Chapter 3. Integrating with an existing Red Hat Ceph Storage cluster
Use the procedures and information in this section to integrate Red Hat OpenStack Platform (RHOSP) with an existing Red Hat Ceph Storage cluster. You can create custom environment files to override and provide values for configuration options within OpenStack components.
3.1. Creating a custom environment file
Director supplies parameters to tripleo-ansible
to integrate with an external Red Hat Ceph Storage cluster through the environment file:
-
/usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml
If you deploy the Shared File Systems service (manila) with external CephFS, separate environment files supply additional parameters.
-
For native CephFS, the environment file is
/usr/share/openstack-tripleo-heat-templates/environments/manila-cephfsnative-config.yaml
. -
For CephFS through NFS, the environment file is
/usr/share/openstack-tripleo-heat-templates/environments/manila-cephfsganesha-config.yaml
.
To configure integration of an existing Ceph Storage cluster with the overcloud, you must supply the details of your Ceph Storage cluster to director by using a custom environment file. Director invokes these environment files during deployment.
Procedure
Create a custom environment file:
/home/stack/templates/ceph-config.yaml
Add a
parameter_defaults:
section to the file:parameter_defaults:
Use
parameter_defaults
to set all of the parameters that you want to override in/usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml
. You must set the following parameters at a minimum:-
CephClientKey
: The Ceph client key for theclient.openstack
user in your Ceph Storage cluster. This is the value ofkey
that you retrieved in Configuring the existing Ceph Storage cluster. For example,AQDLOh1VgEp6FRAAFzT7Zw+Y9V6JJExQAsRnRQ==
. -
CephClusterFSID
: The file system ID of your Ceph Storage cluster. This is the value offsid
in your Ceph Storage cluster configuration file, which you retrieved in Configuring the existing Ceph Storage cluster. For example,4b5c8c0a-ff60-454b-a1b4-9747aa737d19
. CephExternalMonHost
: A comma-delimited list of the IPs of all MON hosts in your Ceph Storage cluster, for example,172.16.1.7, 172.16.1.8
.For example:
parameter_defaults: CephClientKey: <AQDLOh1VgEp6FRAAFzT7Zw+Y9V6JJExQAsRnRQ==> CephClusterFSID: <4b5c8c0a-ff60-454b-a1b4-9747aa737d19> CephExternalMonHost: <172.16.1.7, 172.16.1.8, 172.16.1.9>
-
Optional: You can override the Red Hat OpenStack Platform (RHOSP) client username and the following default pool names to match your Ceph Storage cluster:
-
CephClientUserName: <openstack>
-
NovaRbdPoolName: <vms>
-
CinderRbdPoolName: <volumes>
-
GlanceRbdPoolName: <images>
-
CinderBackupRbdPoolName: <backups>
-
Optional: If you are deploying the Shared File Systems service with CephFS, you can override the following default data and metadata pool names:
ManilaCephFSDataPoolName: <manila_data> ManilaCephFSMetadataPoolName: <manila_metadata>
NoteEnsure that these names match the names of the pools you created.
Set the client key that you created for the Shared File Systems service. You can override the default Ceph client username for that key:
ManilaCephFSCephFSAuthId: <manila> CephManilaClientKey: <AQDQ991cAAAAABAA0aXFrTnjH9aO39P0iVvYyg==>
NoteThe default client username
ManilaCephFSCephFSAuthId
ismanila
, unless you override it.CephManilaClientKey
is always required.
After you create the custom environment file, you must include it when you deploy the overcloud.
Additional resources
3.2. Ceph containers for Red Hat OpenStack Platform with Red Hat Ceph Storage
You must have a Ceph Storage container to configure Red Hat Openstack Platform (RHOSP) to use Red Hat Ceph Storage with NFS Ganesha. You do not require a Ceph Storage container if the external Ceph Storage cluster only provides Block (through RBD), Object (through RGW), or File (through native CephFS) storage.
RHOSP 17.0 requires Red Hat Ceph Storage 5.x (Ceph package 16.x) or later to be compatible with Red Hat Enterprise Linux 9. The Ceph Storage 5.x containers are hosted at registry.redhat.io
, a registry that requires authentication. For more information, see Container image preparation parameters.
3.3. Deploying the overcloud
Deploy the overcloud with the environment file that you created.
Procedure
The creation of the overcloud requires additional arguments for the
openstack overcloud deploy
command:$ openstack overcloud deploy --templates \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /home/stack/templates/ceph-config.yaml \ -e --ntp-server pool.ntp.org \ ...
This example command uses the following options:
--templates
- Creates the overcloud from the default heat template collection,/usr/share/openstack-tripleo-heat-templates/
.-
-e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml
- Sets the director to integrate an existing Ceph Storage cluster to the overcloud. -
-e /home/stack/templates/ceph-config.yaml
- Adds a custom environment file to override the defaults set by-e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml
. -
--ntp-server pool.ntp.org
- Sets the NTP server.
-
3.3.1. Adding environment files for the Shared File Systems service with CephFS
If you deploy an overcloud that uses the Shared File Systems service (manila) with CephFS, you must add additional environment files.
Procedure
Create and add additional environment files:
-
If you deploy an overcloud that uses the native CephFS back-end driver, add
/usr/share/openstack-tripleo-heat-templates/environments/manila-cephfsnative-config.yaml
. If you deploy an overcloud that uses CephFS through NFS, add
/usr/share/openstack-tripleo-heat-templates/environments/manila-cephfsganesha-config.yaml
.Red Hat recommends that you deploy the Ceph-through-NFS driver with an isolated StorageNFS network where shares are exported. You must deploy the isolated network to overcloud Controller nodes. To enable this deployment, director includes the following file and role:
- An example custom network configuration file that includes the StorageNFS network (/usr/share/openstack-tripleo-heat-templates/network_data_ganesha.yaml). Review and customize this file as necessary.
- A ControllerStorageNFS role.
-
If you deploy an overcloud that uses the native CephFS back-end driver, add
Modify the
openstack overcloud deploy
command depending on the CephFS back end that you use.For native CephFS:
$ openstack overcloud deploy --templates \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/manila-cephfsnative-config.yaml \ -e /home/stack/templates/ceph-config.yaml \ -e --ntp-server pool.ntp.org ...
For CephFS through NFS:
$ openstack overcloud deploy --templates \ -n /usr/share/openstack-tripleo-heat-templates/network_data_ganesha.yaml \ -r /home/stack/custom_roles.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/manila-cephfsganesha-config.yaml \ -e /home/stack/templates/ceph-config.yaml \ -e --ntp-server pool.ntp.org ...
NoteThe custom
ceph-config.yaml
environment file overrides parameters in theexternal-ceph.yaml
file and either themanila-cephfsnative-config.yaml
file or themanila-cephfsganesha-config.yaml
file. Therefore, include the customceph-config.yaml
environment file in the deployment command afterexternal-ceph.yaml
and eithermanila-cephfsnative-config.yaml
ormanila-cephfsganesha-config.yaml
.Example environment file
parameter_defaults: CinderEnableIscsiBackend: false CinderEnableRbdBackend: true CinderEnableNfsBackend: false NovaEnableRbdBackend: true GlanceBackend: rbd CinderRbdPoolName: "volumes" NovaRbdPoolName: "vms" GlanceRbdPoolName: "images" CinderBackupRbdPoolName: "backups" CephClusterFSID: <cluster_ID> CephExternalMonHost: <IP_address>,<IP_address>,<IP_address> CephClientKey: "<client_key>" CephClientUserName: "openstack" ManilaCephFSDataPoolName: manila_data ManilaCephFSMetadataPoolName: manila_metadata ManilaCephFSCephFSAuthId: 'manila' CephManilaClientKey: '<client_key>' ExtraConfig:
-
Replace
<cluster_ID>
,<IP_address>
, and<client_key>
with values that are suitable for your environment.
-
Replace
Additional resources
- For more information about generating a custom roles file, see Deploying the Shared File Systems service with CephFS through NFS.
3.3.2. Adding an additional environment file for external Ceph Object Gateway (RGW) for Object storage
If you deploy an overcloud that uses an already existing RGW service for Object storage, you must add an additional environment file.
Procedure
Add the following
parameter_defaults
to a custom environment file, for example,swift-external-params.yaml
, and adjust the values to suit your deployment:parameter_defaults: ExternalSwiftPublicUrl: 'http://<Public RGW endpoint or loadbalancer>:8080/swift/v1/AUTH_%(project_id)s' ExternalSwiftInternalUrl: 'http://<Internal RGW endpoint>:8080/swift/v1/AUTH_%(project_id)s' ExternalSwiftAdminUrl: 'http://<Admin RGW endpoint>:8080/swift/v1/AUTH_%(project_id)s' ExternalSwiftUserTenant: 'service' SwiftPassword: 'choose_a_random_password'
NoteThe example code snippet contains parameter values that might differ from values that you use in your environment:
-
The default port where the remote RGW instance listens is
8080
. The port might be different depending on how the external RGW is configured. -
The
swift
user created in the overcloud uses the password defined by theSwiftPassword
parameter. You must configure the external RGW instance to use the same password to authenticate with the Identity service by using thergw_keystone_admin_password
.
-
The default port where the remote RGW instance listens is
Add the following code to the Ceph config file to configure RGW to use the Identity service. Replace the variable values to suit your environment:
rgw_keystone_api_version = 3 rgw_keystone_url = http://<public Keystone endpoint>:5000/ rgw_keystone_accepted_roles = member, Member, admin rgw_keystone_accepted_admin_roles = ResellerAdmin, swiftoperator rgw_keystone_admin_domain = default rgw_keystone_admin_project = service rgw_keystone_admin_user = swift rgw_keystone_admin_password = <password_as_defined_in_the_environment_parameters> rgw_keystone_implicit_tenants = true rgw_keystone_revocation_interval = 0 rgw_s3_auth_use_keystone = true rgw_swift_versioning_enabled = true rgw_swift_account_in_url = true rgw_max_attr_name_len = 128 rgw_max_attrs_num_in_req = 90 rgw_max_attr_size = 256 rgw_keystone_verify_ssl = false
NoteDirector creates the following roles and users in the Identity service by default:
- rgw_keystone_accepted_admin_roles: ResellerAdmin, swiftoperator
- rgw_keystone_admin_domain: default
- rgw_keystone_admin_project: service
- rgw_keystone_admin_user: swift
Deploy the overcloud with the additional environment files with any other environment files that are relevant to your deployment:
openstack overcloud deploy --templates \ -e <your_environment_files> -e /usr/share/openstack-tripleo-heat-templates/environments/swift-external.yaml -e swift-external-params.yaml