TLS enabled k8s cluster are not created if admin_user, admin_password and admin_tenant_name are not set in [keystone_authtoken] section, This patch updates the install guide for the same. Change-Id: Id58bbbda34d52f60c174630400ae469c48a7d115 Closes-Bug: #1717798 Related-Bug: #1670355
3.0 KiB
- Edit the
/etc/magnum/magnum.conffile:In the
[api]section, configure the host:[api] ... host = CONTROLLER_IPReplace
CONTROLLER_IPwith the IP address on which you wish magnum api should listen.In the
[certificates]section, selectbarbican(orx509keypairif you don't have barbican installed):Use barbican to store certificates:
[certificates] ... cert_manager_type = barbican
Important
Barbican is recommended for production environments.
To store x509 certificates in magnum's database:
[certificates] ... cert_manager_type = x509keypair
In the
[cinder_client]section, configure the region name:[cinder_client] ... region_name = RegionOneIn the
[database]section, configure database access:[database] ... connection = mysql+pymysql://magnum:MAGNUM_DBPASS@controller/magnumReplace
MAGNUM_DBPASSwith the password you chose for the magnum database.In the
[keystone_authtoken]and[trust]sections, configure Identity service access:[keystone_authtoken] ... memcached_servers = controller:11211 auth_version = v3 auth_uri = http://controller:5000/v3 project_domain_id = default project_name = service user_domain_id = default password = MAGNUM_PASS username = magnum auth_url = http://controller:35357 auth_type = password admin_user = magnum admin_password = MAGNUM_PASS admin_tenant_name = service [trust] ... trustee_domain_name = magnum trustee_domain_admin_name = magnum_domain_admin trustee_domain_admin_password = DOMAIN_ADMIN_PASS trustee_keystone_interface = KEYSTONE_INTERFACEReplace MAGNUM_PASS with the password you chose for the magnum user in the Identity service and DOMAIN_ADMIN_PASS with the password you chose for the
magnum_domain_adminuser.Replace KEYSTONE_INTERFACE with either
publicorinternaldepending on your network configuration. If your instances cannot reach internal keystone endpoint which is often the case in production environments it should be set topublic. Default topublicIn the
[oslo_messaging_notifications]section, configure thedriver:[oslo_messaging_notifications] ... driver = messagingIn the
[DEFAULT]section, configureRabbitMQmessage queue access:[DEFAULT] ... transport_url = rabbit://openstack:RABBIT_PASS@controllerReplace
RABBIT_PASSwith the password you chose for theopenstackaccount inRabbitMQ.