Installing and Configuring OpenStack in Oracle® Solaris 11.2

Exit Print View

Updated: April 2015
 
 

How to Configure the Compute Node

  1. (Optional) Install and configure NTP.

    See Installing Network Time Protocol.

  2. Install the Nova package.
    compute1# pkg install nova
  3. Restart the Remote Access Daemon (RAD).

    Nova uses RAD to communicate with the Oracle Solaris Zones framework.

    compute1# svcadm restart rad:local
  4. Configure Nova by either uncommenting or setting the following parameters in the /etc/nova/nova.conf file.
    [DEFAULT]
    rabbit_host=$CONTROLLER_ADM_NODE
    my_ip=$COMPUTE_ADMIN_NODE_IP
    host=$COMPUTE_ADMIN_NODE_X
    firewall_driver=nova.virt.firewall.NoopFirewallDriver
    keystone_ec2_url=http:/$CONTROLLER_ADM_NODE:5000/v2.0/ec2tokens
    
    [database]
    connection = mysql://nova:nova@$CONTROLLER_ADM_NODE/nova
    
    [glance]
    host=$CONTROLLER_ADM_NODE
    
    [keystone_authtoken]
    auth_uri=http://$CONTROLLER_ADM_NODE:5000/v2.0/
    identity_uri=http://$CONTROLLER_ADM_NODE:35357/
    admin_usr=nova
    admin_password=service-password
    admin_tenant_name=tenant
    
    [neutron]
    url=http://$CONTROLLER_ADM_NODE:9696
    admin_username=neutron
    admin_password=service-password
    admin_tenant_name=tenant
    admin_auth_url=http://$CONTROLLER_ADM_NODE:5000/v2.0
    
  5. Set up EVS on the compute node.
    1. Install the EVS package.
      compute1# pkg install evs
    2. Set the EVS property to specify the location of the EVS controller.
      compute1# evsadm set-prop -p controller=ssh://evsuser@$CONTROLLER_ADM_NODE
  6. Configure the communications between the controller and the compute nodes.
    1. Create an SSH public key on the compute node for the root user.
      compute1# su - root -c "ssh-keygen -N '' -f /root/.ssh/id_rsa -t rsa"
    2. (Optional) Check the contents of the SSH key.
      compute1# cat /root/.ssh/id_rsa.pub
    3. Copy the SSH key /root/.ssh/id_rsa.pub to a location in the controller node.
    4. On the controller node, append the SSH key to the authorized_keys file for evsuser.
      controller# cat location/id_rsa.pub >> /var/user/evsuser/.ssh/authorized_keys
      
    5. (Optional) Verify that the SSH key from the compute node has been appended to the authorized_keys file.
      controller# cat /var/user/evsuser/.ssh/authorized_keys

      The output should include the contents of the SSH key that you generated on the compute node and which Step b displayed.

    6. On the compute node, test the compute node's SSH connections to the controller and accept the fingerprints to be stored in the known_host file.

      Specify Yes at the prompt for confirmation.

      compute1# ssh evsuser@$CONTROLLER_ADM_NODE true
  7. Enable the Nova compute service.
    compute1# svcadm enable nova-compute