Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Source 

Destination
certificate of calico-etcd-<podname>-node1.values.nodes[0].tls.client.cert
certificate-key calico-etcd-<podname>-node1.values.nodes[0].tls.client.key
certificate of calico-etcd-<podname>-node1-peer.values.nodes[0].tls.peer.cert
certificate-key of calico-etcd-<podname>-node1-peer.values.nodes[0].tls.peer.key
certificate of calico-etcd-<podname>-node2.values.nodes[1].tls.client.cert
certificate-key calico-etcd-<podname>-node2.values.nodes[1].tls.client.key
certificate of calico-etcd-<podname>-node2-peer.values.nodes[1].tls.peer.cert
certificate-key of calico-etcd-<podname>-node2-peer.values.nodes[1].tls.peer.key
certificate of calico-etcd-<podname>-node3.values.nodes[2].tls.client.cert
certificate-key calico-etcd-<podname>-node3.values.nodes[2].tls.client.key
certificate of calico-etcd-<podname>-node3-peer.values.nodes[2].tls.peer.cert
certificate-key of calico-etcd-<podname>-node3-peer.values.nodes[2].tls.peer.key

Undercloud Platform

TBA

Ceph

TBA

...

OpenStack Helm Infra

This includes configuring parameters of various infrastucture infrastructure components, such as elasticsearchas Elasticsearch, fluentbitFluentbit, fluentdFluentd,  grafanaGrafana, ingressIngress, mariadbMariadb, prometheusand Prometheus.

User can leave all the values as is.

Open Stack OpenStack Helm - Compute Kit

Under this, there are three important configurations - 

  1. Libvirt:
    1. Network Backend: openvswitch or sriovOpen vSwitch or SR-IOV
  2. Neutron
  3. Nova

Tenant-Ceph

Config

Under this configuration, user can only set the region name for openstack helmOpenStack Helm.

Parametersub-categorySubcategoryDescriptionExample - Value
osh



region_nameThe region name to use. Typically Site name is provided.intel-pod10


PKI-Catalog

sub-categorysub-category
ParameterSubcategory-1Subcategory-2DescriptionExample Value
certificate_authorities




description



certificates




document_name



description



common_name



hosts



groups

keypairs




name



description


...

Boot actions can be more accurately described as post-deployment file placement. This file placement can be leveraged to install actions for servers to take after the permanent OS is installed and the server is rebooted. Including custom or vendor scripts and a SystemD service to run the scripts on first boot or on all boots allows almost any action to be configured.

ParameterSubSubcategory-Category-1subSubcategory-category-2DescriptionExample Value
signaling

whether Whether to expect a signal at the completion of this boot action. If set to true for a boot action that does not send a signal, it will elongate extend the deployment step and consider the boot action failed.true
assets

list of data assets.

items




pathIf type is unit , it is a SystemD unit, such as a service, that will be saved to path and enabled via systemctl enable [filename]


location(see data)


typeboot action framework supports assets of several types - 'unit','file', 'pkg_list' . pkg_list is a list of packages'file'


dataThe asset contents can be sourced from either the in-document data field of the asset mapping or dynamically generated by requesting them from a URL provided in location.


location_pipelineThe boot action framework supports pipelines to allow for some dynamic rendering. There are separate pipelines for the location field to build the URL that referenced assets should be sourced from and the data field (or the data sourced from resolving the location field).template


data_pipeline

The location string will be passed through the location_pipeline before it is queried. This response or the data field will then be passed through the data_pipeline. The data entity will start the pipeline as a bytestring meaning which means that if it is defined in the data field, it will is first be encoded into a bytestring. Below are pipeline segments available for use.

For 'template' - Treat the data element as a Jinja2 template and apply a node context to it. The defined context available to the template is below.

base64_encode', 'template', 'base64_decode', 'utf8_encode','utf8_decode'


permissionsIf type is file. , it is simply saved to the filesystem at path and set with permissions.
node_filter

filter Filter for selecting to which nodes this boot action will apply. If no node filter is included, all nodes will receive the boot action. Otherwise, it will be is only the nodes that match the logic of the filter set.

filter_set_type
Either intersection|union
union

filter_set items




filter_type

same Same as filter_set_type.




node_namesNames of the node.


node_tagsNode tags


node_labelsNode labels.


rack_namesRack Names


rack_labelsRack Labels


Rack


ParameterSub-CategorySubcategoryDescriptionExample Value
tor_switches
For one or more switches, define the following.

mgmt_ipIP address of the management port1.1.1.1

sdn_api_uriThe URI for SDN based configurationhttps://polo.opnfv.org/switchmgmt?switch=switch01name
location



clliCommon Language Location Identifier Code - used within the North American telecommunications industry to specify the location and function of telecommunications equipment. HSTNTXMOCG0

gridThe grid code.EG12
local_networks*
Networks wholly contained to this rack. Nodes in a rack can only connect to local_networks of that rackpxe_network1


Region


ParameterSub-CategorySubcategoryDescriptionExample Value
tag_definitions*



tag


definition_type
lshw_xpath

definition

authorized_keys*


repositories

list List of SSH keys which MaaS will register for the built-in "ubuntu" account during the PXE process.

This list is populated by substitution, so the same SSH keys do not need to be repeated in multiple manifests.



remove_unlistedWhether to remove the unlisted packages?true

repo_type+


url+


distributions


subrepos


components


gpgkey


arches+


options

...

Generating certificates involves the following steps:

  • 1. Get airship treasuremap to the jumpserver. git clone https://github.com/airshipit/treasuremap.git 
  • 2. copy type/cntt folder opnfv-airship to treasuremap under type
  • 3. mv site defn. For pod10 to treasremaptreasuremap
  • 4. sudo tools/airship pegleg site -r /target collect intel-pod10 -s intel-pod10_collected
  • 5. mkdir intel-pod10_certs
  • 6. sudo tools/airship promenade generate-certs -o /target/intel-pod10_certs /target/intel-pod10_collected/*.yaml
  • 7. cp intel-pod10_certs/*.yaml site/intel-pod10/secrets/certificates/
  • 8. mv site/intel-pod10 ../airship/site/


Publishing

TBA