blob: 455c8d9c68902c039f4cb27e3498063819e54fdd [file] [log] [blame]
classes:
- system.linux.system.lowmem
- system.linux.system.repo.glusterfs
- system.linux.system.repo.mcp.openstack
- system.linux.system.repo.mcp.extra
- system.linux.system.repo.mcp.apt_mirantis.saltstack
- system.salt.minion.cert.mysql.server
- system.salt.minion.cert.rabbitmq_server
- system.memcached.server.single
- system.rabbitmq.server.cluster
- service.rabbitmq.server.ssl
- system.nginx.server.single
- system.nginx.server.proxy.openstack_api
- system.nginx.server.proxy.openstack.ironic
#- system.nginx.server.proxy.openstack.designate
- system.nginx.server.proxy.openstack.placement
- system.rabbitmq.server.vhost.openstack
- system.keystone.server.wsgi
- system.keystone.server.cluster
- system.glusterfs.client.cluster
- system.glusterfs.client.volume.glance
- system.glusterfs.client.volume.keystone
- system.glusterfs.server.volume.glance
- system.glusterfs.server.volume.keystone
- system.glusterfs.server.cluster
- system.glance.control.cluster
- system.heka.alarm.openstack_control
- system.nova.control.cluster
- system.neutron.control.openvswitch.cluster
- system.cinder.control.cluster
- system.haproxy.proxy.listen.openstack.ironic
- system.haproxy.proxy.listen.openstack.nova-placement
- system.heat.server.cluster
- system.galera.server.cluster
- service.galera.ssl
- system.galera.server.database.ceilometer
- system.galera.server.database.cinder
- system.galera.server.database.glance
- system.galera.server.database.grafana
- system.galera.server.database.heat
- system.galera.server.database.keystone
- system.galera.server.database.nova
- system.galera.server.database.ironic
- service.ironic.client
- system.ironic.api.cluster
- cluster.virtual-mcp11-ovs-ironic-ssl
parameters:
_param:
keepalived_vip_interface: ens4
cluster_vip_address: ${_param:openstack_control_address}
cluster_local_address: ${_param:single_address}
salt_minion_ca_host: cfg01.${linux:system:domain}
### nginx ssl sites settings
nginx_proxy_ssl:
enabled: true
engine: salt
authority: "${_param:salt_minion_ca_authority}"
key_file: "/etc/ssl/private/internal_proxy.key"
cert_file: "/etc/ssl/certs/internal_proxy.crt"
chain_file: "/etc/ssl/certs/internal_proxy-with-chain.crt"
nginx_proxy_openstack_api_address: ${_param:cluster_local_address}
nginx_proxy_openstack_keystone_host: 127.0.0.1
nginx_proxy_openstack_nova_host: 127.0.0.1
nginx_proxy_openstack_cinder_host: 127.0.0.1
nginx_proxy_openstack_glance_host: 127.0.0.1
nginx_proxy_openstack_neutron_host: 127.0.0.1
nginx_proxy_openstack_heat_host: 127.0.0.1
nginx_proxy_openstack_designate_host: 127.0.0.1
nginx_proxy_openstack_placement_host: 127.0.0.1
nginx_proxy_openstack_ironic_host: 127.0.0.1
apache_keystone_api_host: ${_param:single_address}
apache_keystone_ssl: ${_param:nginx_proxy_ssl}
# Disable keystone nginx sites as we configure SSL for them in Apache
nginx:
server:
site:
nginx_proxy_openstack_api_keystone:
enabled: false
nginx_proxy_openstack_api_keystone_private:
enabled: false
linux:
system:
package:
python-msgpack:
version: latest
network:
interface:
ens4:
enabled: true
type: eth
proto: static
address: ${_param:single_address}
netmask: 255.255.255.0
keepalived:
cluster:
instance:
VIP:
virtual_router_id: 150
keystone:
server:
admin_email: ${_param:admin_email}
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
glance:
server:
storage:
engine: file
images: []
workers: 1
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
bind:
address: 127.0.0.1
identity:
protocol: https
registry:
protocol: https
heat:
server:
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
bind:
api:
address: 127.0.0.1
api_cfn:
address: 127.0.0.1
api_cloudwatch:
address: 127.0.0.1
neutron:
server:
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
bind:
address: 127.0.0.1
identity:
protocol: https
nova:
controller:
networking: dvr
cpu_allocation: 54
metadata:
password: ${_param:metadata_password}
bind:
address: ${_param:cluster_local_address}
bind:
private_address: 127.0.0.1
identity:
protocol: https
network:
protocol: https
glance:
protocol: https
# bind:
# private_address: ${_param:cluster_local_address}
# public_address: ${_param:cluster_vip_address}
# novncproxy_port: 6080
vncproxy_url: http://${_param:cluster_vip_address}:6080
workers: 1
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
cinder:
volume:
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
controller:
notification:
driver: messagingv2
topics: "notifications,${_param:stacklight_notification_topic}"
identity:
protocol: https
osapi:
host: 127.0.0.1
glance:
protocol: https
ironic:
api:
public_endpoint: https://${_param:cluster_vip_address}:6385
message_queue:
port: ${_param:rabbitmq_port}
ssl:
enabled: ${_param:rabbitmq_ssl_enabled}
database:
ssl:
enabled: ${_param:galera_ssl_enabled}
bind:
address: 127.0.0.1
identity:
protocol: https
salt:
minion:
cert:
internal_proxy:
host: ${_param:salt_minion_ca_host}
authority: ${_param:salt_minion_ca_authority}
common_name: internal_proxy
signing_policy: cert_open
alternative_names: IP:127.0.0.1,IP:${_param:cluster_local_address},IP:${_param:cluster_public_host},DNS:${linux:system:name},DNS:${linux:network:fqdn},DNS:${_param:cluster_local_address},DNS:${_param:cluster_public_host}
key_file: "/etc/ssl/private/internal_proxy.key"
cert_file: "/etc/ssl/certs/internal_proxy.crt"
all_file: "/etc/ssl/certs/internal_proxy-with-chain.crt"
haproxy:
proxy:
listen:
keystone_public_api:
type: ~
keystone_admin_api:
type: ~
nova_api:
type: ~
nova_metadata_api:
type: ~
cinder_api:
type: ~
glance_api:
type: ~
glance_registry_api:
type: ~
heat_cloudwatch_api:
type: ~
heat_api:
type: ~
heat_cfn_api:
type: ~
neutron_api:
type: ~
nova_placement_api:
type: ~
ironic:
type: ~