
-        net: 192.168.10.0/24:24
-        params:
-          ip_reserved:
-            gateway: +1
-            l2_network_device: +1
-          ip_ranges:
-            dhcp: [+100, -2]
-
-    groups:
-      - name: default
-        driver:
-          name: devops.driver.libvirt
-          params:
-            connection_string: !os_env CONNECTION_STRING, qemu:///system
-            storage_pool_name: !os_env STORAGE_POOL_NAME, default
-            stp: False
-            hpet: False
-            enable_acpi: true
-            use_host_cpu: !os_env DRIVER_USE_HOST_CPU, true
-
-        network_pools:
-          public: public-pool01
-          private: private-pool01
-
-        l2_network_devices:
-          public:
-            address_pool: public-pool01
-            dhcp: true
-            forward:
-              mode: nat
-
-          private:
-            address_pool: private-pool01
-            dhcp: true
-
-        group_volumes:
-         - name: cloudimage1404    # This name is used for 'backing_store' option for node volumes.
-           source_image: !os_env IMAGE_PATH1404  # https://cloud-images.ubuntu.com/trusty/current/trusty-server-cloudimg-amd64-disk1.img or
-                                             # http://apt.tcpcloud.eu/images/ubuntu-14-04-x64-201608231134.qcow2
-           format: qcow2
-         - name: cloudimage1604    # This name is used for 'backing_store' option for node volumes.
-           source_image: !os_env IMAGE_PATH1604  # https://cloud-images.ubuntu.com/xenial/current/xenial-server-cloudimg-amd64-disk1.img or
-                                             # http://apt.tcpcloud.eu/images/ubuntu-16-04-x64-201608231004.qcow2
-           format: qcow2
-
-        nodes:
-          - name: cfg01.mk22-lab-advanced.local
-            role: salt_master
-            params:
-              vcpu: !os_env SLAVE_NODE_CPU, 4
-              memory: !os_env SLAVE_NODE_MEMORY, 8192
-              boot:
-                - hd
-              cloud_init_volume_name: iso
-              cloud_init_iface_up: ens3
-              volumes:
-                - name: system
-                  capacity: !os_env NODE_VOLUME_SIZE, 150
-                  backing_store: cloudimage1604
-                  format: qcow2
-                - name: iso  # Volume with name 'iso' will be used
-                             # for store image with cloud-init metadata.
-                  capacity: 1
-                  format: raw
-                  device: cdrom
-                  bus: ide
-                  cloudinit_meta_data: !include mk22-lab-advanced--meta-data.yaml
-                  cloudinit_user_data: !include mk22-lab-advanced--user-data-cfg01.yaml
-
-              interfaces:
-                - label: ens3
-                  l2_network_device: public
-                  interface_model: *interface_model
-                - label: ens4
-                  l2_network_device: private
-                  interface_model: *interface_model
-              network_config:
-                ens3:
-                  networks:
-                    - public
-                ens4:
-                  networks:
-                    - private
-
-          - name: ctl01.mk22-lab-advanced.local
-            role: salt_minion
-            params:
-              vcpu: !os_env SLAVE_NODE_CPU, 4
-              memory: !os_env SLAVE_NODE_MEMORY, 12400
-              boot:
-                - hd
-              cloud_init_volume_name: iso
-              cloud_init_iface_up: eth0
-              volumes:
-                - name: system
-                  capacity: !os_env NODE_VOLUME_SIZE, 150
-                  backing_store: cloudimage1404
-                  format: qcow2
-                - name: iso  # Volume with name 'iso' will be used
-                             # for store image with cloud-init metadata.
-                  capacity: 1
-                  format: raw
-                  device: cdrom
-                  bus: ide
-                  cloudinit_meta_data: !include mk22-lab-advanced--meta-data.yaml
-                  cloudinit_user_data: !include mk22-lab-advanced--user-data.yaml
-
-              interfaces: &interfaces
-                - label: eth0
-                  l2_network_device: public
-                  interface_model: *interface_model
-                - label: eth1
-                  l2_network_device: private
-                  interface_model: *interface_model
-              network_config: &network_config
-                eth0:
-                  networks:
-                    - public
-                eth1:
-                  networks:
-                    - private
-
-          - name: ctl02.mk22-lab-advanced.local
-            role: salt_minion
-            params:
-              vcpu: !os_env SLAVE_NODE_CPU, 4
-              memory: !os_env SLAVE_NODE_MEMORY, 12400
-              boot:
-                - hd
-              cloud_init_volume_name: iso
-              cloud_init_iface_up: eth0
-              volumes:
-                - name: system
-                  capacity: !os_env NODE_VOLUME_SIZE, 150
-                  backing_store: cloudimage1404
-                  format: qcow2
-                - name: iso  # Volume with name 'iso' will be used
-                             # for store image with cloud-init metadata.
-                  capacity: 1
-                  format: raw
-                  device: cdrom
-                  bus: ide
-                  cloudinit_meta_data: !include mk22-lab-advanced--meta-data.yaml
-                  cloudinit_user_data: !include mk22-lab-advanced--user-data.yaml
-
-              interfaces: *interfaces
-              network_config: *network_config
-
-          - name: ctl03.mk22-lab-advanced.local
-            role: salt_minion
-            params:
-              vcpu: !os_env SLAVE_NODE_CPU, 4
-              memory: !os_env SLAVE_NODE_MEMORY, 12400
-              boot:
-                - hd
-              cloud_init_volume_name: iso
-              cloud_init_iface_up: eth0
-              volumes:
-                - name: system
-                  capacity: !os_env NODE_VOLUME_SIZE, 150
-                  backing_store: cloudimage1404
-                  format: qcow2
-                - name: iso  # Volume with name 'iso' will be used
-                             # for store image with cloud-init metadata.
-                  capacity: 1
-                  format: raw
-                  device: cdrom
-                  bus: ide
-                  cloudinit_meta_data: !include mk22-lab-advanced--meta-data.yaml
-                  cloudinit_user_data: !include mk22-lab-advanced--user-data.yaml
-
-              interfaces: *interfaces
-              network_config: *network_config
-
-          - name: prx01.mk22-lab-advanced.local
-            role: salt_minion
-            params:
-              vcpu: !os_env SLAVE_NODE_CPU, 1
-              memory: !os_env SLAVE_NODE_MEMORY, 2048
-              boot:
-                - hd
-              cloud_init_volume_name: iso
-              cloud_init_iface_up: eth0
-              volumes:
-                - name: system
-                  capacity: !os_env NODE_VOLUME_SIZE, 150
-                  backing_store: cloudimage1404
-                  format: qcow2
-                - name: iso  # Volume with name 'iso' will be used
-                             # for store image with cloud-init metadata.
-                  capacity: 1
-                  format: raw
-                  device: cdrom
-                  bus: ide
-                  cloudinit_meta_data: !include mk22-lab-advanced--meta-data.yaml
-                  cloudinit_user_data: !include mk22-lab-advanced--user-data.yaml
-
-              interfaces: *interfaces
-              network_config: *network_config
-
-          - name: cmp01.mk22-lab-advanced.local
-            role: salt_minion
-            params:
-              vcpu: !os_env SLAVE_NODE_CPU, 4
-              memory: !os_env SLAVE_NODE_MEMORY, 8192
-              boot:
-                - hd
-              cloud_init_volume_name: iso
-              cloud_init_iface_up: eth0
-              volumes:
-                - name: system
-                  capacity: !os_env NODE_VOLUME_SIZE, 150
-                  backing_store: cloudimage1404
-                  format: qcow2
-                - name: iso  # Volume with name 'iso' will be used
-                             # for store image with cloud-init metadata.
-                  capacity: 1
-                  format: raw
-                  device: cdrom
-                  bus: ide
-                  cloudinit_meta_data: !include mk22-lab-advanced--meta-data.yaml
-                  cloudinit_user_data: !include mk22-lab-advanced--user-data.yaml
-
-              interfaces: *interfaces
-              network_config: *network_config