
As with the rbd_provisioner deployment, cephfs_provisioner should only be deployed to the ceph namespace. This change just disables that deployment in the openstack namespace. Change-Id: Idfec8fbdd9408bd292d8770a3690b1b77de2b22d
590 lines
21 KiB
ReStructuredText
590 lines
21 KiB
ReStructuredText
=========
|
|
Multinode
|
|
=========
|
|
|
|
Overview
|
|
========
|
|
|
|
In order to drive towards a production-ready Openstack solution, our
|
|
goal is to provide containerized, yet stable `persistent
|
|
volumes <https://kubernetes.io/docs/concepts/storage/persistent-volumes/>`_
|
|
that Kubernetes can use to schedule applications that require state,
|
|
such as MariaDB (Galera). Although we assume that the project should
|
|
provide a “batteries included” approach towards persistent storage, we
|
|
want to allow operators to define their own solution as well. Examples
|
|
of this work will be documented in another section, however evidence of
|
|
this is found throughout the project. If you have any questions or
|
|
comments, please create an `issue
|
|
<https://bugs.launchpad.net/openstack-helm>`_.
|
|
|
|
.. note::
|
|
Please see the supported application versions outlined in the
|
|
`source variable file <https://github.com/openstack/openstack-helm/blob/master/tools/gate/vars.sh>`_.
|
|
|
|
Other versions and considerations (such as other CNI SDN providers),
|
|
config map data, and value overrides will be included in other
|
|
documentation as we explore these options further.
|
|
|
|
The installation procedures below, will take an administrator from a new
|
|
``kubeadm`` installation to Openstack-Helm deployment.
|
|
|
|
.. warning:: Until the Ubuntu kernel shipped with 16.04 supports CephFS
|
|
subvolume mounts by default the `HWE Kernel
|
|
<../troubleshooting/ubuntu-hwe-kernel.rst>`__ is required to use CephFS.
|
|
|
|
Kubernetes Preparation
|
|
======================
|
|
|
|
This walkthrough will help you set up a bare metal environment with 5
|
|
nodes, using ``kubeadm`` on Ubuntu 16.04. The assumption is that you
|
|
have a working ``kubeadm`` environment and that your environment is at a
|
|
working state, ***prior*** to deploying a CNI-SDN. This deployment
|
|
procedure is opinionated *only to standardize the deployment process for
|
|
users and developers*, and to limit questions to a known working
|
|
deployment. Instructions will expand as the project becomes more mature.
|
|
|
|
KubeADM Deployment
|
|
-----------------------
|
|
|
|
Once the dependencies are installed, bringing up a ``kubeadm`` environment
|
|
should just require a single command on the master node:
|
|
|
|
::
|
|
|
|
admin@kubenode01:~$ kubeadm init
|
|
|
|
|
|
If your environment looks like this after all nodes have joined the
|
|
cluster, you are ready to continue:
|
|
|
|
::
|
|
|
|
admin@kubenode01:~$ kubectl get pods -o wide --all-namespaces
|
|
NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE
|
|
kube-system dummy-2088944543-lg0vc 1/1 Running 1 5m 192.168.3.21 kubenode01
|
|
kube-system etcd-kubenode01 1/1 Running 1 5m 192.168.3.21 kubenode01
|
|
kube-system kube-apiserver-kubenode01 1/1 Running 3 5m 192.168.3.21 kubenode01
|
|
kube-system kube-controller-manager-kubenode01 1/1 Running 0 5m 192.168.3.21 kubenode01
|
|
kube-system kube-discovery-1769846148-8g4d7 1/1 Running 1 5m 192.168.3.21 kubenode01
|
|
kube-system kube-dns-2924299975-xxtrg 0/4 ContainerCreating 0 5m <none> kubenode01
|
|
kube-system kube-proxy-7kxpr 1/1 Running 0 5m 192.168.3.22 kubenode02
|
|
kube-system kube-proxy-b4xz3 1/1 Running 0 5m 192.168.3.24 kubenode04
|
|
kube-system kube-proxy-b62rp 1/1 Running 0 5m 192.168.3.23 kubenode03
|
|
kube-system kube-proxy-s1fpw 1/1 Running 1 5m 192.168.3.21 kubenode01
|
|
kube-system kube-proxy-thc4v 1/1 Running 0 5m 192.168.3.25 kubenode05
|
|
kube-system kube-scheduler-kubenode01 1/1 Running 1 5m 192.168.3.21 kubenode01
|
|
admin@kubenode01:~$
|
|
|
|
Deploying a CNI-Enabled SDN (Calico)
|
|
------------------------------------
|
|
|
|
After an initial ``kubeadmn`` deployment has been scheduled, it is time
|
|
to deploy a CNI-enabled SDN. We have selected **Calico**, but have also
|
|
confirmed that this works for Weave, and Romana. For Calico version
|
|
v2.6, you can apply the provided `Kubeadm Hosted
|
|
Install <https://docs.projectcalico.org/v2.6/getting-started/kubernetes/installation/hosted/kubeadm/>`_
|
|
manifest.
|
|
|
|
Enabling Cron Jobs
|
|
------------------
|
|
|
|
OpenStack-Helm's default Keystone token provider is `fernet
|
|
<https://docs.openstack.org/keystone/latest/admin/identity-fernet-token-faq.html>`_.
|
|
To provide sufficient security, keys used to generate fernet tokens need to be
|
|
rotated regularly. Keystone chart provides Cron Job for that task, but it is
|
|
only deployed when Cron Jobs API is enabled on Kubernetes cluster. To enable
|
|
Cron Jobs add ``--runtime-config=batch/v2alpha1=true`` to your kube-apiserver
|
|
startup arguments (e.g. in your
|
|
``/etc/kubernetes/manifests/kube-apiserver.yaml`` manifest). By default fernet
|
|
keys will be rotated weekly.
|
|
|
|
Please note that similar solution is used for keys used to encrypt credentials
|
|
saved by Keystone. Those keys are also rotated by another Cron Job. By default
|
|
it is run in a monthly manner.
|
|
|
|
Preparing Persistent Storage
|
|
----------------------------
|
|
|
|
Persistent storage is improving. Please check our current and/or
|
|
resolved
|
|
`issues <https://bugs.launchpad.net/openstack-helm?field.searchtext=ceph>`__
|
|
to find out how we're working with the community to improve persistent
|
|
storage for our project. For now, a few preparations need to be
|
|
completed.
|
|
|
|
Installing Ceph Host Requirements
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
You need to ensure that ``ceph-common`` or equivalent is installed on each of
|
|
our hosts. Using our Ubuntu example:
|
|
|
|
::
|
|
|
|
sudo apt-get install ceph-common
|
|
|
|
Kubernetes Node DNS Resolution
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
For each of the nodes to know how to reach Ceph endpoints, each host much also
|
|
have an entry for the ``kube-dns`` nameserver. That nameserver should be the
|
|
first one in ``/etc/resolv.conf``, followed by general-purpose nameservers.
|
|
A DNS search string such as the one below, along with the
|
|
``ndots:5`` option, will allow for OpenStack-Helm services to resolve one
|
|
another using short domain names. The ``timeout:1`` and ``attempts:1``
|
|
options will ensure that, as the nameservers are used in order, lookups move
|
|
to the next one quickly when the ``kube-dns`` service is unavailable
|
|
(e.g. when rebooting the node). Example:
|
|
|
|
::
|
|
|
|
admin@kubenode01:~$ cat /etc/resolv.conf
|
|
nameserver 10.96.0.10 # Kubernetes DNS Server
|
|
nameserver 8.8.8.8 # Upstream DNS Server
|
|
nameserver 8.8.4.4 # Upstream DNS Server
|
|
search openstack.svc.cluster.local svc.cluster.local cluster.local
|
|
options ndots:5 timeout:1 attempts:1
|
|
|
|
To do this you will first need to find out what the IP Address of your
|
|
``kube-dns`` deployment is:
|
|
|
|
::
|
|
|
|
admin@kubenode01:~$ kubectl get svc kube-dns --namespace=kube-system
|
|
NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE
|
|
kube-dns 10.96.0.10 <none> 53/UDP,53/TCP 1d
|
|
admin@kubenode01:~$
|
|
|
|
You may need to take extra steps to persist these settings across reboots.
|
|
Since we are using Ubuntu for our example, the nameservers and search entries
|
|
should go in ``/etc/network/interfaces`` (see ``man 8 resolvconf``),
|
|
and the ``options`` line should be placed in
|
|
``/etc/resolvconf/resolv.conf.d/base``.
|
|
|
|
Now we are ready to continue with the Openstack-Helm installation.
|
|
|
|
Openstack-Helm Preparation
|
|
==========================
|
|
|
|
Please ensure that you have verified and completed the steps above to
|
|
prevent issues with your deployment. Since our goal is to provide a
|
|
Kubernetes environment with reliable, persistent storage, we will
|
|
provide some helpful verification steps to ensure you are able to
|
|
proceed to the next step.
|
|
|
|
Although Ceph is mentioned throughout this guide, our deployment is
|
|
flexible to allow you the option of bringing any type of persistent
|
|
storage. Although most of these verification steps are the same, if not
|
|
very similar, we will use Ceph as our example throughout this guide.
|
|
|
|
Node Labels
|
|
-----------
|
|
|
|
First, we must label our nodes according to their role. Although we are
|
|
labeling ``all`` nodes, you are free to label only the nodes you wish.
|
|
You must have at least one, although a minimum of three are recommended.
|
|
In the case of Ceph, it is important to note that Ceph monitors
|
|
and OSDs are each deployed as a ``DaemonSet``. Be aware that
|
|
labeling an even number of monitor nodes can result in trouble
|
|
when trying to reach a quorum.
|
|
|
|
Nodes are labeled according to their Openstack roles:
|
|
|
|
* **Ceph MON Nodes:** ``ceph-mon``
|
|
* **Ceph OSD Nodes:** ``ceph-osd``
|
|
* **Ceph MDS Nodes:** ``ceph-mds``
|
|
* **Ceph RGW Nodes:** ``ceph-rgw``
|
|
* **Ceph MGR Nodes:** ``ceph-mgr``
|
|
* **Control Plane:** ``openstack-control-plane``
|
|
* **Compute Nodes:** ``openvswitch``, ``openstack-compute-node``
|
|
|
|
::
|
|
|
|
kubectl label nodes openstack-control-plane=enabled --all
|
|
kubectl label nodes ceph-mon=enabled --all
|
|
kubectl label nodes ceph-osd=enabled --all
|
|
kubectl label nodes ceph-mds=enabled --all
|
|
kubectl label nodes ceph-rgw=enabled --all
|
|
kubectl label nodes ceph-mgr=enabled --all
|
|
kubectl label nodes openvswitch=enabled --all
|
|
kubectl label nodes openstack-compute-node=enabled --all
|
|
|
|
Obtaining the Project
|
|
---------------------
|
|
|
|
Download the latest copy of Openstack-Helm:
|
|
|
|
::
|
|
|
|
git clone https://github.com/openstack/openstack-helm.git
|
|
cd openstack-helm
|
|
|
|
Ceph Preparation and Installation
|
|
---------------------------------
|
|
|
|
Ceph takes advantage of host networking. For Ceph to be aware of the
|
|
OSD cluster and public networks, you must set the CIDR ranges to be the
|
|
subnet range that your host machines are running on. In the example provided,
|
|
the host's subnet CIDR is ``10.26.0.0/26``, but you will need to replace this
|
|
to reflect your cluster. Export these variables to your deployment environment
|
|
by issuing the following commands:
|
|
|
|
::
|
|
|
|
export OSD_CLUSTER_NETWORK=10.26.0.0/26
|
|
export OSD_PUBLIC_NETWORK=10.26.0.0/26
|
|
|
|
Helm Preparation
|
|
----------------
|
|
|
|
Now we need to install and prepare Helm, the core of our project. Please
|
|
use the installation guide from the
|
|
`Kubernetes/Helm <https://github.com/kubernetes/helm/blob/master/docs/install.md#from-the-binary-releases>`__
|
|
repository. Please take note of our required versions above.
|
|
|
|
Once installed, and initiated (``helm init``), you will need your local
|
|
environment to serve helm charts for use. You can do this by:
|
|
|
|
::
|
|
|
|
helm serve &
|
|
helm repo add local http://localhost:8879/charts
|
|
|
|
Openstack-Helm Installation
|
|
===========================
|
|
|
|
Now we are ready to deploy, and verify our Openstack-Helm installation.
|
|
The first required is to build out the deployment secrets, lint and
|
|
package each of the charts for the project. Do this my running ``make``
|
|
in the ``openstack-helm`` directory:
|
|
|
|
::
|
|
|
|
make
|
|
|
|
.. note::
|
|
If you need to make any changes to the deployment, you may run
|
|
``make`` again, delete your helm-deployed chart, and redeploy
|
|
the chart (update). If you need to delete a chart for any reason,
|
|
do the following:
|
|
|
|
::
|
|
|
|
helm list
|
|
|
|
# NAME REVISION UPDATED STATUS CHART
|
|
# bootstrap 1 Fri Dec 23 13:37:35 2016 DEPLOYED bootstrap-0.2.0
|
|
# bootstrap-ceph 1 Fri Dec 23 14:27:51 2016 DEPLOYED bootstrap-0.2.0
|
|
# ceph 3 Fri Dec 23 14:18:49 2016 DEPLOYED ceph-0.2.0
|
|
# keystone 1 Fri Dec 23 16:40:56 2016 DEPLOYED keystone-0.2.0
|
|
# mariadb 1 Fri Dec 23 16:15:29 2016 DEPLOYED mariadb-0.2.0
|
|
# memcached 1 Fri Dec 23 16:39:15 2016 DEPLOYED memcached-0.2.0
|
|
# rabbitmq 1 Fri Dec 23 16:40:34 2016 DEPLOYED rabbitmq-0.2.0
|
|
|
|
helm delete --purge keystone
|
|
|
|
Please ensure that you use ``--purge`` whenever deleting a project. Please note that by default
|
|
this will not delete the database associated with the project. To enable the deletion of the
|
|
associated database when the chart is deleted the manifests.job_db_drop value should be set
|
|
to true when the chart is installed.
|
|
|
|
Ceph Installation and Verification
|
|
----------------------------------
|
|
|
|
Install the first service, which is Ceph. If all instructions have been
|
|
followed as mentioned above, this installation should go smoothly. It is at this
|
|
point you can also decide to enable keystone authentication for the RadosGW if
|
|
you wish to use ceph for tenant facing object storage. If you do not wish to do
|
|
this then you should set the value of ``CEPH_RGW_KEYSTONE_ENABLED=false`` before
|
|
running the following commands in the ``openstack-helm`` project folder:
|
|
|
|
::
|
|
|
|
: ${CEPH_RGW_KEYSTONE_ENABLED:="true"}
|
|
helm install --namespace=ceph ${WORK_DIR}/ceph --name=ceph \
|
|
--set endpoints.identity.namespace=openstack \
|
|
--set endpoints.object_store.namespace=ceph \
|
|
--set endpoints.ceph_mon.namespace=ceph \
|
|
--set ceph.rgw_keystone_auth=${CEPH_RGW_KEYSTONE_ENABLED} \
|
|
--set network.public=${OSD_PUBLIC_NETWORK} \
|
|
--set network.cluster=${OSD_CLUSTER_NETWORK} \
|
|
--set deployment.storage_secrets=true \
|
|
--set deployment.ceph=true \
|
|
--set deployment.rbd_provisioner=true \
|
|
--set deployment.cephfs_provisioner=true \
|
|
--set deployment.client_secrets=false \
|
|
--set deployment.rgw_keystone_user_and_endpoints=false \
|
|
--set bootstrap.enabled=true
|
|
|
|
After Ceph has deployed and all the pods are running, you can check the health
|
|
of your cluster by running:
|
|
|
|
::
|
|
|
|
MON_POD=$(kubectl get pods \
|
|
--namespace=ceph \
|
|
--selector="application=ceph" \
|
|
--selector="component=mon" \
|
|
--no-headers | awk '{ print $1; exit }')
|
|
kubectl exec -n ceph ${MON_POD} -- ceph -s
|
|
|
|
For more information on this, please see the section entitled `Ceph
|
|
Troubleshooting <../troubleshooting/persistent-storage.html>`__.
|
|
|
|
Activating Control-Plane Namespace for Ceph
|
|
-------------------------------------------
|
|
|
|
In order for Ceph to fulfill PersistentVolumeClaims within Kubernetes namespaces
|
|
outside of Ceph's namespace, a client keyring needs to be present within that
|
|
namespace. For the rest of the OpenStack and supporting core services, this guide
|
|
will be deploying the control plane to a seperate namespace ``openstack``. To
|
|
deploy the client keyring and ``ceph.conf`` to the ``openstack`` namespace:
|
|
|
|
::
|
|
|
|
: ${CEPH_RGW_KEYSTONE_ENABLED:="true"}
|
|
helm install --namespace=openstack ${WORK_DIR}/ceph --name=ceph-openstack-config \
|
|
--set endpoints.identity.namespace=openstack \
|
|
--set endpoints.object_store.namespace=ceph \
|
|
--set endpoints.ceph_mon.namespace=ceph \
|
|
--set ceph.rgw_keystone_auth=${CEPH_RGW_KEYSTONE_ENABLED} \
|
|
--set network.public=${OSD_PUBLIC_NETWORK} \
|
|
--set network.cluster=${OSD_CLUSTER_NETWORK} \
|
|
--set deployment.storage_secrets=false \
|
|
--set deployment.ceph=false \
|
|
--set deployment.rbd_provisioner=false \
|
|
--set deployment.cephfs_provisioner=false \
|
|
--set deployment.client_secrets=true \
|
|
--set deployment.rgw_keystone_user_and_endpoints=false
|
|
|
|
MariaDB Installation and Verification
|
|
-------------------------------------
|
|
|
|
To install MariaDB, issue the following command:
|
|
|
|
::
|
|
|
|
helm install --name=mariadb ./mariadb --namespace=openstack
|
|
|
|
Installation of Other Services
|
|
------------------------------
|
|
|
|
Now you can easily install the other services simply by going in order:
|
|
|
|
**Install Memcached/Etcd/RabbitMQ/Ingress/Libvirt/OpenVSwitch:**
|
|
|
|
::
|
|
|
|
helm install --name=memcached ./memcached --namespace=openstack
|
|
helm install --name=etcd-rabbitmq ./etcd --namespace=openstack
|
|
helm install --name=rabbitmq ./rabbitmq --namespace=openstack
|
|
helm install --name=ingress ./ingress --namespace=openstack
|
|
helm install --name=libvirt ./libvirt --namespace=openstack
|
|
helm install --name=openvswitch ./openvswitch --namespace=openstack
|
|
|
|
**Install Keystone:**
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack --name=keystone ./keystone \
|
|
--set pod.replicas.api=2
|
|
|
|
**Install RadosGW Object Storage:**
|
|
|
|
If you elected to install Ceph with Keystone support for the RadosGW you can
|
|
now create endpoints in the Keystone service catalog:
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack ${WORK_DIR}/ceph --name=radosgw-openstack \
|
|
--set endpoints.identity.namespace=openstack \
|
|
--set endpoints.object_store.namespace=ceph \
|
|
--set endpoints.ceph_mon.namespace=ceph \
|
|
--set ceph.rgw_keystone_auth=${CEPH_RGW_KEYSTONE_ENABLED} \
|
|
--set network.public=${OSD_PUBLIC_NETWORK} \
|
|
--set network.cluster=${OSD_CLUSTER_NETWORK} \
|
|
--set deployment.storage_secrets=false \
|
|
--set deployment.ceph=false \
|
|
--set deployment.rbd_provisioner=false \
|
|
--set deployment.client_secrets=false \
|
|
--set deployment.rgw_keystone_user_and_endpoints=true
|
|
|
|
**Install Horizon:**
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack --name=horizon ./horizon \
|
|
--set network.node_port.enabled=true
|
|
|
|
**Install Glance:**
|
|
|
|
Glance supports a number of backends:
|
|
|
|
* ``pvc``: A simple file based backend using Kubernetes PVCs
|
|
* ``rbd``: Uses Ceph RBD devices to store images.
|
|
* ``radosgw``: Uses Ceph RadosGW object storage to store images.
|
|
* ``swift``: Uses the ``object-storage`` service from the OpenStack service
|
|
catalog to store images.
|
|
|
|
You can deploy Glance with any of these backends if you deployed both the
|
|
RadosGW and created Keystone endpoints by changing the value for
|
|
``GLANCE_BACKEND`` in the following:
|
|
|
|
::
|
|
|
|
: ${GLANCE_BACKEND:="radosgw"}
|
|
helm install --namespace=openstack --name=glance ./glance \
|
|
--set pod.replicas.api=2 \
|
|
--set pod.replicas.registry=2 \
|
|
--set storage=${GLANCE_BACKEND}
|
|
|
|
**Install Heat:**
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack --name=heat ./heat
|
|
|
|
**Install Neutron:**
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack --name=neutron ./neutron \
|
|
--set pod.replicas.server=2
|
|
|
|
**Install Nova:**
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack --name=nova ./nova \
|
|
--set pod.replicas.api_metadata=2 \
|
|
--set pod.replicas.osapi=2 \
|
|
--set pod.replicas.conductor=2 \
|
|
--set pod.replicas.consoleauth=2 \
|
|
--set pod.replicas.scheduler=2 \
|
|
--set pod.replicas.novncproxy=2
|
|
|
|
**Install Cinder:**
|
|
|
|
::
|
|
|
|
helm install --namespace=openstack --name=cinder ./cinder \
|
|
--set pod.replicas.api=2
|
|
|
|
Final Checks
|
|
------------
|
|
|
|
Now you can run through your final checks. Wait for all services to come
|
|
up:
|
|
|
|
::
|
|
|
|
watch kubectl get all --namespace=openstack
|
|
|
|
Finally, you should now be able to access horizon at http:// using
|
|
admin/password
|
|
|
|
Node and label specific configurations
|
|
--------------------------------------
|
|
|
|
There are situations where we need to define configuration differently for
|
|
different nodes in the environment. For example, we may require that some nodes
|
|
have a different vcpu_pin_set or other hardware specific deltas in nova.conf.
|
|
|
|
To do this, we can specify overrides in the values fed to the chart. Ex:
|
|
|
|
.. code-block:: yaml
|
|
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "0-31"
|
|
cpu_allocation_ratio: 3.0
|
|
overrides:
|
|
nova_compute:
|
|
labels:
|
|
- label:
|
|
key: compute-type
|
|
values:
|
|
- "dpdk"
|
|
- "sriov"
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "0-15"
|
|
- label:
|
|
key: another-label
|
|
values:
|
|
- "another-value"
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "16-31"
|
|
hosts:
|
|
- name: host1.fqdn
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "8-15"
|
|
- name: host2.fqdn
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "16-23"
|
|
|
|
Note that only one set of overrides is applied per node, such that:
|
|
1. Host overrides supercede label overrides
|
|
2. The farther down the list the label appears, the greater precedence it has.
|
|
e.g., "another-label" overrides will apply to a node containing both labels.
|
|
|
|
Also note that other non-overridden values are inherited by hosts and labels with overrides.
|
|
The following shows a set of example hosts and the values fed into the configmap for each:
|
|
|
|
1. ``host1.fqdn`` with labels ``compute-type: dpdk, sriov`` and ``another-label: another-value``:
|
|
|
|
.. code-block:: yaml
|
|
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "8-15"
|
|
cpu_allocation_ratio: 3.0
|
|
|
|
2. ``host2.fqdn`` with labels ``compute-type: dpdk, sriov`` and ``another-label: another-value``:
|
|
|
|
.. code-block:: yaml
|
|
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "16-23"
|
|
cpu_allocation_ratio: 3.0
|
|
|
|
3. ``host3.fqdn`` with labels ``compute-type: dpdk, sriov`` and ``another-label: another-value``:
|
|
|
|
.. code-block:: yaml
|
|
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "16-31"
|
|
cpu_allocation_ratio: 3.0
|
|
|
|
4. ``host4.fqdn`` with labels ``compute-type: dpdk, sriov``:
|
|
|
|
.. code-block:: yaml
|
|
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "0-15"
|
|
cpu_allocation_ratio: 3.0
|
|
|
|
5. ``host5.fqdn`` with no labels:
|
|
|
|
.. code-block:: yaml
|
|
|
|
conf:
|
|
nova:
|
|
DEFAULT:
|
|
vcpu_pin_set: "0-31"
|
|
cpu_allocation_ratio: 3.0
|