OpenStack Newton : Add Compute Nodes
2016/10/22 |
Add Compute Nodes to run more instances.
|
|
[1] |
Install KVM Hypervisor first which needs on Compute Node.
It's unnecessarry to set Bridge networking on the section [2] of the link. |
[2] | Install Nova-Compute, Nova-Network. If you do not use legacy nova-network, it's unnecessarry to include "openstack-nova-network" below. |
[root@node01 ~]# yum --enablerepo=centos-openstack-newton,epel -y install openstack-nova-compute openstack-nova-api openstack-nova-network
|
[3] | Configure Nova. |
[root@node01 ~]# mv /etc/nova/nova.conf /etc/nova/nova.conf.org
[root@node01 ~]#
vi /etc/nova/nova.conf # create new [DEFAULT] # define own IP address my_ip = 10.0.0.51 state_path = /var/lib/nova enabled_apis = osapi_compute,metadata osapi_compute_listen = 0.0.0.0 osapi_compute_listen_port = 8774 rootwrap_config = /etc/nova/rootwrap.conf api_paste_config = /etc/nova/api-paste.ini auth_strategy = keystone log_dir = /var/log/nova rpc_backend = rabbit # enable VNC [vnc] enabled = True vncserver_listen = 0.0.0.0 vncserver_proxyclient_address = $my_ip novncproxy_base_url = http://10.0.0.30:6080/vnc_auto.html # specify Glance server [glance] api_servers = http://10.0.0.30:9292
[oslo_concurrency]
lock_path = /var/lib/nova/tmp # RabbitMQ server connection info [oslo_messaging_rabbit] rabbit_host = 10.0.0.30 rabbit_port = 5672 rabbit_userid = openstack rabbit_password = password # Keystone server auth info [keystone_authtoken] auth_uri = http://10.0.0.30:5000 auth_url = http://10.0.0.30:35357 memcached_servers = 10.0.0.30:11211 auth_type = password project_domain_name = default user_domain_name = default project_name = service username = nova password = servicepassword chmod 640 /etc/nova/nova.conf [root@node01 ~]# chgrp nova /etc/nova/nova.conf |
[4] | Configure Networking. The follows is for the case you use legacy nova-network function. But if you use Neutron Networking function, Refer to here to configure it. Anyway, legacy nova-network function is officially not recommended. |
[root@node01 ~]#
vi /etc/nova/nova.conf # add follows in [DEFAULT] section use_neutron = False libvirt_vif_driver = nova.virt.libvirt.vif.LibvirtGenericVIFDriver linuxnet_interface_driver = nova.network.linux_net.LinuxBridgeInterfaceDriver firewall_driver = nova.virt.libvirt.firewall.IptablesFirewallDriver network_manager = nova.network.manager.FlatDHCPManager network_size = 254 allow_same_net_traffic = False multi_host = True send_arp_for_ha = True share_dhcp_address = True force_dhcp_release = True # specify nic for public public_interface = eth0 # specify any name for bridge flat_network_bridge = br100 # specify nic for flat DHCP bridge flat_interface = dummy0 # add a dummy interface which is for the flat DHCP bridge
[root@node01 ~]#
[root@node01 ~]# cat > /etc/sysconfig/network-scripts/ifcfg-dummy0 <<EOF
DEVICE=dummy0 BOOTPROTO=none ONBOOT=yes TYPE=Ethernet NM_CONTROLLED=no EOF echo "alias dummy0 dummy" > /etc/modprobe.d/dummy.conf [root@node01 ~]# ifup dummy0 |
[5] | If SELinux is enabled, change policy like follows. |
[root@node01 ~]#
vi nova_pol.te # create new module nova_pol 1.0; require { type nova_t; type nova_log_t; type sysctl_net_t; type netutils_exec_t; class file { read getattr create open execute }; class dir { write search add_name }; class capability { kill sys_ptrace }; class capability2 block_suspend; } #============= nova_t ============== allow nova_t netutils_exec_t:file execute; allow nova_t self:capability kill; allow nova_t sysctl_net_t:dir search; allow nova_t sysctl_net_t:file { read getattr open }; allow nova_t self:capability sys_ptrace; allow nova_t self:capability2 block_suspend; checkmodule -m -M -o nova_pol.mod nova_pol.te checkmodule: loading policy configuration from nova_pol.te checkmodule: policy configuration loaded checkmodule: writing binary representation (version 17) to nova_pol.mod [root@node01 ~]# semodule_package --outfile nova_pol.pp --module nova_pol.mod [root@node01 ~]# semodule -i nova_pol.pp |
[6] | If Firewalld is running, allow ports for services. |
[root@node01 ~]# firewall-cmd --add-port={6080/tcp,8774/tcp,8775/tcp} --permanent success [root@node01 ~]# firewall-cmd --reload success |
[7] | Start Nova Services. If you don't use legacy nova-network, exclude the word "network" below. |
[root@node01 ~]# for service in metadata-api compute network; do
systemctl start openstack-nova-$service systemctl enable openstack-nova-$service done |
[8] | Make sure the status of Nova services on Controle Node like here. If all State is "up", they are running normally. |
[root@dlp ~(keystone)]# nova service-list +----+------------------+------------------+----------+---------+-------+----------------------------+-----------------+ | Id | Binary | Host | Zone | Status | State | Updated_at | Disabled Reason | +----+------------------+------------------+----------+---------+-------+----------------------------+-----------------+ | 7 | nova-cert | dlp.srv.world | internal | enabled | up | 2016-10-22T16:53:04.000000 | - | | 8 | nova-consoleauth | dlp.srv.world | internal | enabled | up | 2016-10-22T16:53:04.000000 | - | | 9 | nova-conductor | dlp.srv.world | internal | enabled | up | 2016-10-22T16:53:02.000000 | - | | 13 | nova-scheduler | dlp.srv.world | internal | enabled | up | 2016-10-22T16:53:04.000000 | - | | 14 | nova-compute | dlp.srv.world | nova | enabled | up | 2016-10-22T16:53:04.000000 | - | | 15 | nova-network | dlp.srv.world | internal | enabled | up | 2016-10-22T16:53:04.000000 | - | | 16 | nova-compute | node01.srv.world | nova | enabled | up | 2016-10-22T16:53:04.000000 | - | | 17 | nova-network | node01.srv.world | internal | enabled | up | 2016-10-22T16:53:06.000000 | - | +----+------------------+------------------+----------+---------+-------+----------------------------+-----------------+ |