blob: 9f2c63c3c08281f8bab04ff0c1a899531cb4dd71 [file] [log] [blame]
classes:
- system.salt.minion.cert.proxy
- system.salt.minion.cert.mysql.server
- system.salt.minion.cert.rabbitmq_server
- system.linux.system.lowmem
- system.linux.system.repo.mcp.apt_mirantis.glusterfs
- system.linux.system.repo.mcp.apt_mirantis.openstack
- system.linux.system.repo.mcp.extra
- system.linux.system.repo.mcp.apt_mirantis.saltstack
- system.memcached.server.single
- system.rabbitmq.server.cluster
- service.rabbitmq.server.ssl
- system.rabbitmq.server.vhost.openstack
- system.apache.server.site.manila
- system.apache.server.site.nova-placement
- system.apache.server.site.cinder
- system.nginx.server.single
- system.nginx.server.proxy.openstack_api
- system.nginx.server.proxy.openstack.designate
- system.nginx.server.proxy.openstack.glance_registry
- system.keystone.server.wsgi
- system.keystone.server.cluster
- system.glusterfs.client.cluster
- system.glusterfs.client.volume.glance
- system.glusterfs.server.volume.glance
- system.glusterfs.server.cluster
- system.glance.control.cluster
- system.nova.control.cluster
- system.neutron.control.openvswitch.cluster
- system.cinder.control.cluster
- system.cinder.control.backend.lvm
- system.heat.server.cluster
- system.designate.server.cluster
- system.galera.server.cluster
- system.apache.server.ssl
- system.nginx.server.proxy.ssl
- system.galera.server.database.cinder
- system.galera.server.database.glance
- system.galera.server.database.heat
- system.galera.server.database.keystone
- system.galera.server.database.nova
- system.galera.server.database.neutron
- system.galera.server.database.designate
- system.galera.server.database.manila
- system.galera.server.database.aodh
- system.galera.server.database.panko
- system.galera.server.database.gnocchi
- system.ceilometer.client
- system.ceilometer.client.cinder_volume
- system.ceilometer.client.neutron
- system.haproxy.proxy.listen.openstack.placement
- system.haproxy.proxy.listen.openstack.manila
- system.manila.control.cluster
- cluster.virtual-mcp-pike-dvr-ssl
parameters:
_param:
keepalived_vip_interface: ens4
salt_minion_ca_authority: salt_master_ca
nginx_proxy_ssl:
authority: "${_param:salt_minion_ca_authority}"
key_file: "/etc/ssl/private/internal_proxy.key"
cert_file: "/etc/ssl/certs/internal_proxy.crt"
chain_file: "/etc/ssl/certs/internal_proxy-with-chain.crt"
apache_ssl:
authority: "${_param:salt_minion_ca_authority}"
key_file: "/etc/ssl/private/internal_proxy.key"
cert_file: "/etc/ssl/certs/internal_proxy.crt"
chain_file: "/etc/ssl/certs/internal_proxy-with-chain.crt"
nginx_proxy_openstack_api_address: ${_param:cluster_local_address}
nginx_proxy_openstack_keystone_host: 127.0.0.1
nginx_proxy_openstack_nova_host: 127.0.0.1
nginx_proxy_openstack_glance_host: 127.0.0.1
nginx_proxy_openstack_neutron_host: 127.0.0.1
nginx_proxy_openstack_heat_host: 127.0.0.1
nginx_proxy_openstack_designate_host: 127.0.0.1
apache_manila_api_address: ${_param:single_address}
apache_keystone_api_host: ${_param:single_address}
apache_nova_placement_api_address: ${_param:cluster_local_address}
apache_cinder_api_address: ${_param:cluster_local_address}
rabbitmq:
server:
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
nginx:
server:
site:
nginx_proxy_openstack_api_keystone:
enabled: false
nginx_proxy_openstack_api_keystone_private:
enabled: false
nginx_proxy_openstack_api_cinder:
enabled: false
linux:
system:
package:
python-msgpack:
version: latest
network:
interface:
ens4:
enabled: true
type: eth
proto: static
address: ${_param:single_address}
netmask: 255.255.255.0
keepalived:
cluster:
instance:
VIP:
virtual_router_id: 150
keystone:
server:
admin_email: ${_param:admin_email}
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
designate:
pool_manager:
enabled: ${_param:designate_pool_manager_enabled}
periodic_sync_interval: ${_param:designate_pool_manager_periodic_sync_interval}
server:
identity:
protocol: https
bind:
api:
address: 127.0.0.1
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
backend:
pdns4:
api_token: ${_param:designate_pdns_api_key}
api_endpoint: ${_param:designate_pdns_api_endpoint}
mdns:
address: ${_param:designate_mdns_address}
port: ${_param:designate_mdns_port}
pools:
default:
description: 'test pool'
targets:
default:
description: 'test target1'
default1:
type: ${_param:designate_pool_target_type}
description: 'test target2'
masters: ${_param:designate_pool_target_masters}
options:
host: ${_param:openstack_dns_node02_address}
port: 53
api_endpoint: "http://${_param:openstack_dns_node02_address}:${_param:powerdns_webserver_port}"
api_token: ${_param:designate_pdns_api_key}
quota:
zones: ${_param:designate_quota_zones}
glance:
server:
storage:
engine: file
images: []
workers: 1
bind:
address: 127.0.0.1
identity:
protocol: https
registry:
protocol: https
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
heat:
server:
bind:
api:
address: 127.0.0.1
api_cfn:
address: 127.0.0.1
api_cloudwatch:
address: 127.0.0.1
identity:
protocol: https
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
# Since we using self signed cert not present in images, we have to
# use insecure option when sending signal to wait condition from instance.
clients:
heat:
insecure: true
neutron:
server:
bind:
address: 127.0.0.1
identity:
protocol: https
l2gw:
enabled: true
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
nova:
controller:
networking: dvr
cpu_allocation: 54
metadata:
password: ${_param:metadata_password}
bind:
address: ${_param:cluster_local_address}
bind:
public_address: ${_param:cluster_vip_address}
novncproxy_port: 6080
private_address: 127.0.0.1
identity:
protocol: https
network:
protocol: https
glance:
protocol: https
vncproxy_url: http://${_param:cluster_vip_address}:6080
workers: 1
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
notification:
notify_on:
state_change: vm_and_task_state
cinder:
controller:
identity:
protocol: https
osapi:
host: 127.0.0.1
glance:
protocol: https
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
manila:
common:
identity:
protocol: https
default_share_type: default
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
salt:
minion:
cert:
internal_proxy:
host: ${_param:salt_minion_ca_host}
authority: ${_param:salt_minion_ca_authority}
common_name: internal_proxy
signing_policy: cert_open
alternative_names: IP:127.0.0.1,IP:${_param:cluster_local_address},IP:${_param:cluster_public_host},DNS:${linux:system:name},DNS:${linux:network:fqdn},DNS:${_param:cluster_local_address},DNS:${_param:cluster_public_host}
key_file: "/etc/ssl/private/internal_proxy.key"
cert_file: "/etc/ssl/certs/internal_proxy.crt"
all_file: "/etc/ssl/certs/internal_proxy-with-chain.crt"
haproxy:
proxy:
listen:
# barbican-api:
# type: ~
# barbican-admin-api:
# type: ~
designate_api:
type: ~
keystone_public_api:
type: ~
keystone_admin_api:
type: ~
manila_api:
type: ~
nova_api:
type: ~
nova_metadata_api:
type: ~
cinder_api:
type: ~
glance_api:
type: ~
glance_registry_api:
type: ~
heat_cloudwatch_api:
type: ~
heat_api:
type: ~
heat_cfn_api:
type: ~
neutron_api:
type: ~
placement_api:
type: ~