Neutron Plugin Guide¶
Integration is provided via a plugin. There are multiple configuration settings required for proper indexing and incremental updates. Some of the settings are specified in Searchlight configuration files. Others are provided in other service configuration files.
Searchlight Configuration¶
Searchlight resource configuration options are shown below with their configuration file and default values.
See Searchlight Plugin Documentation for common options with their default values, general configuration information, and an example complete configuration.
Note
Unless you are changing to a non-default value, you do not need to specify any of the following configuration options.
searchlight.conf¶
Plugin: OS::Neutron::Net¶
[resource_plugin:os_neutron_net]
enabled = true
resource_group_name = searchlight
Plugin: OS::Neutron::Port¶
[resource_plugin:os_neutron_port]
enabled = true
resource_group_name = searchlight
Plugin: OS::Neutron::Subnet¶
[resource_plugin:os_neutron_subnet]
enabled = true
resource_group_name = searchlight
Plugin: OS::Neutron::Router¶
[resource_plugin:os_neutron_router]
enabled = true
resource_group_name = searchlight
Plugin: OS::Neutron::FloatingIP¶
[resource_plugin:os_neutron_floatingip]
enabled = true
resource_group_name = searchlight
Plugin: OS::Neutron::SecurityGroup¶
[resource_plugin:os_neutron_security_group]
enabled = true
resource_group_name = searchlight
Neutron Configuration¶
Neutron sends notifications on create/update/delete actions on the concepts that it implements. Currently Searchlight supports indexing for networks, subnets, ports, routers, floating IPs and security groups.
neutron.conf¶
Notifications must be configured properly for searchlight to process incremental updates. Enable notifications using the following:
[oslo_messaging_notifications]
driver = messagingv2
Note
Restart the Neutron api service (q-svc) after making changes. See Notifications for more information on notification topics.
local.conf (devstack)¶
The settings above may be automatically configured by stack.sh
by adding them to the following post config section in devstack.
Just place the following in local.conf and copy the above settings
underneath it.:
[[post-config|$NEUTRON_CONF]]
[DEFAULT]
Neutron RBAC Reference¶
RBAC Filters¶
RBAC in searchlight neutron plugin is implemented as:
Networks are visible within a tenant OR if they are shared OR if they are external. Subnets are visible within a tenant OR if their network is shared (OR for admins if their network is external). Ports are visible within a tenant (OR for admins if their network is shared or external). Routers are visible within a tenant. Floating IPs are visible within a tenant. Security groups are visible within a tenant.
Neutron Ports Notifications¶
Not all Neutron ports send notifications when created/updated. Depending on the port’s
device_owner
, the notifications will be sent. The device_owner
‘s that will
send a notification are:
- compute:*
- baremetal:*
We want the initial indexing (and subsequent re-indexings) to match the state that
Searchlight receives from the Neutron notifications. Having this mismatch will lead
to the Searchlight state being out of sync with the Neutron state. To prevent this
from happening, searchlight-manage
will index only the Neutron ports that have
device_owner
defined above. All other ports with device_owner
not listed
above will be ignored when indexing.
Release Notes¶
1.0.0.0 (Newton)¶
The Neutron tenant RBAC policy functionality is supported as part of the OS::Neutron::Net resource type.
0.2.0.0 (Mitaka)¶
Notifications must be configured properly for searchlight to process incremental updates. Searchlight must use its own topic. Use the following:
notification_driver = messaging
notification_topics = searchlight_indexer
DHCP ports are not indexed. Neutron doesn’t provide a reliable way for Searchlight to index these ports since they are created and modified asynchronously from the subnets that they’re attached to.
All provider:* properties of networks are exposed to administrators only. All binding:* properties of ports are also visible only to administrators. The ‘distributed’ and ‘ha’ router properties are available only to administrators.
Additional properties can be protected similarly with the admin_only_fields under each plugin’s configuration section. Glob-like patterns are supported. For instance:
[resource_plugin:os_neutron_net]
admin_only_fields=admin_state_up,status
See: ADMIN_ONLY_FIELDS in: * searchlight/elasticsearch/plugins/neutron/networks.py * searchlight/elasticsearch/plugins/neutron/ports.py * searchlight/elasticsearch/plugins/neutron/routers.py
Floating IP addresses are mapped as type ‘ip’ which only supports ipv4 in Elasticsearch prior to the 5.0 release. Neutron doesn’t seem to support ipv6 floating IPs since translating ipv4 FIPs to ipv6 internal addresses isn’t supported and mapping ipv6->ipv6 is deemed unnecessary.