Skip to content

Commit 93f5cc2

Browse files
authored
[OCPBUGS-3341] Add RHOSP CCM options reference documentation (#53068)
1 parent ff737b7 commit 93f5cc2

File tree

2 files changed

+330
-1
lines changed

2 files changed

+330
-1
lines changed

installing/installing_openstack/installing-openstack-cloud-config-reference.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,5 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
include::modules/nw-openstack-external-ccm.adoc[leveloffset=+1]
9+
include::modules/nw-openstack-external-ccm.adoc[leveloffset=+1]
10+
include::modules/cluster-cloud-controller-config-osp.adoc[leveloffset=+1]
Lines changed: 328 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,328 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_openstack/installing-openstack-cloud-config-reference.adoc
4+
5+
:_content-type: REFERENCE
6+
[id="cluster-cloud-controller-config_{context}"]
7+
= The OpenStack Cloud Controller Manager (CCM) config map
8+
9+
An OpenStack CCM config map defines how your cluster interacts with your {rh-openstack} cloud. By default, this configuration is stored under the `cloud.conf` key in the `cloud-conf` config map in the `openshift-cloud-controller-manager` namespace.
10+
11+
[IMPORTANT]
12+
====
13+
The `cloud-conf` config map is generated from the `cloud-provider-config` config map in the `openshift-config` namespace.
14+
15+
To change the settings that are described by the `cloud-conf` config map, modify the `cloud-provider-config` config map.
16+
17+
As part of this synchronization, the CCM Operator overrides some options. For more information, see "The {rh-openstack} Cloud Controller Manager".
18+
====
19+
20+
For example:
21+
22+
.An example `cloud-conf` config map
23+
[source,yaml]
24+
----
25+
apiVersion: v1
26+
data:
27+
cloud.conf: |
28+
[Global] <1>
29+
secret-name = openstack-credentials
30+
secret-namespace = kube-system
31+
region = regionOne
32+
[LoadBalancer]
33+
use-octavia = True
34+
kind: ConfigMap
35+
metadata:
36+
creationTimestamp: "2022-12-20T17:01:08Z"
37+
name: cloud-conf
38+
namespace: openshift-cloud-controller-manager
39+
resourceVersion: "2519"
40+
uid: cbbeedaf-41ed-41c2-9f37-4885732d3677
41+
----
42+
<1> Set global options by using a `clouds.yaml` file rather than modifying the config map.
43+
44+
The following options are present in the config map. Except when indicated otherwise, they are mandatory for clusters that run on {rh-openstack}.
45+
46+
// [id="ccm-config-global-options"]
47+
// == Global options
48+
49+
// The following options are used for {rh-openstack} CCM authentication with the {rh-openstack} Identity service, also known as Keystone. They are similiar to the global options that you can set by using the `openstack` CLI.
50+
51+
// |===
52+
// | Option | Description
53+
54+
// | `ca-file`
55+
// | Optional. The CA certificate bundle file for communication with the {rh-openstack} Identity service. If you use the HTTPS protocol with The Identity service URL, this option is required.
56+
57+
// | `cert-file`
58+
// | Optional. The client certificate path to use for client TLS authentication.
59+
60+
// | `key-file`
61+
// | Optional. The client private key path to use for client TLS authentication.
62+
63+
// | `region`
64+
// | The Identity service region name.
65+
66+
// | `trust-id`
67+
// | The Identity service trust ID. A trust represents the authorization of a user, or trustor, to delegate roles to another user, or trustee. Optionally, a trust authorizes the trustee to impersonate the trustor. You can find available trusts by querying the `/v3/OS-TRUST/trusts` endpoint of the Identity service API.
68+
69+
// | `trustee-id`
70+
// | The Identity service trustee user ID.
71+
72+
// | `trustee-password`
73+
// | The Identity service trustee user password.
74+
75+
// | `application-credential-id`
76+
// | The ID of an application credential to authenticate with. An `application-credential-secret` must be set along with this parameter.
77+
78+
// | `application-credential-name`
79+
// | The name of an application credential to authenticate with. If `application-credential-id` is not set, the user name and domain must be set.
80+
81+
// | `application-credential-secret`
82+
// | The secret of an application credential to authenticate with.
83+
84+
// | `tls-insecure`
85+
// | Whether or not to verify the server's TLS certificate. If set to `true`, the certificate is not verified. By default, the certificate is verified.
86+
// |===
87+
88+
89+
// [id="ccm-config-networking-options"]
90+
// == Networking options
91+
92+
// |===
93+
// | Option | Description
94+
95+
// | `ipv6-support-disabled`
96+
// | Whether or not IPv6 is supported as indicated by a boolean value. By default, this option is `false`.
97+
98+
// | `public-network-name`
99+
// | The name of an {rh-openstack} Networking service, or Neutron, external network. The CCM uses this option when retrieving the external IP address of a Kubernetes node. This value can contain multiple names. Specified networks are bitwise ORed. The default value is `""`.
100+
101+
// | `internal-network-name`
102+
// | The name of a Networking service internal network. The CCM uses this option when retrieving the internal IP address of a Kubernetes node. This value can contain multiple names. Specified networks are bitwise ORed. The default value is `""`.
103+
104+
// | `address-sort-order`
105+
// | This configuration key affects how the provider reports node addresses to Kubernetes node resources. The default order depends on the hard-coded order in which the provider queries addresses and what the cloud returns. A specific order is not guaranteed.
106+
107+
// To override this behavior, specify a comma-separated list of CIDR addresses. CCM sorts and groups all addresses that match the list in a prioritized manner, wherein the first retrieved item has a higher priority than the last. Addresses that do not match the list remain in their default order. The default value is `""`.
108+
109+
// This option can be useful if you have multiple or dual-stack interfaces attached to a node that need a user-controlled, deterministic way of sorting addresses.
110+
// |===
111+
112+
[id="ccm-config-lb-options"]
113+
== Load balancer options
114+
115+
CCM supports several load balancer options for deployments that use Octavia.
116+
117+
[NOTE]
118+
====
119+
Neutron-LBaaS support is deprecated.
120+
====
121+
122+
|===
123+
| Option | Description
124+
125+
| `enabled`
126+
| Whether or not to enable the `LoadBalancer` type of services integration. The default value is `true`.
127+
128+
// Always enforced.
129+
// | `use-octavia`
130+
// | Whether or not to use Octavia for the `LoadBalancer` type of service implementation rather than Neutron-LBaaS. The default value is `true`.
131+
132+
| `floating-network-id`
133+
| Optional. The external network used to create floating IP addresses for load balancer virtual IP addresses (VIPs). If there are multiple external networks in the cloud, this option must be set or the user must specify `loadbalancer.openstack.org/floating-network-id` in the service annotation.
134+
135+
| `floating-subnet-id`
136+
| Optional. The external network subnet used to create floating IP addresses for the load balancer VIP. Can be overridden by the service annotation `loadbalancer.openstack.org/floating-subnet-id`.
137+
138+
| `floating-subnet`
139+
| Optional. A name pattern (glob or regular expression if starting with `~`) for the external network subnet used to create floating IP addresses for the load balancer VIP. Can be overridden by the service annotation `loadbalancer.openstack.org/floating-subnet`. If multiple subnets match the pattern, the first one with available IP addresses is used.
140+
141+
| `floating-subnet-tags`
142+
| Optional. Tags for the external network subnet used to create floating IP addresses for the load balancer VIP. Can be overridden by the service annotation `loadbalancer.openstack.org/floating-subnet-tags`. If multiple subnets match these tags, the first one with available IP addresses is used.
143+
144+
If the {rh-openstack} network is configured with sharing disabled, for example, with the `--no-share` flag used during creation, this option is unsupported. Set the network to share to use this option.
145+
146+
| `lb-method`
147+
| The load balancing algorithm used to create the load balancer pool.
148+
For the Amphora provider the value can be `ROUND_ROBIN`, `LEAST_CONNECTIONS`, or `SOURCE_IP`. The default value is `ROUND_ROBIN`.
149+
150+
For the OVN provider, only the `SOURCE_IP_PORT` algorithm is supported.
151+
152+
For the Amphora provider, if using the `LEAST_CONNECTIONS` or `SOURCE_IP` methods, configure the `create-monitor` option as `true` in the `cloud-provider-config` config map on the `openshift-config` namespace and `ETP:Local` on the load-balancer type service to allow balancing algorithm enforcement in the client to service endpoint connections.
153+
154+
| `lb-provider`
155+
| Optional. Used to specify the provider of the load balancer, for example, `amphora` or `octavia`. Only the Amphora and Octavia providers are supported.
156+
157+
| `lb-version`
158+
| Optional. The load balancer API version. Only `"v2"` is supported.
159+
160+
| `subnet-id`
161+
| The ID of the Networking service subnet on which load balancer VIPs are created.
162+
163+
// This ID is also used to create pool members if `member-subnet-id` is not set.
164+
165+
// | `member-subnet-id`
166+
// | ID of the Neutron network on which to create the members of the load balancer. The load balancer gets another network port on this subnet. Defaults to `subnet-id` if not set.
167+
168+
| `network-id`
169+
| The ID of the Networking service network on which load balancer VIPs are created. Unnecessary if `subnet-id` is set.
170+
171+
// | `manage-security-groups`
172+
// | If the Neutron security groups should be managed separately. Default: false
173+
174+
| `create-monitor`
175+
| Whether or not to create a health monitor for the service load balancer. A health monitor is required for services that declare `externalTrafficPolicy: Local`. The default value is `false`.
176+
177+
This option is unsupported if you use {rh-openstack} earlier than version 17 with the `ovn` provider.
178+
179+
| `monitor-delay`
180+
| The interval in seconds by which probes are sent to members of the load balancer. The default value is `5`.
181+
182+
| `monitor-max-retries`
183+
| The number of successful checks that are required to change the operating status of a load balancer member to `ONLINE`. The valid range is `1` to `10`, and the default value is `1`.
184+
185+
| `monitor-timeout`
186+
| The time in seconds that a monitor waits to connect to the back end before it times out. The default value is `3`.
187+
188+
| `internal-lb`
189+
| Whether or not to create an internal load balancer without floating IP addresses. The default value is `false`.
190+
191+
// | `cascade-delete`
192+
// | Determines whether or not to perform cascade deletion of load balancers. Default: true.
193+
194+
// | `flavor-id`
195+
// | The id of the loadbalancer flavor to use. Uses octavia default if not set.
196+
197+
// | `availability-zone`
198+
// | The name of the loadbalancer availability zone to use. It is applicable if use-octavia is set to True and requires Octavia API version 2.14 or later (Ussuri release). The Octavia availability zone capabilities will not be used if it is not set. The parameter will be ignored if the Octavia version doesn't support availability zones yet.
199+
200+
| `LoadBalancerClass "ClassName"`
201+
a| This is a config section that comprises a set of options:
202+
203+
* `floating-network-id`
204+
* `floating-subnet-id`
205+
* `floating-subnet`
206+
* `floating-subnet-tags`
207+
* `network-id`
208+
* `subnet-id`
209+
210+
// * `member-subnet-id`
211+
212+
The behavior of these options is the same as that of the identically named options in the load balancer section of the CCM config file.
213+
214+
You can set the `ClassName` value by specifying the service annotation `loadbalancer.openstack.org/class`.
215+
216+
// | `enable-ingress-hostname`
217+
// | Used with proxy protocol (set by annotation `loadbalancer.openstack.org/proxy-protocol: "true"`) by adding a dns suffix (nip.io) to the load balancer IP address. Default false.
218+
219+
// This option is currently a workaround for the issue https://github.com/kubernetes/ingress-nginx/issues/3996, should be removed or refactored after the Kubernetes [KEP-1860](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1860-kube-proxy-IP-node-binding) is implemented.
220+
221+
// | `ingress-hostname-suffix`
222+
// | The dns suffix to the load balancer IP address when using proxy protocol. Default nip.io
223+
224+
// This option is currently a workaround for the issue https://github.com/kubernetes/ingress-nginx/issues/3996, should be removed or refactored after the Kubernetes [KEP-1860](https://github.com/kubernetes/enhancements/tree/master/keps/sig-network/1860-kube-proxy-IP-node-binding) is implemented.
225+
226+
// | `default-tls-container-ref`
227+
// | Reference to a tls container. This option works with Octavia, when this option is set then the cloud provider will create an Octavia Listener of type TERMINATED_HTTPS for a TLS Terminated loadbalancer.
228+
229+
// Format for tls container ref: `https://{keymanager_host}/v1/containers/{uuid}`
230+
// Check `container-store` parameter if you want to disable validation.
231+
232+
// | `container-store`
233+
// | Optional. Used to specify the store of the tls-container-ref, e.g. "barbican" or "external" - other store will cause a warning log. Default value - `barbican` - existence of tls container ref would always be performed. If set to `external` format for tls container ref will not be validated.
234+
235+
| `max-shared-lb`
236+
| The maximum number of services that can share a load balancer. The default value is `2`.
237+
|===
238+
239+
// [id="ccm-config-metadata-options"]
240+
// == Metadata options
241+
242+
// |===
243+
// | Option | Description
244+
245+
// | `search-order`
246+
// | This configuration key affects the way that the provider retrieves metadata that relates to the instances in which it runs. The default value of `configDrive,metadataService` results in the provider retrieving metadata that relates to the instance from, if available, the config drive first,and then the metadata service. Alternative values are:
247+
// * `configDrive`: Only retrieve instance metadata from the configuration drive.
248+
// * `metadataService`: Only retrieve instance metadata from the metadata service.
249+
// * `metadataService,configDrive`: Retrieve instance metadata from the metadata service first if available, and then retrieve instance metadata from the configuration drive.
250+
// |===
251+
252+
// ### Multi region support (alpha)
253+
254+
// | environment variable `OS_CCM_REGIONAL` is set to `true` - allow CCM to set ProviderID with region name `${ProviderName}://${REGION}/${instance-id}`. Default: false.
255+
256+
[id="cluster-cloud-controller-config-overrides"]
257+
== Options that the Operator overrides
258+
259+
The CCM Operator overrides the following options, which you might recognize from configuring {rh-openstack}. Do not configure them yourself. They are included in this document for informational purposes only.
260+
261+
|===
262+
| Option | Description
263+
264+
| `auth-url`
265+
| The {rh-openstack} Identity service URL. For example, `http://128.110.154.166/identity`.
266+
267+
| `os-endpoint-type`
268+
| The type of endpoint to use from the service catalog.
269+
270+
// If unset, public endpoints are used.
271+
272+
| `username`
273+
| The Identity service user name.
274+
275+
// Leave this option unset if you are using Identity service application credentials.
276+
277+
| `password`
278+
| The Identity service user password.
279+
280+
// Leave this option unset if you are using Identity service application credentials.
281+
282+
| `domain-id`
283+
| The Identity service user domain ID.
284+
285+
// Leave this option unset if you are using Identity service application credentials.
286+
287+
| `domain-name`
288+
| The Identity service user domain name.
289+
290+
// This option is not required if you set `domain-id`.
291+
292+
| `tenant-id`
293+
| The Identity service project ID. Leave this option unset if you are using Identity service application credentials.
294+
295+
In version 3 of the Identity API, which changed the identifier `tenant` to `project`, the value of `tenant-id` is automatically mapped to the project construct in the API.
296+
297+
| `tenant-name`
298+
| The Identity service project name.
299+
300+
| `tenant-domain-id`
301+
| The Identity service project domain ID.
302+
303+
| `tenant-domain-name`
304+
| The Identity service project domain name.
305+
306+
| `user-domain-id`
307+
| The Identity service user domain ID.
308+
309+
| `user-domain-name`
310+
| The Identity service user domain name.
311+
312+
| `use-clouds`
313+
a| Whether or not to fetch authorization credentials from a `clouds.yaml` file. Options set in this section are prioritized over values read from the `clouds.yaml` file.
314+
315+
CCM searches for the file in the following places:
316+
317+
. The value of the `clouds-file` option.
318+
. A file path stored in the environment variable `OS_CLIENT_CONFIG_FILE`.
319+
. The directory `pkg/openstack`.
320+
. The directory `~/.config/openstack`.
321+
. The directory `/etc/openstack`.
322+
323+
| `clouds-file`
324+
| The file path of a `clouds.yaml` file. It is used if the `use-clouds` option is set to `true`.
325+
326+
| `cloud`
327+
| The named cloud in the `clouds.yaml` file that you want to use. It is used if the `use-clouds` option is set to `true`.
328+
|===

0 commit comments

Comments
 (0)