Add virtual-mcp-pike-dvr-ssl
The model uses SSL on internal/public endpoints.
Change-Id: I2a38ffdc93c9658bd1fb99c5fca29a0436362e04
Related-Prod: PROD-17943
diff --git a/classes/cluster/virtual-mcp-pike-dvr-ssl/init.yml b/classes/cluster/virtual-mcp-pike-dvr-ssl/init.yml
new file mode 100644
index 0000000..6075456
--- /dev/null
+++ b/classes/cluster/virtual-mcp-pike-dvr-ssl/init.yml
@@ -0,0 +1,37 @@
+classes:
+- system.linux.network.dynamic_hosts
+- service.grafana.collector
+- system.heka.log_collector.single
+- system.heka.log_collector.output.telegraf
+- system.linux.system.repo.mcp.extra
+- system.linux.system.single
+- system.rsyslog.client.single
+- system.prometheus.collector
+- system.telegraf.agent
+- system.openssh.server.team.lab
+- system.openssh.server.team.tcpcloud
+- system.openssh.server.team.mcp_qa
+- cluster.virtual-mcp-pike-dvr-ssl.infra
+- cluster.virtual-mcp-pike-dvr-ssl.openstack
+- cluster.virtual-mcp-pike-dvr-ssl.stacklight
+- cluster.overrides
+parameters:
+ _param:
+ cluster_domain: virtual-mcp-pike-dvr-ssl.local
+ cluster_name: virtual-mcp-pike-dvr-ssl
+ salt_minion_ca_host: cfg01.${linux:system:domain}
+ # infra service addresses
+ infra_config_hostname: cfg01
+ infra_config_address: 172.16.10.100
+ # stacklight service addresses
+ stacklight_monitor_address: 172.16.10.253
+ stacklight_monitor_node01_address: 172.16.10.107
+ stacklight_monitor_node02_address: 172.16.10.108
+ stacklight_monitor_node03_address: 172.16.10.109
+ stacklight_telemetry_address: ${_param:stacklight_monitor_address}
+ stacklight_log_address: ${_param:stacklight_monitor_address}
+ stacklight_telemetry_node01_address: ${_param:stacklight_monitor_node01_address}
+ salt:
+ minion:
+ trusted_ca_minions:
+ - cfg01.${linux:system:domain}