Refactor install-guide: integration with other services

* Group all topics related to other services under one heading
* Move multitenancy configuration to the install-guide
* Remove useless page on configuring port groups
* Fix titles to be more consistent (e.g. when talking about services)
* Use separate pages instead of includes.
* Move deploy ramdisk section up, as it's used in enrollment

Change-Id: I675d201b0acf1cf3acb4eafeafb8eb9628fd10f5
This commit is contained in:
Dmitry Tantsur 2017-05-02 18:29:15 +02:00
parent ed90bdc93e
commit b85688864f
11 changed files with 174 additions and 172 deletions

View File

@ -31,149 +31,10 @@ the Bare Metal service:
Configuring the Bare Metal service
==================================
Below is an example flow of how to set up the Bare Metal service so that node
provisioning will happen in a multi-tenant environment (which means using the
``neutron`` network interface as stated above):
See the `Configure tenant networks`_ section in the installation guide for the
Bare Metal service.
#. Network interfaces can be enabled on ironic-conductor by adding them to the
``enabled_network_interfaces`` configuration option under the ``default``
section of the configuration file::
[DEFAULT]
...
enabled_network_interfaces=noop,flat,neutron
Keep in mind that, ideally, all ironic-conductors should have the same list
of enabled network interfaces, but it may not be the case during
ironic-conductor upgrades. This may cause problems if one of the
ironic-conductors dies and some node that is taken over is mapped to an
ironic-conductor that does not support the node's network interface.
Any actions that involve calling the node's driver will fail until that
network interface is installed and enabled on that ironic-conductor.
#. It is recommended to set the default network interface via the
``default_network_interface`` configuration option under the ``default``
section of the configuration file::
[DEFAULT]
...
default_network_interface=neutron
This default value will be used for all nodes that don't have a network
interface explicitly specified in the creation request.
If this configuration option is not set, the default network interface is
determined by looking at the ``[dhcp]dhcp_provider`` configuration option
value. If it is ``neutron``, then ``flat`` network interface becomes the
default, otherwise ``noop`` is the default.
#. Define a provider network in the Networking service, which we shall refer to
as the "provisioning" network, and add it in the ``neutron`` section of the
ironic-conductor configuration file. Using the ``neutron`` network interface
requires that ``provisioning_network`` and ``cleaning_network``
configuration options are set to valid identifiers (UUID or name) of
networks in the Networking service. If these options are not set correctly,
cleaning or provisioning will fail to start::
[neutron]
...
cleaning_network=$CLEAN_UUID_OR_NAME
provisioning_network=$PROVISION_UUID_OR_NAME
Please refer to `Configure the Bare Metal service for cleaning`_ for more
information about cleaning.
.. warning::
Please make sure that the Bare Metal service has exclusive access to the
provisioning and cleaning networks. Spawning instances by non-admin users
in these networks and getting access to the Bare Metal service's control
plane is a security risk. For this reason, the provisioning and cleaning
networks should be configured as non-shared networks in the ``admin``
tenant.
.. note::
Spawning a bare metal instance onto the provisioning network is
impossible, the deployment will fail. The node should be deployed onto a
different network than the provisioning network. When you boot a bare
metal instance from the Compute service, you should choose a different
network in the Networking service for your instance.
.. note::
The "provisioning" and "cleaning" networks may be the same network or
distinct networks. To ensure that communication between the Bare Metal
service and the deploy ramdisk works, it is important to ensure that
security groups are disabled for these networks, *or* that the default
security groups allow:
* DHCP
* TFTP
* egress port used for the Bare Metal service (6385 by default)
* ingress port used for ironic-python-agent (9999 by default)
* if using the iSCSI deploy method (``pxe_*`` and ``iscsi_*`` drivers),
the ingress port used for iSCSI (3260 by default)
* if using the direct deploy method (``agent_*`` drivers), the egress
port used for the Object Storage service (typically 80 or 443)
* if using iPXE, the egress port used for the HTTP server running
on the ironic-conductor nodes (typically 80).
#. This step is optional and applicable only if you want to use security
groups during provisioning and/or cleaning of the nodes. If not specified,
default security groups are used.
#. Define security groups in the Networking service, to be used for
provisioning and/or cleaning networks.
#. Add the list of these security group UUIDs under the ``neutron`` section
of ironic-conductor's configuration file as shown below::
[neutron]
...
cleaning_network=$CLEAN_UUID_OR_NAME
cleaning_network_security_groups=[$LIST_OF_CLEAN_SECURITY_GROUPS]
provisioning_network=$PROVISION_UUID_OR_NAME
provisioning_network_security_groups=[$LIST_OF_PROVISION_SECURITY_GROUPS]
Multiple security groups may be applied to a given network, hence,
they are specified as a list.
The same security group(s) could be used for both provisioning and
cleaning networks.
.. warning::
If security groups are configured as described above, do not
set the "port_security_enabled" flag to False for the corresponding
Networking service's network or port. This will cause the deploy to fail.
For example: if ``provisioning_network_security_groups`` configuration
option is used, ensure that "port_security_enabled" flag for the
provisioning network is set to True. This flag is set to True by
default; make sure not to override it by manually setting it to False.
#. Install and configure a compatible ML2 mechanism driver which supports bare
metal provisioning for your switch. See `ML2 plugin configuration manual
<http://docs.openstack.org/networking-guide/config-ml2.html>`_
for details.
#. Restart the ironic-conductor and ironic-api services after the
modifications:
- Fedora/RHEL7/CentOS7::
sudo systemctl restart openstack-ironic-api
sudo systemctl restart openstack-ironic-conductor
- Ubuntu::
sudo service ironic-api restart
sudo service ironic-conductor restart
#. Make sure that the ironic-conductor is reachable over the provisioning
network by trying to download a file from a TFTP server on it, from some
non-control-plane server in that network::
tftp $TFTP_IP -c get $FILENAME
where FILENAME is the file located at the TFTP server.
.. _`Configure tenant networks`: http://docs.openstack.org/project-install-guide/baremetal/draft/configure-tenant-networks.html
Configuring nodes
=================
@ -272,5 +133,3 @@ Configuring nodes
After these steps, the provisioning of the created node will happen in the
provisioning network, and then the node will be moved to the tenant network
that was requested.
.. _`Configure the Bare Metal service for cleaning`: http://docs.openstack.org/project-install-guide/baremetal/draft/configure-cleaning.html

View File

@ -1,5 +1,5 @@
Configure Compute to use the Bare Metal service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Configure the Compute service to use the Bare Metal service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Compute service needs to be configured to use the Bare Metal service's
driver. The configuration file for the Compute service is typically located at

View File

@ -2,12 +2,14 @@
Integration with other OpenStack services
=========================================
.. include:: include/configure-identity.rst
.. toctree::
:maxdepth: 1
.. include:: include/configure-nova-compute.rst
.. include:: include/configure-nova-flavors.rst
.. include:: include/configure-neutron-networks.rst
.. include:: include/configure-glance-images.rst
configure-identity
configure-compute
configure-networking
enabling-https
configure-cleaning
configure-tenant-networks.rst
configure-glance-images
configure-nova-flavors

View File

@ -1,7 +1,7 @@
.. _configure-networking:
Configure Networking to communicate with the bare metal server
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Configure the Networking service for bare metal provisioning
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You need to configure Networking so that the bare metal server can communicate
with the Networking service for DHCP, PXE boot and other requirements.

View File

@ -1,7 +1,7 @@
.. _flavor-creation:
Create Compute flavors for use with the Bare Metal service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Create flavors for use with the Bare Metal service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You'll need to create a special bare metal flavor in the Compute service.
The flavor is mapped to the bare metal node through the hardware specifications.

View File

@ -1,8 +0,0 @@
.. _configure-port-groups:
Configure port groups
=====================
See `Port groups configuration in Bare Metal service`_.
.. _`Port groups configuration in Bare Metal service`: http://docs.openstack.org/developer/ironic/deploy/portgroups.html

View File

@ -3,6 +3,150 @@
Configure tenant networks
=========================
See `Multitenancy in Bare Metal service`_.
Below is an example flow of how to set up the Bare Metal service so that node
provisioning will happen in a multi-tenant environment (which means using the
``neutron`` network interface as stated above):
#. Network interfaces can be enabled on ironic-conductor by adding them to the
``enabled_network_interfaces`` configuration option under the ``default``
section of the configuration file::
[DEFAULT]
...
enabled_network_interfaces=noop,flat,neutron
Keep in mind that, ideally, all ironic-conductors should have the same list
of enabled network interfaces, but it may not be the case during
ironic-conductor upgrades. This may cause problems if one of the
ironic-conductors dies and some node that is taken over is mapped to an
ironic-conductor that does not support the node's network interface.
Any actions that involve calling the node's driver will fail until that
network interface is installed and enabled on that ironic-conductor.
#. It is recommended to set the default network interface via the
``default_network_interface`` configuration option under the ``default``
section of the configuration file::
[DEFAULT]
...
default_network_interface=neutron
This default value will be used for all nodes that don't have a network
interface explicitly specified in the creation request.
If this configuration option is not set, the default network interface is
determined by looking at the ``[dhcp]dhcp_provider`` configuration option
value. If it is ``neutron``, then ``flat`` network interface becomes the
default, otherwise ``noop`` is the default.
#. Define a provider network in the Networking service, which we shall refer to
as the "provisioning" network, and add it in the ``neutron`` section of the
ironic-conductor configuration file. Using the ``neutron`` network interface
requires that ``provisioning_network`` and ``cleaning_network``
configuration options are set to valid identifiers (UUID or name) of
networks in the Networking service. If these options are not set correctly,
cleaning or provisioning will fail to start::
[neutron]
...
cleaning_network=$CLEAN_UUID_OR_NAME
provisioning_network=$PROVISION_UUID_OR_NAME
Please refer to :doc:`configure-cleaning` for more information about
cleaning.
.. warning::
Please make sure that the Bare Metal service has exclusive access to the
provisioning and cleaning networks. Spawning instances by non-admin users
in these networks and getting access to the Bare Metal service's control
plane is a security risk. For this reason, the provisioning and cleaning
networks should be configured as non-shared networks in the ``admin``
tenant.
.. note::
Spawning a bare metal instance onto the provisioning network is
impossible, the deployment will fail. The node should be deployed onto a
different network than the provisioning network. When you boot a bare
metal instance from the Compute service, you should choose a different
network in the Networking service for your instance.
.. note::
The "provisioning" and "cleaning" networks may be the same network or
distinct networks. To ensure that communication between the Bare Metal
service and the deploy ramdisk works, it is important to ensure that
security groups are disabled for these networks, *or* that the default
security groups allow:
* DHCP
* TFTP
* egress port used for the Bare Metal service (6385 by default)
* ingress port used for ironic-python-agent (9999 by default)
* if using the iSCSI deploy method (``pxe_*`` and ``iscsi_*`` drivers),
the ingress port used for iSCSI (3260 by default)
* if using the direct deploy method (``agent_*`` drivers), the egress
port used for the Object Storage service (typically 80 or 443)
* if using iPXE, the egress port used for the HTTP server running
on the ironic-conductor nodes (typically 80).
#. This step is optional and applicable only if you want to use security
groups during provisioning and/or cleaning of the nodes. If not specified,
default security groups are used.
#. Define security groups in the Networking service, to be used for
provisioning and/or cleaning networks.
#. Add the list of these security group UUIDs under the ``neutron`` section
of ironic-conductor's configuration file as shown below::
[neutron]
...
cleaning_network=$CLEAN_UUID_OR_NAME
cleaning_network_security_groups=[$LIST_OF_CLEAN_SECURITY_GROUPS]
provisioning_network=$PROVISION_UUID_OR_NAME
provisioning_network_security_groups=[$LIST_OF_PROVISION_SECURITY_GROUPS]
Multiple security groups may be applied to a given network, hence,
they are specified as a list.
The same security group(s) could be used for both provisioning and
cleaning networks.
.. warning::
If security groups are configured as described above, do not
set the "port_security_enabled" flag to False for the corresponding
Networking service's network or port. This will cause the deploy to fail.
For example: if ``provisioning_network_security_groups`` configuration
option is used, ensure that "port_security_enabled" flag for the
provisioning network is set to True. This flag is set to True by
default; make sure not to override it by manually setting it to False.
#. Install and configure a compatible ML2 mechanism driver which supports bare
metal provisioning for your switch. See `ML2 plugin configuration manual
<http://docs.openstack.org/networking-guide/config-ml2.html>`_
for details.
#. Restart the ironic-conductor and ironic-api services after the
modifications:
- Fedora/RHEL7/CentOS7::
sudo systemctl restart openstack-ironic-api
sudo systemctl restart openstack-ironic-conductor
- Ubuntu::
sudo service ironic-api restart
sudo service ironic-conductor restart
#. Make sure that the ironic-conductor is reachable over the provisioning
network by trying to download a file from a TFTP server on it, from some
non-control-plane server in that network::
tftp $TFTP_IP -c get $FILENAME
where FILENAME is the file located at the TFTP server.
See `Multitenancy in Bare Metal service`_ for required node configuration.
.. _`Multitenancy in Bare Metal service`: http://docs.openstack.org/developer/ironic/deploy/multitenancy.html#multitenancy

View File

@ -410,3 +410,12 @@ The Bare Metal service supports hardware inspection that simplifies enrolling
nodes - please see `inspection`_ for details.
.. _`inspection`: http://docs.openstack.org/developer/ironic/deploy/inspection.html
Tenant Networks and Port Groups
-------------------------------
See `Multitenancy in Bare Metal service`_ and
`Port groups configuration in Bare Metal service`_.
.. _`Multitenancy in Bare Metal service`: http://docs.openstack.org/developer/ironic/deploy/multitenancy.html
.. _`Port groups configuration in Bare Metal service`: http://docs.openstack.org/developer/ironic/deploy/portgroups.html

View File

@ -15,14 +15,10 @@ It contains the following sections:
get_started.rst
install.rst
configure-integration.rst
configure-cleaning.rst
configure-tenant-networks.rst
configure-port-groups.rst
deploy-ramdisk.rst
enrollment.rst
enabling-https.rst
standalone.rst
configdrive.rst
deploy-ramdisk.rst
setup-drivers.rst
advanced.rst
troubleshooting.rst