OpenStack Newton : Configure Neutron#2 (Network Node)
2016/10/23 |
Configure OpenStack Network Service (Neutron).
For this example, Install Neutron Server on Control Node which Keystone/Glance/Nova API are already installed,
and Install DHCP Agent, L3 Agent, L2 Agent, Metadata Agent on Network Node, and also Install L2 Agent on Compute Node on here.
( it's possible to install on a server as All-in-One, though, if you want )
Neutron needs a plugin software, it's possible to choose it from some softwares.
This example chooses ML2 plugin. ( it uses Open vSwitch under the backend )
| +------------------+ | +------------------------+ | [ Control Node ] | | | [ Network Node ] | | Keystone |10.0.0.30 | 10.0.0.50| DHCP Agent | | Glance |------------+------------| L3 Agent | | Nova API |eth0 | eth0| L2 Agent | | Neutron Server | | | Metadata Agent | +------------------+ | +------------------------+ eth0|10.0.0.51 +--------------------+ | [ Compute Node ] | | Nova Compute | | L2 Agent | +--------------------+ |
Configure Network Node on here.
|
|
[1] | Change Kernel parameters for IP fowarding and so on. |
[root@network ~]# echo 'net.ipv4.ip_forward=1' >> /etc/sysctl.conf [root@network ~]# echo 'net.ipv4.conf.default.rp_filter=0' >> /etc/sysctl.conf [root@network ~]# echo 'net.ipv4.conf.all.rp_filter=0' >> /etc/sysctl.conf [root@network ~]# sysctl -p |
[2] | Install some packages for Network Node. |
[root@network ~]# yum --enablerepo=centos-openstack-newton,epel -y install openstack-neutron openstack-neutron-ml2 openstack-neutron-openvswitch
|
[3] | Configure as a Network node. |
[root@network ~]# mv /etc/neutron/neutron.conf /etc/neutron/neutron.conf.org
[root@network ~]#
vi /etc/neutron/neutron.conf # create new [DEFAULT] core_plugin = ml2 service_plugins = router auth_strategy = keystone state_path = /var/lib/neutron allow_overlapping_ips = True rpc_backend = rabbit [agent] root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf # Keystone auth info [keystone_authtoken] auth_uri = http://10.0.0.30:5000 auth_url = http://10.0.0.30:35357 memcached_servers = 10.0.0.30:11211 auth_type = password project_domain_name = default user_domain_name = default project_name = service username = neutron password = servicepassword [oslo_concurrency] lock_path = $state_path/lock # RabbitMQ connection info [oslo_messaging_rabbit] rabbit_host = 10.0.0.30 rabbit_port = 5672 rabbit_userid = openstack rabbit_password = password chmod 640 /etc/neutron/neutron.conf [root@network ~]# chgrp neutron /etc/neutron/neutron.conf
[root@network ~]#
vi /etc/neutron/l3_agent.ini # line 17: add
interface_driver = neutron.agent.linux.interface.OVSInterfaceDriver
# line 98: add ( it's OK with no value (set later if need) ) external_network_bridge =
[root@network ~]#
vi /etc/neutron/dhcp_agent.ini # line 17: add
interface_driver = neutron.agent.linux.interface.OVSInterfaceDriver
# line 32: uncomment dhcp_driver = neutron.agent.linux.dhcp.Dnsmasq # line 41: uncomment and change enable_isolated_metadata = True
[root@network ~]#
vi /etc/neutron/metadata_agent.ini # line 22: uncomment and specify Nova API server nova_metadata_ip = 10.0.0.30
# line 27: uncomment nova_metadata_port = 8775 # line 34: uncomment and specify any secret key you like metadata_proxy_shared_secret = metadata_secret
[root@network ~]#
vi /etc/neutron/plugins/ml2/ml2_conf.ini # line 102: add ( it's OK with no value for "tenant_network_types" (set later if need) ) [ml2]
type_drivers = flat,vlan,gre,vxlan
tenant_network_types = mechanism_drivers = openvswitch,l2population extension_drivers = port_security # line 235: uncomment and add enable_security_group = True firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
# end line: uncomment enable_ipset = True ln -s /etc/neutron/plugins/ml2/ml2_conf.ini /etc/neutron/plugin.ini [root@network ~]# systemctl start openvswitch [root@network ~]# systemctl enable openvswitch [root@network ~]# ovs-vsctl add-br br-int [root@network ~]# for service in dhcp-agent l3-agent metadata-agent openvswitch-agent; do systemctl start neutron-$service systemctl enable neutron-$service done |
[4] | If SELinux is enabled, change policy like follows. |
[root@network ~]# setsebool -P neutron_can_network on
[root@network ~]#
vi neutron_pol.te # create new module neutron_pol 1.0; require { type sysfs_t; type http_port_t; type neutron_t; type neutron_tmp_t; type ovsdb_port_t; type openvswitch_t; type openflow_port_t; class sock_file { create write unlink getattr setattr }; class tcp_socket { name_bind name_connect }; class filesystem getattr; } #============= neutron_t ============== allow neutron_t http_port_t:tcp_socket name_bind; allow neutron_t sysfs_t:filesystem getattr; allow neutron_t neutron_tmp_t:sock_file { create write getattr unlink setattr }; allow neutron_t openflow_port_t:tcp_socket name_bind; #============= openvswitch_t ============== allow openvswitch_t ovsdb_port_t:tcp_socket name_bind; checkmodule -m -M -o neutron_pol.mod neutron_pol.te checkmodule: loading policy configuration from neutron_pol.te checkmodule: policy configuration loaded checkmodule: writing binary representation (version 17) to neutron_pol.mod [root@network ~]# semodule_package --outfile neutron_pol.pp --module neutron_pol.mod [root@network ~]# semodule -i neutron_pol.pp |