CentOS Stream 9
Sponsored Link

OpenStack Zed : Configure Neutron OVN (Network Node)2022/11/10

 
Configure OpenStack Network Service (Neutron).
This example is based on the environment like follows.
Configure Neutron services with Open Virtual Network (OVN).
------------+-----------------------------+-----------------------------+------------
            |                             |                             |
        eth0|10.0.0.30                eth0|10.0.0.50                eth0|10.0.0.51
+-----------+-----------+     +-----------+-----------+     +-----------+-----------+
|   [ dlp.srv.world ]   |     | [ network.srv.world ] |     |  [ node01.srv.world ] |
|     (Control Node)    |     |     (Network Node)    |     |     (Compute Node)    |
|                       |     |                       |     |                       |
|  MariaDB    RabbitMQ  |     |      Open vSwitch     |     |        Libvirt        |
|  Memcached  Nginx     |     |     Neutron Server    |     |      Nova Compute     |
|  Keystone   httpd     |     |      OVN-Northd       |     |      Open vSwitch     |
|  Glance     Nova API  |     |         Nginx         |     |   OVN Metadata Agent  |
|                       |     |                       |     |     OVN-Controller    |
+-----------------------+     +-----------------------+     +-----------------------+

[1]
Create a user or endpoints and Database for Neutron on Control Node, refer to here.
On the example of the link, Neutron Server (API) is installed on Control Node,
but on this example, Neutron Server is installed on Network Node,
so replace the Endpoints of Neutron to [10.0.0.50].
[2] Install Neutron Server on Network Node.
# install from Zed, EPEL, CRB

[root@network ~]#
dnf --enablerepo=centos-openstack-zed,epel,crb -y install openstack-neutron openstack-neutron-ml2 ovn-2021-central nginx nginx-mod-stream
[3] Configure Neutron Server.
[root@network ~]#
mv /etc/neutron/neutron.conf /etc/neutron/neutron.conf.org

[root@network ~]#
vi /etc/neutron/neutron.conf
# create new

[DEFAULT]
bind_host = 127.0.0.1
bind_port = 9696
core_plugin = ml2
service_plugins = ovn-router
auth_strategy = keystone
state_path = /var/lib/neutron
allow_overlapping_ips = True
notify_nova_on_port_status_changes = True
notify_nova_on_port_data_changes = True
# RabbitMQ connection info
transport_url = rabbit://openstack:password@dlp.srv.world

# Keystone auth info
[keystone_authtoken]
www_authenticate_uri = https://dlp.srv.world:5000
auth_url = https://dlp.srv.world:5000
memcached_servers = dlp.srv.world:11211
auth_type = password
project_domain_name = default
user_domain_name = default
project_name = service
username = neutron
password = servicepassword
# if using self-signed certs on httpd Keystone, turn to [true]
insecure = false

[database]
connection = mysql+pymysql://neutron:password@dlp.srv.world/neutron_ml2

[nova]
auth_url = https://dlp.srv.world:5000
auth_type = password
project_domain_name = default
user_domain_name = default
region_name = RegionOne
project_name = service
username = nova
password = servicepassword
# if using self-signed certs on httpd Keystone, turn to [true]
insecure = false

[oslo_concurrency]
lock_path = $state_path/tmp

[root@network ~]#
chmod 640 /etc/neutron/neutron.conf

[root@network ~]#
chgrp neutron /etc/neutron/neutron.conf
[root@network ~]#
vi /etc/neutron/plugins/ml2/ml2_conf.ini
# add to the end

[ml2]
type_drivers = flat,geneve
tenant_network_types = geneve
mechanism_drivers = ovn
extension_drivers = port_security
overlay_ip_version = 4

[ml2_type_geneve]
vni_ranges = 1:65536
max_header_size = 38

[ml2_type_flat]
flat_networks = *

[securitygroup]
enable_security_group = True
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver

[ovn]
# IP address of this Network node
ovn_nb_connection = tcp:10.0.0.50:6641
ovn_sb_connection = tcp:10.0.0.50:6642
ovn_l3_scheduler = leastloaded
ovn_metadata_enabled = True

[root@network ~]#
vi /etc/sysconfig/openvswitch
# line 28 : add

OPTIONS="
--ovsdb-server-options='--remote=ptcp:6640:127.0.0.1'
"
[4] Get valid SSL/TLS certificate or Create self-signed certificate for Network Node and configure Nginx for proxy settings.
[root@network ~]#
mv /etc/nginx/nginx.conf /etc/nginx/nginx.conf.org

[root@network ~]#
vi /etc/nginx/nginx.conf
# create new

user nginx;
worker_processes auto;
error_log /var/log/nginx/error.log;
pid /run/nginx.pid;
include /usr/share/nginx/modules/*.conf;
events {
    worker_connections 1024;
}
http {
    log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '
                      '$status $body_bytes_sent "$http_referer" '
                      '"$http_user_agent" "$http_x_forwarded_for"';
    access_log  /var/log/nginx/access.log  main;
    sendfile            on;
    tcp_nopush          on;
    tcp_nodelay         on;
    keepalive_timeout   65;
    types_hash_max_size 2048;
    include             /etc/nginx/mime.types;
    default_type        application/octet-stream;
    include /etc/nginx/conf.d/*.conf;
}

stream {
    upstream neutron-api {
        server 127.0.0.1:9696;
    }
    server {
        listen 10.0.0.50:9696 ssl;
        proxy_pass neutron-api;
    }
    ssl_certificate "/etc/letsencrypt/live/network.srv.world/fullchain.pem";
    ssl_certificate_key "/etc/letsencrypt/live/network.srv.world/privkey.pem";
}
[5] If SELinux is enabled, change policy.
[root@network ~]#
dnf --enablerepo=centos-openstack-zed -y install openstack-selinux

[root@network ~]#
setsebool -P neutron_can_network on

[root@network ~]#
setsebool -P haproxy_connect_any on

[root@network ~]#
setsebool -P daemons_enable_cluster_mode on

[root@network ~]#
vi ovsofctl.te
# create new

module ovsofctl 1.0;

require {
        type neutron_t;
        type neutron_exec_t;
        type dnsmasq_t;
        type tracefs_t;
        type openvswitch_load_module_t;
        type var_run_t;
        type openvswitch_t;
        type ovsdb_port_t;
        type dmesg_exec_t;
        type ping_exec_t;
        type ssh_exec_t;
        type ssh_keygen_exec_t;
        type crontab_exec_t;
        type dbusd_exec_t;
        type thumb_exec_t;
        type systemd_notify_exec_t;
        type keepalived_exec_t;
        type lsmd_plugin_exec_t;
        type gpg_agent_exec_t;
        type hostname_exec_t;
        type passwd_exec_t;
        type systemd_tmpfiles_exec_t;
        type rpmdb_exec_t;
        type systemd_hwdb_exec_t;
        type virt_qemu_ga_exec_t;
        type journalctl_exec_t;
        type conmon_exec_t;
        type locate_exec_t;
        type traceroute_exec_t;
        type mount_exec_t;
        type lsmd_exec_t;
        type policykit_auth_exec_t;
        type vlock_exec_t;
        type chronyc_exec_t;
        type ssh_agent_exec_t;
        type su_exec_t;
        type loadkeys_exec_t;
        type mandb_exec_t;
        type systemd_passwd_agent_exec_t;
        type gpg_exec_t;
        type checkpolicy_exec_t;
        type systemd_systemctl_exec_t;
        type devicekit_exec_t;
        type plymouth_exec_t;
        type chfn_exec_t;
        type rsync_exec_t;
        type NetworkManager_exec_t;
        type container_runtime_exec_t;
        type groupadd_exec_t;
        type kdumpctl_exec_t;
        type login_exec_t;
        type fusermount_exec_t;
        type httpd_t;
        class tcp_socket { name_bind name_connect };
        class sock_file write;
        class file { execute_no_trans getattr };
        class dir search;
        class capability { dac_override sys_rawio };
}

#============= neutron_t ==============
allow neutron_t self:capability { dac_override sys_rawio };
allow neutron_t neutron_exec_t:file execute_no_trans;
allow neutron_t NetworkManager_exec_t:file getattr;
allow neutron_t checkpolicy_exec_t:file getattr;
allow neutron_t chfn_exec_t:file getattr;
allow neutron_t chronyc_exec_t:file getattr;
allow neutron_t conmon_exec_t:file getattr;
allow neutron_t container_runtime_exec_t:file getattr;
allow neutron_t crontab_exec_t:file getattr;
allow neutron_t dbusd_exec_t:file getattr;
allow neutron_t devicekit_exec_t:file getattr;
allow neutron_t dmesg_exec_t:file getattr;
allow neutron_t fusermount_exec_t:file getattr;
allow neutron_t gpg_agent_exec_t:file getattr;
allow neutron_t gpg_exec_t:file getattr;
allow neutron_t groupadd_exec_t:file getattr;
allow neutron_t hostname_exec_t:file getattr;
allow neutron_t journalctl_exec_t:file getattr;
allow neutron_t kdumpctl_exec_t:file getattr;
allow neutron_t keepalived_exec_t:file getattr;
allow neutron_t loadkeys_exec_t:file getattr;
allow neutron_t locate_exec_t:file getattr;
allow neutron_t login_exec_t:file getattr;
allow neutron_t lsmd_exec_t:file getattr;
allow neutron_t lsmd_plugin_exec_t:file getattr;
allow neutron_t mandb_exec_t:file getattr;
allow neutron_t mount_exec_t:file getattr;
allow neutron_t passwd_exec_t:file getattr;
allow neutron_t ping_exec_t:file getattr;
allow neutron_t plymouth_exec_t:file getattr;
allow neutron_t policykit_auth_exec_t:file getattr;
allow neutron_t rpmdb_exec_t:file getattr;
allow neutron_t rsync_exec_t:file getattr;
allow neutron_t ssh_agent_exec_t:file getattr;
allow neutron_t ssh_exec_t:file getattr;
allow neutron_t ssh_keygen_exec_t:file getattr;
allow neutron_t su_exec_t:file getattr;
allow neutron_t systemd_hwdb_exec_t:file getattr;
allow neutron_t systemd_notify_exec_t:file getattr;
allow neutron_t systemd_passwd_agent_exec_t:file getattr;
allow neutron_t systemd_systemctl_exec_t:file getattr;
allow neutron_t systemd_tmpfiles_exec_t:file getattr;
allow neutron_t thumb_exec_t:file getattr;
allow neutron_t traceroute_exec_t:file getattr;
allow neutron_t virt_qemu_ga_exec_t:file getattr;
allow neutron_t vlock_exec_t:file getattr;

#============= openvswitch_t ==============
allow openvswitch_t var_run_t:sock_file write;
allow openvswitch_t ovsdb_port_t:tcp_socket name_bind;

#============= openvswitch_load_module_t ==============
allow openvswitch_load_module_t tracefs_t:dir search;

#============= dnsmasq_t ==============
allow dnsmasq_t self:capability dac_override;

[root@network ~]#
checkmodule -m -M -o ovsofctl.mod ovsofctl.te

[root@network ~]#
semodule_package --outfile ovsofctl.pp --module ovsofctl.mod

[root@network ~]#
semodule -i ovsofctl.pp

[6] If Firewalld is running, allow service ports.
[root@network ~]#
firewall-cmd --add-port={9696/tcp,6641/tcp,6642/tcp}

success
[root@network ~]#
firewall-cmd --runtime-to-permanent

success
[7] Start Neutron services.
[root@network ~]#
systemctl enable --now openvswitch

[root@network ~]#
ovs-vsctl add-br br-int
[root@network ~]#
ln -s /etc/neutron/plugins/ml2/ml2_conf.ini /etc/neutron/plugin.ini

[root@network ~]#
su -s /bin/bash neutron -c "neutron-db-manage --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugin.ini upgrade head"
[root@network ~]#
systemctl enable --now ovn-northd

[root@network ~]#
ovn-nbctl set-connection ptcp:6641:10.0.0.50 -- set connection . inactivity_probe=60000

[root@network ~]#
ovn-sbctl set-connection ptcp:6642:10.0.0.50 -- set connection . inactivity_probe=60000
[root@network ~]#
systemctl enable --now neutron-server nginx
Matched Content