1 # Copyright 2014 Red Hat, Inc.
4 # Licensed under the Apache License, Version 2.0 (the "License"); you may
5 # not use this file except in compliance with the License. You may obtain
6 # a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12 # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13 # License for the specific language governing permissions and limitations
16 if !str2bool(hiera('enable_package_install', 'false')) {
19 Package { provider => 'norpm' } # provided by tripleo-puppet
22 warning('enable_package_install option not supported.')
27 $enable_pacemaker = str2bool(hiera('enable_pacemaker'))
28 $enable_keepalived = !$enable_pacemaker
29 if $::hostname == downcase(hiera('bootstrap_nodeid')) {
30 $pacemaker_master = true
32 $pacemaker_master = false
35 if hiera('step') >= 1 {
37 $controller_node_ips = split(hiera('controller_node_ips'), ',')
39 class { '::tripleo::loadbalancer' :
40 controller_hosts => $controller_node_ips,
41 manage_vip => $enable_keepalived,
44 if $enable_pacemaker {
45 $pacemaker_cluster_members = regsubst(hiera('controller_node_ips'), ',', ' ', 'G')
49 class { '::pacemaker':
50 hacluster_pwd => hiera('hacluster_pwd'),
52 class { '::pacemaker::corosync':
53 cluster_members => $pacemaker_cluster_members,
54 setup_cluster => $pacemaker_master,
56 class { '::pacemaker::stonith':
59 if $pacemaker_master {
60 $control_vip = hiera('tripleo::loadbalancer::controller_virtual_ip')
61 pacemaker::resource::ip { 'control_vip':
62 ip_address => $control_vip,
64 $public_vip = hiera('tripleo::loadbalancer::public_virtual_ip')
65 pacemaker::resource::ip { 'public_vip':
66 ip_address => $public_vip,
68 pacemaker::resource::systemd { 'haproxy':
76 if hiera('step') >= 2 {
78 if count(hiera('ntp::servers')) > 0 {
83 if downcase(hiera('ceilometer_backend')) == 'mongodb' {
84 include ::mongodb::globals
85 include ::mongodb::server
86 $mongo_node_ips = split(hiera('mongo_node_ips'), ',')
87 $mongo_node_ips_with_port = suffix($mongo_node_ips, ':27017')
88 $mongo_node_string = join($mongo_node_ips_with_port, ',')
90 $mongodb_replset = hiera('mongodb::server::replset')
91 $ceilometer_mongodb_conn_string = "mongodb://${mongo_node_string}/ceilometer?replicaSet=${mongodb_replset}"
92 if downcase(hiera('bootstrap_nodeid')) == $::hostname {
93 mongodb_replset { $mongodb_replset :
94 members => $mongo_node_ips_with_port,
100 $redis_node_ips = split(hiera('redis_node_ips'), ',')
101 $redis_master_hostname = downcase(hiera('bootstrap_nodeid'))
103 if $redis_master_hostname == $::hostname {
106 $slaveof = "${redis_master_hostname} 6379"
112 if count($redis_node_ips) > 1 {
113 Class['::tripleo::redis_notification'] -> Service['redis-sentinel']
114 include ::redis::sentinel
115 class {'::tripleo::redis_notification' :
116 haproxy_monitor_ip => hiera('tripleo::loadbalancer::controller_virtual_ip'),
120 if str2bool(hiera('enable_galera', 'true')) {
121 $mysql_config_file = '/etc/my.cnf.d/galera.cnf'
123 $mysql_config_file = '/etc/my.cnf.d/server.cnf'
126 class { 'mysql::server':
127 config_file => $mysql_config_file,
128 override_options => {
130 'bind-address' => hiera('controller_host')
135 # FIXME: this should only occur on the bootstrap host (ditto for db syncs)
136 # Create all the database schemas
137 # Example DSN format: mysql://user:password@host/dbname
138 $allowed_hosts = ['%',hiera('controller_host')]
139 $keystone_dsn = split(hiera('keystone::database_connection'), '[@:/?]')
140 class { 'keystone::db::mysql':
141 user => $keystone_dsn[3],
142 password => $keystone_dsn[4],
143 host => $keystone_dsn[5],
144 dbname => $keystone_dsn[6],
145 allowed_hosts => $allowed_hosts,
147 $glance_dsn = split(hiera('glance::api::database_connection'), '[@:/?]')
148 class { 'glance::db::mysql':
149 user => $glance_dsn[3],
150 password => $glance_dsn[4],
151 host => $glance_dsn[5],
152 dbname => $glance_dsn[6],
153 allowed_hosts => $allowed_hosts,
155 $nova_dsn = split(hiera('nova::database_connection'), '[@:/?]')
156 class { 'nova::db::mysql':
157 user => $nova_dsn[3],
158 password => $nova_dsn[4],
159 host => $nova_dsn[5],
160 dbname => $nova_dsn[6],
161 allowed_hosts => $allowed_hosts,
163 $neutron_dsn = split(hiera('neutron::server::database_connection'), '[@:/?]')
164 class { 'neutron::db::mysql':
165 user => $neutron_dsn[3],
166 password => $neutron_dsn[4],
167 host => $neutron_dsn[5],
168 dbname => $neutron_dsn[6],
169 allowed_hosts => $allowed_hosts,
171 $cinder_dsn = split(hiera('cinder::database_connection'), '[@:/?]')
172 class { 'cinder::db::mysql':
173 user => $cinder_dsn[3],
174 password => $cinder_dsn[4],
175 host => $cinder_dsn[5],
176 dbname => $cinder_dsn[6],
177 allowed_hosts => $allowed_hosts,
179 $heat_dsn = split(hiera('heat::database_connection'), '[@:/?]')
180 class { 'heat::db::mysql':
181 user => $heat_dsn[3],
182 password => $heat_dsn[4],
183 host => $heat_dsn[5],
184 dbname => $heat_dsn[6],
185 allowed_hosts => $allowed_hosts,
187 if downcase(hiera('ceilometer_backend')) == 'mysql' {
188 $ceilometer_dsn = split(hiera('ceilometer_mysql_conn_string'), '[@:/?]')
189 class { 'ceilometer::db::mysql':
190 user => $ceilometer_dsn[3],
191 password => $ceilometer_dsn[4],
192 host => $ceilometer_dsn[5],
193 dbname => $ceilometer_dsn[6],
194 allowed_hosts => $allowed_hosts,
198 if $enable_pacemaker {
199 # the module ignores erlang_cookie if cluster_config is false
200 file { '/var/lib/rabbitmq/.erlang.cookie':
205 content => hiera('rabbitmq::erlang_cookie'),
208 class { '::rabbitmq':
209 service_manage => false,
210 environment_variables => {
211 'RABBITMQ_NODENAME' => "rabbit@$::hostname",
214 if $pacemaker_master {
215 pacemaker::resource::ocf { 'rabbitmq':
216 resource_name => 'heartbeat:rabbitmq-cluster',
217 options => 'set_policy=\'ha-all ^(?!amq\.).* {"ha-mode":"all"}\'',
219 require => Class['::rabbitmq'],
223 $rabbit_nodes = split(hiera('rabbit_node_ips'), ',')
224 if count($rabbit_nodes) > 1 {
225 class { '::rabbitmq':
226 config_cluster => true,
227 cluster_nodes => $rabbit_nodes,
229 rabbitmq_policy { 'ha-all@/':
230 pattern => '^(?!amq\.).*',
240 # pre-install swift here so we can build rings
243 $cinder_enable_rbd_backend = hiera('cinder_enable_rbd_backend', false)
244 $enable_ceph = $cinder_enable_rbd_backend
247 class { 'ceph::profile::params':
248 mon_initial_members => downcase(hiera('ceph_mon_initial_members'))
250 include ::ceph::profile::mon
253 if str2bool(hiera('enable_ceph_storage', 'false')) {
254 include ::ceph::profile::client
255 include ::ceph::profile::osd
260 if hiera('step') >= 3 {
264 #TODO: need a cleanup-keystone-tokens.sh solution here
266 'ec2/driver': value => 'keystone.contrib.ec2.backends.sql.Ec2';
268 file { [ '/etc/keystone/ssl', '/etc/keystone/ssl/certs', '/etc/keystone/ssl/private' ]:
269 ensure => 'directory',
272 require => Package['keystone'],
274 file { '/etc/keystone/ssl/certs/signing_cert.pem':
275 content => hiera('keystone_signing_certificate'),
278 notify => Service['keystone'],
279 require => File['/etc/keystone/ssl/certs'],
281 file { '/etc/keystone/ssl/private/signing_key.pem':
282 content => hiera('keystone_signing_key'),
285 notify => Service['keystone'],
286 require => File['/etc/keystone/ssl/private'],
288 file { '/etc/keystone/ssl/certs/ca.pem':
289 content => hiera('keystone_ca_certificate'),
292 notify => Service['keystone'],
293 require => File['/etc/keystone/ssl/certs'],
296 # TODO: notifications, scrubber, etc.
298 include ::glance::api
299 include ::glance::registry
300 include ::glance::backend::swift
303 glance_api_servers => join([hiera('glance_protocol'), '://', hiera('controller_virtual_ip'), ':', hiera('glance_port')]),
308 include ::nova::conductor
309 include ::nova::consoleauth
310 include ::nova::network::neutron
311 include ::nova::vncproxy
312 include ::nova::scheduler
315 include ::neutron::server
316 include ::neutron::agents::dhcp
317 include ::neutron::agents::l3
319 file { '/etc/neutron/dnsmasq-neutron.conf':
320 content => hiera('neutron_dnsmasq_options'),
323 notify => Service['neutron-dhcp-service'],
324 require => Package['neutron'],
327 class { 'neutron::plugins::ml2':
328 flat_networks => split(hiera('neutron_flat_networks'), ','),
329 tenant_network_types => [hiera('neutron_tenant_network_type')],
330 type_drivers => [hiera('neutron_tenant_network_type')],
333 class { 'neutron::agents::ml2::ovs':
334 bridge_mappings => split(hiera('neutron_bridge_mappings'), ','),
335 tunnel_types => split(hiera('neutron_tunnel_types'), ','),
338 class { 'neutron::agents::metadata':
339 auth_url => join(['http://', hiera('controller_virtual_ip'), ':35357/v2.0']),
342 Service['neutron-server'] -> Service['neutron-dhcp-service']
343 Service['neutron-server'] -> Service['neutron-l3']
344 Service['neutron-server'] -> Service['neutron-ovs-agent-service']
345 Service['neutron-server'] -> Service['neutron-metadata']
348 include ::cinder::api
349 include ::cinder::glance
350 include ::cinder::scheduler
351 include ::cinder::volume
352 class {'cinder::setup_test_volume':
353 size => join([hiera('cinder_lvm_loop_device_size'), 'M']),
356 $cinder_enable_iscsi = hiera('cinder_enable_iscsi_backend', true)
357 if $cinder_enable_iscsi {
358 $cinder_iscsi_backend = 'tripleo_iscsi'
360 cinder::backend::iscsi { $cinder_iscsi_backend :
361 iscsi_ip_address => hiera('cinder_iscsi_ip_address'),
362 iscsi_helper => hiera('cinder_iscsi_helper'),
369 pg_num => hiera('ceph::profile::params::osd_pool_default_pg_num'),
370 pgp_num => hiera('ceph::profile::params::osd_pool_default_pgp_num'),
371 size => hiera('ceph::profile::params::osd_pool_default_size'),
374 $ceph_pools = hiera('ceph_pools')
375 ceph::pool { $ceph_pools : }
378 if $cinder_enable_rbd_backend {
379 $cinder_rbd_backend = 'tripleo_ceph'
382 "${cinder_rbd_backend}/host": value => 'hostgroup';
385 cinder::backend::rbd { $cinder_rbd_backend :
386 rbd_pool => 'volumes',
387 rbd_user => 'openstack',
388 rbd_secret_uuid => hiera('ceph::profile::params::fsid'),
389 require => Ceph::Pool['volumes'],
393 $cinder_enabled_backends = delete_undef_values([$cinder_iscsi_backend, $cinder_rbd_backend])
394 class { '::cinder::backends' :
395 enabled_backends => $cinder_enabled_backends,
400 include ::swift::proxy
401 include ::swift::proxy::proxy_logging
402 include ::swift::proxy::healthcheck
403 include ::swift::proxy::cache
404 include ::swift::proxy::keystone
405 include ::swift::proxy::authtoken
406 include ::swift::proxy::staticweb
407 include ::swift::proxy::ceilometer
408 include ::swift::proxy::ratelimit
409 include ::swift::proxy::catch_errors
410 include ::swift::proxy::tempurl
411 include ::swift::proxy::formpost
414 if str2bool(hiera('enable_swift_storage', 'true')) {
415 class {'swift::storage::all':
416 mount_check => str2bool(hiera('swift_mount_check'))
418 if(!defined(File['/srv/node'])) {
423 require => Package['openstack-swift'],
426 $swift_components = ['account', 'container', 'object']
427 swift::storage::filter::recon { $swift_components : }
428 swift::storage::filter::healthcheck { $swift_components : }
432 $ceilometer_backend = downcase(hiera('ceilometer_backend'))
433 case $ceilometer_backend {
435 $ceilometer_database_connection = hiera('ceilometer_mysql_conn_string')
438 $ceilometer_database_connection = $ceilometer_mongodb_conn_string
442 include ::ceilometer::api
443 include ::ceilometer::agent::notification
444 include ::ceilometer::agent::central
445 include ::ceilometer::alarm::notifier
446 include ::ceilometer::alarm::evaluator
447 include ::ceilometer::expirer
448 include ::ceilometer::collector
449 class { '::ceilometer::db' :
450 database_connection => $ceilometer_database_connection,
452 class { 'ceilometer::agent::auth':
453 auth_url => join(['http://', hiera('controller_virtual_ip'), ':5000/v2.0']),
456 Cron <| title == 'ceilometer-expirer' |> { command => "sleep $((\$(od -A n -t d -N 3 /dev/urandom) % 86400)) && ${::ceilometer::params::expirer_command}" }
461 include ::heat::api_cfn
462 include ::heat::api_cloudwatch
463 include ::heat::engine
465 $snmpd_user = hiera('snmpd_readonly_user_name')
466 snmp::snmpv3_user { $snmpd_user:
468 authpass => hiera('snmpd_readonly_user_password'),
471 agentaddress => ['udp:161','udp6:[::1]:161'],
472 snmpd_config => [ join(['rouser ', hiera('snmpd_readonly_user_name')]), 'proc cron', 'includeAllDisks 10%', 'master agentx', 'trapsink localhost public', 'iquerySecName internalUser', 'rouser internalUser', 'defaultMonitors yes', 'linkUpDownNotifications yes' ],