System administration To effectively administer Compute, you must understand how the different installed nodes interact with each other. Compute can be installed in many different ways using multiple servers, but generally multiple compute nodes control the virtual servers and a cloud controller node contains the remaining Compute services. The Compute cloud works using a series of daemon processes named nova-* that exist persistently on the host machine. These binaries can all run on the same machine or be spread out on multiple boxes in a large deployment. The responsibilities of services and drivers are: Services nova-api: receives XML requests and sends them to the rest of the system. A WSGI app routes and authenticates requests. Supports the EC2 and OpenStack APIs. A nova.conf configuration file is created when Compute is installed. nova-cert: manages certificates. nova-compute: manages virtual machines. Loads a Service object, and exposes the public methods on ComputeManager through a Remote Procedure Call (RPC). nova-conductor: provides database-access support for Compute nodes (thereby reducing security risks). nova-consoleauth: manages console authentication. nova-objectstore: a simple file-based storage system for images that replicates most of the S3 API. It can be replaced with OpenStack Image service and either a simple image manager or OpenStack Object Storage as the virtual machine image storage facility. It must exist on the same node as nova-compute. nova-network: manages floating and fixed IPs, DHCP, bridging and VLANs. Loads a Service object which exposes the public methods on one of the subclasses of NetworkManager. Different networking strategies are available by changing the network_manager configuration option to FlatManager, FlatDHCPManager, or VLANManager (defaults to VLANManager if nothing is specified). nova-scheduler: dispatches requests for new virtual machines to the correct node. nova-novncproxy: provides a VNC proxy for browsers, allowing VNC consoles to access virtual machines. Some services have drivers that change how the service implements its core functionality. For example, the nova-compute service supports drivers that let you choose which hypervisor type it can use. nova-network and nova-scheduler also have drivers.
Manage Compute users Access to the Euca2ools (ec2) API is controlled by an access key and a secret key. The user's access key needs to be included in the request, and the request must be signed with the secret key. Upon receipt of API requests, Compute verifies the signature and runs commands on behalf of the user. To begin using Compute, you must create a user with the Identity Service.
Injecting the administrator password Compute can generate a random administrator (root) password and inject that password into an instance. If this feature is enabled, users can ssh to an instance without an ssh keypair. The random password appears in the output of the nova boot command. You can also view and set the admin password from the dashboard. Password injection using the dashboard By default, the dashboard will display the admin password and allow the user to modify it. If you do not want to support password injection, disable the password fields by editing the dashboard's local_settings file. On Fedora/RHEL/CentOS, the file location is /etc/openstack-dashboard/local_settings. On Ubuntu and Debian, it is /etc/openstack-dashboard/local_settings.py. On openSUSE and SUSE Linux Enterprise Server, it is /srv/www/openstack-dashboard/openstack_dashboard/local/local_settings.py OPENSTACK_HYPERVISOR_FEATURE = { ... 'can_set_password': False, } Password injection on libvirt-based hypervisors For hypervisors that use the libvirt backend (such as KVM, QEMU, and LXC), admin password injection is disabled by default. To enable it, set this option in /etc/nova/nova.conf: [libvirt] inject_password=true When enabled, Compute will modify the password of the admin account by editing the /etc/shadow file inside the virtual machine instance. Users can only ssh to the instance by using the admin password if the virtual machine image is a Linux distribution, and it has been configured to allow users to ssh as the root user. This is not the case for Ubuntu cloud images which, by default, do not allow users to ssh to the root account. Password injection and XenAPI (XenServer/XCP) when using the XenAPI hypervisor backend, Compute uses the XenAPI agent to inject passwords into guests. The virtual machine image must be configured with the agent for password injection to work. Password injection and Windows images (all hypervisors) For Windows virtual machines, configure the Windows image to retrieve the admin password on boot by installing an agent such as cloudbase-init.
Manage the cloud System administrators can use nova client and Euca2ools commands to manage their clouds. nova client and euca2ools can be used by all users, though specific commands might be restricted by Role Based Access Control in the Identity Service. Managing the cloud with nova client The python-novaclient package provides a nova shell that enables Compute API interactions from the command line. Install the client, and provide your user name and password (which can be set as environment variables for convenience), for the ability to administer the cloud from the command line. To install python-novaclient, download the tarball from http://pypi.python.org/pypi/python-novaclient/#downloads and then install it in your favorite Python environment. $ curl -O http://pypi.python.org/packages/source/p/python-novaclient/python-novaclient-2.6.3.tar.gz $ tar -zxvf python-novaclient-2.6.3.tar.gz $ cd python-novaclient-2.6.3 As root, run: # python setup.py install Confirm the installation was successful: $ nova help usage: nova [--version] [--debug] [--os-cache] [--timings] [--timeout SECONDS] [--os-username AUTH_USER_NAME] [--os-password AUTH_PASSWORD] [--os-tenant-name AUTH_TENANT_NAME] [--os-tenant-id AUTH_TENANT_ID] [--os-auth-url AUTH_URL] [--os-region-name REGION_NAME] [--os-auth-system AUTH_SYSTEM] [--service-type SERVICE_TYPE] [--service-name SERVICE_NAME] [--volume-service-name VOLUME_SERVICE_NAME] [--endpoint-type ENDPOINT_TYPE] [--os-compute-api-version COMPUTE_API_VERSION] [--os-cacert CA_CERTIFICATE] [--insecure] [--bypass-url BYPASS_URL] SUBCOMMAND ... This command returns a list of nova commands and parameters. To get help for a subcommand, run: $ nova help SUBCOMMAND For a complete list of nova commands and parameters, see the OpenStack Command-Line Reference. Set the required parameters as environment variables to make running commands easier. For example, you can add --os-username as a nova option, or set it as an environment variable. To set the user name, password, and tenant as environment variables, use: $ export OS_USERNAME=joecool $ export OS_PASSWORD=coolword $ export OS_TENANT_NAME=coolu The Identity Service will give you an authentication endpoint, which Compute recognizes as OS_AUTH_URL. $ export OS_AUTH_URL=http://hostname:5000/v2.0 $ export NOVA_VERSION=1.1
Managing the cloud with euca2ools The euca2ools command-line tool provides a command line interface to EC2 API calls. For more information about euca2ools, see http://open.eucalyptus.com/wiki/Euca2oolsGuide_v1.3
Logging Logging module Logging behavior can be changed by creating a configuration file. To specify the configuration file, add this line to the /etc/nova/nova.conf file: log-config=/etc/nova/logging.conf To change the logging level, add DEBUG, INFO, WARNING, or ERROR as a parameter. The logging configuration file is an INI-style configuration file, which must contain a section called logger_nova. This controls the behavior of the logging facility in the nova-* services. For example: [logger_nova] level = INFO handlers = stderr qualname = nova This example sets the debugging level to INFO (which is less verbose than the default DEBUG setting). For more about the logging configuration syntax, including the handlers and quaname variables, see the Python documentation on logging configuration files. For an example logging.conf file with various defined handlers, see the OpenStack Configuration Reference. Syslog OpenStack Compute services can send logging information to syslog. This is useful if you want to use rsyslog to forward logs to a remote machine. Separately configure the Compute service (nova), the Identity service (keystone), the Image service (glance), and, if you are using it, the Block Storage service (cinder) to send log messages to syslog. Open these configuration files: /etc/nova/nova.conf /etc/keystone/keystone.conf /etc/glance/glance-api.conf /etc/glance/glance-registry.conf /etc/cinder/cinder.conf In each configuration file, add these lines: verbose = False debug = False use_syslog = True syslog_log_facility = LOG_LOCAL0 In addition to enabling syslog, these settings also turn off verbose and debugging output from the log. Although this example uses the same local facility for each service (LOG_LOCAL0, which corresponds to syslog facility LOCAL0), we recommend that you configure a separate local facility for each service, as this provides better isolation and more flexibility. For example, you can capture logging information at different severity levels for different services. syslog allows you to define up to eight local facilities, LOCAL0, LOCAL1, ..., LOCAL7. For more information, see the syslog documentation. Rsyslog rsyslog is useful for setting up a centralized log server across multiple machines. This section briefly describe the configuration to set up an rsyslog server. A full treatment of rsyslog is beyond the scope of this book. This section assumes rsyslog has already been installed on your hosts (it is installed by default on most Linux distributions). This example provides a minimal configuration for /etc/rsyslog.conf on the log server host, which receives the log files: # provides TCP syslog reception $ModLoad imtcp $InputTCPServerRun 1024 Add a filter rule to /etc/rsyslog.conf which looks for a host name. This example uses COMPUTE_01 as the compute host name: :hostname, isequal, "COMPUTE_01" /mnt/rsyslog/logs/compute-01.log On each compute host, create a file named /etc/rsyslog.d/60-nova.conf, with the following content: # prevent debug from dnsmasq with the daemon.none parameter *.*;auth,authpriv.none,daemon.none,local0.none -/var/log/syslog # Specify a log level of ERROR local0.error @@172.20.1.43:1024 Once you have created the file, restart the rsyslog service. Error-level log messages on the compute hosts should now be sent to the log server. Serial console The serial console provides a way to examine kernel output and other system messages during troubleshooting if the instance lacks network connectivity. OpenStack Icehouse and earlier supports read-only access using the serial console using the os-GetSerialOutput server action. Most cloud images enable this feature by default. For more information, see Troubleshoot Compute. OpenStack Juno and later supports read-write access using the serial console using the os-GetSerialConsole server action. This feature also requires a websocket client to access the serial console. Configuring read-write serial console access On a compute node, edit the /etc/nova/nova.conf file: In the [serial_console] section, enable the serial console: [serial_console] ... enabled = true In the [serial_console] section, configure the serial console proxy similar to graphical console proxies: [serial_console] ... base_url = ws://controller:6083/ listen = 0.0.0.0 proxyclient_address = MANAGEMENT_INTERFACE_IP_ADDRESS The option specifies the base URL that clients receive from the API upon requesting a serial console. Typically, this refers to the host name of the controller node. The option specifies the network interface nova-compute should listen on for virtual console connections. Typically, 0.0.0.0 will enable listening on all interfaces. The option specifies which network interface the proxy should connect to. Typically, this refers to the IP address of the management interface. When you enable read-write serial console access, Compute will add serial console information to the Libvirt XML file for the instance. For example: <console type='tcp'> <source mode='bind' host='127.0.0.1' service='10000'/> <protocol type='raw'/> <target type='serial' port='0'/> <alias name='serial0'/> </console> Accessing the serial console on an instance Use the nova get-serial-proxy command to retrieve the websocket URL for the serial console on the instance: $ nova get-serial-proxy INSTANCE_NAME +--------+-----------------------------------------------------------------+ | Type | Url | +--------+-----------------------------------------------------------------+ | serial | ws://127.0.0.1:6083/?token=18510769-71ad-4e5a-8348-4218b5613b3d | +--------+-----------------------------------------------------------------+ Alternatively, use the API directly: $ curl -i 'http://<controller>:8774/v2/<tenant_uuid>/servers/<instance_uuid>/action' \ -X POST \ -H "Accept: application/json" \ -H "Content-Type: application/json" \ -H "X-Auth-Project-Id: <project_id>" \ -H "X-Auth-Token: <auth_token>" \ -d '{"os-getSerialConsole": {"type": "serial"}}' Use Python websocket with the URL to generate .send, .recv, and .fileno methods for serial console access. For example: import websocket ws = websocket.create_connection( 'ws://127.0.0.1:6083/?token=18510769-71ad-4e5a-8348-4218b5613b3d', subprotocols=['binary', 'base64']) Alternatively, use a Python websocket client such as . When you enable the serial console, typical instance logging using the nova console-log command is disabled. Kernel output and other system messages will not be visible unless you are actively viewing the serial console.
Migrate instances This section discusses how to migrate running instances from one OpenStack Compute server to another OpenStack Compute server. Before starting a migration, review the Configure migrations section. Although the nova command is called live-migration, under the default Compute configuration options, the instances are suspended before migration. For more information, see Configure migrations in the OpenStack Configuration Reference. Migrating instances Check the ID of the instance to be migrated: $ nova list Check the information associated with the instance. In this example, vm1 is running on HostB: $ nova show d1df1b5a-70c4-4fed-98b7-423362f2c47c Select the compute node the instance will be migrated to. In this example, we will migrate the instance to HostC, because nova-compute is running on it.: # nova service-list +------------------+------------+----------+---------+-------+----------------------------+-----------------+ | Binary | Host | Zone | Status | State | Updated_at | Disabled Reason | +------------------+------------+----------+---------+-------+----------------------------+-----------------+ | nova-consoleauth | HostA | internal | enabled | up | 2014-03-25T10:33:25.000000 | - | | nova-scheduler | HostA | internal | enabled | up | 2014-03-25T10:33:25.000000 | - | | nova-conductor | HostA | internal | enabled | up | 2014-03-25T10:33:27.000000 | - | | nova-compute | HostB | nova | enabled | up | 2014-03-25T10:33:31.000000 | - | | nova-compute | HostC | nova | enabled | up | 2014-03-25T10:33:31.000000 | - | | nova-cert | HostA | internal | enabled | up | 2014-03-25T10:33:31.000000 | - | +------------------+------------+----------+---------+-------+----------------------------+-----------------+ Check that HostC has enough resources for migration: # nova host-describe HostC +-----------+------------+-----+-----------+---------+ | HOST | PROJECT | cpu | memory_mb | disk_gb | +-----------+------------+-----+-----------+---------+ | HostC | (total) | 16 | 32232 | 878 | | HostC | (used_now) | 13 | 21284 | 442 | | HostC | (used_max) | 13 | 21284 | 442 | | HostC | p1 | 13 | 21284 | 442 | | HostC | p2 | 13 | 21284 | 442 | +-----------+------------+-----+-----------+---------+ cpu: Number of CPUs memory_mb: Total amount of memory, in MB disk_gb: Total amount of space for NOVA-INST-DIR/instances, in GB In this table, the first row shows the total amount of resources available on the physical server. The second line shows the currently used resources. The third line shows the maximum used resources. The fourth line and below shows the resources available for each project. Migrate the instances using the nova live-migration command: $ nova live-migration SERVER HOST_NAME In this example, SERVER can be the ID or name of the instance. Another example: $ nova live-migration d1df1b5a-70c4-4fed-98b7-423362f2c47c HostC Check the instances have been migrated successfully, using nova list. If instances are still running on HostB, check the log files at src/dest for nova-compute and nova-scheduler) to determine why.