Jump to: navigation, search

Difference between revisions of "Manila/IcehouseDevstack"

m
Line 7: Line 7:
 
2. Clone manila  
 
2. Clone manila  
  
  $ git clone https://github.com/openstack-dev/devstack.git
+
  $ git clone https://github.com/stackforge/manila.git
  
 
3. Copy over the devstack files from the manila repo into the devstack repo
 
3. Copy over the devstack files from the manila repo into the devstack repo

Revision as of 23:13, 28 May 2014

Here are instructions on how to use Devstack with the latest code from Manila to begin using Manila.

1. Clone devstack

$ git clone -b stable/icehouse https://github.com/openstack-dev/devstack.git

2. Clone manila

$ git clone https://github.com/stackforge/manila.git

3. Copy over the devstack files from the manila repo into the devstack repo

$ cp manila/contrib/devstack/lib/manila devstack/lib/
$ cp manila/contrib/devstack/extras.d/70-manila.sh devstack/extras.d/

4. Copy the sample local.conf into the root devstack directory

$ cd devstack; cp samples/local.conf .

5. Edit/append local.conf to enable manila, neutron, and change the horizon repository and branch to the Manila-specific fork; you may want to uncomment the last four lines depending on your networking configuration

$ cat <<EOF >> local.conf
enable_service manila,m-api,m-sch,m-shr
 
HORIZON_REPO=https://github.com/NetApp/horizon.git
HORIZON_BRANCH=manila
 
disable_service n-net
enable_service q-svc,q-agt,q-dhcp,q-l3,q-meta,neutron
Q_PLUGIN=ml2
ENABLE_TENANT_VLANS=True
ML2_VLAN_RANGES=physnet1:100:200
PHYSICAL_NETWORK=physnet1
OVS_PHYSICAL_BRIDGE=br-eth1
Q_ML2_PLUGIN_MECHANISM_DRIVERS=openvswitch
Q_ML2_PLUGIN_TYPE_DRIVERS=vlan
SHARE_BACKING_FILE_SIZE=8G
#FLOATING_RANGE=192.168.33.128/28
#FLAT_INTERFACE=eth1
#PUBLIC_INTERFACE=eth1
#HOST_IP=192.168.33.10
 
EOF

6. Run stack.sh as normal; When it is complete, the manila processes should be started, and the horizon extensions for Manila should be present.

7. There is a current defect (https://bugs.launchpad.net/bugs/1314591) that may require you to set the security group rules for the service tenant; this can be achieved by running the following commands:

$ . openrc manila service
$ nova secgroup-add-rule default tcp 1 65535 0.0.0.0/0 
$ nova secgroup-add-rule default udp 1 65535 0.0.0.0/0
$ nova secgroup-add-rule default icmp -1 -1 0.0.0.0/0
Vagrant File

If you use Vagrant, here is a Vagrantfile that I have used successfully with the above process:

VAGRANTFILE_API_VERSION = "2"

Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
    config.vm.box = "precise64" 

    config.vm.network :private_network, ip: "192.168.33.10" 

    config.vm.provider :virtualbox do |vb|
       vb.customize ["modifyvm", :id, "--memory", "2048"]
    end

    config.vm.provision :shell, :inline => "sudo apt-get upgrade -y && sudo apt-get install -y git vim libxslt1-dev libmysqlclient-dev"
end