-
Notifications
You must be signed in to change notification settings - Fork 2
XEN_CRM_configuration
Home > Configuration > C RM
Disclaimer: The following configuration manual assumes that installation of the whole software has been done according to the installation manual.
The configuration file is located at vt_manager/src/python/vt_manager/mySettings.py
.
FLAG | Values | Comments |
---|---|---|
ISLAND_NAME |
String | Island/testbed name. Shown on the upper right corner of the Web frontend |
VTAM_IP |
String | C RM (VT AM) host domain name/IP |
VTAM_PORT |
String | WebUI and XMLRPC TCP port (default:8445) |
XMLRPC_USER |
String | XMLRPC interface username |
XMLRPC_PASS |
String | XMLRPC interface username's password |
###Root (Island Manager) account information
FLAG | Values | Comments |
---|---|---|
ROOT_USERNAME |
String | C RM (VT AM)'s root username (Note: this does not create a superuser account in Django. You will be requested to do that in the last step of the installation) |
ROOT_PASSWORD |
String | C RM (VT AM)'s root password |
ROOT_EMAIL |
String | C RM (VT AM)'s root email |
###Database parameters
FLAG | Values | Comments |
---|---|---|
DATABASE_USER |
String | MySQL username |
DATABASE_PASSWORD |
String | MySQL password |
DATABASE_HOST |
String | MySQL host (e.g. 127.0.0.1) |
DATABASE_NAME |
String | C RM (VT AM) database name. |
The configuration of the Agent is performed during the installation. The only important parameter to take into account is the XMLRPC_PASSWORD
, which is set during installation, and will be required when adding Servers to the Virtualization Aggregate Manager, in next section.
Servers currently in order to create VMs MUST have one available range (pool) of MAC addresses and IPs. This, in a common configuration, means that at least one global IP and MAC range is needed to be defined. Take a look at next section for details.
Global vs. non-global ranges
By default servers use ranges tagged as global without having to do any kind of configuration to the server (subscription). In other words, if they are not subscribed to any range in particular, they will use all the global ranges to obtain MACs and IPs, in a random order.
However, if the servers subscribe to one or more ranges, regardless of its nature (whether if they are global or not), VMs will be created from addresses contained only in the pool of subscribed ranges (in a random manner).
The global flag, accordingly, should be disabled by those ranges that are particular to one server, and that do not apply to the rest of the servers (for instance a local testing server out of the addressing of the testbed). In general, servers should use global ranges for simplicty and since they do not need this mechanism.
Remember that subscription to MAC ranges does not imply nor has any effect to IPv4 subscription to ranges (they are completely independent).
Take this into account while defining the ranges and configure the servers.
Creating the ranges...
From the UI Dashboard click on Network Settings IPv4 ranges and Create range to define a new IPv4 range. The parameters of the IPv4 Range will be used to configure the VMs networking, this is, they will use the Mask, GW and DNSs of the range which provides the IP.
Create as many ranges as needed. For IPv4 ranges
- Range name: Name to identify the range.
- Global range: Global/Not Global flag.
- Range start Ip: Beggining of the range.
- Range end Ip: End of the range.
- Network mask: Network mask to apply over the IPs.
- Gw: IP address of the default gateway for the VMs.
- Dns1: In OFELIA installations it is important that the first DNS is the internal federeation DNS (e.g. for OFELIA it is 10.216.24.2).
- Dns2
For Ethernet Ranges, the only parameters are:
- Range name
- Global range
- Start Mac Address: In OFELIA installations MACs have to be in the range 02:0Y:XX:XX:XX:XX, where Y is the island identifier. To be agreed for FELIX.
- End Mac Address
When necessary, you can add Exceptions to this ranges.
After they have been set -and in the case you need specially addressing schema for a specific server- you can edit the server to subscribe it to specific ranges.
Create a server from the Add a server link in the Dashboard or in the Administrate Servers page.
- UUID: Automatically generated.
- Enabled: Uncheck if you want to add the server but not make it available for use.
- Name: Server name
- OS Type: Server's OS type
- OS Distribution: Server's OS type
- OS Version: Server's OS version
- Virtualization Technology: hypervisor running in the server
-
URL of the Server Agent: URL where the Agent daemon in the Server is listening. It should be
https://DOMAIN_NAME:PORT/
, default PORT is9229
.
In order to advertise the resources of your island in an appropriate manner, you should change the HRN
setting in the file vt_manager/src/python/vt_manager/communication/geni/v3/settings/vtam.py
as follows:
HRN = ocf.<your_organization_name_in_lowercase> # Example: ocf.i2cat
Finally, restart Apache. If you have RO deployed in your island and at least run once, you should delete the CRM resources inside RO's database. In a console, write the following:
mongo
> use felix_ro
> db.resource.com.node.drop()
> db.resource.com.link.drop()
> exit
After that, and assuming that SDNRM resources are deleted as well, you may restart the RO.
The last step for configuration relates to the management of the clients that are allowed to communicate against the GENIv3 API of your resource managers (RMs). Both C RM and SDN RM require to authorise the certificate of the clearinghouse that issues the credentials of the client you want to allow. Such certificate can be found in ~/.gcf/ch-cert.pem
in case you are using the GENI Control Framework and Clearinghouse.
Note1
: in the first stages of deployment, every FELIX island will use the same certificates (and respective keys) for ClearingHouse and user Alice. Request such certificates and place them in ~/.gcf/ch-cert.pem
(~/.gcf/ch-key.pem
), ~/.gcf/trusted_roots/ch-cert.pem
, ~/.gcf/trusted_roots/CATedCACerts.pem
and ~/.gcf/alice-cert.pem
(~/.gcf/alice-key.pem
), respectively. If using RMs that request to have a copy of the client or peer certificate to be trusted, place the Clearinghouse certificate under their respective folders (see below for C RM).
Enabling a specific peer is achieved in two steps:
- Add the certificate of the client's clearinghouse in the RM
-
Add it as a new
.gid
file (you pick the name) to thetrusted_roots
folder:cp -p ~/.gcf/ch-cert.pem <path_to_ocf>/vt_manager/src/python/vt_manager/communication/geni/v3/trusted_roots/felix-<organisation>.gid
-
Note: ensure that this file is unique, i.e. not previously saved under other name or coincident
- Append the certificate of the client's clearinghouse in the Apache SSL
- Append it to the end of the
/etc/apache2/ssl.crt/ca_clients.crt
file - Restart Apache
- General info
- Administering
- Contributing
- Experimenting