[DEFAULT] auth_strategy = noauth debug = true default_deploy_interface = direct default_inspect_interface = agent default_network_interface = noop enabled_bios_interfaces = no-bios,redfish,idrac-redfish,irmc,ilo enabled_boot_interfaces = ipxe,ilo-ipxe,pxe,ilo-pxe,fake,redfish-virtual-media,idrac-redfish-virtual-media,ilo-virtual-media,redfish-https enabled_deploy_interfaces = direct,fake,ramdisk,custom-agent enabled_firmware_interfaces = no-firmware,fake,redfish # NOTE(dtantsur): when changing this, make sure to update the driver # dependencies in Dockerfile. enabled_hardware_types = ipmi,idrac,irmc,fake-hardware,redfish,manual-management,ilo,ilo5 enabled_inspect_interfaces = agent,irmc,fake,redfish,ilo enabled_management_interfaces = ipmitool,irmc,fake,redfish,idrac-redfish,ilo,ilo5,noop enabled_network_interfaces = noop enabled_power_interfaces = ipmitool,irmc,fake,redfish,idrac-redfish,ilo enabled_raid_interfaces = no-raid,irmc,agent,fake,redfish,idrac-redfish,ilo5 enabled_vendor_interfaces = no-vendor,ipmitool,idrac-redfish,redfish,ilo,fake {% if env.IRONIC_EXPOSE_JSON_RPC | lower == "true" %} rpc_transport = json-rpc {% else %} rpc_transport = none {% endif %} use_stderr = true # NOTE(dtantsur): the default md5 is not compatible with FIPS mode hash_ring_algorithm = sha256 my_ip = {{ env.IRONIC_IP }} host = {{ env.IRONIC_CONDUCTOR_HOST }} # If a path to a certificate is defined, use that first for webserver {% if env.WEBSERVER_CACERT_FILE %} webserver_verify_ca = {{ env.WEBSERVER_CACERT_FILE }} {% elif env.IRONIC_INSECURE == "true" %} webserver_verify_ca = false {% endif %} isolinux_bin = /usr/share/syslinux/isolinux.bin # NOTE(dtantsur): this path is specific to the GRUB image that is built into # the ESP provided in [conductor]bootloader. grub_config_path = EFI/BOOT/grub.cfg [agent] deploy_logs_collect = always deploy_logs_local_path = /shared/log/ironic/deploy # NOTE(dtantsur): in some environments temporary networking issues can cause # the whole deployment to fail on inability to reach the ramdisk. Increasing # retries here works around such problems without affecting the normal path. # See https://bugzilla.redhat.com/show_bug.cgi?id=1822763 max_command_attempts = 30 [api] {% if env.IRONIC_REVERSE_PROXY_SETUP == "true" %} {% if env.IRONIC_PRIVATE_PORT == "unix" %} unix_socket = /shared/ironic.sock # NOTE(dtantsur): this is not ideal, but since the socket is accessed from # another container, we need to make it world-writeable. unix_socket_mode = 0666 {% else %} host_ip = 127.0.0.1 port = {{ env.IRONIC_PRIVATE_PORT }} {% endif %} public_endpoint = {{ env.IRONIC_BASE_URL }} {% else %} host_ip = {% if env.LISTEN_ALL_INTERFACES | lower == "true" %}::{% else %}{{ env.IRONIC_IP }}{% endif %} port = {{ env.IRONIC_LISTEN_PORT }} {% if env.IRONIC_TLS_SETUP == "true" %} enable_ssl_api = true {% endif %} {% endif %} api_workers = {{ env.NUMWORKERS }} # Disable schema validation so we can pass nmstate format network_data_schema = /etc/ironic/network-data-schema-empty.json [conductor] automated_clean = {{ env.IRONIC_AUTOMATED_CLEAN }} # NOTE(dtantsur): keep aligned with [pxe]boot_retry_timeout below. deploy_callback_timeout = 4800 send_sensor_data = {{ env.SEND_SENSOR_DATA }} # NOTE(TheJulia): Do not lower this value below 120 seconds. # Power state is checked every 60 seconds and BMC activity should # be avoided more often than once every sixty seconds. send_sensor_data_interval = 160 bootloader = http://{{ env.IRONIC_URL_HOST }}:{{ env.HTTP_PORT }}/uefi_esp.img verify_step_priority_override = management.clear_job_queue:90 # We don't use this feature, and it creates an additional load on the database node_history = False # Provide for a timeout longer than 60 seconds for certain vendor's hardware power_state_change_timeout = 120 {% if env.IRONIC_DEFAULT_KERNEL is defined %} deploy_kernel = file://{{ env.IRONIC_DEFAULT_KERNEL }} {% endif %} {% if env.IRONIC_DEFAULT_RAMDISK is defined %} deploy_ramdisk = file://{{ env.IRONIC_DEFAULT_RAMDISK }} {% endif %} [database] {% if env.IRONIC_USE_MARIADB | lower == "false" %} connection = sqlite:////var/lib/ironic/ironic.sqlite # Synchronous mode is required for data integrity in case of operating system # crash. In our case we restart the container from scratch, so we can save some # IO by not doing syncs all the time. sqlite_synchronous = False {% else %} connection = {{ env.MARIADB_CONNECTION }} {% endif %} [deploy] default_boot_option = local erase_devices_metadata_priority = 10 erase_devices_priority = 0 http_root = /shared/html/ http_url = http://{{ env.IRONIC_URL_HOST }}:{{ env.HTTP_PORT }} fast_track = {{ env.IRONIC_FAST_TRACK }} {% if env.IRONIC_BOOT_ISO_SOURCE %} ramdisk_image_download_source = {{ env.IRONIC_BOOT_ISO_SOURCE }} {% endif %} {% if env.IRONIC_EXTERNAL_HTTP_URL %} external_http_url = {{ env.IRONIC_EXTERNAL_HTTP_URL }} {% elif env.IRONIC_VMEDIA_TLS_SETUP == "true" %} external_http_url = https://{{ env.IRONIC_URL_HOST }}:{{ env.VMEDIA_TLS_PORT }} {% endif %} {% if env.IRONIC_EXTERNAL_CALLBACK_URL %} external_callback_url = {{ env.IRONIC_EXTERNAL_CALLBACK_URL }} {% endif %} [dhcp] dhcp_provider = none [inspector] # NOTE(dtantsur): we properly configure the "unmanaged" inspection boot (i.e. # booting IPA through a separate inspector.ipxe rather than the driver's boot # interface), so managed boot is not required. require_managed_boot = False power_off = {{ false if env.IRONIC_FAST_TRACK == "true" else true }} # NOTE(dtantsur): keep inspection arguments synchronized with inspector.ipxe # Also keep in mind that only parameters unique for inspection go here. # No need to duplicate pxe_append_params/kernel_append_params. extra_kernel_params = ipa-inspection-collectors={{ env.IRONIC_IPA_COLLECTORS }} ipa-enable-vlan-interfaces={{ env.IRONIC_ENABLE_VLAN_INTERFACES }} ipa-inspection-dhcp-all-interfaces=1 ipa-collect-lldp=1 hooks = $default_hooks,parse-lldp add_ports = all keep_ports = present [auto_discovery] enabled = {{ env.IRONIC_ENABLE_DISCOVERY }} driver = ipmi [ipmi] # use_ipmitool_retries transfers the responsibility of retrying to ipmitool # when supported. If set to false, then ipmitool is called as follows : # $ipmitool -R 1 -N 1 ... # and Ironic handles the retry loop. use_ipmitool_retries = false # The following parameters are the defaults in Ironic. They are used in the # following way if use_ipmitool_retries is set to true: # $ipmitool -R -N ... # where : # X = command_retry_timeout / min_command_interval # Y = min_command_interval # If use_ipmitool_retries is false, then ironic retries X times, with an # interval of Y in between each tries. min_command_interval = 5 command_retry_timeout = 60 # List of possible cipher suites versions that can be # supported by the hardware in case the field `cipher_suite` # is not set for the node. (list value) cipher_suite_versions = 3,17 {% if env.IRONIC_EXPOSE_JSON_RPC | lower == "true" %} [json_rpc] # We assume that when we run API and conductor in the same container, they use # authentication over localhost, using the same credentials as API, to prevent # unauthenticated connections from other processes in the same host since the # containers are in host networking. auth_strategy = http_basic http_basic_auth_user_file = /etc/ironic/htpasswd-rpc host_ip = {% if env.LISTEN_ALL_INTERFACES | lower == "true" %}::{% else %}{{ env.IRONIC_IP }}{% endif %} {% if env.IRONIC_TLS_SETUP == "true" %} use_ssl = true cafile = {{ env.IRONIC_CACERT_FILE }} insecure = {{ env.IRONIC_INSECURE }} {% endif %} {% endif %} [nova] send_power_notifications = false [oslo_messaging_notifications] driver = prometheus_exporter location = /shared/ironic_prometheus_exporter transport_url = fake:// [pxe] # NOTE(dtantsur): keep this value at least 3x lower than # [conductor]deploy_callback_timeout so that at least some retries happen. # The default settings enable 3 retries after 20 minutes each. boot_retry_timeout = 1200 images_path = /shared/html/tmp instance_master_path = /shared/html/master_images tftp_master_path = /shared/tftpboot/master_images tftp_root = /shared/tftpboot kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }} # This makes networking boot templates generated even for nodes using local # boot (the default), ensuring that they boot correctly even if they start # netbooting for some reason (e.g. with the noop management interface). enable_netboot_fallback = true # Enable the fallback path to in-band inspection ipxe_fallback_script = inspector.ipxe {% if env.IPXE_TLS_SETUP | lower == "true" %} ipxe_config_template = /tmp/ipxe_config.template {% endif %} [redfish] use_swift = false kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }} [ilo] kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }} use_web_server_for_images = true [irmc] kernel_append_params = nofb nomodeset vga=normal ipa-insecure={{ env.IPA_INSECURE }} {% if env.ENABLE_FIPS_IPA %}fips={{ env.ENABLE_FIPS_IPA|trim }}{% endif %} {% if env.IRONIC_RAMDISK_SSH_KEY %}sshkey="{{ env.IRONIC_RAMDISK_SSH_KEY|trim }}"{% endif %} {{ env.IRONIC_KERNEL_PARAMS|trim }} systemd.journald.forward_to_console=yes net.ifnames={{ '0' if env.PREDICTABLE_NIC_NAMES == 'false' else '1' }} [service_catalog] endpoint_override = {{ env.IRONIC_BASE_URL }} {% if env.IRONIC_TLS_SETUP == "true" %} [ssl] cert_file = {{ env.IRONIC_CERT_FILE }} key_file = {{ env.IRONIC_KEY_FILE }} {% endif %}