Bug 1875508
| Summary: | THT fails to deploy Spine and Leaf architecture if TLS everywhere is enabled | |||
|---|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Alex Stupnikov <astupnik> | |
| Component: | openstack-tripleo-heat-templates | Assignee: | Harald Jensås <hjensas> | |
| Status: | CLOSED ERRATA | QA Contact: | David Rosenfeld <drosenfe> | |
| Severity: | low | Docs Contact: | ||
| Priority: | high | |||
| Version: | 13.0 (Queens) | CC: | alee, amcleod, gregraka, hjensas, mburns, pbabbar, pweeks, rheslop, sputhenp | |
| Target Milestone: | z16 | Keywords: | Triaged, ZStream | |
| Target Release: | 13.0 (Queens) | Flags: | pweeks:
needinfo-
pweeks: needinfo- |
|
| Hardware: | All | |||
| OS: | All | |||
| Whiteboard: | ||||
| Fixed In Version: | openstack-tripleo-heat-templates-8.4.1-82.el7ost | Doc Type: | Enhancement | |
| Doc Text: |
This enhancement enables you to override the Orchestration service (heat) parameter, `ServiceNetMap`, for a role when you deploy the overcloud.
+
On spine-and-leaf (edge) deployments that use TLS-everywhere, hiera interpolation has been problematic when used to map networks on roles. Overriding the ServiceNetMap per role fixes the issues seen in some TLS-everywhere deployments, provides an easier interface, and replaces the need for the more complex hiera interpolation.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1918585 (view as bug list) | Environment: | ||
| Last Closed: | 2021-06-16 10:58:54 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1918585 | |||
|
Comment 2
Alex Stupnikov
2020-09-03 16:09:29 UTC
@Ade, It seems we don't document the libvirt_certificates_specs and libvirt_vnc_certificates_specs, since the spine_leaf_networking book in doc's don't example TLS. We should enchance the docs. [1] https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/13/html-single/spine_leaf_networking/index I think one way to verify would be to use the role-based parameter to map some service to a non-default network. If we deploy Compute and Controller roles, we can for example re-map some Nova stuff that is default on 'internal_api' to the 'storage' network.
Ie:
parameter_defaults:
ControllerServiceNetMap:
NovaMetadataNetwork: storage
NovaVncProxyNetwork: storage
NovaLibvirtNetwork: storage
ComputeServiceNetMap:
NovaMetadataNetwork: storage
NovaVncProxyNetwork: storage
NovaLibvirtNetwork: storage
Then check that etc/nova.conf ``[vnc]/server_listen`` is set to the node's ip address on the storage network.
Unless we have a spine-and-leaf OSP13 job with TLSe enabled?
Then we should switch that to use the per-role ServiceNetMap functionaly this fix adds, and remove the hiera interpolation overrides.
i.e replace the hiera interpolation overrides as exampled in the doc[1]:
This
----
Compute1ServiceNetMap:
NeutronTenantNetwork: tenant1
NovaApiNetwork: internal_api1
NovaLibvirtNetwork: internal_api1
NovaVncProxyNetwork: internal_api1
Not-this
--------
Compute1ExtraConfig:
nova::compute::libvirt::vncserver_listen: "%{hiera('internal_api1')}"
nova::compute::vncserver_proxyclient_address: "%{hiera('internal_api1')}"
neutron::agents::ml2::ovs::local_ip: "%{hiera('tenant1')}"
cold_migration_ssh_inbound_addr: "%{hiera('internal_api1')}"
live_migration_ssh_inbound_addr: "%{hiera('internal_api1')}"
nova::migration::libvirt::live_migration_inbound_addr: "%{hiera('internal_api1')}"
nova::my_ip: "%{hiera('internal_api1')}"
tripleo::profile::base::database::mysql::client::mysql_client_bind_address: "%{hiera('internal_api1')}"
https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/13/html-single/spine_leaf_networking/index#assigning-routes-for-roles (step 4.)
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat OpenStack Platform 13.0 bug fix and enhancement advisory), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:2385 |