Go to file
Maksim Malchuk 6f897b25a2 TLS certificates management sync with Kolla-Ansible
This change is a part of If195d5402579cee9a14b91f63f5fde84eb84cccf fixes
replaced 'kolla_external_fqdn_cacert' and 'kolla_internal_fqdn_cacert'
with 'kolla_admin_openrc_cacert', which by default is not set. Also
'OS_CACERT' is now set to the value of 'kolla_admin_openrc_cacert' in
the both 'admin-openrc.sh' and 'public-openrc.sh' files.

Also this change sync the usage of the other TLS related variables like
'kolla_enable_tls_backend', 'kolla_verify_tls_backend' and
'kolla_copy_ca_into_containers' from Kolla-Ansible to Kayobe. Adds tests
for these variables in the 'kolla-ansible' role and updates
documentation.

The 'kolla-ansible' tasks are also updates CA certificates bundle with
provided CA files on the seed and controller hosts when the
'kolla_copy_ca_into_containers' is enabled.

Also this change set defaults for openstack_cacert.
Since I0fd596d93a0e575a391250d4bed261ad370a3664 we always have the
'ca-certificates' package installed in the all containers so its fine
to set defaults but leave an ability to override the 'openstack_cacert'
via environment variable too. All supported systems already install
the 'ca-certificates' package by default but for sure we install it
on the Ansible control host in the kolla-ansible role itself.

Also this change partially reverts
I9e99c04173acb7adb0d0e367b6db388b86baf5f2 to restore kolla-host.yml and
drop only iSCSI related task.

Change-Id: If6c34db3711d465d5c0a2aab225c6dcd3ca067e3
Signed-off-by: Maksim Malchuk <maksim.malchuk@gmail.com>
2022-04-06 12:35:58 +03:00
2017-12-14 20:39:55 +00:00
2022-03-24 13:44:48 +00:00
2022-03-18 15:04:21 +00:00
2019-09-16 16:26:27 +02:00
2021-03-24 07:25:28 +00:00
2021-07-27 07:33:20 +02:00
2019-06-25 02:24:45 +00:00
2017-04-06 10:15:29 +01:00
2021-05-31 10:02:04 +02:00
2022-01-11 22:03:31 +08:00
2020-04-20 18:04:19 +00:00
2021-11-09 17:31:48 +00:00
2020-05-19 10:08:36 +01:00

Kayobe

image

Kayobe enables deployment of containerised OpenStack to bare metal.

Containers offer a compelling solution for isolating OpenStack services, but running the control plane on an orchestrator such as Kubernetes or Docker Swarm adds significant complexity and operational overheads.

The hosts in an OpenStack control plane must somehow be provisioned, but deploying a secondary OpenStack cloud to do this seems like overkill.

Kayobe stands on the shoulders of giants:

  • OpenStack bifrost discovers and provisions the cloud
  • OpenStack kolla builds container images for OpenStack services
  • OpenStack kolla-ansible delivers painless deployment and upgrade of containerised OpenStack services

To this solid base, kayobe adds:

  • Configuration of cloud host OS & flexible networking
  • Management of physical network devices
  • A friendly openstack-like CLI

All this and more, automated from top to bottom using Ansible.

Features

  • Heavily automated using Ansible
  • kayobe Command Line Interface (CLI) for cloud operators
  • Deployment of a seed VM used to manage the OpenStack control plane
  • Configuration of physical network infrastructure
  • Discovery, introspection and provisioning of control plane hardware using OpenStack bifrost
  • Deployment of an OpenStack control plane using OpenStack kolla-ansible
  • Discovery, introspection and provisioning of bare metal compute hosts using OpenStack ironic and ironic inspector
  • Virtualised compute using OpenStack nova
  • Containerised workloads on bare metal using OpenStack magnum
  • Big data on bare metal using OpenStack sahara
  • Control plane and workload monitoring and log aggregation using OpenStack monasca

Documentation

https://docs.openstack.org/kayobe/latest/

Release Notes

https://docs.openstack.org/releasenotes/kayobe/

Bugs

https://storyboard.openstack.org/#!/project/openstack/kayobe

Community

OFTC's IRC channel: #openstack-kolla

License

Kayobe is distributed under the Apache 2.0 License.

Description
Deployment of containerised OpenStack to bare metal using kolla and bifrost
Readme 44 MiB
Languages
Python 84.8%
Shell 8.2%
Jinja 7%