Académique Documents
Professionnel Documents
Culture Documents
Platform 6
Administration Guide
Legal Notice
Co pyright 20 15 Red Hat Inc.
The text o f and illustratio ns in this do cument are licensed by Red Hat under a Creative
Co mmo ns Attributio nShare Alike 3.0 Unpo rted license ("CC-BY-SA"). An explanatio n o f CCBY-SA is available at
http://creativeco mmo ns.o rg/licenses/by-sa/3.0 /
. In acco rdance with CC-BY-SA, if yo u distribute this do cument o r an adaptatio n o f it, yo u must
pro vide the URL fo r the o riginal versio n.
Red Hat, as the licenso r o f this do cument, waives the right to enfo rce, and agrees no t to assert,
Sectio n 4 d o f CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shado wman lo go , JBo ss, MetaMatrix, Fedo ra, the Infinity
Lo go , and RHCE are trademarks o f Red Hat, Inc., registered in the United States and o ther
co untries.
Linux is the registered trademark o f Linus To rvalds in the United States and o ther co untries.
Java is a registered trademark o f Oracle and/o r its affiliates.
XFS is a trademark o f Silico n Graphics Internatio nal Co rp. o r its subsidiaries in the United
States and/o r o ther co untries.
MySQL is a registered trademark o f MySQL AB in the United States, the Euro pean Unio n and
o ther co untries.
No de.js is an o fficial trademark o f Jo yent. Red Hat So ftware Co llectio ns is no t fo rmally
related to o r endo rsed by the o fficial Jo yent No de.js o pen so urce o r co mmercial pro ject.
The OpenStack Wo rd Mark and OpenStack Lo go are either registered trademarks/service
marks o r trademarks/service marks o f the OpenStack Fo undatio n, in the United States and o ther
co untries and are used with the OpenStack Fo undatio n's permissio n. We are no t affiliated with,
endo rsed o r spo nso red by the OpenStack Fo undatio n, o r the OpenStack co mmunity.
All o ther trademarks are the pro perty o f their respective o wners.
Abstract
This Administratio n Guide pro vides pro cedures fo r the management o f a Red Hat Enterprise
Linux OpenStack Platfo rm enviro nment. Pro cedures to manage bo th user pro jects and the
clo ud co nfiguratio n are pro vided.
T able of Contents
.CHAPT
. . . . . .ER
. . .1.. .INT
. . .RO
. . .DUCT
. . . . .IO
. .N. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. . . . . . . . . .
1.1. O PENSTACK DASHBO ARD
3
1.2. CO MMAND-LINE CLIENTS
4
.CHAPT
. . . . . .ER
. . .2.. .PRO
. . . .JECT
. . . .S
. .AND
. . . . USERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. . . . . . . . . .
2.1. MANAG E PRO JECTS
6
2.2. MANAG E USERS
10
.CHAPT
. . . . . .ER
. . .3.. .VIRT
. . . .UAL
. . . .MACHINE
. . . . . . . . .INST
. . . .ANCES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. 7. . . . . . . . . .
3.1. MANAG E INSTANCES
17
3.2. MANAG E INSTANCE SECURITY
28
3.3. MANAG E FLAVO RS
30
3.4. MANAG E HO ST AG G REG ATES
37
3.5. SCHEDULE HO STS AND CELLS
41
3.6 . EVACUATE INSTANCES
48
.CHAPT
. . . . . .ER
. . .4.. .IMAG
. . . . ES
. . . AND
. . . . .ST
. .O
. .RAG
. . . .E. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
...........
4.1. MANAG E IMAG ES
52
4.2. MANAG E VO LUMES
4.3. MANAG E CO NTAINERS
67
84
. . . . . . .ER
CHAPT
. . .5.. .NET
. . . WO
. . . RKING
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8. 7. . . . . . . . . .
5.1. MANAG E NETWO RK RESO URCES
5.2. CO NFIG URE IP ADDRESSING
87
96
98
.CHAPT
. . . . . .ER
. . .6.. .CLO
. . . UD
. . . .RESO
. . . . .URCES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0. 0. . . . . . . . . .
6 .1. MANAG E STACKS
10 0
6 .2. USING THE TELEMETRY SERVICE
10 3
.CHAPT
. . . . . .ER
. . .7.. .T. RO
. . .UBLESHO
. . . . . . . . .O. T
. .ING
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0. 9. . . . . . . . . .
7.1. LO G G ING
10 9
7.2. SUPPO RT
113
. . . . . . . . . .A.
APPENDIX
. . IMAG
. . . . .E. CO
. . . NFIG
. . . . URAT
. . . . . .IO
. .N. PARAMET
. . . . . . . . . ERS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.1. 4. . . . . . . . . .
. . . . . . . . . .B.
APPENDIX
. . REVISIO
. . . . . . . .N. HIST
. . . . .O. RY
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.2. 2. . . . . . . . . .
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
CHAPTER 1. INTRODUCTION
Red Hat Enterprise Linux OpenStack Platform (RHEL OpenStack Platform) provides the
foundation to build a private or public Infrastructure-as-a-Service (IaaS) cloud on top of Red
Hat Enterprise Linux. It offers a massively scalable, fault-tolerant platform for the
development of cloud-enabled workloads.
This guide provides cloud-management procedures for the following OpenStack services:
Block Storage, Compute, D ashboard, Identity, Image, Object Storage, OpenStack
Networking, Orchestration, and Telemetry.
Procedures for both administrators and project users (end users) are provided;
administrator-only procedures are marked as such.
You can manage the cloud using either the OpenStack dashboard or the command-line
clients. Most procedures can be carried out using either method; some of the more advanced
procedures can only be executed on the command line. This guide provides procedures for
the dashboard where possible.
Note
For the complete suite of documentation for RHEL OpenStack Platform, see
https://access.redhat.com/documentation/enUS/Red_Hat_Enterprise_Linux_OpenStack_Platform/
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Examp le 1.1.
$ source ~/keystonerc_admin
Note
By default, the Packstack utility creates the ad mi n and d emo users, and their
keysto ne_ad mi n and keysto ne_d emo RC files.
Examp le 1.2.
The following example file sets the necessary variables for the ad mi n user:
export
export
export
export
export
OS_USERNAME=admin
OS_TENANT_NAME=admin
OS_PASSWORD=secretPass
OS_AUTH_URL=http://192.0.2.24:35357/v2.0/
PS1='[\u@ \h \W(keystone_admin)]\$ '
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
4. On the P ro ject Members tab, add members to the project, or remove them as
needed.
5. Click Save.
Note
The Enabl ed check box is selected by default. To temporarily disable the project,
clear the Enabl ed check box. To enable a disabled project, select the Enabl ed
check box.
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
All projects have a default security group that is applied to any instance that has no other
defined security group. Unless you change the default values, this security group denies all
incoming traffic and allows only outgoing traffic to your instance.
Field
Descript ion
Rule
Rule typ e. If yo u s p ec ify a rule temp late (fo r examp le, ' SSH' ), its field s are
auto matic ally filled in:
TCP: Typ ic ally us ed to exc hang e d ata b etween s ys tems , and fo r end us er c o mmunic atio n.
UDP: Typ ic ally us ed to exc hang e d ata b etween s ys tems , p artic ularly at
the ap p lic atio n level.
ICMP: Typ ic ally us ed b y netwo rk d evic es , s uc h as ro uters , to s end
erro r o r mo nito ring mes s ag es .
Direc tio
n
Field
O p en
Po rt
Descript ion
Typ e
Co d e
Remo te
2 .1 .5 .4 . De le t e a Se curit y Gro up
1. In the dashboard, select P ro ject > C o mpute > Access & Securi ty.
2. On the Securi ty G ro ups tab, select the group, and click D el ete Securi ty
G ro ups.
3. Click D el ete Securi ty G ro ups.
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Note
You cannot undo the delete action.
10
Examp le 2.1.
Examp le 2.2.
11
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
2. To assign a user to a project, you must assign the role to a user-project pair. To do
this, you need the user, role, and project names or ID s.
a. List users:
$ keystone user-list
b. List roles:
$ keystone role-list
c. List projects:
$ keystone tenant-list
Examp le 2.3.
In this example, you assign the new-ro l e role to the d emo -d emo pair:
$ keystone user-role-add --user demo --role new-role -tenant demo
Examp le 2.4 .
12
2 .2 .4 .3. De le t e a Ro le
1. Remove a role from a user-project pair:
$ keystone user-role-remove --user USER_NAME --role ROLE -tenant TENANT_NAME
If the role was removed, the command output omits the removed role.
Examp le 2.5.
13
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Examp le 2.6 .
Note
To view a list of options for the quota-update command, run:
$ nova help quota-update
14
Examp le 2.7.
The following line in /etc/no va/po l i cy. jso n specifies that there are no restrictions
on which users can create volumes; if the user has any role in a tenant, they can create
volumes in that tenant.
"volume:create": [],
Examp le 2.8.
To restrict creation of volumes to users who had the compute-user role in a particular
tenant, you would add " role:compute-user" to the Compute policy:
"volume:create": ["role:compute-user"],
Examp le 2.9 .
To restrict all Compute service requests to require this role, values in the file might look
like the following (not a complete example):
{"admin_or_owner": [["role:admin"], ["project_id:%
(project_id)s"]],
"default": [["rule:admin_or_owner"]],
"compute:create": ["role:compute-user"],
"compute:create:attach_network": ["role:compute-user"],
"compute:create:attach_volume": ["role:compute-user"],
"compute:get_all": ["role:compute-user"],
"compute:unlock_override": ["rule:admin_api"],
"admin_api": [["role:admin"]],
"compute_extension:accounts": [["rule:admin_api"]],
"compute_extension:admin_actions": [["rule:admin_api"]],
"compute_extension:admin_actions:pause":
[["rule:admin_or_owner"]],
"compute_extension:admin_actions:unpause":
[["rule:admin_or_owner"]],
"compute_extension:admin_actions:suspend":
[["rule:admin_or_owner"]],
"compute_extension:admin_actions:resume":
[["rule:admin_or_owner"]],
"compute_extension:admin_actions:lock": [["rule:admin_or_owner"]],
"compute_extension:admin_actions:unlock":
[["rule:admin_or_owner"]],
"compute_extension:admin_actions:resetNetwork":
[["rule:admin_api"]],
"compute_extension:admin_actions:injectNetworkInfo":
[["rule:admin_api"]],
"compute_extension:admin_actions:createBackup":
[["rule:admin_or_owner"]],
"compute_extension:admin_actions:migrateLive":
15
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
[["rule:admin_api"]],
"compute_extension:admin_actions:migrate": [["rule:admin_api"]],
"compute_extension:aggregates": [["rule:admin_api"]],
"compute_extension:certificates": ["role:compute-user"],
"compute_extension:cloudpipe": [["rule:admin_api"]],
"compute_extension:console_output": ["role:compute-user"],
"compute_extension:consoles": ["role:compute-user"],
"compute_extension:createserverext": ["role:compute-user"],
"compute_extension:deferred_delete": ["role:compute-user"],
"compute_extension:disk_config": ["role:compute-user"],
"compute_extension:evacuate": [["rule:admin_api"]],
"compute_extension:extended_server_attributes":
[["rule:admin_api"]],
...
16
T ab
Field
Not es
17
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
T ab
Field
Not es
Details
Availab ility Zo ne
Flavo r
Ins tanc e Bo o t
So urc e
Dep end ing o n the item s elec ted , new field s are
d is p layed allo wing yo u to s elec t the s o urc e:
Imag e s o urc es mus t b e c o mp atib le with
O p enStac k (s ee Sec tio n 4.1, Manag e
Imag es ).
If a vo lume o r vo lume s o urc e is s elec ted , the
s o urc e mus t b e fo rmatted us ing an imag e
(s ee Sec tio n 4.2, Manag e Vo lumes ).
Ac c es s and
Sec urity
Netwo rking
18
Key Pair
Sec urity G ro up s
T ab
Field
Not es
Po s tCreatio n
Ad vanc ed
O p tio ns
Dis k Partitio n
Co nfig uratio n
Drive
Act ion
Descript ion
Create Snap s ho t
As s o c iate/Dis as s o c i
ate Flo ating IP
Ed it Ins tanc e
Ed it Sec urity G ro up s
19
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Act ion
Descript ion
Co ns o le
View Lo g
Immed iately p aus e the ins tanc e (yo u are no t as ked fo r c o nfirmatio n);
the s tate o f the ins tanc e is s to red in memo ry (RAM).
Bring up the Res iz e Ins tanc e wind o w (s ee Sec tio n 3.1.3, Res iz e an
ins tanc e ).
So ft Reb o o t
G rac efully s to p and res tart the ins tanc e. A s o ft reb o o t attemp ts to
g rac efully s hut d o wn all p ro c es s es b efo re res tarting the ins tanc e.
Hard Reb o o t
Sto p and res tart the ins tanc e. A hard reb o o t effec tively jus t s huts
d o wn the ins tanc e' s ' p o wer' and then turns it b ac k o n.
Us e new imag e and d is k-p artitio n o p tio ns to reb uild the imag e (s hut
d o wn, re-imag e, and re-b o o t the ins tanc e). If enc o untering o p erating
s ys tem is s ues , this o p tio n is eas ier to try than terminating the
ins tanc e and s tarting o ver.
Permanently d es tro y the ins tanc e (yo u are as ked fo r c o nfirmatio n).
For example, you can create and allocate an external address by using the 'Associate
Floating IP' action.
Pro ced u re 3.2. U p d at e Examp le - Assig n a Flo at in g IP
1. In the dashboard, select P ro ject > C o mpute > Instances.
2. Select the Asso ci ate Fl o ati ng IP action for the instance.
Note
A floating IP address can only be selected from an already created floating
IP pool (see Section 5.2.1, Create Floating IP Pools ).
20
Note
If you do not know the name of the instance, just its IP address (and you do not
want to flip through the details of all your instances), you can run the following on
the command line:
$ nova list --ip IPAddress
21
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Warn in g
Red Hat does not recommend any particular libvirt security strategy; SSHtunneling steps are provided for user reference only. Only users with ro o t access
can set up SSH tunneling.
2. On the first compute node, generate a key pair for the no va user:
# su nova
# ssh-keygen
# echo 'StrictHostKeyChecking no' >> /var/lib/nova/.ssh/config
# cat /var/lib/nova/.ssh/id_rsa.pub >>
/var/lib/nova/.ssh/authorized_keys
The key pair, i d _rsa and i d _rsa. pub, is generated in /var/l i b/no va/. ssh.
3. As root, copy the created key pair to the second compute node:
# scp /var/lib/nova/.ssh/id_rsa root@ computeNodeAddress:~/
# scp /var/lib/nova/.ssh/id_rsa.pub root@ computeNodeAddress:~/
4. As root on the second compute node, change the copied key pair's permissions back
to 'nova', and then add the key pair into SSH:
#
#
#
#
22
# cp id_rsa /var/lib/nova/.ssh/
# cat id_rsa.pub >> /var/lib/nova/.ssh/authorized_keys
# echo 'StrictHostKeyChecking no' >> /var/lib/nova/.ssh/config
5. Ensure that the no va user can now log into each node without using a password:
# su nova
# ssh nova@ computeNodeAddress
6. As root on both nodes, restart both libvirt and the Compute services:
# systemctl restart libvirtd.service
# systemctl restart openstack-nova-compute.service
23
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
3. Log in using the image's user name and password (for example, a CirrOS image
uses 'cirros'/'cubswin:)').
Note
Red Hat Enterprise Linux guest images typically do not allow direct console
access; you must SSH into the instance (see Section 3.1.5.4, SSH into an
Instance ).
24
Note
no va-xvpvncvi ewer provides a simple example of a Java client. To
download the client, use:
# git clone https://github.com/cloudbuilders/novaxvpvncviewer
# cd nova-xvpvncviewer/viewer
# make
This tool is provided only for customer convenience, and is not officially
supported by Red Hat.
This tool is provided only for customer convenience, and is not officially supported
by Red Hat.
However, depending on your installation, the administrator may need to first set up the
no va-seri al pro xy service. The proxy service is a websocket proxy that allows
connections to OpenStack Compute serial ports.
25
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
2. Update the seri al _co nso l e section in /etc/no va/no va. co nf:
a. Enable the no va-seri al pro xy service:
$ openstack-config --set /etc/nova/nova.conf
serial_console enabled true
b. Specify the string used to generate URLS provided by the no va g etseri al -co nso l e command.
$ openstack-config --set /etc/nova/nova.conf
serial_console base_url ws://PUBLIC_IP:6083/
Where PUBLIC_IP is the public IP address of the host running the no vaseri al pro xy service.
c. Specify the IP address on which the instance serial console should listen
(string).
$ openstack-config --set /etc/nova/nova.conf
serial_console listen 0.0.0.0
[serial_console]
enabled=true
base_url=ws://192.0.2.0:6083/
listen=0.0.0.0
proxyclient_address=192.0.2.3
26
5. Restart any running instances, to ensure that they are now listening on the right
sockets.
6. Open the firewall for serial-console port connections. Serial ports are set using
[seri al _co nso l e] po rt_rang e in /etc/no va/no va. co nf; by default, the
range is 10000:20000. Update iptables with:
# iptables -I INPUT 1 -p tcp --dport 10000:20000 -j ACCEPT
5. You can now SSH into the file with the user supplied by the image.
The following example command shows how to SSH into the Red Hat Enterprise
Linux guest image with the user 'cloud-user':
$ ssh cloud-user@ 192.0.2.24
Note
You can also use the certificate directly. For example:
$ ssh -i /myDir/os-key.pem cloud-user@ 192.0.2.24
27
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
28
Key pairs provide SSH access to the instances. Each time a key pair is generated, its
certificate is downloaded to the local machine and can be distributed to users. Typically, one
key pair is created for each project (and used for multiple instances).
You can also import an existing key pair into OpenStack.
3.2 .1 .2 . Im po rt a Ke y Pair
1. In the dashboard, select P ro ject > C o mpute > Access & Securi ty.
2. On the Key P ai rs tab, click Impo rt Key P ai r.
3. Specify a name in the Key P ai r Name field, and copy and paste the contents of
your public key into the P ubl i c Key field.
4. Click Impo rt Key P ai r.
29
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Projects have a limited range of floating IP address that can be used (by default, the limit is
50), so you should release these addresses for reuse when they are no longer needed.
Floating IP addresses can only be allocated from an existing floating IP pool (see
Section 5.2.1, Create Floating IP Pools ).
Pro ced u re 3.4 . Allo cat e a Flo at in g IP t o t h e Pro ject
1. In the dashboard, select P ro ject > C o mpute > Access & Securi ty.
2. On the Fl o ati ng IP s tab, click Al l o cate IP to P ro ject.
3. Select a network from which to allocate the IP address in the P o o l field.
4. Click Al l o cate IP .
Pro ced u re 3.5. Assig n a Flo at in g IP
1. In the dashboard, select P ro ject > C o mpute > Access & Securi ty.
2. On the Fl o ati ng IP s tab, click the address' Asso ci ate button.
3. Select the address to be assigned in the IP ad d ress field.
Note
If no addresses are available, you can click the + button to create a new
address.
30
Each created instance is given a flavor (resource template), which determines the instance's
size and capacity. Flavors can also specify secondary ephemeral storage, swap disk,
metadata to restrict usage, or special project access (none of the default flavors have these
additional attributes defined).
T ab le 3.1. D ef au lt Flavo rs
Name
vCPUs
RAM
m1.tiny
512 MB
1 GB
m1.s mall
20 48 MB
20 G B
m1.med ium
40 9 6 MB
40 G B
m1.larg e
8 19 2 MB
80 GB
m1.xlarg e
16 38 4 MB
16 0 G B
The majority of end users will be able to use the default flavors. However, you might need to
create and manage specialized flavors. For example, you might:
Change default memory and capacity to suit the underlying hardware needs.
Add metadata to force a specific I/O rate for the instance or to match a host aggregate.
Note
Behavior set using image properties overrides behavior set using flavors (for more
information, see Section 4.1, Manage Images ).
31
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
T ab
Field
Descript ion
Flavo r
Info rmati
on
Name
Uniq ue name.
ID
VCPUs
RAM (MB)
Ro o t Dis k (G B)
Ep ehemeral Dis k
(G B)
Flavo r
Ac c es s
32
Both pre-defined and user-defined keys can determine instance scheduling. For example,
you might specify 'SpecialComp=True'; any instance with this flavor can then only run in
a host aggregate with the same key-value combination in its metadata (see Section 3.4,
Manage Host Aggregates ).
33
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Key
Descript ion
hw: action
Ac tio n that c o nfig ures s up p o rt limits p er ins tanc e. Valid
ac tio ns are:
hw: NUMA_def
Definitio n o f NUMA to p o lo g y fo r the ins tanc e. Fo r flavo rs
who s e RAM and vCPU allo c atio ns are larg er than the s iz e
o f NUMA no d es in the c o mp ute ho s ts , d efining NUMA
to p o lo g y enab les ho s ts to b etter utiliz e NUMA and
imp ro ve p erfo rmanc e o f the g ues t O S.
NUMA d efinitio ns d efined thro ug h the flavo r o verrid e
imag e d efinitio ns . Valid d efinitio ns are:
34
Key
35
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Key
Descript ion
hw_rng : action
A rand o m-numb er g enerato r d evic e c an b e ad d ed to an
ins tanc e us ing its imag e p ro p erties (s ee hw_rng _mo d el
in the " Co mmand -Line Interfac e Referenc e" in RHEL
O p enStac k Platfo rm d o c umentatio n).
If the d evic e has b een ad d ed , valid ac tio ns are:
al l o wed - If ' True' , the d evic e is enab led ; if ' Fals e' ,
d is ab led . By d efault, the d evic e is d is ab led .
hw_vi d eo : ram_max_mb
Maximum p ermitted RAM to b e allo wed fo r vid eo d evic es
(in MB).
Examp le: ' hw:ram_max_mb =6 4'
q uo ta: option
Enfo rc ing limit fo r the ins tanc e. Valid o p tio ns are:
36
Key
Descript
b ytes ion
p er s ec o nd .
37
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Administrators can use host aggregates to handle load balancing, enforce physical
isolation (or redundancy), group servers with common attributes, or separate out classes
of hardware. When you create an aggregate, a zone name must be specified, and it is this
name which is presented to the end user.
Availability zones - An availability zone is the end-user view of a host aggregate. An end
user cannot view which hosts make up the zone, nor see the zone's metadata; the user
can only see the zone's name.
End users can be directed to use specific zones which have been configured with certain
capabilities or within certain areas.
38
39
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Under Avai l abl e Metad ata, click on the O ther field, and specify the
key you want to add. Use predefined keys (see Table 3.3, Host Aggregate
Metadata ) or add your own (which will only be valid if exactly the same
key is set in an instance's flavor).
Click the + button; you can now view the new key under Exi sti ng
Metad ata.
N o t e: Remove a key by clicking its - icon.
Click Save.
T ab le 3.3. H o st Ag g reg at e Met ad at a
Key
Descript ion
cpu_al l o cati o n
_rati o
d i sk_al l o cati o
n_rati o
fi l ter_tenant_i
d
ram_al l o cati o n
_rati o
40
41
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
You define which filters you would like the scheduler to use in the
sched ul er_d efaul t_fi l ters option (/etc/no va/no va. co nf file; you must have
either ro o t or no va user permissions). Filters can be added or removed.
By default, the following filters are configured to run in the scheduler:
scheduler_default_filters=RetryFilter,AvailabilityZoneFilter,RamFilter
,ComputeFilter,ComputeCapabilitiesFilter,ImagePropertiesFilter,Server
GroupAntiAffinityFilter,ServerGroupAffinityFilter
Filt er
Descript ion
42
Filt er
Descript ion
Metad ata in the ho s t ag g reg ate mus t matc h the ho s t' s flavo r
metad ata. Fo r mo re info rmatio n, s ee Sec tio n 3.3.4, Up d ate
Flavo r Metad ata .
Ag g reg ateRamFilter
Us es the ho s t-ag g reg ate metad ata key
ram_al l o cati o n_rati o to filter o ut ho s ts exc eed ing the
o ver c o mmit ratio (virtual RAM to p hys ic al RAM allo c atio n
ratio ); o nly valid if a ho s t ag g reg ate is s p ec ified fo r the
ins tanc e.
If this ratio is no t s et, the filter us es the
ram_al l o cati o n_rati o value in the
/etc/no va/no va. co nf file. The d efault value is ' 1.5' (1.5
RAM c an b e allo c ated fo r eac h p hys ic al RAM).
AllHo s ts Filter
Filters us ing the ins tanc e' s s p ec ified availab ility z o ne.
Ens ures Co mp ute metad ata is read c o rrec tly. Anything b efo re
the ' :' is read as a names p ac e. Fo r examp le,
' q uo ta:c p u_p erio d ' us es ' q uo ta' as the names p ac e and
' c p u_p erio d ' as the key.
Co mp uteFilter
Co reFilter
DifferentHo s tFilter
43
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Filt er
Descript ion
Dis kFilter
Is o lated Ho s ts Filter
Js o nFilter
Rec o g nis es and us es an ins tanc e' s c us to m JSO N filters :
Valid o p erato rs are: =, < , > , in, < =, > =, no t, o r, and
Rec o g nis ed variab les are: $free_ram_mb ,
$free_d i sk_mb , $to tal _usabl e_ram_mb ,
$vcpus_to tal , $vcpus_used
The filter is s p ec fied as a q uery hint in the no va bo o t
c o mmand . Fo r examp le:
44
Metric Filter
NUMATo p o lo g yFilter
RamFilter
RetryFilter
Filt er
Descript ion
SameHo s tFilter
Pas s es o ne o r mo re s p ec ified ho s ts ; s p ec ify ho s ts fo r the
ins tanc e us ing the --hint same_host o p tio n fo r no va
bo o t.
ServerG ro up AffinityFilter
O nly p as s es ho s ts fo r a s p ec ific s erver g ro up :
G ive the s erver g ro up the affinity p o lic y ( no va serverg ro up-create --po l i cy affi ni ty groupName ).
Build the ins tanc e with that g ro up ( no va bo o t o p tio n -hi nt g ro up= UUID ).
ServerG ro up AntiAffinityFilter
O nly p as s es ho s ts in a s erver g ro up that d o no t alread y ho s t
an ins tanc e:
G ive the s erver g ro up the anti-affinity p o lic y ( no va
Simp leCIDRAffinityFilter
O nly p as s es ho s ts o n the s p ec ified IP s ub net rang e
s p ec ified b y the ins tanc e' s ci d r and
bui l d _new_ho st_i p hints . Examp le:
45
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
You can define the host weighers you would like the scheduler to use in the [D EFAULT ]
sched ul er_wei g ht_cl asses option. Valid weighers are:
no va. sched ul er. wei g hts. ram - Weighs the host's available RAM.
no va. sched ul er. wei g hts. metri cs - Weighs the host's metrics.
no va. sched ul er. wei g hts. al l _wei g hers - Uses all host weighers (default).
T ab le 3.5. H o st Weig h t O p t io n s
Weighe
r
O pt ion
Descript ion
All
[DEFAULT]
s c hed uler_ho s t_s ub s et_s i
ze
metric s
46
metric s
[metric s ]
weig ht_o f_unavailab le
metric s
Weighe
r
O pt ion
metric s
Descript ion
ram
[DEFAULT]
ram_weig ht_multip lier
47
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Weighers
O pt ion
Descript ion
mute_c hild
[c ells ]
mute_weig ht_mult
ip lier
mute_c hild
[c ells ]
mute_weig ht_valu
e
[c ells ]
ram_weig ht_multi
p lier
[c ells ]
o ffs et_weig ht_mul
tip lier
48
Note
If you have a functioning compute node, and you want to:
Make a static copy (not running) of an instance for backup purposes or to copy
the instance to a different environment, make a snapshot using no va i mag ecreate (see Migrate a Static Instance).
Move an instance in a static state (not running) to a host in the same
environment (shared storage not needed), migrate it using no va mi g rate (see
Migrate a Static Instance).
Move an instance in a live state (running) to a host in the same environment,
migrate it using no va l i ve-mi g rati o n (see Migrate a Live (running)
Instance).
Where:
--passwo rd pass - Admin password to set for the evacuated instance (cannot be used
if --o n-shared -sto rag e is specified). If a password is not specified, a random
password is generated and output when evacuation is complete.
--o n-shared -sto rag e - Indicates that all instance files are on shared storage.
instance_name - Name of the instance to be evacuated.
target_host - Host to which the instance is evacuated; if you do not specify the host,
the Compute scheduler selects one for you. You can find possible hosts using:
49
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Where:
--targ et target_host - Host to which the instance is evacuated; if you do not specify
the host, the Compute scheduler selects one for you. You can find possible hosts using:
--o n-shared -sto rag e - Indicates that all instance files are on shared storage.
source_host - Name of the host to be evacuated.
For example:
# nova host-evacuate --target Compute2_OnEL7.localdomain
myDemoHost.localdomain
5 20:37 instances
b. Add the following lines to the /etc/expo rts file; switch out node1_IP and
node2_IP for the IP addresses of the two compute nodes:
/var/lib/nova/instances
node1_IP(rw,sync,fsid=0,no_root_squash)
/var/lib/nova/instances
node2_IP(rw,sync,fsid=0,no_root_squash)
c. Export the /var/l i b/no va/i nstances directory to the compute nodes.
# exportfs -avr
50
2. O n each co mp u t e n o d e:
a. Ensure the /var/l i b/no va/i nstances directory exists locally.
b. Add the following line to the /etc/fstab file:
controllerName:/var/lib/nova/instances
/var/lib/nova/instances nfs4 defaults 0 0
e. Ensure that the node can see the instances directory with:
# ls -ld /var/lib/nova/instances
drwxr-xr-x. 9 nova nova 4096 Nov
/var/lib/nova/instances
5 20:37
Note
You can also run the following to view all mounted devices:
# df -k
51
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
52
4 .1 .1 .1 . Use a KVM Gue st Im age Wit h RHEL Ope nSt ack Plat fo rm
You can use a ready RHEL KVM guest qcow2 image available at: RHEL 7 KVM Guest Image
or RHEL 6.6 KVM Guest Image. These images are configured with cl o ud -i ni t and must
take advantage of ec2-compatible metadata services for provisioning SSH keys in order to
function properly.
Note
For the KVM guest images:
The ro o t account in the image is disabled, but sud o access is granted to a
special user named cl o ud -user.
There is no ro o t password set for this image.
The ro o t password is locked in /etc/shad o w by placing ! ! in the second
field.
For an OpenStack instance, it is recommended that you generate an ssh keypair from the
OpenStack dashboard or command line and use that key combination to perform an SSH
public authentication to the instance as ro o t.
When the instance is launched, this public key will be injected to it. You can then
authenticate using the private key downloaded while creating the keypair.
If you want to create custom Red Hat Enterprise Linux images, see Section 4.1.1.2.1, Create
a Red Hat Enterprise Linux 7 Image or Section 4.1.1.2.2, Create a Red Hat Enterprise Linux
6 Image .
53
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Libguestfs tools (run command yum i nstal l l i bg uestfs-to o l s-c). This installs a
set of tools for accessing and modifying virtual machine images.
A Red Hat Enterprise Linux ISO file (see RHEL 7.0 Binary D VD or RHEL 6.6 Binary D VD ).
Text editor, if you want to change the ki ckstart files.
Note
In the following procedures, all commands with the [user@ ho st]# prompt should
be run on your host machine.
54
55
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
For other storage options, choose Auto mati cal l y co nfi g ure
parti ti o ni ng .
e. For software selection, choose Mi ni mal Instal l .
f. For network and hostname, choose eth0 for network and choose a
ho stname for your device. The default ho stname is
l o cal ho st. l o cal d o mai n.
g. Choose the root password.
56
The installation process completes and the C o mpl ete! screen appears.
3. After the installation is complete, reboot the instance and log in as the root user.
4. Update the /etc/sysco nfi g /netwo rk-scri pts/i fcfg -eth0 file so it only
contains the following values:
TYPE=Ethernet
DEVICE=eth0
ONBOOT=yes
BOOTPROTO=dhcp
NM_CONTROLLED=no
a. Enter your Customer Portal user name and password when prompted:
Username: admin@ example.com
Password:
57
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
c. Use the pool identifiers located in the previous step to attach the R ed Hat
Enterpri se Li nux Server entitlement to the system:
# subscription-manager attach --pool=pool_id
For RHEL OpenStack Platform 6, the required channels are rhel -7server-o penstack-6 . 0 -rpms and rhel -7-server-rh-co mmo n-rpms.
Note
For more information, see Software Repository Configuration
11. To ensure the console messages appear in the Lo g tab on the dashboard and the
no va co nso l e-l o g output, add the following boot option to the
/etc/d efaul t/g rub file:
GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"
58
12. Un-register the virtual machine so that the resulting image does not contain the same
subscription details for every instance cloned based on it.
# subscription-manager repos --disable=*
# subscription-manager unregister
# yum clean all
14. Reset and clean the image using the vi rt-sysprep command so it can be to create
instances without issues:
[user@ host]# virt-sysprep -d rhel7
15. Reduce the size of the image using the vi rt-sparsi fy command. This command
converts any free space within the disk image back to free space within the host:
[user@ host]# virt-sparsify --compress rhel7.qcow2 rhel7cloud.qcow2
This creates a new rhel 7-cl o ud . q co w2 file in the location from where the
command is run.
The rhel 7-cl o ud . q co w2 image file is ready to be uploaded to the Image service. For
more information on uploading this image to your OpenStack deployment using the
dashboard, see Section 4.1.2, Upload an Image .
4 .1.1.2.2. C reat e a R ed H at En t erp rise Lin u x 6 Imag e
59
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
This section provides you with the steps to manually create an OpenStack-compatible image
in .qcow2 format using a Red Hat Enterprise Linux 6 ISO file.
1. Start the installation using vi rt-i nstal l :
[user@ host]# qemu-img create -f qcow2 rhel6.qcow2 4G
[user@ host]# virt-install --connect=qemu:///system -network=bridge:virbr0 \
--name=rhel6.6 --os-type linux --os-variant rhel6 \
--disk path=rhel6.qcow2,format=qcow2,size=10,cache=none \
--ram 4096 --vcpus=2 --check-cpu --accelerate \
--hvm --cdrom=rhel-server-6.6-x86_64-dvd.iso
60
The installation checks for disc and performs a Med i a C heck. When the
check is a Success, it ejects the disc.
b. Choose the appropriate Lang uag e and Keybo ard options.
c. When prompted about which type of devices your installation uses, choose
Basi c Sto rag e D evi ces.
61
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
62
a. Enter your Customer Portal user name and password when prompted:
Username: admin@ example.com
Password:
c. Use the pool identifiers located in the previous step to attach the R ed Hat
Enterpri se Li nux Server entitlement to the system:
# subscription-manager attach --pool=pool_id
For RHEL OpenStack Platform 6, the required channels are rhel -7server-o penstack-6 . 0 -rpms and rhel -6 -server-rh-co mmo n-rpms.
Note
For more information, see Software Repository Configuration
63
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
This prevents /etc/ud ev/rul es. d /70 -persi stent-net. rul es file from being
created. If /etc/ud ev/rul es. d /70 -persi stent-net. rul es is created,
networking may not function properly when booting from snapshots (the network
interface is created as " eth1" rather than " eth0" and IP address is not assigned).
11. Add the following line to /etc/sysco nfi g /netwo rk to avoid problems accessing
the EC2 metadata service.
NOZEROCONF=yes
12. To ensure the console messages appear in the Lo g tab on the dashboard and the
no va co nso l e-l o g output, add the following boot option to the
/etc/g rub. co nf:
console=tty0 console=ttyS0,115200n8
13. Un-register the virtual machine so that the resulting image does not contain the same
subscription details for every instance cloned based on it.
# subscription-manager repos --disable=*
# subscription-manager unregister
# yum clean all
15. Reset and clean the image using the vi rt-sysprep command so it can be to create
instances without issues:
64
16. Reduce image size using the vi rt-sparsi fy command. This command converts
any free space within the disk image back to free space within the host:
[user@ host]# virt-sparsify - -compress rhel6.qcow2 rhel6cloud.qcow2
This creates a new rhel 6 -cl o ud . q co w2 file in the location from where the
command is run.
Note
You will need to manually resize the partitions of instances based on the image in
accordance with the disk space in the flavor that is applied to the instance.
The rhel 6 -cl o ud . q co w2 image file is ready to be uploaded to the Image service. For
more information on uploading this image to your OpenStack deployment using the
dashboard, see Section 4.1.2, Upload an Image .
Field
Not es
Name
Imag e So urc e
Imag e s o urc e: Imag e Lo cati o n o r Imag e Fi l e .
Bas ed o n yo ur s elec tio n, the next field is d is p layed .
Imag e Lo c atio n o r
Imag e File
65
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Field
Not es
Fo rmat
Minimum Dis k (G B)
Pub lic
Note
You can also use the g l ance i mag e-create command with the pro perty
option to create an image. More values are available on the commmand line. For a
complete listing, see Appendix A, Image Configuration Parameters.
3. Update the fields and click Upd ate Imag e when finished. You can update the
following values - name, description, kernel ID , ramdisk ID , architecture, format,
minimum disk, minimum RAM, public, protected.
4. Click the dropdown menu and select Upd ate Metad ata option.
5. Specify metadata by adding items from the left column to the right one. In the left
column, there are metadata definitions from the Image Service Metadata Catalog.
Select O ther to add metadata with the key of your choice and click Save when
finished.
66
Note
You can also use the g l ance i mag e-upd ate command with the pro perty
option to update an image. More values are available on the commmand line; for a
complete listing, see Appendix A, Image Configuration Parameters.
4 .2 .1 .1 . Cre at e a Vo lum e
1. In the dashboard, select P ro ject > C o mpute > Vo l umes.
2. Click C reat e Vo lu me, and edit the following fields:
Field
Descript ion
Vo lume
name
Typ e
O p tio nal vo lume typ e (s ee Sec tio n 4.2.4, G ro up Vo lume Setting s
with Vo lume Typ es ).
If yo u have multip le Blo c k Sto rag e b ac k end s , yo u c an us e this to
s elec t a s p ec ific b ac k end . See Sec tio n 4.2.1.2, Sp ec ify Bac k End fo r
Vo lume Creatio n fo r d etails .
Siz e (G B)
67
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Field
Availab ility
Zo ne
Descript ion
Source
Descript ion
No
s o urc e,
emp ty
vo lume
The vo lume will b e emp ty, and will no t c o ntain a file s ys tem o r p artitio n
tab le.
Snap s ho t
Us e an exis ting s nap s ho t as a vo lume s o urc e. If yo u s elec t this o p tio n,
a new Use snapsho t as a so urce lis t ap p ears ; yo u c an then
c ho o s e a s nap s ho t fro m the lis t. Fo r mo re info rmatio n ab o ut vo lume
s nap s ho ts , refer to Sec tio n 4.2.1.8 , Create, Clo ne, o r Delete Vo lume
Snap s ho ts .
Imag e
Vo lume
4. Click C reate Vo l ume. After the volume is created, its name appears in the Vo l umes
table.
68
If you do not specify a back end during volume creation, the Block Storage service will
automatically choose one for you. By default, the service will choose the back end with the
most available free space. You can also configure the Block Storage service to choose
randomly among all available back ends instead; for more information, see Section 4.2.7,
Configure How Volumes are Allocated to Multiple Back Ends .
4 .2 .1 .4 . De le t e a Vo lum e
1. In the dashboard, select P ro ject > C o mpute > Vo l umes.
2. In the Vo lu mes table, select the volume to delete.
3. Click D elet e Vo lu mes.
Note
A volume cannot be deleted if it has existing snapshots. For instructions on how to
delete snapshots, see Section 4.2.1.8, Create, Clone, or D elete Volume
Snapshots .
69
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
4 .2 .1 .6 . Se t a Vo lum e t o Re ad-Only
You can give multiple users shared access to a single volume without allowing them to edit
its contents. To do so, set the volume to read -o nl y using the following command:
# cinder readonly-mode-update VOLUME true
70
Examp le 4 .1.
Where TRANSFERID and TRANSFERKEY are the i d and auth_key values returned
by the ci nd er transfer-create command, respectively.
Examp le 4 .2.
Note
You can view all available volume transfers using:
# cinder transfer-list
71
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Warn in g
Creating a snapshot of a volume that is attached to an instance may corrupt the
snapshot. For instructions on how to detach a volume from an instance, see
Procedure 4.2, D etach a Volume From an Instance .
Note
Volume backups are different from snapshots. Backups preserve the data
contained in the volume, whereas snapshots preserve the state of a volume at a
specific point in time. In addition, you cannot delete a volume if it has existing
snapshots. Volume backups are used to prevent data loss, whereas snapshots are
used to facilitate cloning.
For more information about volume backups, refer to Section 4.2.2, Back Up and
Restore a Volume .
72
73
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Where VOLUME is the ID or D i spl ay Name of the volume you wish to back-up.
Examp le 4 .3.
The volume backup creation is complete when the Status of the backup entry is
avai l abl e.
At this point, you can also export and store the volume backup's metadata. This allows you
to restore the volume backup, even if the Block Storage database suffers a catastrophic loss.
To do so, run:
# cinder --os-volume-api-version 2 backup-export BACKUPID
Examp le 4 .4 .
74
The volume backup metadata consists of the backup_servi ce and backup_url values.
Where backup_service and backup_url are from the metadata you exported.
Examp le 4 .5.
Using the exported sample metadata from Section 4.2.2.1, Create a Volume
Backup :
# cinder --os-volume-api-version 2 backup-import
cinder.backup.drivers.swift eyJzdGF0dXMi...c2l6ZSI6IDF9
+----------+--------------------------------------+
| Property |
Value
|
75
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
+----------+--------------------------------------+
|
id
| 77951e2f-4aff-4365-8c64-f833802eaa43 |
|
name
|
None
|
+----------+--------------------------------------+
2. After the metadata is imported into the Block Storage service database, you can
restore the volume as normal (see Section 4.2.2.3, Restore a Volume from a
Backup ).
The Vo l ume ID should match the ID of the volume you wish to restore.
2. Restore the volume backup:
# cinder backup-restore BACKUP_ID
2. List the available back ends (hosts) and their respective availability zones:
# cinder-manage host list
76
Where:
VOLUME is the ID of the volume to be migrated.
BACKEND is the back end to where the volume should be migrated.
4. View the current status of the volume to be migrated:
# cinder show VOLUME
Examp le 4 .6 .
77
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Examp le 4 .7.
Volume types provide the capability to provide different users with storage tiers. By
associating specific performance, resilience, and other settings as key/value pairs to a
volume type, you can map tier-specific settings to different volume types. You can then
apply tier settings when creating a volume by specifying the corresponding volume type.
Note
Available and supported Extra Specs vary per volume driver. Consult your volume
driver's documentation for a list of valid Extra Specs.
78
Note
You can also associate a QOS Spec to the volume type. For details, refer to
Section 4.2.5.2, Associate a QOS Spec with a Volume Type .
79
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Volume types are directly applied to volumes, whereas QOS Specs are not. Rather, QOS
Specs are associated to volume types. D uring volume creation, specifying a volume type
also applies the performance settings mapped to the volume type's associated QOS
Specs.
T ype
Descript ion
b ac k-end
fro nt-end
b o th
5. Click C reate. The new QOS Spec should now appear in the Q O S Specs table.
6. In the QOS Specs table, select the new spec's Manag e Specs action.
7. Click C reate, and specify the Key and Val ue. The key/value pair must be valid;
otherwise, specifying a volume type associated with this QOS Spec during volume
creation will fail.
8. Click C reate. The associated setting (key/value pair) now appears in the KeyVal ue P ai rs table.
80
4 .2 .6 .1 . Co nfigure a St at ic Ke y
The first step in implementing basic volume encryption is to set a static key. This key must be
a hex string, which will be used by the Block Storage volume service (namely, o penstackci nd er-vo l ume) and all Compute services (o penstack-no va-co mpute). To configure
both services to use this key, set the key as the fi xed _key value in the [keymg r] section
of both service's respective configuration files.
1. From the command line, log in as ro o t to the node hosting o penstack-ci nd ervo l ume.
2. Set the static key:
# openstack-config --set /etc/cinder/cinder.conf keymgr
fixed_key HEX_KEY
81
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
4. Log in to the node hosting o penstack-no va-co mpute, and set the same static key:
# openstack-config --set /etc/nova/nova.conf keymgr fixed_key
HEX_KEY
Note
If you have multiple Compute nodes (multiple nodes hosting o penstackno va-co mpute), then you need to set the same static key in
/etc/no va/no va. co nf of each node.
At this point, both Compute and Block Storage volume services can now use the same static
key to encrypt/decrypt volumes. That is, new instances will be able to use volumes encrypted
with the static key (HEX_KEY).
Where:
BITSIZE is the key size (for example, 512 for a 512-bit key).
82
4 .2.7. Configure How Volumes are Allocat ed t o Mult iple Back Ends
If the Block Storage service is configured to use multiple back ends, you can use configured
volume types to specify where a volume should be created. For details, see Section 4.2.1.2,
Specify Back End for Volume Creation .
The Block Storage service will automatically choose a back end if you do not specify one
during volume creation. Block Storage sets the first defined back end as a default; this back
end will be used until it runs out of space. At that point, Block Storage will set the second
defined back end as a default, and so on.
If this is not suitable for your needs, you can use the filter scheduler to control how Block
Storage should select back ends. This scheduler can use different filters to triage suitable
back ends, such as:
Availab ilit yZ o n eFilt er
Filters out all back ends that do not meet the availability zone requirements of the
requested volume
C ap acit yFilt er
Selects only back ends with enough space to accommodate the volume
C ap ab ilit iesFilt er
Selects only back ends that can support any specified settings in the volume
To configure the filter scheduler:
1. Enable the Fi l terSched ul er driver.
# openstack-config --set /etc/cinder/cinder.conf DEFAULT
scheduler_driver
cinder.scheduler.filter_scheduler.FilterScheduler
83
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
3. Configure how the scheduler should select a suitable back end. If you want the
scheduler:
To always choose the back end with the most available free space, run:
# openstack-config --set /etc/cinder/cinder.conf DEFAULT
scheduler_default_weighers AllocatedCapacityWeigher
# openstack-config --set /etc/cinder/cinder.conf DEFAULT
allocated_capacity_weight_multiplier -1.0
84
T ype
Descript ion
Privat
e
Pub li
c
85
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
1. In the dashboard, select P ro ject > O bject Sto re > C o ntai ners.
2. Click the name of the object's container or folder (to display the object).
3. Click Upl o ad O bject.
4. Browse for the file to be copied, and select C o py in its arrow menu.
5. Specify the following:
Field
Descript ion
Des tinatio n
c o ntainer
Path
6. Click C o py O bject.
86
CHAPTER 5. NETWORKING
OpenStack Networking (neutron) is the software-defined networking component of RHEL
OpenStack Platform. The virtual network infrastructure enables connectivity between
instances and the physical external network.
5 .1 .1 .1 . Cre at e a Ne t wo rk
1. In the dashboard, select P ro ject > Netwo rk > Netwo rks.
2. Click + C reate Netwo rk.
3. Specify the following:
Field
Descript ion
87
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Field
Netwo rk
Name
Descript ion
Des c rip tive name, b as ed o n the ro le that the netwo rk will p erfo rm. If yo u
are integ rating the netwo rk with an external VLAN, c o ns id er ap p end ing
the VLAN ID numb er to the name. Examp les :
Co ntro ls whether the netwo rk is immed iately availab le. This field allo ws
yo u to c reate the netwo rk b ut s till keep it in a D o wn s tate, where it is
lo g ic ally p res ent b ut s till inac tive. This is us eful if yo u d o no t intend to
enter the netwo rk into p ro d uc tio n rig ht away.
4. Click the Next button, and specify the following in the Subnet tab:
Field
Descript ion
Create
Sub net
Sub net
Name
Netwo rk
Ad d res s
IP
Vers io n
88
G ateway
IP
Dis ab le
G ateway
Field
Descript ion
Enab le DHCP
IPv6 Ad d res s
Co nfig uratio n
Mo d e
SLAAC (Statel ess Ad d ress Auto co nfi g urati o n) Ins tanc es g enerate IPv6 ad d res s es b as ed o n Ro uter
Ad vertis ement (RA) mes s ag es s ent fro m the O p enStac k
Netwo rking ro uter. This c o nfig uratio n res ults in an O p enStac k
Netwo rking s ub net c reated with ra_mo d e s et to sl aac and
ad d ress_mo d e s et to sl aac .
DNS Name
Servers
Ho s t Ro utes
Static ho s t ro utes . Firs t s p ec ify the d es tinatio n netwo rk in CIDR
fo rmat, fo llo wed b y the next ho p that s ho uld b e us ed fo r ro uting .
Fo r examp le: 19 2.16 8 .23.0 /24, 10 .1.31.1
Pro vid e this value if yo u need to d is trib ute s tatic ro utes to
ins tanc es .
6. Click C reate.
89
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
The completed network is available for viewing in the Netwo rks tab. You can also click
Ed i t to change any options as needed. Now when you create instances, you can configure
them now to use its subnet, and they will subsequently receive any specified D HCP options.
5 .1 .1 .2 . Cre at e an Advance d Ne t wo rk
Advanced network options are available for administrators, when creating a network from the
Ad mi n view. These options define the network type to use, and allow tenants to be specified:
1. In the dashboard, select Ad mi n > Netwo rks > C reate Netwo rk > P ro ject.
2. Select a destination project to host the new network using P ro ject.
3. Review the options in P ro vi d er Netwo rk T ype:
Lo cal - Traffic remains on the local Compute host and is effectively isolated from
any external networks.
Fl at - Traffic remains on a single network and can also be shared with the host.
No VLAN tagging or other network segregation takes place.
VLAN - Create a network using a VLAN ID that corresponds to a VLAN present in
the physical network. Allows instances to communicate with systems on the same
layer 2 VLAN.
G R E - Use a network overlay that spans multiple nodes for private communication
between instances. Traffic egressing the overlay must be routed.
VXLAN - Use a network overlay that spans multiple nodes for private
communication between instances. Traffic egressing the overlay must be routed.
4. Click C reate Netwo rk, and review the Project's Netwo rk T o po l o g y to validate
that the network has been successfully created.
90
5. Click Ad d Interface.
Instances on your network are now able to communicate with systems outside the subnet.
4. Select P ro ject > Netwo rk > Netwo rks, and select the network you would like to
delete.
5. Click D el ete Netwo rks in this and the next dialog screen.
91
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Subnets are the means by which instances are granted network connectivity. Each instance
is assigned to a subnet as part of the instance creation process, therefore it's important to
consider proper placement of instances to best accomodate their connectivity requirements.
Subnets are created in pre-existing networks.
Remember that tenant networks in OpenStack Networking can host multiple subnets. This is
useful if you intend to host distinctly different systems in the same network, and would prefer
a measure of isolation between them. For example, you can designate that only webserver
traffic is present on one subnet, while database traffic traverse another. Subnets are isolated
from each other, and any instance that wishes to communicate with another subnet must
have their traffic directed by a router. Consider placing systems that will require a high
volume of traffic amongst themselves in the same subnet, so that they don't require routing,
and avoid the subsequent latency and load.
Pro ced u re 5.1. C reat e a n ew su b n et
1. In the dashboard, select P ro ject > Netwo rk > Netwo rks, and click your
network's name in the Netwo rks view.
2. Click C reate Subnet, and specify the following.
Field
Descript ion
Sub net
Name
Netwo rk
Ad d res s
IP
Vers io n
G ateway
IP
Dis ab le
G ateway
92
Field
Descript ion
Enab le DHCP
IPv6 Ad d res s
Co nfig uratio n
Mo d e
SLAAC (Statel ess Ad d ress Auto co nfi g urati o n) Ins tanc es g enerate IPv6 ad d res s es b as ed o n Ro uter
Ad vertis ement (RA) mes s ag es s ent fro m the O p enStac k
Netwo rking ro uter. This c o nfig uratio n res ults in a O p enStac k
Netwo rking s ub net c reated with ra_mo d e s et to sl aac and
ad d ress_mo d e s et to sl aac .
DNS Name
Servers
Ho s t Ro utes
Static ho s t ro utes . Firs t s p ec ify the d es tinatio n netwo rk in CIDR
fo rmat, fo llo wed b y the next ho p that s ho uld b e us ed fo r ro uting .
Fo r examp le: 19 2.16 8 .23.0 /24, 10 .1.31.1
Pro vid e this value if yo u need to d is trib ute s tatic ro utes to
ins tanc es .
4. Click C reate.
The new subnet is available for viewing in your network's Subnets list. You can also click
Ed i t to change any options as needed. When you create instances, you can configure them
now to use this subnet, and they will subsequently receive any specified D HCP options.
93
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
94
1. In the dashboard, select P ro ject > Netwo rk > R o uters, and click on the name
of the router you would like to delete.
2. Select the interfaces of type Internal Interface.
3. Click D el ete Interfaces.
4. From the R o uters list, select the target router and click D el ete R o uters.
95
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
The Floating IP allocation pool is defined when you create an external subnet. If the subnet
only hosts floating IP addresses, consider disabling D HCP allocation with the
enabl e_d hcp= Fal seoption:
# neutron subnet-create --name SUBNET_NAME --enable_dhcp=False -allocation_pool start=IP_ADDRESS,end=IP_ADDRESS -gateway=IP_ADDRESS NETWORK_NAME CIDR
Examp le 5.1.
Examp le 5.2.
In this example, a floating IP address is allocated to an instance named co rp-vm-0 1:
96
2. With the IP address allocated, you can assign it to a particular instance. Locate the
ID of the port associated with your instance (this will match the fixed IP address
allocated to the instance). This port ID is used in the following step to associate the
instance's port ID with the floating IP address ID . You can further distinguish the
correct port ID by ensuring the MAC address in the third column matches the one on
the instance.
# neutron port-list
+--------+------+-------------+-------------------------------------------------------+
| id
| name | mac_address | fixed_ips
|
+--------+------+-------------+-------------------------------------------------------+
| ce8320 |
| 3e:37:09:4b | {"subnet_id": "361f27",
"ip_address": "192.168.100.2"} |
| d88926 |
| 3e:1d:ea:31 | {"subnet_id": "361f27",
"ip_address": "192.168.100.5"} |
97
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
| 8190ab |
| 3e:a3:3d:2f | {"subnet_id": "b74dbb",
"ip_address": "10.10.1.25"}|
+--------+------+-------------+-------------------------------------------------------+
3. Use the neutro n command to associate the floating IP address with the desired port
ID of an instance:
# neutron floatingip-associate 9d7e2603482d 8190ab
2. Configure the virtual bridge with the IP address details that were previously allocated
to eth0:
# vi /etc/sysconfig/network-scripts/ifcfg-br-ex
DEVICE=br-ex
DEVICETYPE=ovs
TYPE=OVSBridge
BOOTPROTO=static
IPADDR=192.168.120.10
98
NETMASK=255.255.255.0
GATEWAY=192.168.120.1
DNS1=192.168.120.1
ONBOOT=yes
Where IP AD D R , NET MASK G AT EWAY , and D NS1 (name server) must be updated to
match your network.
You can now assign floating IP addresses to instances and make them available to the
physical network.
99
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
This package installs the sample Heat templates in /usr/share/o penstack-heattempl ates/so ftware-co nfi g /exampl e-templ ates.
O pt ion
Descript ion
File
Us e a lo c al temp late file o n yo ur s ys tem. Selec t yo ur file b y c lic king
T empl ate Fi l e > Bro wse .
Direc t
Inp ut
100
Enter yo ur temp late d irec tly into the d as hb o ard us ing the T empl ate
D ata field .
O pt ion
Descript ion
URL
Us e an external HTTP URL fo r the temp late. Sp ec ify the temp late' s URL
in the T empl ate UR L field .
Note
Red Hat Enterprise Linux OpenStack Platform includes sample templates.
For more details, see Section 6.1.1, D ownload Sample Heat Templates .
O pt ion
Descript ion
File
Us e a . yaml file fo r the enviro nment. Selec t yo ur enviro nment b y
c lic king Envi ro nment Fi l e > Bro wse .
Direc t
Inp ut
Enter yo ur enviro nment d ata d irec tly into the d as hb o ard us ing the
Envi ro nment D ata field .
4. Click Next.
5. Specify values for the following fields:
Field
Descript ion
Stac k Name
Creatio n
Timeo ut
(minutes )
Ro llb ac k O n
Failure
If s elec ted , ro lls b ac k any c hang es o r up d ates to the temp late if the
s tac k launc h fails .
Pas s wo rd fo r
us er
USERNAME
The Lau n ch St ack window may also contain other fields, depending on the
parameters defined in the template. Update these fields as required.
6. Click Launch.
101
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
6. Click Launch.
O pt ion
Descript ion
File
Us e a lo c al temp late file o n yo ur s ys tem. Selec t yo ur file b y c lic king
T empl ate Fi l e > Bro wse .
Direc t
Inp ut
Enter yo ur temp late d irec tly into the d as hb o ard us ing the T empl ate
D ata field .
URL
Us e an external HTTP URL fo r the temp late. Sp ec ify the temp late' s URL
in the T empl ate UR L field .
O pt ion
Descript ion
File
Us e a . yaml file fo r the enviro nment. Selec t yo ur enviro nment b y
c lic king Envi ro nment Fi l e > Bro wse .
Direc t
Inp ut
Enter yo ur enviro nment d ata d irec tly into the d as hb o ard us ing the
Envi ro nment D ata field .
6. Click Next.
7. Specify values for the following fields:
102
Field
Descript ion
Creatio n
Timeo ut
(minutes )
Ro llb ac k O n
Failure
If s elec ted , ro lls b ac k any c hang es o r up d ates to the temp late if the
s tac k launc h fails .
Pas s wo rd fo r
us er
USERNAME
The Lau n ch St ack window may also contain other fields, depending on the
parameters defined in the template. Update these fields as required.
8. Click Upd ate. The Orchestration service re-launches the stack with the updated
parameters. The Upd ated column on the Stacks table now reflects how long it has
been since the stack was last updated.
103
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
# ceilometer alarm-list
Where UUID is the resource ID for an existing resource (for example, an instance, image, or
volume).
Examp le 6 .1.
To configure an alarm that activates when the average CPU utilization for an individual
instance exceeds 50% for three consecutive 600s (10 minute) periods, use:
# ceilometer alarm-threshold-create --name cpu_high --description
'CPU usage high' --meter-name cpu_usage_high --threshold 50 -comparison-operator gt --statistic avg --period 600 --evaluation-
104
To edit an existing threshold alarm, use the cei l o meter al arm-thresho l d -upd ate
command together with the alarm ID , followed by one or more options to be updated.
Examp le 6 .2.
To increase the alarm threshold to 75% , use:
# ceilometer alarm-threshold-update 35addb25-d488-4a74-a038076aad3a3dc3 --threshold=75
To list samples only for a particular resource within a range of time stamps, use:
# ceilometer sample-list --meter METER_NAME --query
'resource_id=INSTANCE_ID;timestamp>START_TIME;timestamp>=END_TIME'
Examp le 6 .3.
To query an instance for samples taken between 13: 10 : 0 0 and 14 : 25: 0 0 , use:
#ceilometer sample-list --meter cpu --query
'resource_id=5056eda6-8a24-4f52-9cc4-c3ddb6fb4a69;timestamp>2015-
105
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
01-12T13:10:00;timestamp>=2015-01-12T14:25:00'
+-------------------+------+------------+---------------+------+--------------------+
| Resource ID
| Name | Type
| Volume
| Unit |
Timestamp
|
+-------------------+------+------------+---------------+------+--------------------+
| 5056eda6-8a24-... | cpu | cumulative | 3.5569e+11
| ns
|
2015-01-12T14:21:44 |
| 5056eda6-8a24-... | cpu | cumulative | 3.0041e+11
| ns
|
2015-01-12T14:11:45 |
| 5056eda6-8a24-... | cpu | cumulative | 2.4811e+11
| ns
|
2015-01-12T14:01:54 |
| 5056eda6-8a24-... | cpu | cumulative | 1.3743e+11
| ns
|
2015-01-12T13:30:54 |
| 5056eda6-8a24-... | cpu | cumulative | 84710000000.0 | ns
|
2015-01-12T13:20:54 |
| 5056eda6-8a24-... | cpu | cumulative | 31170000000.0 | ns
|
2015-01-12T13:10:54 |
+-------------------+------+------------+---------------+------+--------------------+
Examp le 6 .4 .
106
| message_id
| 521f138a-9a84-11e4-8058-525400ee874f
|
| name
| On_Time_Mins
|
| project_id
| f2352499957d4760a00cebd26c910c0f
|
| resource_id
| 5056eda6-8a24-4f52-9cc4-c3ddb6fb4a69
|
| resource_metadata | {}
|
| source
| f2352499957d4760a00cebd26c910c0f:openstack |
| timestamp
| 2015-01-12T17:56:23.179729
|
| type
| cumulative
|
| unit
| mins
|
| user_id
| b0e5000684a142bd89c4af54381d3722
|
| volume
| 0.0
|
+-------------------+-------------------------------------------+
Where vo l ume, normally the value obtained as a result of the sampling action, is in this
case the value being created by the command.
Note
Samples are not updated because the moment a sample is created, it is sent to the
Telemetry service. Samples are essentially messages, which is why they have a
message ID . To create new samples, repeat the sampl e-create command and
update the --sampl e-vo l ume value.
107
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Examp le 6 .5.
To view all the statistics for the cpu_uti l meter, use:
# ceilometer statistics --meter cpu_util
+--------+----------------+---------------+-----+-----+------+------+------+-------| Period | Period Start
|Period End
| Max | Min | Avg |
Sum
| Count| Dura...
+--------+----------------+---------------+-----+-----+------+------+------+-------| 0
| 2015-01-09T14: |2015-01-09T14:2| 9.44| 0.0 | 6.75 |
337.94| 50
| 2792...
+--------+----------------+---------------+-----+-----+------+------+------+--------
Examp le 6 .6 .
Statistics can be restricted to a specific resource by means of the --q uery option, and
restricted to a specific range by means of the ti mestamp option.
# ceilometer statistics --meter cpu_util --query
'resource_id=5056eda6-8a24-4f52-9cc4-c3ddb6fb4a69;timestamp>201501-12T13:00:00;timestamp<=2015-01-13T14:00:00'
+--------+----------------+---------------+-----+-----+------+------+------+-------| Period | Period Start
|Period End
| Max | Min | Avg |
Sum
| Count| Dura...
+--------+----------------+---------------+-----+-----+------+------+------+-------| 0
| 2015-01-12T20:1|2015-01-12T20:1| 9.44| 5.95| 8.90 |
347.10| 39
| 2465...
+--------+----------------+---------------+-----+-----+------+------+------+--------
108
CHAPTER 7. TROUBLESHOOTING
This chapter contains logging and support information to assist with troubleshooting your
RHEL OpenStack Platform deployment.
7.1. LOGGING
RHEL OpenStack Platform writes informational messages to specific log files; you can use
these messages for troubleshooting and monitoring system events.
Service
Service Name
Log Pat h
Service
Service Name
Log Pat h
109
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Service
Service Name
Log Pat h
O p enStac k Co mp ute Co nd uc to r
s ervic e
no va-manag e
c o mmand
Service
Service Name
Log Pat h
Service
Service Name
Log Pat h
110
Service
Service Name
Log Pat h
Service
Service Name
Log Pat h
O p en vSwitc h ag ent
Service
Service Name
Log Pat h
111
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Service
Service Name
Log Pat h
Mo ng o DB integ ratio n
Service
Service Name
Log Pat h
n/a
112
debug=True
7.2. SUPPORT
If client commands fail or you run into other issues, please contact Red Hat Technical
Support with a description of what happened, an so srepo rt, the full console output, and
all log files referenced in the console output.
For information about the so srepo rt command (so s package), refer to What is a sosreport
and how to create one in Red Hat Enterprise Linux 4.6 and later.
113
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Examp le A.1.
Note
Behavior set using image properties overrides behavior set using flavors. For more
information, see Section 3.3, Manage Flavors .
Specific
to
Key
Descript ion
All
arc hitec t
ure
Support ed values
i a6 4 -Itanium
l m32 -Lattic e Mic ro 32
m6 8k -Mo to ro la 6 8 0 0 0
mi cro bl aze -Xilinx 32-b it
FPG A (Big End ian)
114
Specific
to
Key
Descript ion
115
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Specific
to
Key
Descript ion
All
hyp ervis
o r_typ e
kvm , vmware
All
ins tanc e
_uuid
All
kernel_i
d
Valid imag e ID
All
o s _d is tr
o
C entO S
d ebi an -Deb ian. Do no t us e
D ebi an o r o rg . d ebi an
fed o ra -Fed o ra. Do no t us e
Fed o ra , o rg . fed o ra , o r
o rg . fed o rapro ject
freebsd -FreeBSD. Do no t
us e o rg . freebsd ,
freeBSD , o r FreeBSD
g ento o -G ento o Linux. Do
no t us e G ento o o r
o rg . g ento o
mand rake -Mand rakelinux
(Mand rakeSo ft) d is trib utio n.
Do no t us e mand rakel i nux
o r Mand rakeLi nux
116
Specific
to
Key
Descript ion
mand ri vaES
msd o s -Mic ro s o ft Dis c
O p erating Sys tem. Do no t us e
ms-d o s
netbsd -NetBSD. Do no t us e
NetBSD o r o rg . netbsd
netware -No vell NetWare. Do
no t us e no vel l o r NetWare
o penbsd -O p enBSD. Do no t
us e O penBSD o r
o rg . o penbsd
o penso l ari s -O p enSo laris .
Do no t us e O penSo l ari s o r
o rg . o penso l ari s
o pensuse -o p enSUSE. Do
no t us e suse , SuSE , o r
o rg . o pensuse
rhel -Red Hat Enterp ris e
Linux. Do no t us e red hat,
R ed Hat, o r co m. red hat
sl ed -SUSE Linux Enterp ris e
Des kto p . Do no t us e
co m. suse
ubuntu -Ub untu. Do no t us e
Ubuntu , co m. ubuntu ,
o rg . ubuntu , o r
cano ni cal
wi nd o ws -Mic ro s o ft
Wind o ws . Do no t us e
All
o s _vers i
on
117
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Specific
to
Key
Descript ion
Support ed values
All
ramd is k
_id
Valid imag e ID
All
vm_mo d
e
lib virt
API
d river
hw_d is k
_b us
lib virt
API
d river
hw_num
a_no d e
s
Numb er o f NUMA no d es to
exp o s e to the ins tanc e (d o es no t
o verrid e flavo r d efinitio n).
lib virt
API
d river
hw_num
a_memp
o lic y
118
lib virt
API
d river
hw_num
a_c p us .
0
lib virt
API
d river
hw_num
a_c p us .
1
lib virt
API
d river
hw_num
a_mem.
0
Integ er
lib virt
API
d river
hw_num
a_mem.
1
Integ er
Specific
to
Key
Descript ion
Support ed values
lib virt
API
d river
hw_rng _
mo d el
Ad d s a rand o m-numb er
g enerato r d evic e to the imag e' s
ins tanc es . The c lo ud
ad minis trato r c an enab le and
c o ntro l d evic e b ehavio r b y
c o nfig uring the ins tanc e' s flavo r.
By d efault:
/d ev/rand o m is us ed as the
d efault entro p y s o urc e. To
s p ec ify a p hys ic al HW RNG
d evic e, us e the fo llo wing
o p tio n in the no va. co nf file:
rng_dev_path=/dev/hwr
ng
lib virt
API
d river
hw_s c s i
_mo d el
vi rti o -scsi
lib virt
API
d river
hw_vid e
o _mo d e
l
lib virt
API
d river
hw_vid e
o _ram
119
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Specific
to
Key
Descript ion
lib virt
API
d river
hw_watc
hd o g _a
c tio n
Support ed values
lib virt
API
d river
o s _c o m
mand _li
ne
lib virt
API
d river
and
VMware
API
d river
hw_vif_
mo d el
120
Specific
to
Key
Descript ion
Support ed values
VMware
API
d river
vmware_
ad ap tert
yp e
l si Lo g i c , busLo g i c , o r
ide
VMware
API
d river
vmware_
o s typ e
See thinkvirt.c o m.
VMware
API
d river
vmware_
imag e_v
ers io n
Currently unus ed .
XenAPI
d river
auto _d i
s k_c o nfi
g
true | fal se
XenAPI
d river
o s _typ e
l i nux o r wi nd o ws
121
Red Hat Ent erprise Linux O penSt ack Plat form 6 Administ rat ion G uide
Mon Aug 0 3 2 0 1 5
Deept i Navale
Revision 6 .0 .4 - 1
Wed Jul 1 5 2 0 1 5
Deept i Navale
Revision 6 .0 .4 - 0
T ue Jul 1 4 2 0 1 5
Deept i Navale
Revision 6 .0 .3- 0
Fri Jun 1 9 2 0 1 5
Don Domingo
Revision 6 .0 .2 - 4
T ue Jun 0 1 2 0 1 5
Don Domingo
Revision 6 .0 .2 - 3
Fri May 1 5 2 0 1 5
Summer Long
Revision 6 .0 .2 - 2
T hu Apr 2 3 2 0 1 5
Summer Long
Revision 6 .0 .2 - 1
T hu Apr 1 6 2 0 1 5
Summer Long
Revision 6 .0 .2 - 0
T hu Apr 9 2 0 1 5
Don Domingo
Revision 6 .0 .1 - 3
T ue Apr 7 2 0 1 5
Summer Long
Revision 6 .0 .1 - 2
T hu Mar 1 9 2 0 1 5
Mart in Lopes
Revision 6 .0 .1 - 1
T ue Mar 1 7 2 0 1 5
Summer Long
Revision 6 .0 .1 - 0
122
T hu Mar 5 2 0 1 5
Summer Long
Fi n a l i z ed fo r m a i n ten a n ce r el ea se 6 .0 .1.
B Z#119 17 9 4 - S tr u ctu r a l ed i ts fo r en ti r e g u i d e.
Revision 6 .0 .0 - 6
Wed Feb 1 8 2 0 1 5
Don Domingo
Revision 6 .0 .0 - 5
T hu Feb 1 2 2 0 1 5
Summer Long
Revision 6 .0 .0 - 4
T hu Feb 5 2 0 1 5
Summer Long
123