forked from suse-edge/Factory
234 lines
10 KiB
Django/Jinja
234 lines
10 KiB
Django/Jinja
[DEFAULT]
|
|
auth_strategy = noauth
|
|
debug = true
|
|
default_deploy_interface = direct
|
|
default_inspect_interface = agent
|
|
default_network_interface = noop
|
|
enabled_bios_interfaces = no-bios,redfish,idrac-redfish,irmc,ilo
|
|
enabled_boot_interfaces = ipxe,ilo-ipxe,pxe,ilo-pxe,fake,redfish-virtual-media,idrac-redfish-virtual-media,ilo-virtual-media,redfish-https
|
|
enabled_deploy_interfaces = direct,fake,ramdisk,custom-agent
|
|
enabled_firmware_interfaces = no-firmware,fake,redfish
|
|
# NOTE(dtantsur): when changing this, make sure to update the driver
|
|
# dependencies in Dockerfile.
|
|
enabled_hardware_types = ipmi,idrac,irmc,fake-hardware,redfish,manual-management,ilo,ilo5
|
|
enabled_inspect_interfaces = agent,irmc,fake,redfish,ilo
|
|
enabled_management_interfaces = ipmitool,irmc,fake,redfish,idrac-redfish,ilo,ilo5,noop
|
|
enabled_network_interfaces = noop
|
|
enabled_power_interfaces = ipmitool,irmc,fake,redfish,idrac-redfish,ilo
|
|
enabled_raid_interfaces = no-raid,irmc,agent,fake,redfish,idrac-redfish,ilo5
|
|
enabled_vendor_interfaces = no-vendor,ipmitool,idrac-redfish,redfish,ilo,fake
|
|
{% if env.IRONIC_EXPOSE_JSON_RPC | lower == "true" %}
|
|
rpc_transport = json-rpc
|
|
{% else %}
|
|
rpc_transport = none
|
|
{% endif %}
|
|
use_stderr = true
|
|
# NOTE(dtantsur): the default md5 is not compatible with FIPS mode
|
|
hash_ring_algorithm = sha256
|
|
my_ip = {{ env.IRONIC_IP }}
|
|
host = {{ env.IRONIC_CONDUCTOR_HOST }}
|
|
|
|
# If a path to a certificate is defined, use that first for webserver
|
|
{% if env.WEBSERVER_CACERT_FILE %}
|
|
webserver_verify_ca = {{ env.WEBSERVER_CACERT_FILE }}
|
|
{% elif env.IRONIC_INSECURE == "true" %}
|
|
webserver_verify_ca = false
|
|
{% endif %}
|
|
|
|
isolinux_bin = /usr/share/syslinux/isolinux.bin
|
|
|
|
# NOTE(dtantsur): this path is specific to the GRUB image that is built into
|
|
# the ESP provided in [conductor]bootloader.
|
|
grub_config_path = EFI/BOOT/grub.cfg
|
|
|
|
[agent]
|
|
deploy_logs_collect = always
|
|
deploy_logs_local_path = /shared/log/ironic/deploy
|
|
# NOTE(dtantsur): in some environments temporary networking issues can cause
|
|
# the whole deployment to fail on inability to reach the ramdisk. Increasing
|
|
# retries here works around such problems without affecting the normal path.
|
|
# See https://bugzilla.redhat.com/show_bug.cgi?id=1822763
|
|
max_command_attempts = 30
|
|
|
|
[api]
|
|
{% if env.IRONIC_REVERSE_PROXY_SETUP == "true" %}
|
|
{% if env.IRONIC_PRIVATE_PORT == "unix" %}
|
|
unix_socket = /shared/ironic.sock
|
|
# NOTE(dtantsur): this is not ideal, but since the socket is accessed from
|
|
# another container, we need to make it world-writeable.
|
|
unix_socket_mode = 0666
|
|
{% else %}
|
|
host_ip = 127.0.0.1
|
|
port = {{ env.IRONIC_PRIVATE_PORT }}
|
|
{% endif %}
|
|
public_endpoint = {{ env.IRONIC_BASE_URL }}
|
|
{% else %}
|
|
host_ip = {% if env.LISTEN_ALL_INTERFACES | lower == "true" %}::{% else %}{{ env.IRONIC_IP }}{% endif %}
|
|
port = {{ env.IRONIC_LISTEN_PORT }}
|
|
{% if env.IRONIC_TLS_SETUP == "true" %}
|
|
enable_ssl_api = true
|
|
{% endif %}
|
|
{% endif %}
|
|
api_workers = {{ env.NUMWORKERS }}
|
|
|
|
# Disable schema validation so we can pass nmstate format
|
|
network_data_schema = /etc/ironic/network-data-schema-empty.json
|
|
|
|
[conductor]
|
|
automated_clean = {{ env.IRONIC_AUTOMATED_CLEAN }}
|
|
# NOTE(dtantsur): keep aligned with [pxe]boot_retry_timeout below.
|
|
deploy_callback_timeout = 4800
|
|
send_sensor_data = {{ env.SEND_SENSOR_DATA }}
|
|
# NOTE(TheJulia): Do not lower this value below 120 seconds.
|
|
# Power state is checked every 60 seconds and BMC activity should
|
|
# be avoided more often than once every sixty seconds.
|
|
send_sensor_data_interval = 160
|
|
bootloader = http://{{ env.IRONIC_URL_HOST }}:{{ env.HTTP_PORT }}/uefi_esp.img
|
|
verify_step_priority_override = management.clear_job_queue:90
|
|
# We don't use this feature, and it creates an additional load on the database
|
|
node_history = False
|
|
# Provide for a timeout longer than 60 seconds for certain vendor's hardware
|
|
power_state_change_timeout = 120
|
|
{% if env.IRONIC_DEFAULT_KERNEL is defined %}
|
|
deploy_kernel = file://{{ env.IRONIC_DEFAULT_KERNEL }}
|
|
{% endif %}
|
|
{% if env.IRONIC_DEFAULT_RAMDISK is defined %}
|
|
deploy_ramdisk = file://{{ env.IRONIC_DEFAULT_RAMDISK }}
|
|
{% endif %}
|
|
|
|
[database]
|
|
{% if env.IRONIC_USE_MARIADB | lower == "false" %}
|
|
connection = sqlite:////var/lib/ironic/ironic.sqlite
|
|
# Synchronous mode is required for data integrity in case of operating system
|
|
# crash. In our case we restart the container from scratch, so we can save some
|
|
# IO by not doing syncs all the time.
|
|
sqlite_synchronous = False
|
|
{% else %}
|
|
connection = {{ env.MARIADB_CONNECTION }}
|
|
{% endif %}
|
|
|
|
[deploy]
|
|
default_boot_option = local
|
|
erase_devices_metadata_priority = 10
|
|
erase_devices_priority = 0
|
|
http_root = /shared/html/
|
|
http_url = http://{{ env.IRONIC_URL_HOST }}:{{ env.HTTP_PORT }}
|
|
fast_track = {{ env.IRONIC_FAST_TRACK }}
|
|
{% if env.IRONIC_BOOT_ISO_SOURCE %}
|
|
ramdisk_image_download_source = {{ env.IRONIC_BOOT_ISO_SOURCE }}
|
|
{% endif %}
|
|
{% if env.IRONIC_EXTERNAL_HTTP_URL %}
|
|
external_http_url = {{ env.IRONIC_EXTERNAL_HTTP_URL }}
|
|
{% elif env.IRONIC_VMEDIA_TLS_SETUP == "true" %}
|
|
external_http_url = https://{{ env.IRONIC_URL_HOST }}:{{ env.VMEDIA_TLS_PORT }}
|
|
{% endif %}
|
|
{% if env.IRONIC_EXTERNAL_CALLBACK_URL %}
|
|
external_callback_url = {{ env.IRONIC_EXTERNAL_CALLBACK_URL }}
|
|
{% endif %}
|
|
|
|
[dhcp]
|
|
dhcp_provider = none
|
|
|
|
[inspector]
|
|
# NOTE(dtantsur): we properly configure the "unmanaged" inspection boot (i.e.
|
|
# booting IPA through a separate inspector.ipxe rather than the driver's boot
|
|
# interface), so managed boot is not required.
|
|
require_managed_boot = False
|
|
power_off = {{ false if env.IRONIC_FAST_TRACK == "true" else true }}
|
|
# NOTE(dtantsur): keep inspection arguments synchronized with inspector.ipxe
|
|
# Also keep in mind that only parameters unique for inspection go here.
|
|
# No need to duplicate pxe_append_params/kernel_append_params.
|
|
extra_kernel_params = ipa-inspection-collectors={{ env.IRONIC_IPA_COLLECTORS }} ipa-enable-vlan-interfaces={{ env.IRONIC_ENABLE_VLAN_INTERFACES }} ipa-inspection-dhcp-all-interfaces=1 ipa-collect-lldp=1
|
|
hooks = $default_hooks,parse-lldp
|
|
add_ports = all
|
|
keep_ports = present
|
|
|
|
[auto_discovery]
|
|
enabled = {{ env.IRONIC_ENABLE_DISCOVERY }}
|
|
driver = ipmi
|
|
|
|
[ipmi]
|
|
# use_ipmitool_retries transfers the responsibility of retrying to ipmitool
|
|
# when supported. If set to false, then ipmitool is called as follows :
|
|
# $ipmitool -R 1 -N 1 ...
|
|
# and Ironic handles the retry loop.
|
|
use_ipmitool_retries = false
|
|
# The following parameters are the defaults in Ironic. They are used in the
|
|
# following way if use_ipmitool_retries is set to true:
|
|
# $ipmitool -R <X> -N <Y> ...
|
|
# where :
|
|
# X = command_retry_timeout / min_command_interval
|
|
# Y = min_command_interval
|
|
# If use_ipmitool_retries is false, then ironic retries X times, with an
|
|
# interval of Y in between each tries.
|
|
min_command_interval = 5
|
|
command_retry_timeout = 60
|
|
# List of possible cipher suites versions that can be
|
|
# supported by the hardware in case the field `cipher_suite`
|
|
# is not set for the node. (list value)
|
|
cipher_suite_versions = 3,17
|
|
|
|
{% if env.IRONIC_EXPOSE_JSON_RPC | lower == "true" %}
|
|
[json_rpc]
|
|
# We assume that when we run API and conductor in the same container, they use
|
|
# authentication over localhost, using the same credentials as API, to prevent
|
|
# unauthenticated connections from other processes in the same host since the
|
|
# containers are in host networking.
|
|
auth_strategy = http_basic
|
|
http_basic_auth_user_file = /etc/ironic/htpasswd-rpc
|
|
host_ip = {% if env.LISTEN_ALL_INTERFACES | lower == "true" %}::{% else %}{{ env.IRONIC_IP }}{% endif %}
|
|
{% if env.IRONIC_TLS_SETUP == "true" %}
|
|
use_ssl = true
|
|
cafile = {{ env.IRONIC_CACERT_FILE }}
|
|
insecure = {{ env.IRONIC_INSECURE }}
|
|
{% endif %}
|
|
{% endif %}
|
|
|
|
[nova]
|
|
send_power_notifications = false
|
|
|
|
[oslo_messaging_notifications]
|
|
driver = prometheus_exporter
|
|
location = /shared/ironic_prometheus_exporter
|
|
transport_url = fake://
|
|
|
|
[pxe]
|
|
# NOTE(dtantsur): keep this value at least 3x lower than
|
|
# [conductor]deploy_callback_timeout so that at least some retries happen.
|
|
# The default settings enable 3 retries after 20 minutes each.
|
|
boot_retry_timeout = 1200
|
|
images_path = /shared/html/tmp
|
|
instance_master_path = /shared/html/master_images
|
|
tftp_master_path = /shared/tftpboot/master_images
|
|
tftp_root = /shared/tftpboot
|
|
kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }}
|
|
# This makes networking boot templates generated even for nodes using local
|
|
# boot (the default), ensuring that they boot correctly even if they start
|
|
# netbooting for some reason (e.g. with the noop management interface).
|
|
enable_netboot_fallback = true
|
|
# Enable the fallback path to in-band inspection
|
|
ipxe_fallback_script = inspector.ipxe
|
|
{% if env.IPXE_TLS_SETUP | lower == "true" %}
|
|
ipxe_config_template = /tmp/ipxe_config.template
|
|
{% endif %}
|
|
|
|
[redfish]
|
|
use_swift = false
|
|
kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }}
|
|
|
|
[ilo]
|
|
kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }}
|
|
use_web_server_for_images = true
|
|
|
|
[irmc]
|
|
kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }}
|
|
|
|
[service_catalog]
|
|
endpoint_override = {{ env.IRONIC_BASE_URL }}
|
|
|
|
{% if env.IRONIC_TLS_SETUP == "true" %}
|
|
[ssl]
|
|
cert_file = {{ env.IRONIC_CERT_FILE }}
|
|
key_file = {{ env.IRONIC_KEY_FILE }}
|
|
{% endif %}
|