Chapter 5. Orchestration
The director uses Heat Orchestration Templates (HOT) as a template format for its Overcloud deployment plan. Templates in HOT format are mostly expressed in YAML format. The purpose of a template is to define and create a stack, which is a collection of resources that Heat creates and the configuration per resources. Resources are objects in OpenStack and can include compute resources, network configuration, security groups, scaling rules, and custom resources.
This chapter provides some basics for understanding the HOT syntax so that you can create your own template files.
5.1. Learning Heat Template Basics
5.1.1. Understanding Heat Templates
The structure of a Heat template has three main sections:
- Parameters
-
These are settings passed to Heat, which provides a way to customize a stack, and any default values for parameters without passed values. These are defined in the
parameters
section of a template. - Resources
-
These are the specific objects to create and configure as part of a stack. OpenStack contains a set of core resources that span across all components. These are defined in the
resources
section of a template. - Output
-
These are values passed from Heat after the stack’s creation. You can access these values either through the Heat API or client tools. These are defined in the
output
section of a template.
Here is an example of a basic Heat template:
heat_template_version: 2013-05-23 description: > A very basic Heat template. parameters: key_name: type: string default: lars description: Name of an existing key pair to use for the instance flavor: type: string description: Instance type for the instance to be created default: m1.small image: type: string default: cirros description: ID or name of the image to use for the instance resources: my_instance: type: OS::Nova::Server properties: name: My Cirros Instance image: { get_param: image } flavor: { get_param: flavor } key_name: { get_param: key_name } output: instance_name: description: Get the instance's name value: { get_attr: [ my_instance, name ] }
This template uses the resource type type: OS::Nova::Server
to create an instance called my_instance
with a particular flavor, image, and key. The stack returns the value of instance_name
, which is My Cirros Instance
.
A Heat template also requires the heat_template_version
parameter, which defines the syntax version to use and the functions available. For more information, see the Official Heat Documentation.
5.1.2. Understanding Environment Files
An environment file is a special type of template that provides customization for your Heat templates. This includes three key parts:
- Parameters
-
These are common settings you apply to a template’s parameters. These are defined in the
parameters
section of an environment file. - Parameter Defaults
-
These parameters modify the default values for parameters in your templates. These are defined in the
parameter_defaults
section of an environment file. - Resource Registry
-
This section defines custom resource names, link to other Heat templates. This essentially provides a method to create custom resources that do not exist within the core resource collection. These are defined in the
resource_registry
section of an environment file.
Here is an example of a basic environment file:
resource_registry: OS::Nova::Server::MyServer: myserver.yaml parameter_defaults: NetworkName: my_network parameters: MyIP: 192.168.0.1
This creates a new resource type called OS::Nova::Server::MyServer
. The myserver.yaml
file is a Heat template file that provides an implementation for this resource type that overrides any built-in ones.
5.2. Obtaining the Default Director Templates
The director uses an advanced Heat template collection used to create an Overcloud. This collection is available from the openstack
group on Github in the openstack-tripleo-heat-templates
repository. To obtain a clone of this template collection, run the following command:
$ git clone https://github.com/openstack/tripleo-heat-templates.git
The Red Hat-specific version of this template collection is available from the openstack-tripleo-heat-template
package, which installs the collection to /usr/share/openstack-tripleo-heat-templates
.
There are many Heat templates and environment files in this collection. However, the three main files to note in this template collection:
overcloud-without-mergepy.yaml
- This is the main template file used to create the Overcloud environment.
overcloud-resource-registry-puppet.yaml
- This is the main environment file used to create the Overcloud environment. It provides a set of configurations for Puppet modules stored on the Overcloud image. After the director writes the Overcloud image to each node, Heat starts the Puppet configuration for each node using the resources registered in this environment file.
overcloud-resource-registry.yaml
- This is a standard environment file used to create the Overcloud environment. The overcloud-resource-registry-puppet.yaml is based on this file. This file is used for a customized configuration of your environment.
The director uses the first two files to drive the creation of the Overcloud. All other files in this collection either have some descendant relation to the overcloud-resource-registry-puppet.yaml
file or provide extra functionality in relation to their own environment file, which you can add to the deployment.
environments
-
Contains additional Heat environment files that you can use with your Overcloud creation. These environment files enable extra functions for your resulting OpenStack environment. For example, the directory contains an environment file for enabling Cinder NetApp backend storage (
cinder-netapp-config.yaml
). extraconfig
-
Templates used to enable extra functionality. For example, the
extraconfig/pre_deploy/rhel-registration
director provides the ability to register your nodes' Red Hat Enterprise Linux operating systems to the Red Hat Content Delivery network or your own Red Hat Satellite server. firstboot
-
Provides example
first_boot
scripts that the director uses when initially creating the nodes. network
- A set of Heat templates to help create isolated networks and ports.
puppet
-
Templates mostly driven by configuration with puppet. The aforementioned
overcloud-resource-registry-puppet.yaml
environment file uses the files in this directory to drive the application of the Puppet configuration on each node. validation-scripts
- Contains validation scripts useful for all deployment configurations.
This provides a general overview of the templates the director uses for orchestrating the Overcloud creation. The next few sections show how to create your own custom templates and environment files that you can add to an Overcloud deployment.
5.3. Customizing Configuration on First Boot
The director provides a mechanism to perform configuration on all nodes upon the initial creation of the Overcloud. The director achieves this through cloud-init
, which you can call using the OS::TripleO::NodeUserData
resource type.
In this example, we aim to update the nameserver with a custom IP address on all nodes. we first create a basic Heat template (nameserver.yaml
) that runs a script to append each node’s resolv.conf
with a specific nameserver. We use the OS::TripleO::MultipartMime
resource type to send the configuration script.
heat_template_version: 2014-10-16 resources: userdata: type: OS::Heat::MultipartMime properties: parts: - config: {get_resource: nameserver_config} nameserver_config: type: OS::Heat::SoftwareConfig properties: config: | #!/bin/bash echo "nameserver 192.168.1.1" >> /etc/resolve.conf outputs: OS::stack_id: value: {get_resource: userdata}
Next, create an environment file (firstboot.yaml
) that registers our Heat template as the OS::TripleO::NodeUserData
resource type.
resource_registry: OS::TripleO::NodeUserData: nameserver.yaml
This achieves the following:
-
OS::TripleO::NodeUserData
is a director-based Heat resource used in other templates in the collection and applies first boot configuration to all nodes. This resource passes data for use incloud-init
. The defaultNodeUserData
refers to a Heat template that produces a blank value (firstboot/userdata_default.yaml
). In our case, ourfirstboot.yaml
environment file replaces this default with a reference to our ownnameserver.yaml
file. -
nameserver_config
defines our Bash script to run on first boot. TheOS::Heat::SoftwareConfig
resource defines it as a piece of configuration to apply. -
userdata
converts the configuration fromnameserver_config
into a multi-part MIME message using theOS::Heat::MultipartMime
resource. -
The
outputs
provides an output parameterOS::stack_id
which takes the MIME message fromuserdata
and provides it to the the Heat template/resource calling it.
As a result, each node runs the following Bash script on its first boot:
#!/bin/bash echo "nameserver 192.168.1.1" >> /etc/resolve.conf
This example shows how Heat template pass and modfy configuration from one resource to another. It also shows how to use environment files to register new Heat resources or modify existing ones.
5.4. Customizing Configuration before Overcloud Configuration
The Overcloud uses Puppet for core configuration of OpenStack components. The director provides a set of resources to provide custom configuration after the first boot completes and before the core configuration begins. These resources include:
- OS::TripleO::ControllerExtraConfigPre
- Additional configuration applied to Controller nodes before the core Puppet configuration.
- OS::TripleO::ComputeExtraConfigPre
- Additional configuration applied to Compute nodes before the core Puppet configuration.
- OS::TripleO::CephStorageExtraConfigPre
- Additional configuration applied to CephStorage nodes before the core Puppet configuration.
- OS::TripleO::NodeExtraConfig
- Additional configuration applied to all nodes roles before the core Puppet configuration.
In this example, we first create a basic Heat template (/home/stack/templates/nameserver.yaml
) that runs a script to append each node’s resolv.conf
with a variable nameserver.
heat_template_version: 2014-10-16 parameters: server: type: json nameserver_ip: type: string resources: ExtraPreConfig: type: OS::Heat::SoftwareConfig properties: group: script config: str_replace: template: | #!/bin/sh echo "nameserver _NAMESERVER_IP_" >> /etc/resolve.conf params: _NAMESERVER_IP_: {get_param: nameserver_ip} ExtraPreDeployment: type: OS::Heat::SoftwareDeployment properties: config: {get_resource: ExtraPreConfig} server: {get_param: server} actions: ['CREATE'] outputs: deploy_stdout: description: Deployment reference, used to trigger post-deploy on changes value: {get_attr: [ExtraPreDeployment, deploy_stdout]}
The servers
parameter is the server list to apply the configuration and is provided by the parent template. This parameter is mandatory in all pre-configuration templates.
Next, create an environment file (/home/stack/templates/pre_config.yaml
) that registers our Heat template as the OS::TripleO::NodeExtraConfig
resource type.
resource_registry: OS::TripleO::NodeExtraConfig: nameserver.yaml parameter_defaults: nameserver_ip: 192.168.1.1
This achieves the following:
-
OS::TripleO::NodeExtraConfig
is a director-based Heat resource used in the configuration templates in the Heat template collection. This resource passes configuration to each node type through the*-puppet.yaml
templates. The defaultNodeExtraConfig
refers to a Heat template that produces a blank value (puppet/extraconfig/pre_deploy/default.yaml
). In our case, ourpre_config.yaml
environment file replaces this default with a reference to our ownnameserver.yaml
file. -
The environment file also passes the
nameserver_ip
as aparameter_default
value for our environment. This is a parameter that stores the IP address of our nameserver. Thenameserver.yaml
Heat template then accepts this parameter as defined in theparameters
section. -
The template defines
ExtraPreConfig
as a configuration resource throughOS::Heat::SoftwareConfig
. Note thegroup: script
property. Thegroup
defines the software configuration tool to use, which are available through a set of hooks for Heat. In this case, thescript
hook runs an executable script that your define in theSoftwareConfig
resource as theconfig
property. The script itself appends
/etc/resolve.conf
with the nameserver IP address. Note thestr_replace
attribute, which allows you to replace variables in thetemplate
section with parameters in theparams
section. In this case, we set the NAMESERVER_IP to the nameserver IP address, which substitutes the same variable in the script. This results in the following script:#!/bin/sh echo "nameserver 192.168.1.1" >> /etc/resolve.conf
The
ExtraPreDeployments
deploys theExtraPreConfig
configuration to the node. Note the following:-
The
config
attribute makes a reference to theExtraPreConfig
resource so Heat knows what configuration to apply. -
The
servers
attribute retrieves a map of the Overcloud nodes, which theovercloud-without-mergepy.yaml
passes. -
The
actions
attribute defines when to apply the configuration. In this case, we only apply the configuration when the Overcloud is created. Possible actions includeCREATE
,UPDATE
,DELETE
,SUSPEND
, andRESUME
.
-
The
This example shows how to create a Heat template that defines a configuration and deploys it using the OS::Heat::SoftwareConfig
and OS::Heat::SoftwareDeployments
before the core configuration. It also shows how to define parameters in your environment file and pass them to templates in the configuration.
5.5. Customizing Configuration after Overcloud Configuration
A situation might occur where you have completed the creation of your Overcloud but want to add additional configuration, either on initial creation or on a subsequent update of the Overcloud. In this case, you use the OS::TripleO::NodeExtraConfigPost
resource to apply configuration using the standard OS::Heat::SoftwareConfig
types. This applies additional configuration after the main Overcloud configuration completes.
In this example, we first create a basic Heat template (nameserver.yaml
) that runs a script to append each node’s resolv.conf
with a variable nameserver.
heat_template_version: 2014-10-16 parameters: servers: type: json nameserver_ip: type: string resources: ExtraConfig: type: OS::Heat::SoftwareConfig properties: group: script config: str_replace: template: | #!/bin/sh echo "nameserver _NAMESERVER_IP_" >> /etc/resolve.conf params: _NAMESERVER_IP_: {get_param: nameserver_ip} ExtraDeployments: type: OS::Heat::SoftwareDeployments properties: servers: {get_param: servers} config: {get_resource: ExtraConfig} actions: ['CREATE']
The servers
parameter is the server list to apply the configuration and is provided by the parent template (overcloud-without-mergepy.yaml
). This parameter is mandatory in all OS::TripleO::NodeExtraConfigPost
templates.
Next, create an environment file (post_config.yaml
) that registers our Heat template as the OS::TripleO::NodeExtraConfigPost
resource type.
resource_registry: OS::TripleO::NodeExtraConfigPost: nameserver.yaml parameter_defaults: nameserver_ip: 192.168.1.1
This achieves the following:
-
OS::TripleO::NodeExtraConfigPost
is a director-based Heat resource used in the post-configuration templates in the collection. This resource passes configuration to each node type through the*-post.yaml
templates. The defaultNodeExtraConfigPost
refers to a Heat template that produces a blank value (extraconfig/post_deploy/default.yaml
). In our case, ourpost_config.yaml
environment file replaces this default with a reference to our ownnameserver.yaml
file. -
The environment file also passes the
nameserver_ip
as aparameter_default
value for our environment. This is a parameter that stores the IP address of our nameserver. Thenameserver.yaml
Heat template then accepts this parameter as defined in theparameters
section. -
The template defines
ExtraConfig
as a configuration resource throughOS::Heat::SoftwareConfig
. Note thegroup: script
property. Thegroup
defines the software configuration tool to use, which are available through a set of hooks for Heat. In this case, thescript
hook runs an executable script that your define in theSoftwareConfig
resource as theconfig
property. The script itself appends
/etc/resolve.conf
with the nameserver IP address. Note thestr_replace
attribute, which allows you to replace variables in thetemplate
section with parameters in theparams
section. In this case, we set the NAMESERVER_IP to the nameserver IP address, which substitutes the same variable in the script. This results in the following script:#!/bin/sh echo "nameserver 192.168.1.1" >> /etc/resolve.conf
The
ExtraDeployments
deploys theExtraConfig
configuration to the node. Note the following:-
The
config
attribute makes a reference to theExtraConfig
resource so Heat knows what configuration to apply. -
The
servers
attribute retrieves a map of the Overcloud nodes, which theovercloud-without-mergepy.yaml
passes. -
The
actions
attribute defines when to apply the configuration. In this case, we only apply the configuration when the Overcloud is created. Possible actions includeCREATE
,UPDATE
,DELETE
,SUSPEND
, andRESUME
.
-
The
This example shows how to create a Heat template that defines a configuration and deploys it using the OS::Heat::SoftwareConfig
and OS::Heat::SoftwareDeployments
. It also shows how to define parameters in your environment file and pass them to templates in the configuration.
5.6. Applying Custom Puppet Configuration to an Overcloud
Previously, we discussed adding configuration for a new backend to OpenStack Puppet modules. This section show how the director executes the application of new configuration.
Heat templates provide a hook allowing you to apply Puppet configuration with a OS::Heat::SoftwareConfig
resource. The process is similar to how we include and execute Bash scripts. However, instead of the group: script
hook, we use the group: puppet
hook.
For example, you might have a Puppet manifest (example-puppet-manifest.pp
) that enables an NFS Cinder backend using the official Cinder Puppet Module:
cinder::backend::nfs { 'mynfsserver': nfs_servers => ['192.168.1.200:/storage'], }
This Puppet configuration creates a new resource using the cinder::backend::nfs
defined type. To apply this resource through Heat, create a basic Heat template (puppet-config.yaml
) that runs our Puppet manifest:
heat_template_version: 2014-10-16 parameters: servers: type: json resources: ExtraPuppetConfig: type: OS::Heat::SoftwareConfig properties: group: puppet config: get_file: example-puppet-manifest.pp options: enable_hiera: True enable_facter: False ExtraPuppetDeployment: type: OS::Heat::SoftwareDeployments properties: config: {get_resource: ExtraPuppetConfig} servers: {get_param: servers} actions: ['CREATE','UPDATE']
Next, create an environment file (puppet_config.yaml
) that registers our Heat template as the OS::TripleO::NodeExtraConfigPost
resource type.
resource_registry: OS::TripleO::NodeExtraConfigPost: puppet_config.yaml
This example is similar to using SoftwareConfig
and SoftwareDeployments
from the script
hook example in the previous section. However, there are some differences in this example:
-
We set
group: puppet
so that we execute thepuppet
hook. -
The
config
attribute uses theget_file
attribute to refer to a Puppet manifest that contains our additional configuration. The
options
attribute contains some options specific to Puppet configurations:-
The
enable_hiera
option enables the Puppet configuration to use Hiera data. -
The
enable_facter
option enables the Puppet configuration to use system facts from thefacter
command.
-
The
This example shows how to include a Puppet manifest as part of the software configuration for the Overcloud. This provides a way to apply certain configuration classes from existing Puppet modules on the Overcloud images, which helps you customize your Overcloud to use certain software and hardware.
5.7. Modifying Hiera Data in the Overcloud
As mentioned previously, Puppet uses the Hiera tool to provide node-specific values for certain variables. These keys and their values are usually stored in files located in /etc/puppet/hieradata
. On the Overcloud, this directory includes a set of extra Hiera files, which you use to add custom parameters.
You pass this Hiera data using a set of parameters in the director’s Heat template collection. These parameters are:
- ExtraConfig
- Configuration to add to all nodes.
- NovaComputeExtraConfig
- Configuration to add to all Compute nodes.
- controllerExtraConfig
- Configuration to add to all Controller nodes.
- BlockStorageExtraConfig
- Configuration to add to all Block Storage nodes.
- ObjectStorageExtraConfig
- Configuration to add to all Object Storage nodes
- CephStorageExtraConfig
- Configuration to add to all Ceph Storage nodes
To add extra configuration to the post-deployment configuration process, create an environment file that contains these parameters in the parameter_defaults
section. For example, to increase the reserved memory for Compute hosts to 1024 MB:
parameter_defaults: NovaComputeExtraConfig: nova::compute::reserved_host_memory: 1024
This adds nova::compute::reserved_host_memory: 1024
to a custom Hiera file in the /etc/puppet/hieradata
directory on Compute nodes.
5.8. Adding Environment Files to an Overcloud Deployment
After developing a set of environment files relevant to your custom configuration, include these files in your Overcloud deployment. This means running the openstack overcloud deploy
command with the -e
option, followed by the environment file. You can specify the -e
option as many times as necessary for your customization. For example:
$ openstack overcloud deploy --templates -e network-configuration.yaml -e storage-configuration.yaml -e first-boot.yaml
Environment files are stacked in consecutive order. This means that each subsequent file stacks upon both the main Heat template collection and all previous environment files. This provides a way to override resource definitions. For example, if all environment files in an Overcloud deployment define the NodeExtraConfigPost
resource, then Heat uses NodeExtraConfigPost
defined in the last environment file. As a result, the order of the environment files is important. Make sure to order your environment files so they are processed and stacked correctly.
Any environment files added to the Overcloud using the -e
option become part of your Overcloud’s stack definition. The director requires these environment files for any post-deployment or re-deployment functions. Failure to include these files can result in damage to your Overcloud.
[[Integration Points]] == Integration Points
This chapter explores the specific integration points for director integration. This includes looking at specific OpenStack components and their relationship with director or Overcloud integration. This section is not an exhaustive description of all OpenStack integration but should give you enough information to start integrating hardware and software with Red Hat OpenStack Platform.
5.9. Bare Metal Provisioning (Ironic)
The OpenStack Bare Metal Provisioning (Ironic) component is used within the director to control the power state of the nodes. The director uses a set of back-end drivers to interface with specific bare metal power controllers. These drivers are the key to enabling hardware and vendor specific extensions and capabilities. The most common driver is the IPMI driver (pxe_ipmitool
) which controls the power state for any server that supports the Intelligent Platform Management Interface (IPMI).
Integrating with Ironic starts with the upstream OpenStack community first. Ironic drivers accepted upstream are automatically included in the core Red Hat OpenStack Platform product and the director by default. However, they might not be supported as per certification requirements.
Hardware drivers must undergo continuous integration testing to ensure their continued functionality. For information on third party driver testing and suitability, please see the OpenStack community page on Ironic Testing.
Upstream Repositories:
Upstream Blueprints:
- Launchpad: http://launchpad.net/ironic
Puppet Module:
Bugzilla components:
- openstack-ironic
- python-ironicclient
- python-ironic-oscplugin
- openstack-ironic-discoverd
- openstack-puppet-modules
- openstack-tripleo-heat-templates
Integration Notes:
-
The upstream project contains drivers in the
ironic/drivers
directory. -
The director performs a bulk registration of nodes defined in a JSON file. The
os-cloud-config
tool (https://github.com/openstack/os-cloud-config/) parses this file to determine the node registration details and perform the registration. This means theos-cloud-config
tool, specifically thenodes.py
file, requires support for your driver. The director is automatically configured to use Ironic, which means the Puppet configuration requires little to no modification. However, if your driver is included with Ironic, you need to add your driver to the
/etc/ironic/ironic.conf
file. Edit this file and search for theenabled_drivers
parameter. For example:enabled_drivers=pxe_ipmitool,pxe_ssh,pxe_drac
This allows Ironic to use the specified driver from the
drivers
directory.
5.10. Networking (Neutron)
OpenStack Networking (Neutron) provides the ability to create a network architecture within your cloud environment. The project provides several integration points for Software Defined Networking (SDN) vendors. These integration points usually fall into the categories of plugins or agents
A plugin allows extension and customization of pre-existing Neutron functions. Vendors can write plugins to ensure interoperability between Neutron and certified software and hardware. Most vendors should aim to develop a driver for Neutron’s Modular Layer 2 (ml2) plugin, which provides a modular backend for integrating your own drivers.
An agent provides a specific network function. The main Neutron server (and its plugins) communicate with Neutron agents. Existing examples include agents for DHCP, Layer 3 support, and bridging support.
For both plugins and agents, you can either:
- Include them for distribution as part of the OpenStack Platform solution, or
- Add them to the Overcloud images after OpenStack Platform’s distribution.
It is recommended to analyze the functionality of existing plugins and agents so you can determine how to integrate your own certified hardware and software. In particular, it is recommended to first develop a driver as a part of the ml2 plugin.
Upstream Repositories:
Upstream Blueprints:
- Launchpad: http://launchpad.net/neutron
Puppet Module:
Bugzilla components:
- openstack-neutron
- python-neutronclient
- openstack-puppet-modules
- openstack-tripleo-heat-templates
Integration Notes:
The upstream
neutron
project contains several integration points:-
The plugins are located in
neutron/plugins/
-
The ml2 plugin drivers are located in
neutron/plugins/ml2/drivers/
-
The agents are located in
neutron/agents/
-
The plugins are located in
-
Since the OpenStack Liberty release, many of the vendor-specific ml2 plugin have been moved into their own repositories beginning with
networking-
. For example, the Cisco-specific plugins are located in https://github.com/openstack/networking-cisco The
puppet-neutron
repository also contains separate directories for configuring these integration points:-
The plugin configuration is located in
manifests/plugins/
-
The ml2 plugin driver configuration is located in
manifests/plugins/ml2/
-
The agent configuration is located in
manifests/agents/
-
The plugin configuration is located in
-
The
puppet-neutron
repository contains numerous additional libraries for configuration functions. For example, theneutron_plugin_ml2
library adds a function to add attributes to the ml2 plugin configuration file.
5.11. Block Storage (Cinder)
OpenStack Block Storage (Cinder) provides an API that interacts with block storage devices, which OpenStack uses to create volumes. For example, Cinder provides virtual storage devices for instances. Cinder provides a core set of drivers to support different storage hardware and protocols. For example, some of the core drivers include support for NFS, iSCSI, and Red Hat Ceph Storage. Vendors can include drivers to support additional certified hardware.
Vendors have two main options with the drivers and configuration they develop:
- Include them for distribution as part of the OpenStack Platform solution, or
- Add them to the Overcloud images after OpenStack Platform’s distribution.
It is recommended to analyze the functionality of existing drivers so you can determine how to integrate your own certified hardware and software.
Upstream Repositories:
Upstream Blueprints:
- Launchpad: http://launchpad.net/cinder
Puppet Module:
Bugzilla components:
- openstack-cinder
- python-cinderclient
- openstack-puppet-modules
- openstack-tripleo-heat-templates
Integration Notes:
-
The upstream
cinder
repository contains the drivers incinder/volume/drivers/
The
puppet-cinder
repository contains two main directories for driver configuration:-
The
manifests/backend
directory contains a set of defined types that configure the drivers. -
The
manifests/volume
directory contains a set of classes to configure a default block storage device.
-
The
-
The
puppet-cinder
repository contains a library calledcinder_config
to add attributes to the Cinder configuration files.
5.12. Image Storage (Glance)
OpenStack Image Storage (Cinder) provides an API that interacts with storage types to provide storage for images. Glance provides a core set of drivers to support different storage hardware and protocols. For example, the core drivers include support for file, OpenStack Object Storage (Swift), OpenStack Block Storage (Cinder), and Red Hat Ceph Storage. Vendors can include drivers to support additional certified hardware.
Upstream Repositories:
OpenStack:
GitHub:
Upstream Blueprints:
- Launchpad: http://launchpad.net/glance
Puppet Module:
Bugzilla components:
- openstack-glance
- python-glanceclient
- openstack-puppet-modules
- openstack-tripleo-heat-templates
Integration Notes:
- Adding vendor-specific driver is not necessary as Glance can use Cinder, which contains integretion points, to manage image storage.
-
The upstream
glance_store
repository contains the drivers inglance_store/_drivers
. -
The
puppet-glance
repository contains the driver configuration in themanifests/backend
directory. -
The
puppet-glance
repository contains a library calledglance_api_config
to add attributes to the Glance configuration files.