OpenStack Antelope : Configure Neutron OVN (Network Node)2023/04/17 |
Configure OpenStack Network Service (Neutron).
This example is based on the environment like follows.
Configure Neutron services with Open Virtual Network (OVN). ------------+--------------------------+--------------------------+------------ | | | eth0|10.0.0.30 eth0|10.0.0.50 eth0|10.0.0.51 +-----------+-----------+ +-----------+-----------+ +-----------+-----------+ | [ dlp.srv.world ] | | [ network.srv.world ] | | [ node01.srv.world ] | | (Control Node) | | (Network Node) | | (Compute Node) | | | | | | | | MariaDB RabbitMQ | | Open vSwitch | | Libvirt | | Memcached Nginx | | Neutron Server | | Nova Compute | | Keystone httpd | | OVN-Northd | | Open vSwitch | | Glance Nova API | | Nginx | | OVN Metadata Agent | | | | | | OVN-Controller | +-----------------------+ +-----------------------+ +-----------------------+ |
[1] |
Create a user or endpoints and Database for Neutron on Control Node, refer to here.
On the example of the link, Neutron Server (API) is installed on Control Node, but on this example, Neutron Server is installed on Network Node, so replace the Endpoints of Neutron to [10.0.0.50]. |
[2] | Install Neutron Server on Network Node. |
[root@network ~]# dnf --enablerepo=centos-openstack-antelope,epel,crb -y install openstack-neutron openstack-neutron-ml2 ovn22.12-central nginx nginx-mod-stream
|
[3] | Configure Neutron Server. |
[root@network ~]# mv /etc/neutron/neutron.conf /etc/neutron/neutron.conf.org
[root@network ~]#
vi /etc/neutron/neutron.conf # create new [DEFAULT] bind_host = 127.0.0.1 bind_port = 9696 core_plugin = ml2 service_plugins = ovn-router auth_strategy = keystone state_path = /var/lib/neutron allow_overlapping_ips = True notify_nova_on_port_status_changes = True notify_nova_on_port_data_changes = True # RabbitMQ connection info transport_url = rabbit://openstack:password@dlp.srv.world # Keystone auth info [keystone_authtoken] www_authenticate_uri = https://dlp.srv.world:5000 auth_url = https://dlp.srv.world:5000 memcached_servers = dlp.srv.world:11211 auth_type = password project_domain_name = default user_domain_name = default project_name = service username = neutron password = servicepassword # if using self-signed certs on httpd Keystone, turn to [true] insecure = false [database] connection = mysql+pymysql://neutron:password@dlp.srv.world/neutron_ml2 [nova] auth_url = https://dlp.srv.world:5000 auth_type = password project_domain_name = default user_domain_name = default region_name = RegionOne project_name = service username = nova password = servicepassword # if using self-signed certs on httpd Keystone, turn to [true] insecure = false [oslo_concurrency] lock_path = $state_path/tmp [oslo_policy] enforce_new_defaults = true
[root@network ~]#
chmod 640 /etc/neutron/neutron.conf [root@network ~]# chgrp neutron /etc/neutron/neutron.conf
[root@network ~]#
vi /etc/neutron/plugins/ml2/ml2_conf.ini # add to the end
[ml2]
type_drivers = flat,geneve
tenant_network_types = geneve
mechanism_drivers = ovn
extension_drivers = port_security
overlay_ip_version = 4
[ml2_type_geneve]
vni_ranges = 1:65536
max_header_size = 38
[ml2_type_flat]
flat_networks = *
[securitygroup]
enable_security_group = True
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
[ovn]
# IP address of this Network node
ovn_nb_connection = tcp:10.0.0.50:6641
ovn_sb_connection = tcp:10.0.0.50:6642
ovn_l3_scheduler = leastloaded
ovn_metadata_enabled = True
[root@network ~]#
vi /etc/sysconfig/openvswitch # line 28 : add OPTIONS=" --ovsdb-server-options='--remote=ptcp:6640:127.0.0.1' "
|
[4] | Get valid SSL/TLS certificate or Create self-signed certificate for Network Node and configure Nginx for proxy settings. |
[root@network ~]# mv /etc/nginx/nginx.conf /etc/nginx/nginx.conf.org
[root@network ~]#
vi /etc/nginx/nginx.conf # create new user nginx; worker_processes auto; error_log /var/log/nginx/error.log; pid /run/nginx.pid; include /usr/share/nginx/modules/*.conf; events { worker_connections 1024; } http { log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; include /etc/nginx/mime.types; default_type application/octet-stream; include /etc/nginx/conf.d/*.conf; } stream { upstream neutron-api { server 127.0.0.1:9696; } server { listen 10.0.0.50:9696 ssl; proxy_pass neutron-api; } ssl_certificate "/etc/letsencrypt/live/network.srv.world/fullchain.pem"; ssl_certificate_key "/etc/letsencrypt/live/network.srv.world/privkey.pem"; } |
[5] | If SELinux is enabled, change policy. |
[root@network ~]# dnf --enablerepo=centos-openstack-antelope -y install openstack-selinux [root@network ~]# setsebool -P neutron_can_network on [root@network ~]# setsebool -P haproxy_connect_any on [root@network ~]# setsebool -P daemons_enable_cluster_mode on
[root@network ~]#
vi ovsofctl.te # create new module ovsofctl 1.0; require { type neutron_t; type neutron_exec_t; type dnsmasq_t; type tracefs_t; type openvswitch_load_module_t; type var_run_t; type openvswitch_t; type ovsdb_port_t; type dmesg_exec_t; type ping_exec_t; type ssh_exec_t; type ssh_keygen_exec_t; type crontab_exec_t; type dbusd_exec_t; type thumb_exec_t; type systemd_notify_exec_t; type keepalived_exec_t; type lsmd_plugin_exec_t; type gpg_agent_exec_t; type hostname_exec_t; type passwd_exec_t; type systemd_tmpfiles_exec_t; type rpmdb_exec_t; type systemd_hwdb_exec_t; type virt_qemu_ga_exec_t; type journalctl_exec_t; type conmon_exec_t; type locate_exec_t; type traceroute_exec_t; type mount_exec_t; type lsmd_exec_t; type policykit_auth_exec_t; type vlock_exec_t; type chronyc_exec_t; type ssh_agent_exec_t; type su_exec_t; type loadkeys_exec_t; type mandb_exec_t; type systemd_passwd_agent_exec_t; type gpg_exec_t; type checkpolicy_exec_t; type systemd_systemctl_exec_t; type devicekit_exec_t; type plymouth_exec_t; type chfn_exec_t; type rsync_exec_t; type NetworkManager_exec_t; type container_runtime_exec_t; type groupadd_exec_t; type kdumpctl_exec_t; type login_exec_t; type fusermount_exec_t; type httpd_t; type tmpfs_t; class tcp_socket { name_bind name_connect }; class sock_file write; class file { create execute_no_trans getattr link open read unlink write }; class dir search; class capability { dac_override sys_rawio }; } #============= neutron_t ============== allow neutron_t self:capability { dac_override sys_rawio }; allow neutron_t neutron_exec_t:file execute_no_trans; allow neutron_t NetworkManager_exec_t:file getattr; allow neutron_t checkpolicy_exec_t:file getattr; allow neutron_t chfn_exec_t:file getattr; allow neutron_t chronyc_exec_t:file getattr; allow neutron_t conmon_exec_t:file getattr; allow neutron_t container_runtime_exec_t:file getattr; allow neutron_t crontab_exec_t:file getattr; allow neutron_t dbusd_exec_t:file getattr; allow neutron_t devicekit_exec_t:file getattr; allow neutron_t dmesg_exec_t:file getattr; allow neutron_t fusermount_exec_t:file getattr; allow neutron_t gpg_agent_exec_t:file getattr; allow neutron_t gpg_exec_t:file getattr; allow neutron_t groupadd_exec_t:file getattr; allow neutron_t hostname_exec_t:file getattr; allow neutron_t journalctl_exec_t:file getattr; allow neutron_t kdumpctl_exec_t:file getattr; allow neutron_t keepalived_exec_t:file getattr; allow neutron_t loadkeys_exec_t:file getattr; allow neutron_t locate_exec_t:file getattr; allow neutron_t login_exec_t:file getattr; allow neutron_t lsmd_exec_t:file getattr; allow neutron_t lsmd_plugin_exec_t:file getattr; allow neutron_t mandb_exec_t:file getattr; allow neutron_t mount_exec_t:file getattr; allow neutron_t passwd_exec_t:file getattr; allow neutron_t ping_exec_t:file getattr; allow neutron_t plymouth_exec_t:file getattr; allow neutron_t policykit_auth_exec_t:file getattr; allow neutron_t rpmdb_exec_t:file getattr; allow neutron_t rsync_exec_t:file getattr; allow neutron_t ssh_agent_exec_t:file getattr; allow neutron_t ssh_exec_t:file getattr; allow neutron_t ssh_keygen_exec_t:file getattr; allow neutron_t su_exec_t:file getattr; allow neutron_t systemd_hwdb_exec_t:file getattr; allow neutron_t systemd_notify_exec_t:file getattr; allow neutron_t systemd_passwd_agent_exec_t:file getattr; allow neutron_t systemd_systemctl_exec_t:file getattr; allow neutron_t systemd_tmpfiles_exec_t:file getattr; allow neutron_t thumb_exec_t:file getattr; allow neutron_t traceroute_exec_t:file getattr; allow neutron_t virt_qemu_ga_exec_t:file getattr; allow neutron_t vlock_exec_t:file getattr; allow neutron_t tmpfs_t:file { create getattr link open read unlink write }; #============= openvswitch_t ============== allow openvswitch_t var_run_t:sock_file write; allow openvswitch_t ovsdb_port_t:tcp_socket name_bind; #============= openvswitch_load_module_t ============== allow openvswitch_load_module_t tracefs_t:dir search; #============= dnsmasq_t ============== allow dnsmasq_t self:capability dac_override; checkmodule -m -M -o ovsofctl.mod ovsofctl.te [root@network ~]# semodule_package --outfile ovsofctl.pp --module ovsofctl.mod [root@network ~]# semodule -i ovsofctl.pp |
[6] | If Firewalld is running, allow service ports. |
[root@network ~]# firewall-cmd --add-port={9696/tcp,6641/tcp,6642/tcp} success [root@network ~]# firewall-cmd --runtime-to-permanent success |
[7] | Start Neutron services. |
[root@network ~]#
ln -s /etc/neutron/plugins/ml2/ml2_conf.ini /etc/neutron/plugin.ini [root@network ~]# su -s /bin/bash neutron -c "neutron-db-manage --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugin.ini upgrade head"
[root@network ~]#
[root@network ~]# systemctl enable --now ovn-northd [root@network ~]# ovn-nbctl set-connection ptcp:6641:10.0.0.50 -- set connection . inactivity_probe=60000 [root@network ~]# ovn-sbctl set-connection ptcp:6642:10.0.0.50 -- set connection . inactivity_probe=60000
systemctl enable --now neutron-server nginx
|
Sponsored Link |
|