OpenStack Victoria : Configure Octavia (Network Node)2020/10/20 |
Install OpenStack Load Balancing as a Service (Octavia).
This example is based on the environment like follows.
------------+---------------------------+---------------------------+------------ | | | eth0|10.0.0.30 eth0|10.0.0.50 eth0|10.0.0.51 +-----------+-----------+ +-----------+-----------+ +-----------+-----------+ | [ Control Node ] | | [ Network Node ] | | [ Compute Node ] | | | | | | | | MariaDB RabbitMQ | | L2 Agent | | Libvirt | | Memcached httpd | | L3 Agent | | Nova Compute | | Keystone Glance | | Metadata Agent | | L2 Agent | | Nova API | | Octavia Services | | | | Neutron Server | | | | | | Metadata Agent | | | | | +-----------------------+ +-----------------------+ +-----------------------+ |
[1] | Install Octavia services. For questions duruing the installation, it's OK with [No] to all. |
root@network:~# apt -y install octavia-api octavia-health-manager octavia-housekeeping octavia-worker
|
[2] | Create certificates that are used among LoadBalancer Instance and Octavia services. |
root@network:~# mkdir -p /etc/octavia/certs/private root@network:~# mkdir ~/work root@network:~# cd ~/work root@network:~/work# git clone https://opendev.org/openstack/octavia.git root@network:~/work# cd octavia/bin root@network:~/work/octavia/bin# ./create_dual_intermediate_CA.sh root@network:~/work/octavia/bin# cp -p ./dual_ca/etc/octavia/certs/server_ca.cert.pem /etc/octavia/certs root@network:~/work/octavia/bin# cp -p ./dual_ca/etc/octavia/certs/server_ca-chain.cert.pem /etc/octavia/certs root@network:~/work/octavia/bin# cp -p ./dual_ca/etc/octavia/certs/server_ca.key.pem /etc/octavia/certs/private root@network:~/work/octavia/bin# cp -p ./dual_ca/etc/octavia/certs/client_ca.cert.pem /etc/octavia/certs root@network:~/work/octavia/bin# cp -p ./dual_ca/etc/octavia/certs/client.cert-and-key.pem /etc/octavia/certs/private root@network:~/work/octavia/bin# chown -R octavia /etc/octavia/certs |
[3] | Configure Octavia. |
root@network:~# mv /etc/octavia/octavia.conf /etc/octavia/octavia.conf.org
root@network:~#
vi /etc/octavia/octavia.conf # create new [DEFAULT] # RabbitMQ connection info transport_url = rabbit://openstack:password@10.0.0.30 [api_settings] # IP address this host listens bind_host = 10.0.0.50 bind_port = 9876 auth_strategy = keystone api_base_uri = http://10.0.0.50:9876 # MariaDB connection info [database] connection = mysql+pymysql://octavia:password@10.0.0.30/octavia [health_manager] bind_ip = 0.0.0.0 bind_port = 5555 # Keystone auth info [keystone_authtoken] www_authenticate_uri = http://10.0.0.30:5000 auth_url = http://10.0.0.30:5000 memcached_servers = 10.0.0.30:11211 auth_type = password project_domain_name = default user_domain_name = default project_name = service username = octavia password = servicepassword # specify certificates created on [2] [certificates] ca_private_key = /etc/octavia/certs/private/server_ca.key.pem ca_certificate = /etc/octavia/certs/server_ca.cert.pem server_certs_key_passphrase = insecure-key-do-not-use-this-key ca_private_key_passphrase = not-secure-passphrase # specify certificates created on [2] [haproxy_amphora] server_ca = /etc/octavia/certs/server_ca-chain.cert.pem client_cert = /etc/octavia/certs/private/client.cert-and-key.pem # specify certificates created on [2] [controller_worker] client_ca = /etc/octavia/certs/client_ca.cert.pem [oslo_messaging] topic = octavia_prov # Keystone auth info [service_auth] auth_url = http://10.0.0.30:5000 memcached_servers = 10.0.0.30:11211 auth_type = password project_domain_name = Default user_domain_name = Default project_name = service username = octavia password = servicepassword
root@network:~#
root@network:~# chmod 640 /etc/octavia/octavia.conf root@network:~# chgrp octavia /etc/octavia/octavia.conf
su -s /bin/bash octavia -c "octavia-db-manage --config-file /etc/octavia/octavia.conf upgrade head" root@network:~# systemctl restart octavia-api octavia-health-manager octavia-housekeeping octavia-worker |
Sponsored Link |