Role lxc_hosts for OpenStack-Ansible
d77bbf6d0a
The default apparmor profile does not allow dnsmasq to read from /etc/neutron or /var/log/neutron as we see from the following entry in the audit.log file: type=AVC msg=audit(1500476274.931:179617): apparmor="DENIED" operation="open" profile="/usr/sbin/dnsmasq" name="/etc/neutron/dnsmasq-neutron.conf" pid=27503 comm="dnsmasq" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 However, having such access is essential for neutron to work otherwise dnsmasq fails to start and the VMs have all sorts of network problems. As such, we create a local profile with the neutron allowances. Change-Id: I11b1c777fc738f319e0d1c875390522468504050 |
||
---|---|---|
defaults | ||
doc | ||
examples | ||
files | ||
handlers | ||
meta | ||
releasenotes | ||
tasks | ||
templates | ||
tests | ||
vars | ||
.gitignore | ||
.gitreview | ||
bindep.txt | ||
CONTRIBUTING.rst | ||
LICENSE | ||
manual-test.rc | ||
README.rst | ||
run_tests.sh | ||
setup.cfg | ||
setup.py | ||
test-requirements.txt | ||
tox.ini | ||
Vagrantfile |
Team and repository tags
OpenStack-Ansible LXC hosts
Ansible role that configures a host for running LXC containers.
- Documentation for the project can be found at:
-
https://docs.openstack.org/openstack-ansible-lxc_hosts/latest
- The project home is at: