14.2. Adding External Providers
14.2.1. Adding a Red Hat Satellite Instance for Host Provisioning
Add a Satellite instance for host provisioning to the Red Hat Virtualization Manager. Red Hat Virtualization 4.2 is supported with Red Hat Satellite 6.1.
Adding a Satellite Instance for Host Provisioning
-
Click
. - Click Add.
- Enter a Name and Description.
- Select Foreman/Satellite from the Type drop-down list.
Enter the URL or fully qualified domain name of the machine on which the Satellite instance is installed in the Provider URL text field. You do not need to specify a port number.
ImportantIP addresses cannot be used to add a Satellite instance.
- Select the Requires Authentication check box.
- Enter the Username and Password for the Satellite instance. You must use the same user name and password as you would use to log in to the Satellite provisioning portal.
Test the credentials:
- Click Test to test whether you can authenticate successfully with the Satellite instance using the provided credentials.
- If the Satellite instance uses SSL, the Import provider certificates window opens; click OK to import the certificate that the Satellite instance provides to ensure the Manager can communicate with the instance.
- Click OK.
14.2.2. Adding an OpenStack Image (Glance) Instance for Image Management
Add an OpenStack Image (Glance) instance for image management to the Red Hat Virtualization Manager.
Adding an OpenStack Image (Glance) Instance for Image Management
-
Click
. - Click Add and enter the details in the General Settings tab. For more information on these fields, see Section 14.2.10, “Add Provider General Settings Explained”.
- Enter a Name and Description.
- Select OpenStack Image from the Type drop-down list.
- Enter the URL or fully qualified domain name of the machine on which the OpenStack Image instance is installed in the Provider URL text field.
Optionally, select the Requires Authentication check box and enter the Username and Password for the OpenStack Image instance user registered in Keystone. You must also define the authentication URL of the Keystone server by defining the Protocol (must be
HTTP
), Hostname, and API Port.Enter the Tenant for the OpenStack Image instance.
Test the credentials:
- Click Test to test whether you can authenticate successfully with the OpenStack Image instance using the provided credentials.
- If the OpenStack Image instance uses SSL, the Import provider certificates window opens. Click OK to import the certificate that the OpenStack Image instance provides to ensure the Manager can communicate with the instance.
- Click OK.
14.2.3. Adding an OpenStack Networking (Neutron) Instance for Network Provisioning
Add an OpenStack Networking (neutron) instance for network provisioning to the Red Hat Virtualization Manager. To add other third-party network providers that implement the OpenStack Neutron REST API, see Section 14.2.9, “Adding an External Network Provider”.
Red Hat Virtualization supports Red Hat OpenStack Platform versions 10, 13, and 14 as external network providers.
- OpenStack 10 should be deployed with an OVS driver.
- OpenStack 13 should be deployed with an OVS, OVN, or ODL driver.
- OpenStack 14 should be deployed with an OVN or ODL driver.
To use neutron networks, hosts must have the neutron agents configured. You can configure the agents manually, or use the Red Hat OpenStack Platform director to deploy the Networker role, before adding the network node to the Manager as a host. Using the director is recommended. Automatic deployment of the neutron agents through the Network Provider tab in the New Host window is not supported.
Although network nodes and regular hosts can be used in the same cluster, virtual machines using neutron networks can only run on network nodes.
Adding a Network Node as a Host
- Use the Red Hat OpenStack Platform director to deploy the Networker role on the network node. See Creating a New Role and Networker in the Red Hat OpenStack Platform Advanced Overcloud Customization Guide.
Enable the required repositories:
Register your system with the Content Delivery Network, entering your Customer Portal user name and password when prompted:
# subscription-manager register
Find the
Red Hat Enterprise Linux Server
andRed Hat Virtualization
subscription pools and record the pool IDs:# subscription-manager list --available
Use the pool IDs to attach the subscriptions to the system:
# subscription-manager attach --pool=poolid
Configure the repositories:
# subscription-manager repos \ --disable='*' \ --enable=rhel-7-server-rpms \ --enable=rhel-7-server-rhv-4-mgmt-agent-rpms \ --enable=rhel-7-server-ansible-2.9-rpms
Ensure that all packages currently installed are up to date:
# yum update
- Reboot the machine if any kernel packages were updated.
Install the Openstack Networking hook:
# yum install vdsm-hook-openstacknet
Add the network node to the Manager as a host. See Section 10.5.1, “Adding Standard Hosts to the Red Hat Virtualization Manager”.
ImportantDo not select the OpenStack Networking provider from the Network Provider tab. This is currently not supported.
Adding an OpenStack Networking (Neutron) Instance for Network Provisioning
-
Click
. - Click Add and enter the details in the General Settings tab. For more information on these fields, see Section 14.2.10, “Add Provider General Settings Explained”.
- Enter a Name and Description.
- Select OpenStack Networking from the Type drop-down list.
- Ensure that Open vSwitch is selected in the Networking Plugin field.
- Optionally, select the Automatic Synchronization check box. This enables automatic synchronization of the external network provider with existing networks.
Enter the URL or fully qualified domain name of the machine on which the OpenStack Networking instance is installed in the Provider URL text field, followed by the port number. The Read-Only check box is selected by default. This prevents users from modifying the OpenStack Networking instance.
ImportantYou must leave the Read-Only check box selected for your setup to be supported by Red Hat.
Optionally, select the Requires Authentication check box and enter the Username and Password for the OpenStack Networking user registered in Keystone. You must also define the authentication URL of the Keystone server by defining the Protocol, Hostname, API Port, and API Version.
For API version 2.0, enter the Tenant for the OpenStack Networking instance. For API version 3, enter the User Domain Name, Project Name, and Project Domain Name.
Test the credentials:
- Click Test to test whether you can authenticate successfully with the OpenStack Networking instance using the provided credentials.
- If the OpenStack Networking instance uses SSL, the Import provider certificates window opens; click OK to import the certificate that the OpenStack Networking instance provides to ensure the Manager can communicate with the instance.
Click the Agent Configuration tab.
WarningThe following steps are provided only as a Technology Preview. Red Hat Virtualization only supports preconfigured neutron hosts.
- Enter a comma-separated list of interface mappings for the Open vSwitch agent in the Interface Mappings field.
- Select the message broker type that the OpenStack Networking instance uses from the Broker Type list.
- Enter the URL or fully qualified domain name of the host on which the message broker is hosted in the Host field.
- Enter the Port by which to connect to the message broker. This port number will be 5762 by default if the message broker is not configured to use SSL, and 5761 if it is configured to use SSL.
- Enter the Username and Password of the OpenStack Networking user registered in the message broker instance.
- Click OK.
You have added the OpenStack Networking instance to the Red Hat Virtualization Manager. Before you can use the networks it provides, import the networks into the Manager. See Section 9.3.1, “Importing Networks From External Providers”.
14.2.4. Adding an OpenStack Block Storage (Cinder) Instance for Storage Management
Using an OpenStack Block Storage (Cinder) instance for storage management is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend to use them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information on Red Hat Technology Preview features support scope, see https://access.redhat.com/support/offerings/techpreview/.
Add an OpenStack Block Storage (Cinder) instance for storage management to the Red Hat Virtualization Manager. The OpenStack Cinder volumes are provisioned by Ceph Storage.
Adding an OpenStack Block Storage (Cinder) Instance for Storage Management
-
Click
. - Click Add and enter the details in the General Settings tab. For more information on these fields, see Section 14.2.10, “Add Provider General Settings Explained”.
- Enter a Name and Description.
- Select OpenStack Block Storage from the Type drop-down list.
- Select the Data Center to which OpenStack Block Storage volumes will be attached.
- Enter the URL or fully qualified domain name of the machine on which the OpenStack Block Storage instance is installed, followed by the port number, in the Provider URL text field.
Optionally, select the Requires Authentication check box and enter the Username and Password for the OpenStack Block Storage instance user registered in Keystone. Define the authentication URL of the Keystone server by defining the Protocol (must be
HTTP
), Hostname, and API Port.Enter the Tenant for the OpenStack Block Storage instance.
- Click Test to test whether you can authenticate successfully with the OpenStack Block Storage instance using the provided credentials.
- Click OK.
If client Ceph authentication (
cephx
) is enabled, you must also complete the following steps. Thecephx
protocol is enabled by default.-
On your Ceph server, create a new secret key for the
client.cinder
user using theceph auth get-or-create
command. See Cephx Configuration Reference for more information oncephx
, and Managing Users for more information on creating keys for new users. If a key already exists for theclient.cinder
user, retrieve it using the same command. - In the Administration Portal, select the newly created Cinder external provider from the Providers list.
- Click the Authentication Keys tab.
- Click New.
- Enter the secret key in the Value field.
- Copy the automatically generated UUID, or enter an existing UUID in the text field.
On your Cinder server, add the UUID from the previous step and the
cinder
user to /etc/cinder/cinder.conf:rbd_secret_uuid = UUID rbd_user = cinder
-
On your Ceph server, create a new secret key for the
See Section 13.6.1, “Creating a Virtual Disk” for more information about creating a OpenStack Block Storage (Cinder) disk.
14.2.5. Adding a VMware Instance as a Virtual Machine Provider
Add a VMware vCenter instance to import virtual machines from VMware to the Red Hat Virtualization Manager.
Red Hat Virtualization uses V2V to convert VMware virtual machines to the correct format before they are imported. The virt-v2v
package must be installed on at least one host. The virt-v2v
package is available by default on Red Hat Virtualization Hosts (RHVH) and is installed on Red Hat Enterprise Linux hosts as a dependency of VDSM when added to the Red Hat Virtualization environment. Red Hat Enterprise Linux hosts must be Red Hat Enterprise Linux 7.2 or later.
The virt-v2v
package is not available on ppc64le architecture; these hosts cannot be used as proxy hosts.
Adding a VMware vCenter Instance as a Virtual Machine Provider
-
Click
. - Click Add.
- Enter a Name and Description.
- Select VMware from the Type drop-down list.
- Select the Data Center into which VMware virtual machines will be imported, or select Any Data Center to instead specify the destination data center during individual import operations.
- Enter the IP address or fully qualified domain name of the VMware vCenter instance in the vCenter field.
- Enter the IP address or fully qualified domain name of the host from which the virtual machines will be imported in the ESXi field.
- Enter the name of the data center in which the specified ESXi host resides in the Data Center field.
- If you have exchanged the SSL certificate between the ESXi host and the Manager, leave the Verify server’s SSL certificate check box selected to verify the ESXi host’s certificate. If not, clear the check box.
-
Select a host in the chosen data center with
virt-v2v
installed to serve as the Proxy Host during virtual machine import operations. This host must also be able to connect to the network of the VMware vCenter external provider. If you selected Any Data Center above, you cannot choose the host here, but instead can specify a host during individual import operations. - Enter the Username and Password for the VMware vCenter instance. The user must have access to the VMware data center and ESXi host on which the virtual machines reside.
Test the credentials:
- Click Test to test whether you can authenticate successfully with the VMware vCenter instance using the provided credentials.
- If the VMware vCenter instance uses SSL, the Import provider certificates window opens; click OK to import the certificate that the VMware vCenter instance provides to ensure the Manager can communicate with the instance.
- Click OK.
To import virtual machines from the VMware external provider, see Importing a Virtual Machine from a VMware Provider in the Virtual Machine Management Guide.
14.2.6. Adding a RHEL 5 Xen Host as a Virtual Machine Provider
Add a RHEL 5 Xen host to import virtual machines from Xen to Red Hat Virtualization.
Red Hat Virtualization uses V2V to convert RHEL 5 Xen virtual machines to the correct format before they are imported. The virt-v2v
package must be installed on at least one host. The virt-v2v
package is available by default on Red Hat Virtualization Hosts (RHVH) and is installed on Red Hat Enterprise Linux hosts as a dependency of VDSM when added to the Red Hat Virtualization environment. Red Hat Enterprise Linux hosts must be Red Hat Enterprise Linux 7.2 or later.
The virt-v2v
package is not available on ppc64le architecture; these hosts cannot be used as proxy hosts.
Adding a RHEL 5 Xen Instance as a Virtual Machine Provider
Enable public key authentication between the proxy host and the RHEL 5 Xen host:
Log in to the proxy host and generate SSH keys for the vdsm user.
# sudo -u vdsm ssh-keygen
Copy the vdsm user’s public key to the RHEL 5 Xen host. The proxy host’s known_hosts file will also be updated to include the host key of the RHEL 5 Xen host.
# sudo -u vdsm ssh-copy-id root@xenhost.example.com
Log in to the RHEL 5 Xen host to verify that the login works correctly.
# sudo -u vdsm ssh root@xenhost.example.com
-
Click
. - Click Add.
- Enter a Name and Description.
- Select XEN from the Type drop-down list.
- Select the Data Center into which Xen virtual machines will be imported, or select Any Data Center to specify the destination data center during individual import operations.
- Enter the URI of the RHEL 5 Xen host in the URI field.
-
Select a host in the chosen data center with
virt-v2v
installed to serve as the Proxy Host during virtual machine import operations. This host must also be able to connect to the network of the RHEL 5 Xen external provider. If you selected Any Data Center above, you cannot choose the host here, but instead can specify a host during individual import operations. - Click Test to test whether you can authenticate successfully with the RHEL 5 Xen host.
- Click OK.
To import virtual machines from a RHEL 5 Xen external provider, see Importing a Virtual Machine from a RHEL 5 Xen Host in the Virtual Machine Management Guide.
14.2.7. Adding a KVM Host as a Virtual Machine Provider
Add a KVM host to import virtual machines from KVM to Red Hat Virtualization Manager.
Adding a KVM Host as a Virtual Machine Provider
Enable public key authentication between the proxy host and the KVM host:
Log in to the proxy host and generate SSH keys for the vdsm user.
# sudo -u vdsm ssh-keygen
Copy the vdsm user’s public key to the KVM host. The proxy host’s known_hosts file will also be updated to include the host key of the KVM host.
# sudo -u vdsm ssh-copy-id root@kvmhost.example.com
Log in to the KVM host to verify that the login works correctly.
# sudo -u vdsm ssh root@kvmhost.example.com
-
Click
. - Click Add.
- Enter a Name and Description.
- Select KVM from the Type drop-down list.
- Select the Data Center into which KVM virtual machines will be imported, or select Any Data Center to specify the destination data center during individual import operations.
Enter the URI of the KVM host in the URI field.
qemu+ssh://root@host.example.com/system
- Select a host in the chosen data center to serve as the Proxy Host during virtual machine import operations. This host must also be able to connect to the network of the KVM external provider. If you selected Any Data Center in the Data Center field above, you cannot choose the host here. The field is greyed out and shows Any Host in Data Center. Instead you can specify a host during individual import operations.
- Optionally, select the Requires Authentication check box and enter the Username and Password for the KVM host. The user must have access to the KVM host on which the virtual machines reside.
- Click Test to test whether you can authenticate successfully with the KVM host using the provided credentials.
- Click OK.
To import virtual machines from a KVM external provider, see Importing a Virtual Machine from a KVM Host in the Virtual Machine Management Guide.
14.2.8. Adding Open Virtual Network (OVN) as an External Network Provider
Open Virtual Network (OVN) enables you to create networks without adding VLANs or changing the infrastructure. OVN is an Open vSwitch (OVS) extension that enables support for virtual networks by adding native OVS support for virtual L2 and L3 overlays.
You can either install a new OVN network provider or add an existing one.
You can also connect an OVN network to a native Red Hat Virtualization network. See Section 14.2.8.5, “Connecting an OVN Network to a Physical Network” for more information. This feature is available as a Technology Preview only.
A Neutron-like REST API is exposed by ovirt-provider-ovn
, enabling you to create networks, subnets, ports, and routers (see the OpenStack Networking API v2.0 for details). These overlay networks enable communication among the virtual machines.
OVN is supported as an external provider by CloudForms, using the OpenStack (Neutron) API. See Network Managers in Red Hat CloudForms: Managing Providers for details.
For more information on OVS and OVN, see the OVS documentation at http://docs.openvswitch.org/en/latest/ and http://openvswitch.org/support/dist-docs/.
14.2.8.1. Installing a New OVN Network Provider
If the openvswitch
package is already installed and if the version is 1:2.6.1 (version 2.6.1, epoch 1), the OVN installation will fail when it tries to install the latest openvswitch
package. See the Doc Text in BZ#1505398 for the details and a workaround.
When you install OVN using engine-setup
, the following steps are automated:
- Setting up an OVN central server on the Manager machine.
- Adding OVN to Red Hat Virtualization as an external network provider.
-
Setting the Default cluster’s default network provider to
ovirt-provider-ovn
. - Configuring hosts to communicate with OVN when added to the cluster.
If you use a preconfigured answer file with engine-setup
, you can add the following entry to install OVN:
OVESETUP_OVN/ovirtProviderOvn=bool:True
Installing a New OVN Network Provider
Install OVN on the Manager using engine-setup. During the installation,
engine-setup
asks the following questions:#
Install ovirt-provider-ovn(Yes, No) [Yes]?
:-
If
Yes
, engine-setup installsovirt-provider-ovn
. Ifengine-setup
is updating a system, this prompt only appears ifovirt-provider-ovn
has not been installed previously. If
No
, you will not be asked again on the next run ofengine-setup
. If you want to see this option, runengine-setup --reconfigure-optional-components
.#
Use default credentials (admin@internal) for ovirt-provider-ovn(Yes, No) [Yes]?
:If
Yes
,engine-setup
uses the default engine user and password specified earlier in the setup process. This option is only available during new installations.#
oVirt OVN provider user[admin]
: #oVirt OVN provider password[empty]
:You can use the default values or specify the oVirt OVN provider user and password.
NoteTo change the authentication method later, you can edit the
/etc/ovirt-provider-ovn/conf.d/10_engine_setup.conf
file, or create a new/etc/ovirt-provider-ovn/conf.d/20_engine_setup.conf
file. Restart theovirt-provider-ovn
service for the change to take effect. See https://github.com/oVirt/ovirt-provider-ovn/blob/master/README.adoc for more information about OVN authentication.
-
If
Add hosts to the Default cluster. Hosts added to this cluster are automatically configured to communicate with OVN. To add new hosts, see Section 10.5.1, “Adding Standard Hosts to the Red Hat Virtualization Manager”.
To configure your hosts to use an existing, non-default network, see Section 14.2.8.4, “Configuring Hosts for an OVN Tunnel Network”.
-
Add networks to the Default cluster; see Section 9.1.2, “Creating a New Logical Network in a Data Center or Cluster” and select the Create on external provider check box.
ovirt-provider-ovn
is selected by default. - To connect the OVN network to a native Red Hat Virtualization network, select the Connect to physical network check box and specify the Red Hat Virtualization network to use. See Section 14.2.8.5, “Connecting an OVN Network to a Physical Network” for more information and prerequisites.
- Define whether the network should use Security Groups from the Security Groups drop-down. For more information on the available options see Section 9.1.7, “Logical Network General Settings Explained”. You can now create virtual machines that use OVN networks.
14.2.8.2. Adding an Existing OVN Network Provider
Adding an existing OVN central server as an external network provider in Red Hat Virtualization involves the following key steps:
- Install the OVN provider, a proxy used by the Manager to interact with OVN. The OVN provider can be installed on any machine, but must be able to communicate with the OVN central server and the Manager.
- Add the OVN provider to Red Hat Virtualization as an external network provider.
- Create a new cluster that uses OVN as its default network provider. Hosts added to this cluster are automatically configured to communicate with OVN.
Prerequisites
The following packages are required by the OVN provider and must be available on the provider machine:
- openvswitch-ovn-central
- openvswitch
- openvswitch-ovn-common
- python-openvswitch
If these packages are not available from the repositories already enabled on the provider machine, they can be downloaded from the OVS website: http://openvswitch.org/download/.
Adding an Existing OVN Network Provider
Install and configure the OVN provider.
Install the provider on the provider machine:
# yum install ovirt-provider-ovn
If you are not installing the provider on the same machine as the Manager, add the following entry to the
/etc/ovirt-provider-ovn/conf.d/10_engine_setup.conf
file (create this file if it does not already exist):[OVIRT] ovirt-host=https://Manager_host_name
This is used for authentication, if authentication is enabled.
If you are not installing the provider on the same machine as the OVN central server, add the following entry to the
/etc/ovirt-provider-ovn/conf.d/10_engine_setup.conf
file (create this file if it does not already exist):[OVN REMOTE] ovn-remote=tcp:OVN_central_server_IP:6641
Open ports 9696, 6641, and 6642 in the firewall to allow communication between the OVN provider, the OVN central server, and the Manager. This can be done either manually or by adding the
ovirt-provider-ovn
andovirt-provider-ovn-central
services to the appropriate zone:# firewall-cmd --zone=ZoneName --add-service=ovirt-provider-ovn --permanent # firewall-cmd --zone=ZoneName --add-service=ovirt-provider-ovn-central --permanent # firewall-cmd --reload
Start and enable the service:
# systemctl start ovirt-provider-ovn # systemctl enable ovirt-provider-ovn
Configure the OVN central server to listen to requests from ports 6642 and 6641:
# ovn-sbctl set-connection ptcp:6642 # ovn-nbctl set-connection ptcp:6641
-
In the Administration Portal, click
. - Click Add and enter the details in the General Settings tab. For more information on these fields, see Section 14.2.10, “Add Provider General Settings Explained”.
- Enter a Name and Description.
- From the Type list, select External Network Provider.
- Click the Networking Plugin text box and select oVirt Network Provider for OVN from the drop-down menu.
Optionally, select the Automatic Synchronization check box. This enables automatic synchronization of the external network provider with existing networks.
NoteAutomatic synchronization is enabled by default on the ovirt-provider-ovn network provider created by the engine-setup tool.
-
Enter the URL or fully qualified domain name of the OVN provider in the Provider URL text field, followed by the port number. If the OVN provider and the OVN central server are on separate machines, this is the URL of the provider machine, not the central server. If the OVN provider is on the same machine as the Manager, the URL can remain the default
http://localhost:9696
. - Clear the Read-Only check box to allow creating new OVN networks from the Red Hat Virtualization Manager.
Optionally, select the Requires Authentication check box and enter the Username and Password for the for the external network provider user registered in Keystone. You must also define the authentication URL of the Keystone server by defining the Protocol, Hostname, and API Port.
Optionally, enter the Tenant for the external network provider.
The authentication method must be configured in the
/etc/ovirt-provider-ovn/conf.d/10_engine_setup.conf
file (create this file if it does not already exist). Restart theovirt-provider-ovn
service for the change to take effect. See https://github.com/oVirt/ovirt-provider-ovn/blob/master/README.adoc for more information about OVN authentication.Test the credentials:
- Click Test to test whether you can authenticate successfully with OVN using the provided credentials.
- If the OVN instance uses SSL, the Import provider certificates window opens; click OK to import the certificate that the OVN instance provides to ensure the Manager can communicate with the instance.
- Click OK.
- Create a new cluster that uses OVN as its default network provider. See Section 8.2.1, “Creating a New Cluster” and select the OVN network provider from the Default Network Provider drop-down list.
- Add hosts to the cluster. Hosts added to this cluster are automatically configured to communicate with OVN. To add new hosts, see Section 10.5.1, “Adding Standard Hosts to the Red Hat Virtualization Manager”.
Import or add OVN networks to the new cluster. To import networks, see Importing Networks. To create new networks using OVN, see Creating a new logical network in a data center or cluster, and select the Create on external provider check box.
ovirt-provider-ovn
is selected by default.To configure your hosts to use an existing, non-default network, see Section 14.2.8.4, “Configuring Hosts for an OVN Tunnel Network”.
To connect the OVN network to a native Red Hat Virtualization network, select the Connect to physical network check box and specify the Red Hat Virtualization network to use. See Section 14.2.8.5, “Connecting an OVN Network to a Physical Network” for more information and prerequisites.
You can now create virtual machines that use OVN networks.
14.2.8.3. Using an Ansible playbook to modify an OVN tunnel network
You can use the ovirt-provider-ovn-driver
Ansible playbook to use long names to modify the tunnel network for OVN controllers.
Ansible playbook to modify an OVN tunnel network
# ansible-playbook --key-file <path_to_key_file> -i <path_to_inventory> --extra-vars " cluster_name=<cluster_name> ovn_central=<ovn_central_ip_address> ovirt_network=<ovirt network name> ovn_tunneling_interface=<vdsm_network_name>" ovirt-provider-ovn-driver.yml
Parameters
- key-file
-
The key file to log into the host. The default key file is usually found in the
/etc/pki/ovirt-engine/keys
directory. - inventory
-
The oVirt VM inventory. To locate the inventory value, use this script:
/usr/share/ovirt-engine-metrics/bin/ovirt-engine-hosts-ansible-inventory
. - cluster_name
- The name of the cluster on which to update the name.
- ovn_central
- The IP address to the OVN central server. This IP address must be accessible to all hosts.
- ovirt_network
- The oVirt network name.
- ovn_tunneling_interface
- The VDSM network name.
The ovirt-provider-ovn-driver
Ansible playbook supports using either the ovirt_network
parameter or the ovn_tunneling_interface
parameter. This playbook fails if both parameters are present in the same playbook.
Playbook with ovirt_network
parameter
# ansible-playbook --key-file /etc/pki/ovirt-engine/keys/engine_id_rsa -i /usr/share/ovirt-engine-metrics/bin/ovirt-engine-hosts-ansible-inventory --extra-vars " cluster_name=test-cluster ovn_central=192.168.200.2 ovirt_network=\"Long\ Network\ Name\ with\ \Ascii\ character\ \☺\"" ovirt-provider-ovn-driver.yml
Playbook with ovn_tunneling_interface
parameter
# ansible-playbook --key-file /etc/pki/ovirt-engine/keys/engine_id_rsa -i /usr/share/ovirt-engine-metrics/bin/ovirt-engine-hosts-ansible-inventory --extra-vars " cluster_name=test-cluster ovn_central=192.168.200.2 ovn_tunneling_interface=on703ea21ddbc34" ovirt-provider-ovn-driver.yml
On the Manager machine, navigate to the /usr/share/ovirt-engine/playbooks
directory to run the Ansible playbooks.
14.2.8.4. Configuring Hosts for an OVN Tunnel Network
You can configure your hosts to use an existing network, other than the default ovirtmgmt
network, with the ovirt-provider-ovn-driver
Ansible playbook. The network must be accessible to all the hosts in the cluster.
The ovirt-provider-ovn-driver
Ansible playbook updates existing hosts. If you add new hosts to the cluster, you must run the playbook again.
Configuring Hosts for an OVN Tunnel Network
On the Manager machine, go to the playbooks directory:
# cd /usr/share/ovirt-engine/playbooks
Run the
ansible-playbook
command with the following parameters:# ansible-playbook --private-key=/etc/pki/ovirt-engine/keys/engine_id_rsa -i /usr/share/ovirt-engine-metrics/bin/ovirt-engine-hosts-ansible-inventory --extra-vars " cluster_name=Cluster_Name ovn_central=OVN_Central_IP ovn_tunneling_interface=VDSM_Network_Name" ovirt-provider-ovn-driver.yml
For example:
# ansible-playbook --private-key=/etc/pki/ovirt-engine/keys/engine_id_rsa -i /usr/share/ovirt-engine-metrics/bin/ovirt-engine-hosts-ansible-inventory --extra-vars " cluster_name=MyCluster ovn_central=192.168.0.1 ovn_tunneling_interface=MyNetwork" ovirt-provider-ovn-driver.yml
NoteThe OVN_Central_IP can be on the new network, but this is not a requirement. The OVN_Central_IP must be accessible to all hosts.
The VDSM_Network_Name is limited to 15 characters. If you defined a logical network name that was longer than 15 characters or contained non-ASCII characters, a 15-character name is automatically generated. See Mapping VDSM Names to Logical Network Names for instructions on displaying a mapping of these names.
Updating the OVN Tunnel Network on a Single Host
You can update the OVN tunnel network on a single host with vdsm-tool
:
# vdsm-tool ovn-config OVN_Central_IP Tunneling_IP_or_Network_Name
Example 14.1. Updating a Host with vdsm-tool
# vdsm-tool ovn-config 192.168.0.1 MyNetwork
14.2.8.5. Connecting an OVN Network to a Physical Network
This feature relies on Open vSwitch support, which is available only as a Technology Preview in Red Hat Virtualization. Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend using them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information on Red Hat Technology Preview features support scope, see https://access.redhat.com/support/offerings/techpreview/.
You can create an external provider network that overlays a native Red Hat Virtualization network so that the virtual machines on each appear to be sharing the same subnet.
If you created a subnet for the OVN network, a virtual machine using that network will receive an IP address from there. If you want the physical network to allocate the IP address, do not create a subnet for the OVN network.
Prerequisites
- The cluster must have OVS selected as the Switch Type. Hosts added to this cluster must not have any pre-existing Red Hat Virtualization networks configured, such as the ovirtmgmt bridge.
- The physical network must be available on the hosts. You can enforce this by setting the physical network as required for the cluster (in the Manage Networks window, or the Cluster tab of the New Logical Network window).
Creating a New External Network Connected to a Physical Network
-
Click
. - Click the cluster’s name to open the details view.
- Click the Logical Networks tab and click Add Network.
- Enter a Name for the network.
-
Select the Create on external provider check box.
ovirt-provider-ovn
is selected by default. - Select the Connect to physical network check box if it is not already selected by default.
Choose the physical network to connect the new network to:
- Click the Data Center Network radio button and select the physical network from the drop-down list. This is the recommended option.
Click the Custom radio button and enter the name of the physical network. If the physical network has VLAN tagging enabled, you must also select the Enable VLAN tagging check box and enter the physical network’s VLAN tag.
ImportantThe physical network’s name must not be longer than 15 characters, or contain special characters.
- Click OK.
14.2.9. Adding an External Network Provider
Any network provider that implements the OpenStack Neutron REST API can be added to Red Hat Virtualization. The virtual interface driver needs to be provided by the implementer of the external network provider. A reference implementation of a network provider and a virtual interface driver are available at https://github.com/mmirecki/ovirt-provider-mock and https://github.com/mmirecki/ovirt-provider-mock/blob/master/docs/driver_instalation.
Adding an External Network Provider for Network Provisioning
-
Click
. - Click Add and enter the details in the General Settings tab. For more information on these fields, see Section 14.2.10, “Add Provider General Settings Explained”.
- Enter a Name and Description.
- Select External Network Provider from the Type drop-down list.
- Optionally, click the Networking Plugin text box and select the appropriate driver from the drop-down menu.
Optionally, select the Automatic Synchronization check box. This enables automatic synchronization of the external network provider with existing networks. This feature is disabled by default when adding external network providers.
NoteAutomatic synchronization is enabled by default on the ovirt-provider-ovn network provider created by the engine-setup tool.
Enter the URL or fully qualified domain name of the machine on which the external network provider is installed in the Provider URL text field, followed by the port number. The Read-Only check box is selected by default. This prevents users from modifying the external network provider.
ImportantYou must leave the Read-Only check box selected for your setup to be supported by Red Hat.
Optionally, select the Requires Authentication check box and enter the Username and Password for the external network provider user registered in Keystone. You must also define the authentication URL of the Keystone server by defining the Protocol, Hostname, and API Port.
Optionally, enter the Tenant for the external network provider.
Test the credentials:
- Click Test to test whether you can authenticate successfully with the external network provider using the provided credentials.
- If the external network provider uses SSL, the Import provider certificates window opens; click OK to import the certificate that the external network provider provides to ensure the Manager can communicate with the instance.
- Click OK.
Before you can use networks from this provider, you must install the virtual interface driver on the hosts and import the networks. To import networks, see Section 9.3.1, “Importing Networks From External Providers”.
14.2.10. Add Provider General Settings Explained
The General tab in the Add Provider window allows you to register the core details of the external provider.
Setting | Explanation |
---|---|
Name | A name to represent the provider in the Manager. |
Description | A plain text, human-readable description of the provider. |
Type | The type of external provider. Changing this setting alters the available fields for configuring the provider. Foreman/Satellite
OpenStack Image
OpenStack Networking
The following fields appear when you select
The following field appears when you select v2.0 from the API Version field:
OpenStack Volume
VMware
RHEL 5 Xen
KVM
External Network Provider
|
Test | Allows users to test the specified credentials. This button is available to all provider types. |
14.2.11. Add Provider Agent Configuration Settings Explained
The Agent Configuration tab in the Add Provider window allows users to register details for networking plugins. This tab is only available for the OpenStack Networking provider type.
Setting | Explanation |
---|---|
Interface Mappings | A comma-separated list of mappings in the format of label:interface. |
Broker Type | The message broker type that the OpenStack Networking instance uses. Select RabbitMQ or Qpid. |
Host | The URL or fully qualified domain name of the machine on which the message broker is installed. |
Port | The remote port by which a connection with the above host is to be made. By default, this port is 5762 if SSL is not enabled on the host, and 5761 if SSL is enabled. |
Username |
A user name for authenticating the OpenStack Networking instance with the above message broker. By default, this user name is |
Password | The password against which the above user name is to be authenticated. |