2017-01-03 08:45:53 +00:00
|
|
|
[DEFAULT]
|
|
|
|
debug = {{ zun_logging_debug }}
|
2017-07-06 12:25:56 +02:00
|
|
|
|
|
|
|
{% if service_name == 'zun-api' %}
|
|
|
|
# Force zun-api.log or will use app.wsgi
|
|
|
|
log_file = /var/log/kolla/zun/zun-api.log
|
|
|
|
{% endif %}
|
|
|
|
|
2017-01-03 08:45:53 +00:00
|
|
|
log_dir = /var/log/kolla/zun
|
2017-05-29 18:14:06 -04:00
|
|
|
transport_url = {{ rpc_transport_url }}
|
2017-01-03 08:45:53 +00:00
|
|
|
|
2017-07-06 12:25:56 +02:00
|
|
|
state_path = /var/lib/zun
|
2020-02-23 17:36:46 +00:00
|
|
|
container_driver = docker
|
2020-02-17 16:45:33 +00:00
|
|
|
capsule_driver = cri
|
2017-04-12 16:28:33 +01:00
|
|
|
|
2017-06-13 14:39:26 +02:00
|
|
|
[network]
|
|
|
|
driver = kuryr
|
|
|
|
|
2017-04-12 16:28:33 +01:00
|
|
|
[api]
|
|
|
|
host_ip = {{ api_interface_address }}
|
|
|
|
port = {{ zun_api_port }}
|
|
|
|
workers = {{ openstack_service_workers }}
|
|
|
|
|
2017-01-03 08:45:53 +00:00
|
|
|
[database]
|
|
|
|
connection = mysql+pymysql://{{ zun_database_user }}:{{ zun_database_password }}@{{ zun_database_address }}/{{ zun_database_name }}
|
2020-09-22 17:52:36 +02:00
|
|
|
connection_recycle_time = {{ database_connection_recycle_time }}
|
|
|
|
max_pool_size = {{ database_max_pool_size }}
|
2017-01-03 08:45:53 +00:00
|
|
|
max_retries = -1
|
|
|
|
|
2019-08-18 12:22:20 +02:00
|
|
|
# NOTE(yoctozepto): despite what the docs say, both keystone_auth and
|
|
|
|
# keystone_authtoken sections are used and Zun internals may use either -
|
|
|
|
# - best keep them both in sync
|
2017-04-12 16:28:33 +01:00
|
|
|
[keystone_auth]
|
2019-08-18 12:22:20 +02:00
|
|
|
www_authenticate_uri = {{ keystone_internal_url }}
|
2018-12-18 13:36:18 -05:00
|
|
|
auth_url = {{ keystone_admin_url }}
|
2017-04-12 16:28:33 +01:00
|
|
|
auth_type = password
|
2017-06-30 14:24:23 +02:00
|
|
|
project_domain_id = {{ default_project_domain_id }}
|
|
|
|
user_domain_id = {{ default_user_domain_id }}
|
2017-04-12 16:28:33 +01:00
|
|
|
project_name = service
|
|
|
|
username = {{ zun_keystone_user }}
|
|
|
|
password = {{ zun_keystone_password }}
|
2019-08-18 12:22:20 +02:00
|
|
|
service_token_roles_required = True
|
|
|
|
region_name = {{ openstack_region_name }}
|
2020-04-03 14:49:08 +01:00
|
|
|
cafile = {{ openstack_cacert }}
|
2017-04-12 16:28:33 +01:00
|
|
|
|
2019-08-18 12:22:20 +02:00
|
|
|
{% if enable_memcached | bool %}
|
2017-04-12 16:28:33 +01:00
|
|
|
memcache_security_strategy = ENCRYPT
|
|
|
|
memcache_secret_key = {{ memcache_secret_key }}
|
2019-09-11 20:47:00 +02:00
|
|
|
memcached_servers = {% for host in groups['memcached'] %}{{ 'api' | kolla_address(host) | put_address_in_context('memcache') }}:{{ memcached_port }}{% if not loop.last %},{% endif %}{% endfor %}
|
2019-08-18 12:22:20 +02:00
|
|
|
{% endif %}
|
2017-04-12 16:28:33 +01:00
|
|
|
|
2019-08-18 12:22:20 +02:00
|
|
|
# NOTE(yoctozepto): despite what the docs say, both keystone_auth and
|
|
|
|
# keystone_authtoken sections are used and Zun internals may use either -
|
|
|
|
# - best keep them both in sync
|
2017-01-03 08:45:53 +00:00
|
|
|
[keystone_authtoken]
|
2018-12-18 13:36:18 -05:00
|
|
|
www_authenticate_uri = {{ keystone_internal_url }}
|
|
|
|
auth_url = {{ keystone_admin_url }}
|
2017-01-03 08:45:53 +00:00
|
|
|
auth_type = password
|
2017-06-30 14:24:23 +02:00
|
|
|
project_domain_id = {{ default_project_domain_id }}
|
|
|
|
user_domain_id = {{ default_user_domain_id }}
|
2017-01-03 08:45:53 +00:00
|
|
|
project_name = service
|
|
|
|
username = {{ zun_keystone_user }}
|
|
|
|
password = {{ zun_keystone_password }}
|
2017-04-12 16:28:33 +01:00
|
|
|
service_token_roles_required = True
|
2019-08-18 12:22:20 +02:00
|
|
|
region_name = {{ openstack_region_name }}
|
2020-04-03 14:49:08 +01:00
|
|
|
cafile = {{ openstack_cacert }}
|
2017-01-03 08:45:53 +00:00
|
|
|
|
2019-08-18 12:22:20 +02:00
|
|
|
{% if enable_memcached | bool %}
|
2017-01-03 08:45:53 +00:00
|
|
|
memcache_security_strategy = ENCRYPT
|
|
|
|
memcache_secret_key = {{ memcache_secret_key }}
|
2019-09-11 20:47:00 +02:00
|
|
|
memcached_servers = {% for host in groups['memcached'] %}{{ 'api' | kolla_address(host) | put_address_in_context('memcache') }}:{{ memcached_port }}{% if not loop.last %},{% endif %}{% endfor %}
|
2019-08-18 12:22:20 +02:00
|
|
|
{% endif %}
|
|
|
|
|
|
|
|
[zun_client]
|
|
|
|
region_name = {{ openstack_region_name }}
|
|
|
|
endpoint_type = internalURL
|
2020-06-26 11:16:08 -07:00
|
|
|
ca_file = {{ openstack_cacert }}
|
2017-04-12 16:28:33 +01:00
|
|
|
|
|
|
|
[glance_client]
|
|
|
|
region_name = {{ openstack_region_name }}
|
|
|
|
endpoint_type = internalURL
|
2020-06-26 11:16:08 -07:00
|
|
|
ca_file = {{ openstack_cacert }}
|
2017-04-10 15:31:41 +01:00
|
|
|
|
2017-06-13 14:39:26 +02:00
|
|
|
[neutron_client]
|
2019-08-18 12:22:20 +02:00
|
|
|
region_name = {{ openstack_region_name }}
|
|
|
|
endpoint_type = internalURL
|
2020-06-26 11:16:08 -07:00
|
|
|
ca_file = {{ openstack_cacert }}
|
2019-08-18 12:22:20 +02:00
|
|
|
|
|
|
|
[cinder_client]
|
2017-06-13 14:39:26 +02:00
|
|
|
region_name = {{ openstack_region_name }}
|
|
|
|
endpoint_type = internalURL
|
2020-06-26 11:16:08 -07:00
|
|
|
ca_file = {{ openstack_cacert }}
|
2017-06-13 14:39:26 +02:00
|
|
|
|
2019-10-20 19:33:56 +02:00
|
|
|
[placement_client]
|
|
|
|
region_name = {{ openstack_region_name }}
|
|
|
|
endpoint_type = internalURL
|
2020-06-26 11:16:08 -07:00
|
|
|
ca_file = {{ openstack_cacert }}
|
2019-10-20 19:33:56 +02:00
|
|
|
|
2017-06-13 14:39:26 +02:00
|
|
|
{% if enable_osprofiler | bool %}
|
2017-04-10 15:31:41 +01:00
|
|
|
[profiler]
|
|
|
|
enabled = true
|
|
|
|
trace_sqlalchemy = true
|
|
|
|
hmac_keys = {{ osprofiler_secret }}
|
2018-04-24 14:08:28 +08:00
|
|
|
connection_string = {{ osprofiler_backend_connection_string }}
|
2017-04-10 15:31:41 +01:00
|
|
|
{% endif %}
|
2018-01-14 07:32:51 +08:00
|
|
|
|
|
|
|
[oslo_concurrency]
|
|
|
|
lock_path = /var/lib/zun/tmp
|
2018-01-08 17:36:42 +07:00
|
|
|
|
|
|
|
{% if zun_policy_file is defined %}
|
|
|
|
[oslo_policy]
|
|
|
|
policy_file = {{ zun_policy_file }}
|
|
|
|
{% endif %}
|
2018-04-20 22:14:13 +08:00
|
|
|
|
2019-09-07 20:34:58 +00:00
|
|
|
[compute]
|
|
|
|
host_shared_with_nova = {{ inventory_hostname in groups['compute'] and enable_nova | bool and not enable_nova_fake | bool }}
|
|
|
|
|
2018-04-20 22:14:13 +08:00
|
|
|
[websocket_proxy]
|
|
|
|
wsproxy_host = {{ api_interface_address }}
|
|
|
|
wsproxy_port = {{ zun_wsproxy_port }}
|
2019-09-11 20:47:00 +02:00
|
|
|
base_url = ws://{{ kolla_external_fqdn | put_address_in_context('url') }}:{{ zun_wsproxy_port }}
|
2018-07-16 03:13:09 +00:00
|
|
|
|
|
|
|
[docker]
|
2019-09-11 20:47:00 +02:00
|
|
|
api_url = tcp://{{ api_interface_address | put_address_in_context('url') }}:2375
|
2019-08-23 19:38:18 +02:00
|
|
|
docker_remote_api_host = {{ api_interface_address }}
|
|
|
|
docker_remote_api_port = 2375
|
2020-02-17 16:45:33 +00:00
|
|
|
|
|
|
|
[cni_daemon]
|
|
|
|
cni_daemon_port = {{ zun_cni_daemon_port }}
|
2020-05-14 15:18:56 +01:00
|
|
|
|
|
|
|
{% if om_enable_rabbitmq_tls | bool %}
|
|
|
|
[oslo_messaging_rabbit]
|
|
|
|
ssl = true
|
|
|
|
ssl_ca_file = {{ om_rabbitmq_cacert }}
|
|
|
|
{% endif %}
|