Neutron Plugin Guide

Neutron Plugin Guide

Integration is provided via a plugin. There are multiple configuration settings required for proper indexing and incremental updates. Some of the settings are specified in Searchlight configuration files. Others are provided in other service configuration files.

Searchlight Configuration

Searchlight resource configuration options are shown below with their configuration file and default values.

See Searchlight Plugin Documentation for common options with their default values, general configuration information, and an example complete configuration.

Note

Unless you are changing to a non-default value, you do not need to specify any of the following configuration options.

searchlight.conf

Plugin: OS::Neutron::Net

[resource_plugin:os_neutron_net]
enabled = true
resource_group_name = searchlight

Plugin: OS::Neutron::Port

[resource_plugin:os_neutron_port]
enabled = true
resource_group_name = searchlight

Plugin: OS::Neutron::Subnet

[resource_plugin:os_neutron_subnet]
enabled = true
resource_group_name = searchlight

Plugin: OS::Neutron::Router

[resource_plugin:os_neutron_router]
enabled = true
resource_group_name = searchlight

Plugin: OS::Neutron::FloatingIP

[resource_plugin:os_neutron_floatingip]
enabled = true
resource_group_name = searchlight

Plugin: OS::Neutron::SecurityGroup

[resource_plugin:os_neutron_security_group]
enabled = true
resource_group_name = searchlight

Neutron Configuration

Neutron sends notifications on create/update/delete actions on the concepts that it implements. Currently Searchlight supports indexing for networks, subnets, ports, routers, floating IPs and security groups.

neutron.conf

Notifications must be configured properly for searchlight to process incremental updates. Enable notifications using the following:

[oslo_messaging_notifications]
driver = messagingv2

Note

Restart the Neutron api service (q-svc) after making changes. See Notifications for more information on notification topics.

local.conf (devstack)

The settings above may be automatically configured by stack.sh by adding them to the following post config section in devstack. Just place the following in local.conf and copy the above settings underneath it.:

[[post-config|$NEUTRON_CONF]]
[DEFAULT]

Neutron RBAC Reference

RBAC Filters

RBAC in searchlight neutron plugin is implemented as:

Networks are visible within a tenant OR if they are shared OR if they are external. Subnets are visible within a tenant OR if their network is shared (OR for admins if their network is external). Ports are visible within a tenant (OR for admins if their network is shared or external). Routers are visible within a tenant. Floating IPs are visible within a tenant. Security groups are visible within a tenant.

Neutron Ports Notifications

Not all Neutron ports send notifications when created/updated. Depending on the port’s device_owner, the notifications will be sent. The device_owner’s that will send a notification are:

  • compute:*

  • baremetal:*

We want the initial indexing (and subsequent re-indexings) to match the state that Searchlight receives from the Neutron notifications. Having this mismatch will lead to the Searchlight state being out of sync with the Neutron state. To prevent this from happening, searchlight-manage will index only the Neutron ports that have device_owner defined above. All other ports with device_owner not listed above will be ignored when indexing.

Release Notes

1.0.0.0 (Newton)

The Neutron tenant RBAC policy functionality is supported as part of the OS::Neutron::Net resource type.

0.2.0.0 (Mitaka)

Notifications must be configured properly for searchlight to process incremental updates. Searchlight must use its own topic. Use the following:

notification_driver = messaging
notification_topics = searchlight_indexer

DHCP ports are not indexed. Neutron doesn’t provide a reliable way for Searchlight to index these ports since they are created and modified asynchronously from the subnets that they’re attached to.

All provider:* properties of networks are exposed to administrators only. All binding:* properties of ports are also visible only to administrators. The ‘distributed’ and ‘ha’ router properties are available only to administrators.

Additional properties can be protected similarly with the admin_only_fields under each plugin’s configuration section. Glob-like patterns are supported. For instance:

[resource_plugin:os_neutron_net]
admin_only_fields=admin_state_up,status

See: ADMIN_ONLY_FIELDS in: * searchlight/elasticsearch/plugins/neutron/networks.py * searchlight/elasticsearch/plugins/neutron/ports.py * searchlight/elasticsearch/plugins/neutron/routers.py

Floating IP addresses are mapped as type ‘ip’ which only supports ipv4 in Elasticsearch prior to the 5.0 release. Neutron doesn’t seem to support ipv6 floating IPs since translating ipv4 FIPs to ipv6 internal addresses isn’t supported and mapping ipv6->ipv6 is deemed unnecessary.

Creative Commons Attribution 3.0 License

Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.