[admin-guide] Use "project" to replace "tenant" term in admin-guide
This patch use "project" to replace "tenant" term in admin-guide for cleanup. Change-Id: I879a6c1ecfbbed2d8db0a02457d06375a268b176 Partial-Bug: #1475005
This commit is contained in:
parent
4093606a2d
commit
84b1a2ffed
doc/admin-guide/source
baremetal-multitenancy.rstblockstorage-image-volume-cache.rstblockstorage-volume-backed-image.rstblockstorage-volume-backups.rstcli-cinder-quotas.rstcli-manage-flavors.rstcli-manage-projects-users-and-roles.rstcli-networking-advanced-quotas.rstcli-nova-manage-projects-security.rstcli-set-compute-quotas.rstcli-set-quotas.rstcompute-flavors.rstcompute-manage-the-cloud.rstcompute-networking-nova.rstdashboard-set-quotas.rstdashboard-view-cloud-resources.rstidentity-auth-token-middleware.rstidentity-concepts.rstkeystone-integrate-assignment-backend-ldap.rstkeystone-integrate-identity-backend-ldap.rstkeystone-use-trusts.rstnetworking-adv-features.rstnetworking-arch.rstnetworking-auth.rstnetworking-config-agents.rstnetworking-config-identity.rstnetworking-config-plugins.rstnetworking-introduction.rstnetworking-use.rstobjectstorage-tenant-specific-image-storage.rstshared-file-systems-crud-share.rstshared-file-systems-key-concepts.rstshared-file-systems-network-plugins.rstshared-file-systems-quotas.rstshared-file-systems-security-services.rstshared-file-systems-share-networks.rstshared-file-systems-troubleshoot.rstshared-file-systems.rsttelemetry-alarms.rsttelemetry-data-retrieval.rsttelemetry-system-architecture.rst
@ -4,15 +4,15 @@
|
|||||||
Use multitenancy with Bare Metal service
|
Use multitenancy with Bare Metal service
|
||||||
========================================
|
========================================
|
||||||
|
|
||||||
Multitenancy allows creating a dedicated tenant network that extends the
|
Multitenancy allows creating a dedicated project network that extends the
|
||||||
current Bare Metal (ironic) service capabilities of providing ``flat``
|
current Bare Metal (ironic) service capabilities of providing ``flat``
|
||||||
networks. Multitenancy works in conjunction with Networking (neutron)
|
networks. Multitenancy works in conjunction with Networking (neutron)
|
||||||
service to allow provisioning of a bare metal server onto the tenant network.
|
service to allow provisioning of a bare metal server onto the project network.
|
||||||
Therefore, multiple tenants can get isolated instances after deployment.
|
Therefore, multiple projects can get isolated instances after deployment.
|
||||||
|
|
||||||
Bare Metal service provides the ``local_link_connection`` information to the
|
Bare Metal service provides the ``local_link_connection`` information to the
|
||||||
Networking service ML2 driver. The ML2 driver uses that information to plug the
|
Networking service ML2 driver. The ML2 driver uses that information to plug the
|
||||||
specified port to the tenant network.
|
specified port to the project network.
|
||||||
|
|
||||||
.. list-table:: ``local_link_connection`` fields
|
.. list-table:: ``local_link_connection`` fields
|
||||||
:header-rows: 1
|
:header-rows: 1
|
||||||
|
@ -22,7 +22,7 @@ Configure the Internal Tenant
|
|||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
The Image-Volume cache requires that the Internal Tenant be configured for
|
The Image-Volume cache requires that the Internal Tenant be configured for
|
||||||
the Block Storage services. This tenant will own the cached image-volumes so
|
the Block Storage services. This project will own the cached image-volumes so
|
||||||
they can be managed like normal users including tools like volume quotas. This
|
they can be managed like normal users including tools like volume quotas. This
|
||||||
protects normal users from having to see the cached image-volumes, but does
|
protects normal users from having to see the cached image-volumes, but does
|
||||||
not make them globally hidden.
|
not make them globally hidden.
|
||||||
@ -46,7 +46,7 @@ An example ``cinder.conf`` configuration file:
|
|||||||
|
|
||||||
The actual user and project that are configured for the Internal Tenant do
|
The actual user and project that are configured for the Internal Tenant do
|
||||||
not require any special privileges. They can be the Block Storage service
|
not require any special privileges. They can be the Block Storage service
|
||||||
tenant or can be any normal project and user.
|
project or can be any normal project and user.
|
||||||
|
|
||||||
Configure the Image-Volume cache
|
Configure the Image-Volume cache
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
@ -11,7 +11,7 @@ such as file and swift, creating a volume from a Volume-backed image performs
|
|||||||
better when the block storage driver supports efficient volume cloning.
|
better when the block storage driver supports efficient volume cloning.
|
||||||
|
|
||||||
If the image is set to public in the Image service, the volume data can be
|
If the image is set to public in the Image service, the volume data can be
|
||||||
shared among tenants.
|
shared among projects.
|
||||||
|
|
||||||
Configure the Volume-backed image
|
Configure the Volume-backed image
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
@ -50,15 +50,15 @@ each back-end section of the ``cinder.conf`` file:
|
|||||||
image_upload_use_cinder_backend = True
|
image_upload_use_cinder_backend = True
|
||||||
|
|
||||||
By default, the :command:`openstack image create --volume <volume>` command
|
By default, the :command:`openstack image create --volume <volume>` command
|
||||||
creates the Image-Volume in the current tenant. To store the Image-Volume into
|
creates the Image-Volume in the current project. To store the Image-Volume into
|
||||||
the internal tenant, set the following options in each back-end section of the
|
the internal project, set the following options in each back-end section of the
|
||||||
``cinder.conf`` file:
|
``cinder.conf`` file:
|
||||||
|
|
||||||
.. code-block:: ini
|
.. code-block:: ini
|
||||||
|
|
||||||
image_upload_use_internal_tenant = True
|
image_upload_use_internal_tenant = True
|
||||||
|
|
||||||
To make the Image-Volume in the internal tenant accessible from the Image
|
To make the Image-Volume in the internal project accessible from the Image
|
||||||
service, set the following options in the ``glance_store`` section of
|
service, set the following options in the ``glance_store`` section of
|
||||||
the ``glance-api.conf`` file:
|
the ``glance-api.conf`` file:
|
||||||
|
|
||||||
|
@ -87,7 +87,7 @@ command. Optional arguments to clarify the status of your backups
|
|||||||
include: running :option:`--name`, :option:`--status`, and
|
include: running :option:`--name`, :option:`--status`, and
|
||||||
:option:`--volume-id` to filter through backups by the specified name,
|
:option:`--volume-id` to filter through backups by the specified name,
|
||||||
status, or volume-id. Search with :option:`--all-tenants` for details of the
|
status, or volume-id. Search with :option:`--all-tenants` for details of the
|
||||||
tenants associated with the listed backups.
|
projects associated with the listed backups.
|
||||||
|
|
||||||
Because volume backups are dependent on the Block Storage database, you must
|
Because volume backups are dependent on the Block Storage database, you must
|
||||||
also back up your Block Storage database regularly to ensure data recovery.
|
also back up your Block Storage database regularly to ensure data recovery.
|
||||||
|
@ -29,7 +29,7 @@ Administrative users can view Block Storage service quotas.
|
|||||||
|
|
||||||
$ project_id=$(openstack project show -f value -c id PROJECT_NAME)
|
$ project_id=$(openstack project show -f value -c id PROJECT_NAME)
|
||||||
|
|
||||||
#. List the default quotas for a project (tenant):
|
#. List the default quotas for a project:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -48,7 +48,7 @@ Administrative users can view Block Storage service quotas.
|
|||||||
| volumes | 10 |
|
| volumes | 10 |
|
||||||
+-----------+-------+
|
+-----------+-------+
|
||||||
|
|
||||||
#. View Block Storage service quotas for a project (tenant):
|
#. View Block Storage service quotas for a project:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -99,7 +99,7 @@ service quotas.
|
|||||||
<http://docs.openstack.org/mitaka/config-reference/block-storage.html>`_
|
<http://docs.openstack.org/mitaka/config-reference/block-storage.html>`_
|
||||||
in OpenStack Configuration Reference.
|
in OpenStack Configuration Reference.
|
||||||
|
|
||||||
#. To update Block Storage service quotas for an existing project (tenant):
|
#. To update Block Storage service quotas for an existing project
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ Create a flavor
|
|||||||
$ openstack flavor create --is-public true m1.extra_tiny auto 256 0 1 --rxtx-factor .1
|
$ openstack flavor create --is-public true m1.extra_tiny auto 256 0 1 --rxtx-factor .1
|
||||||
|
|
||||||
#. If an individual user or group of users needs a custom
|
#. If an individual user or group of users needs a custom
|
||||||
flavor that you do not want other tenants to have access to,
|
flavor that you do not want other projects to have access to,
|
||||||
you can change the flavor's access to make it a private flavor.
|
you can change the flavor's access to make it a private flavor.
|
||||||
See
|
See
|
||||||
`Private Flavors in the OpenStack Operations Guide <http://docs.openstack.org/ops-guide/ops-user-facing-operations.html#private-flavors>`_.
|
`Private Flavors in the OpenStack Operations Guide <http://docs.openstack.org/ops-guide/ops-user-facing-operations.html#private-flavors>`_.
|
||||||
@ -132,7 +132,7 @@ Create a flavor
|
|||||||
|
|
||||||
#. After you create a flavor, assign it to a
|
#. After you create a flavor, assign it to a
|
||||||
project by specifying the flavor name or ID and
|
project by specifying the flavor name or ID and
|
||||||
the tenant ID:
|
the project ID:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@ Manage projects, users, and roles
|
|||||||
|
|
||||||
As an administrator, you manage projects, users, and
|
As an administrator, you manage projects, users, and
|
||||||
roles. Projects are organizational units in the cloud to which
|
roles. Projects are organizational units in the cloud to which
|
||||||
you can assign users. Projects are also known as *tenants* or
|
you can assign users. Projects are also known as *projects* or
|
||||||
*accounts*. Users can be members of one or more projects. Roles
|
*accounts*. Users can be members of one or more projects. Roles
|
||||||
define which actions users can perform. You assign roles to
|
define which actions users can perform. You assign roles to
|
||||||
user-project pairs.
|
user-project pairs.
|
||||||
@ -146,8 +146,8 @@ Create a user
|
|||||||
^^^^^^^^^^^^^
|
^^^^^^^^^^^^^
|
||||||
|
|
||||||
To create a user, you must specify a name. Optionally, you can
|
To create a user, you must specify a name. Optionally, you can
|
||||||
specify a tenant ID, password, and email address. It is recommended
|
specify a project ID, password, and email address. It is recommended
|
||||||
that you include the tenant ID and password because the user cannot
|
that you include the project ID and password because the user cannot
|
||||||
log in to the dashboard without this information.
|
log in to the dashboard without this information.
|
||||||
|
|
||||||
Create the ``new-user`` user:
|
Create the ``new-user`` user:
|
||||||
|
@ -3,7 +3,7 @@ Manage Networking service quotas
|
|||||||
================================
|
================================
|
||||||
|
|
||||||
A quota limits the number of available resources. A default
|
A quota limits the number of available resources. A default
|
||||||
quota might be enforced for all tenants. When you try to create
|
quota might be enforced for all projects. When you try to create
|
||||||
more resources than the quota allows, an error occurs:
|
more resources than the quota allows, an error occurs:
|
||||||
|
|
||||||
.. code-block:: ini
|
.. code-block:: ini
|
||||||
@ -11,15 +11,15 @@ more resources than the quota allows, an error occurs:
|
|||||||
$ neutron net-create test_net
|
$ neutron net-create test_net
|
||||||
Quota exceeded for resources: ['network']
|
Quota exceeded for resources: ['network']
|
||||||
|
|
||||||
Per-tenant quota configuration is also supported by the quota
|
Per-project quota configuration is also supported by the quota
|
||||||
extension API. See :ref:`cfg_quotas_per_tenant` for details.
|
extension API. See :ref:`cfg_quotas_per_tenant` for details.
|
||||||
|
|
||||||
Basic quota configuration
|
Basic quota configuration
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
In the Networking default quota mechanism, all tenants have
|
In the Networking default quota mechanism, all projects have
|
||||||
the same quota values, such as the number of resources that a
|
the same quota values, such as the number of resources that a
|
||||||
tenant can create.
|
project can create.
|
||||||
|
|
||||||
The quota value is defined in the OpenStack Networking
|
The quota value is defined in the OpenStack Networking
|
||||||
``/etc/neutron/neutron.conf`` configuration file. This example shows the
|
``/etc/neutron/neutron.conf`` configuration file. This example shows the
|
||||||
@ -69,33 +69,33 @@ each security group. Add these lines to the
|
|||||||
|
|
||||||
.. _cfg_quotas_per_tenant:
|
.. _cfg_quotas_per_tenant:
|
||||||
|
|
||||||
Configure per-tenant quotas
|
Configure per-project quotas
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
OpenStack Networking also supports per-tenant quota limit by
|
OpenStack Networking also supports per-project quota limit by
|
||||||
quota extension API.
|
quota extension API.
|
||||||
|
|
||||||
Use these commands to manage per-tenant quotas:
|
Use these commands to manage per-project quotas:
|
||||||
|
|
||||||
neutron quota-delete
|
neutron quota-delete
|
||||||
Delete defined quotas for a specified tenant
|
Delete defined quotas for a specified project
|
||||||
|
|
||||||
neutron quota-list
|
neutron quota-list
|
||||||
Lists defined quotas for all tenants
|
Lists defined quotas for all projects
|
||||||
|
|
||||||
neutron quota-show
|
neutron quota-show
|
||||||
Shows quotas for a specified tenant
|
Shows quotas for a specified project
|
||||||
|
|
||||||
neutron quota-default-show
|
neutron quota-default-show
|
||||||
Show default quotas for a specified tenant
|
Show default quotas for a specified tenant
|
||||||
|
|
||||||
neutron quota-update
|
neutron quota-update
|
||||||
Updates quotas for a specified tenant
|
Updates quotas for a specified project
|
||||||
|
|
||||||
Only users with the ``admin`` role can change a quota value. By default,
|
Only users with the ``admin`` role can change a quota value. By default,
|
||||||
the default set of quotas are enforced for all tenants, so no
|
the default set of quotas are enforced for all projects, so no
|
||||||
:command:`quota-create` command exists.
|
:command:`quota-create` command exists.
|
||||||
|
|
||||||
#. Configure Networking to show per-tenant quotas
|
#. Configure Networking to show per-project quotas
|
||||||
|
|
||||||
Set the ``quota_driver`` option in the ``/etc/neutron/neutron.conf`` file.
|
Set the ``quota_driver`` option in the ``/etc/neutron/neutron.conf`` file.
|
||||||
|
|
||||||
@ -114,7 +114,7 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
$ neutron ext-list -c alias -c name
|
$ neutron ext-list -c alias -c name
|
||||||
|
|
||||||
The command shows the ``quotas`` extension, which provides
|
The command shows the ``quotas`` extension, which provides
|
||||||
per-tenant quota management support.
|
per-project quota management support.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -152,17 +152,18 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
Only some plug-ins support per-tenant quotas.
|
Only some plug-ins support per-project quotas.
|
||||||
Specifically, Open vSwitch, Linux Bridge, and VMware NSX
|
Specifically, Open vSwitch, Linux Bridge, and VMware NSX
|
||||||
support them, but new versions of other plug-ins might
|
support them, but new versions of other plug-ins might
|
||||||
bring additional functionality. See the documentation for
|
bring additional functionality. See the documentation for
|
||||||
each plug-in.
|
each plug-in.
|
||||||
|
|
||||||
#. List tenants who have per-tenant quota support.
|
#. List projects who have per-project quota support.
|
||||||
|
|
||||||
The :command:`neutron quota-list` command lists tenants for which the
|
The :command:`neutron quota-list` command lists projects for which the
|
||||||
per-tenant quota is enabled. The command does not list tenants with default
|
per-project quota is enabled. The command does not list projects with
|
||||||
quota support. You must be an administrative user to run this command:
|
default quota support. You must be an administrative user to run this
|
||||||
|
command:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -174,13 +175,13 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
| 25 | 10 | 30 | 10 | 10 | bff5c9455ee24231b5bc713c1b96d422 |
|
| 25 | 10 | 30 | 10 | 10 | bff5c9455ee24231b5bc713c1b96d422 |
|
||||||
+------------+---------+------+--------+--------+----------------------------------+
|
+------------+---------+------+--------+--------+----------------------------------+
|
||||||
|
|
||||||
#. Show per-tenant quota values.
|
#. Show per-project quota values.
|
||||||
|
|
||||||
The :command:`neutron quota-show` command reports the current
|
The :command:`neutron quota-show` command reports the current
|
||||||
set of quota limits for the specified tenant.
|
set of quota limits for the specified project.
|
||||||
Non-administrative users can run this command without the
|
Non-administrative users can run this command without the
|
||||||
:option:`--tenant_id` parameter. If per-tenant quota limits are
|
:option:`--tenant_id` parameter. If per-project quota limits are
|
||||||
not enabled for the tenant, the command shows the default
|
not enabled for the project, the command shows the default
|
||||||
set of quotas.
|
set of quotas.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -212,10 +213,10 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
| subnet | 5 |
|
| subnet | 5 |
|
||||||
+------------+-------+
|
+------------+-------+
|
||||||
|
|
||||||
#. Update quota values for a specified tenant.
|
#. Update quota values for a specified project.
|
||||||
|
|
||||||
Use the :command:`neutron quota-update` command to
|
Use the :command:`neutron quota-update` command to
|
||||||
update a quota for a specified tenant.
|
update a quota for a specified project.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -251,7 +252,7 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
after the ``--`` directive.
|
after the ``--`` directive.
|
||||||
|
|
||||||
This example updates the limit of the number of floating
|
This example updates the limit of the number of floating
|
||||||
IPs for the specified tenant.
|
IPs for the specified project.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -284,9 +285,9 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
| subnet | 3 |
|
| subnet | 3 |
|
||||||
+------------+-------+
|
+------------+-------+
|
||||||
|
|
||||||
#. Delete per-tenant quota values.
|
#. Delete per-project quota values.
|
||||||
|
|
||||||
To clear per-tenant quota limits, use the
|
To clear per-project quota limits, use the
|
||||||
:command:`neutron quota-delete` command.
|
:command:`neutron quota-delete` command.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -295,7 +296,7 @@ the default set of quotas are enforced for all tenants, so no
|
|||||||
Deleted quota: 6f88036c45344d9999a1f971e4882723
|
Deleted quota: 6f88036c45344d9999a1f971e4882723
|
||||||
|
|
||||||
After you run this command, you can see that quota
|
After you run this command, you can see that quota
|
||||||
values for the tenant are reset to the default values.
|
values for the project are reset to the default values.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ List and view current security groups
|
|||||||
From the command-line you can get a list of security groups for the
|
From the command-line you can get a list of security groups for the
|
||||||
project, using the :command:`nova` command:
|
project, using the :command:`nova` command:
|
||||||
|
|
||||||
#. Ensure your system variables are set for the user and tenant for
|
#. Ensure your system variables are set for the user and project for
|
||||||
which you are checking security group rules. For example:
|
which you are checking security group rules. For example:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -92,7 +92,7 @@ that use it where the longer description field often does not. For
|
|||||||
example, seeing that an instance is using security group "http" is much
|
example, seeing that an instance is using security group "http" is much
|
||||||
easier to understand than "bobs\_group" or "secgrp1".
|
easier to understand than "bobs\_group" or "secgrp1".
|
||||||
|
|
||||||
#. Ensure your system variables are set for the user and tenant for
|
#. Ensure your system variables are set for the user and project for
|
||||||
which you are creating security group rules.
|
which you are creating security group rules.
|
||||||
|
|
||||||
#. Add the new security group, as follows:
|
#. Add the new security group, as follows:
|
||||||
@ -162,7 +162,7 @@ easier to understand than "bobs\_group" or "secgrp1".
|
|||||||
Delete a security group
|
Delete a security group
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
#. Ensure your system variables are set for the user and tenant for
|
#. Ensure your system variables are set for the user and project for
|
||||||
which you are deleting a security group.
|
which you are deleting a security group.
|
||||||
|
|
||||||
#. Delete the new security group, as follows:
|
#. Delete the new security group, as follows:
|
||||||
@ -186,7 +186,7 @@ all the user's other Instances using the specified Source Group are
|
|||||||
selected dynamically. This alleviates the need for individual rules to
|
selected dynamically. This alleviates the need for individual rules to
|
||||||
allow each new member of the cluster.
|
allow each new member of the cluster.
|
||||||
|
|
||||||
#. Make sure to set the system variables for the user and tenant for
|
#. Make sure to set the system variables for the user and project for
|
||||||
which you are creating a security group rule.
|
which you are creating a security group rule.
|
||||||
|
|
||||||
#. Add a source group, as follows:
|
#. Add a source group, as follows:
|
||||||
|
@ -4,8 +4,8 @@ Manage Compute service quotas
|
|||||||
|
|
||||||
As an administrative user, you can use the :command:`nova quota-*`
|
As an administrative user, you can use the :command:`nova quota-*`
|
||||||
commands, which are provided by the ``python-novaclient``
|
commands, which are provided by the ``python-novaclient``
|
||||||
package, to update the Compute service quotas for a specific tenant or
|
package, to update the Compute service quotas for a specific project or
|
||||||
tenant user, as well as update the quota defaults for a new tenant.
|
project user, as well as update the quota defaults for a new project.
|
||||||
|
|
||||||
**Compute quota descriptions**
|
**Compute quota descriptions**
|
||||||
|
|
||||||
@ -18,7 +18,7 @@ tenant user, as well as update the quota defaults for a new tenant.
|
|||||||
* - cores
|
* - cores
|
||||||
- Number of instance cores (VCPUs) allowed per project.
|
- Number of instance cores (VCPUs) allowed per project.
|
||||||
* - fixed-ips
|
* - fixed-ips
|
||||||
- Number of fixed IP addresses allowed per tenant. This number
|
- Number of fixed IP addresses allowed per project. This number
|
||||||
must be equal to or greater than the number of allowed
|
must be equal to or greater than the number of allowed
|
||||||
instances.
|
instances.
|
||||||
* - floating-ips
|
* - floating-ips
|
||||||
@ -46,12 +46,12 @@ tenant user, as well as update the quota defaults for a new tenant.
|
|||||||
* - server-group-members
|
* - server-group-members
|
||||||
- Number of servers per server group.
|
- Number of servers per server group.
|
||||||
|
|
||||||
View and update Compute quotas for a tenant (project)
|
View and update Compute quotas for a project (project)
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
To view and update default quota values
|
To view and update default quota values
|
||||||
---------------------------------------
|
---------------------------------------
|
||||||
#. List all default quotas for all tenants:
|
#. List all default quotas for all projects:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -81,7 +81,7 @@ To view and update default quota values
|
|||||||
| server_group_members | 10 |
|
| server_group_members | 10 |
|
||||||
+-----------------------------+-------+
|
+-----------------------------+-------+
|
||||||
|
|
||||||
#. Update a default value for a new tenant.
|
#. Update a default value for a new project.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -93,16 +93,16 @@ To view and update default quota values
|
|||||||
|
|
||||||
$ nova quota-class-update --instances 15 default
|
$ nova quota-class-update --instances 15 default
|
||||||
|
|
||||||
To view quota values for an existing tenant (project)
|
To view quota values for an existing project
|
||||||
-----------------------------------------------------
|
--------------------------------------------
|
||||||
|
|
||||||
#. Place the tenant ID in a usable variable.
|
#. Place the project ID in a usable variable.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ tenant=$(openstack project show -f value -c id TENANT_NAME)
|
$ tenant=$(openstack project show -f value -c id TENANT_NAME)
|
||||||
|
|
||||||
#. List the currently set quota values for a tenant.
|
#. List the currently set quota values for a project.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -132,10 +132,10 @@ To view quota values for an existing tenant (project)
|
|||||||
| server_group_members | 10 |
|
| server_group_members | 10 |
|
||||||
+-----------------------------+-------+
|
+-----------------------------+-------+
|
||||||
|
|
||||||
To update quota values for an existing tenant (project)
|
To update quota values for an existing project
|
||||||
-------------------------------------------------------
|
----------------------------------------------
|
||||||
|
|
||||||
#. Obtain the tenant ID.
|
#. Obtain the project ID.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -181,11 +181,11 @@ To update quota values for an existing tenant (project)
|
|||||||
|
|
||||||
$ nova help quota-update
|
$ nova help quota-update
|
||||||
|
|
||||||
View and update Compute quotas for a tenant user
|
View and update Compute quotas for a project user
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
To view quota values for a tenant user
|
To view quota values for a project user
|
||||||
--------------------------------------
|
---------------------------------------
|
||||||
|
|
||||||
#. Place the user ID in a usable variable.
|
#. Place the user ID in a usable variable.
|
||||||
|
|
||||||
@ -193,13 +193,13 @@ To view quota values for a tenant user
|
|||||||
|
|
||||||
$ tenantUser=$(openstack user show -f value -c id USER_NAME)
|
$ tenantUser=$(openstack user show -f value -c id USER_NAME)
|
||||||
|
|
||||||
#. Place the user's tenant ID in a usable variable, as follows:
|
#. Place the user's project ID in a usable variable, as follows:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ tenant=$(openstack project show -f value -c id TENANT_NAME)
|
$ tenant=$(openstack project show -f value -c id TENANT_NAME)
|
||||||
|
|
||||||
#. List the currently set quota values for a tenant user.
|
#. List the currently set quota values for a project user.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -229,8 +229,8 @@ To view quota values for a tenant user
|
|||||||
| server_group_members | 10 |
|
| server_group_members | 10 |
|
||||||
+-----------------------------+-------+
|
+-----------------------------+-------+
|
||||||
|
|
||||||
To update quota values for a tenant user
|
To update quota values for a project user
|
||||||
----------------------------------------
|
-----------------------------------------
|
||||||
|
|
||||||
#. Place the user ID in a usable variable.
|
#. Place the user ID in a usable variable.
|
||||||
|
|
||||||
@ -238,7 +238,7 @@ To update quota values for a tenant user
|
|||||||
|
|
||||||
$ tenantUser=$(openstack user show -f value -c id USER_NAME)
|
$ tenantUser=$(openstack user show -f value -c id USER_NAME)
|
||||||
|
|
||||||
#. Place the user's tenant ID in a usable variable, as follows:
|
#. Place the user's project ID in a usable variable, as follows:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -284,8 +284,8 @@ To update quota values for a tenant user
|
|||||||
|
|
||||||
$ nova help quota-update
|
$ nova help quota-update
|
||||||
|
|
||||||
To display the current quota usage for a tenant user
|
To display the current quota usage for a project user
|
||||||
----------------------------------------------------
|
-----------------------------------------------------
|
||||||
|
|
||||||
Use :command:`nova absolute-limits` to get a list of the
|
Use :command:`nova absolute-limits` to get a list of the
|
||||||
current quota values and the current quota usage:
|
current quota values and the current quota usage:
|
||||||
|
@ -7,21 +7,21 @@ Manage quotas
|
|||||||
To prevent system capacities from being exhausted without
|
To prevent system capacities from being exhausted without
|
||||||
notification, you can set up quotas. Quotas are operational
|
notification, you can set up quotas. Quotas are operational
|
||||||
limits. For example, the number of gigabytes allowed for each
|
limits. For example, the number of gigabytes allowed for each
|
||||||
tenant can be controlled so that cloud resources are optimized.
|
project can be controlled so that cloud resources are optimized.
|
||||||
Quotas can be enforced at both the tenant (or project)
|
Quotas can be enforced at both the project
|
||||||
and the tenant-user level.
|
and the project-user level.
|
||||||
|
|
||||||
Using the command-line interface, you can manage quotas for
|
Using the command-line interface, you can manage quotas for
|
||||||
the OpenStack Compute service, the OpenStack Block Storage service,
|
the OpenStack Compute service, the OpenStack Block Storage service,
|
||||||
and the OpenStack Networking service.
|
and the OpenStack Networking service.
|
||||||
|
|
||||||
The cloud operator typically changes default values because a
|
The cloud operator typically changes default values because a
|
||||||
tenant requires more than ten volumes or 1 TB on a compute
|
project requires more than ten volumes or 1 TB on a compute
|
||||||
node.
|
node.
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
To view all tenants (projects), run:
|
To view all projects, run:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -35,7 +35,7 @@ node.
|
|||||||
| f599c5cd1cba4125ae3d7caed08e288c | tenant02 |
|
| f599c5cd1cba4125ae3d7caed08e288c | tenant02 |
|
||||||
+----------------------------------+----------+
|
+----------------------------------+----------+
|
||||||
|
|
||||||
To display all current users for a tenant, run:
|
To display all current users for a project, run:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -61,7 +61,7 @@ Flavors define these elements:
|
|||||||
| | or NSX based systems. |
|
| | or NSX based systems. |
|
||||||
+-------------+---------------------------------------------------------------+
|
+-------------+---------------------------------------------------------------+
|
||||||
| Is Public | Boolean value, whether flavor is available to all users or p\ |
|
| Is Public | Boolean value, whether flavor is available to all users or p\ |
|
||||||
| | rivate to the tenant it was created in. Defaults to ``True``. |
|
| | rivate to the project it was created in. Defaults to ``True``.|
|
||||||
+-------------+---------------------------------------------------------------+
|
+-------------+---------------------------------------------------------------+
|
||||||
| Extra Specs | Key and value pairs that define on which compute nodes a fla\ |
|
| Extra Specs | Key and value pairs that define on which compute nodes a fla\ |
|
||||||
| | vor can run. These pairs must match corresponding pairs on t\ |
|
| | vor can run. These pairs must match corresponding pairs on t\ |
|
||||||
|
@ -53,7 +53,7 @@ specific commands might be restricted by the Identity service.
|
|||||||
#. Set the required parameters as environment variables to make running
|
#. Set the required parameters as environment variables to make running
|
||||||
commands easier. For example, you can add :option:`--os-username` as an
|
commands easier. For example, you can add :option:`--os-username` as an
|
||||||
``openstack`` option, or set it as an environment variable. To set the user
|
``openstack`` option, or set it as an environment variable. To set the user
|
||||||
name, password, and tenant as environment variables, use:
|
name, password, and project as environment variables, use:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -94,28 +94,28 @@ Flat DHCP Network Manager
|
|||||||
|
|
||||||
VLAN Network Manager
|
VLAN Network Manager
|
||||||
This is the default mode for OpenStack Compute. In this mode,
|
This is the default mode for OpenStack Compute. In this mode,
|
||||||
Compute creates a VLAN and bridge for each tenant. For
|
Compute creates a VLAN and bridge for each project. For
|
||||||
multiple-machine installations, the VLAN Network Mode requires a
|
multiple-machine installations, the VLAN Network Mode requires a
|
||||||
switch that supports VLAN tagging (IEEE 802.1Q). The tenant gets a
|
switch that supports VLAN tagging (IEEE 802.1Q). The project gets a
|
||||||
range of private IPs that are only accessible from inside the VLAN.
|
range of private IPs that are only accessible from inside the VLAN.
|
||||||
In order for a user to access the instances in their tenant, a
|
In order for a user to access the instances in their project, a
|
||||||
special VPN instance (code named ``cloudpipe``) needs to be created.
|
special VPN instance (code named ``cloudpipe``) needs to be created.
|
||||||
Compute generates a certificate and key for the user to access the
|
Compute generates a certificate and key for the user to access the
|
||||||
VPN and starts the VPN automatically. It provides a private network
|
VPN and starts the VPN automatically. It provides a private network
|
||||||
segment for each tenant's instances that can be accessed through a
|
segment for each project's instances that can be accessed through a
|
||||||
dedicated VPN connection from the internet. In this mode, each
|
dedicated VPN connection from the internet. In this mode, each
|
||||||
tenant gets its own VLAN, Linux networking bridge, and subnet.
|
project gets its own VLAN, Linux networking bridge, and subnet.
|
||||||
|
|
||||||
The subnets are specified by the network administrator, and are
|
The subnets are specified by the network administrator, and are
|
||||||
assigned dynamically to a tenant when required. A DHCP server is
|
assigned dynamically to a project when required. A DHCP server is
|
||||||
started for each VLAN to pass out IP addresses to VM instances from
|
started for each VLAN to pass out IP addresses to VM instances from
|
||||||
the subnet assigned to the tenant. All instances belonging to one
|
the subnet assigned to the project. All instances belonging to one
|
||||||
tenant are bridged into the same VLAN for that tenant. OpenStack
|
project are bridged into the same VLAN for that project. OpenStack
|
||||||
Compute creates the Linux networking bridges and VLANs when
|
Compute creates the Linux networking bridges and VLANs when
|
||||||
required.
|
required.
|
||||||
|
|
||||||
These network managers can co-exist in a cloud system. However, because
|
These network managers can co-exist in a cloud system. However, because
|
||||||
you cannot select the type of network for a given tenant, you cannot
|
you cannot select the type of network for a given project, you cannot
|
||||||
configure multiple network types in a single Compute installation.
|
configure multiple network types in a single Compute installation.
|
||||||
|
|
||||||
All network managers configure the network using network drivers. For
|
All network managers configure the network using network drivers. For
|
||||||
@ -155,7 +155,7 @@ All machines must have a public and internal network interface
|
|||||||
interface, and ``flat_interface`` and ``vlan_interface`` for the
|
interface, and ``flat_interface`` and ``vlan_interface`` for the
|
||||||
internal interface with flat or VLAN managers). This guide refers to the
|
internal interface with flat or VLAN managers). This guide refers to the
|
||||||
public network as the external network and the private network as the
|
public network as the external network and the private network as the
|
||||||
internal or tenant network.
|
internal or project network.
|
||||||
|
|
||||||
For flat and flat DHCP modes, use the :command:`nova network-create` command
|
For flat and flat DHCP modes, use the :command:`nova network-create` command
|
||||||
to create a network:
|
to create a network:
|
||||||
@ -789,7 +789,7 @@ Using multinic
|
|||||||
--------------
|
--------------
|
||||||
|
|
||||||
In order to use multinic, create two networks, and attach them to the
|
In order to use multinic, create two networks, and attach them to the
|
||||||
tenant (named ``project`` on the command line):
|
project (named ``project`` on the command line):
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -9,15 +9,15 @@ View and manage quotas
|
|||||||
|
|
||||||
To prevent system capacities from being exhausted without notification,
|
To prevent system capacities from being exhausted without notification,
|
||||||
you can set up quotas. Quotas are operational limits. For example, the
|
you can set up quotas. Quotas are operational limits. For example, the
|
||||||
number of gigabytes allowed for each tenant can be controlled so that
|
number of gigabytes allowed for each project can be controlled so that
|
||||||
cloud resources are optimized. Quotas can be enforced at both the tenant
|
cloud resources are optimized. Quotas can be enforced at both the project
|
||||||
(or project) and the tenant-user level.
|
and the project-user level.
|
||||||
|
|
||||||
Typically, you change quotas when a project needs more than ten
|
Typically, you change quotas when a project needs more than ten
|
||||||
volumes or 1 |nbsp| TB on a compute node.
|
volumes or 1 |nbsp| TB on a compute node.
|
||||||
|
|
||||||
Using the Dashboard, you can view default Compute and Block Storage
|
Using the Dashboard, you can view default Compute and Block Storage
|
||||||
quotas for new tenants, as well as update quotas for existing tenants.
|
quotas for new projects, as well as update quotas for existing projects.
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
@ -26,7 +26,7 @@ quotas for new tenants, as well as update quotas for existing tenants.
|
|||||||
the OpenStack Networking service (see `OpenStack Administrator Guide
|
the OpenStack Networking service (see `OpenStack Administrator Guide
|
||||||
<http://docs.openstack.org/admin-guide/cli-set-quotas.html>`_).
|
<http://docs.openstack.org/admin-guide/cli-set-quotas.html>`_).
|
||||||
Additionally, you can update Compute service quotas for
|
Additionally, you can update Compute service quotas for
|
||||||
tenant users.
|
project users.
|
||||||
|
|
||||||
The following table describes the Compute and Block Storage service quotas:
|
The following table describes the Compute and Block Storage service quotas:
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@ View resource statistics
|
|||||||
|
|
||||||
#. Click the:
|
#. Click the:
|
||||||
|
|
||||||
* :guilabel:`Usage Report` tab to view a usage report per tenant (project)
|
* :guilabel:`Usage Report` tab to view a usage report per project
|
||||||
by specifying the time period (or even use a calendar to define
|
by specifying the time period (or even use a calendar to define
|
||||||
a date range).
|
a date range).
|
||||||
|
|
||||||
|
@ -63,8 +63,8 @@ This sample paste config filter makes use of the ``admin_user`` and
|
|||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
Using this option requires an admin tenant/role relationship. The
|
Using this option requires an admin project/role relationship. The
|
||||||
admin user is granted access to the admin role on the admin tenant.
|
admin user is granted access to the admin role on the admin project.
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
|
@ -127,17 +127,17 @@ Identity user management examples:
|
|||||||
Compute service's ``policy.json`` file to require this role for
|
Compute service's ``policy.json`` file to require this role for
|
||||||
Compute operations.
|
Compute operations.
|
||||||
|
|
||||||
The Identity service assigns a tenant and a role to a user. You might
|
The Identity service assigns a project and a role to a user. You might
|
||||||
assign the ``compute-user`` role to the ``alice`` user in the ``acme``
|
assign the ``compute-user`` role to the ``alice`` user in the ``acme``
|
||||||
tenant:
|
project:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ openstack role add --project acme --user alice compute-user
|
$ openstack role add --project acme --user alice compute-user
|
||||||
|
|
||||||
A user can have different roles in different tenants. For example, Alice
|
A user can have different roles in different projects. For example, Alice
|
||||||
might also have the ``admin`` role in the ``Cyberdyne`` tenant. A user
|
might also have the ``admin`` role in the ``Cyberdyne`` project. A user
|
||||||
can also have multiple roles in the same tenant.
|
can also have multiple roles in the same project.
|
||||||
|
|
||||||
The ``/etc/[SERVICE_CODENAME]/policy.json`` file controls the
|
The ``/etc/[SERVICE_CODENAME]/policy.json`` file controls the
|
||||||
tasks that users can perform for a given service. For example, the
|
tasks that users can perform for a given service. For example, the
|
||||||
@ -149,7 +149,7 @@ the Identity service.
|
|||||||
|
|
||||||
The default ``policy.json`` files in the Compute, Identity, and
|
The default ``policy.json`` files in the Compute, Identity, and
|
||||||
Image services recognize only the ``admin`` role. Any user with
|
Image services recognize only the ``admin`` role. Any user with
|
||||||
any role in a tenant can access all operations that do not require the
|
any role in a project can access all operations that do not require the
|
||||||
``admin`` role.
|
``admin`` role.
|
||||||
|
|
||||||
To restrict users from performing operations in, for example, the
|
To restrict users from performing operations in, for example, the
|
||||||
@ -164,11 +164,11 @@ file does not restrict which users can create volumes:
|
|||||||
|
|
||||||
"volume:create": "",
|
"volume:create": "",
|
||||||
|
|
||||||
If the user has any role in a tenant, he can create volumes in that
|
If the user has any role in a project, he can create volumes in that
|
||||||
tenant.
|
project.
|
||||||
|
|
||||||
To restrict the creation of volumes to users who have the
|
To restrict the creation of volumes to users who have the
|
||||||
``compute-user`` role in a particular tenant, you add ``"role:compute-user"``:
|
``compute-user`` role in a particular project, you add ``"role:compute-user"``:
|
||||||
|
|
||||||
.. code-block:: json
|
.. code-block:: json
|
||||||
|
|
||||||
@ -300,7 +300,7 @@ services. It consists of:
|
|||||||
|
|
||||||
The Identity service also maintains a user that corresponds to each
|
The Identity service also maintains a user that corresponds to each
|
||||||
service, such as, a user named ``nova`` for the Compute service, and a
|
service, such as, a user named ``nova`` for the Compute service, and a
|
||||||
special service tenant called ``service``.
|
special service project called ``service``.
|
||||||
|
|
||||||
For information about how to create services and endpoints, see the
|
For information about how to create services and endpoints, see the
|
||||||
`OpenStack Administrator Guide <http://docs.openstack.org/admin-guide/
|
`OpenStack Administrator Guide <http://docs.openstack.org/admin-guide/
|
||||||
@ -330,7 +330,7 @@ Identity API V3 provides the following group-related operations:
|
|||||||
|
|
||||||
* List groups for a user
|
* List groups for a user
|
||||||
|
|
||||||
* Assign a role on a tenant to a group
|
* Assign a role on a project to a group
|
||||||
|
|
||||||
* Assign a role on a domain to a group
|
* Assign a role on a domain to a group
|
||||||
|
|
||||||
@ -345,8 +345,8 @@ Identity API V3 provides the following group-related operations:
|
|||||||
|
|
||||||
Here are a couple of examples:
|
Here are a couple of examples:
|
||||||
|
|
||||||
* Group A is granted Role A on Tenant A. If User A is a member of Group
|
* Group A is granted Role A on Project A. If User A is a member of Group
|
||||||
A, when User A gets a token scoped to Tenant A, the token also
|
A, when User A gets a token scoped to Project A, the token also
|
||||||
includes Role A.
|
includes Role A.
|
||||||
|
|
||||||
* Group B is granted Role B on Domain B. If User B is a member of
|
* Group B is granted Role B on Domain B. If User B is a member of
|
||||||
|
@ -7,7 +7,7 @@ Integrate assignment back end with LDAP
|
|||||||
When you configure the OpenStack Identity service to use LDAP servers,
|
When you configure the OpenStack Identity service to use LDAP servers,
|
||||||
you can split authentication and authorization using the *assignment*
|
you can split authentication and authorization using the *assignment*
|
||||||
feature. Integrating the *assignment* back end with LDAP allows
|
feature. Integrating the *assignment* back end with LDAP allows
|
||||||
administrators to use projects (tenant), roles, domains, and role
|
administrators to use projects, roles, domains, and role
|
||||||
assignments in LDAP.
|
assignments in LDAP.
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
@ -211,7 +211,7 @@ Identity attribute mapping
|
|||||||
user_enabled_invert = false
|
user_enabled_invert = false
|
||||||
user_enabled_default = 51
|
user_enabled_default = 51
|
||||||
user_default_project_id_attribute =
|
user_default_project_id_attribute =
|
||||||
user_attribute_ignore = default_project_id,tenants
|
user_attribute_ignore = default_project_id,projects
|
||||||
user_additional_attribute_mapping =
|
user_additional_attribute_mapping =
|
||||||
|
|
||||||
group_id_attribute = cn
|
group_id_attribute = cn
|
||||||
|
@ -24,7 +24,7 @@ The delegation parameters are:
|
|||||||
The user IDs for the trustor and trustee.
|
The user IDs for the trustor and trustee.
|
||||||
|
|
||||||
**Privileges**
|
**Privileges**
|
||||||
The delegated privileges are a combination of a tenant ID and a
|
The delegated privileges are a combination of a project ID and a
|
||||||
number of roles that must be a subset of the roles assigned to the
|
number of roles that must be a subset of the roles assigned to the
|
||||||
trustor.
|
trustor.
|
||||||
|
|
||||||
@ -50,7 +50,7 @@ The delegation parameters are:
|
|||||||
This parameter further restricts the delegation to the specified
|
This parameter further restricts the delegation to the specified
|
||||||
endpoints only. If you omit the endpoints, the delegation is
|
endpoints only. If you omit the endpoints, the delegation is
|
||||||
useless. A special value of ``all_endpoints`` allows the trust to be
|
useless. A special value of ``all_endpoints`` allows the trust to be
|
||||||
used by all endpoints associated with the delegated tenant.
|
used by all endpoints associated with the delegated project.
|
||||||
|
|
||||||
**Duration**
|
**Duration**
|
||||||
(Optional) Comprised of the start time and end time for the trust.
|
(Optional) Comprised of the start time and end time for the trust.
|
||||||
|
@ -11,8 +11,8 @@ to be of interest to the OpenStack community.
|
|||||||
Provider networks
|
Provider networks
|
||||||
~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
Networks can be categorized as either tenant networks or provider
|
Networks can be categorized as either project networks or provider
|
||||||
networks. Tenant networks are created by normal users and details about
|
networks. Project networks are created by normal users and details about
|
||||||
how they are physically realized are hidden from those users. Provider
|
how they are physically realized are hidden from those users. Provider
|
||||||
networks are created with administrative credentials, specifying the
|
networks are created with administrative credentials, specifying the
|
||||||
details of how the network is physically realized, usually to match some
|
details of how the network is physically realized, usually to match some
|
||||||
@ -20,7 +20,7 @@ existing network in the data center.
|
|||||||
|
|
||||||
Provider networks enable administrators to create networks that map
|
Provider networks enable administrators to create networks that map
|
||||||
directly to the physical networks in the data center.
|
directly to the physical networks in the data center.
|
||||||
This is commonly used to give tenants direct access to a public network
|
This is commonly used to give projects direct access to a public network
|
||||||
that can be used to reach the Internet. It might also be used to
|
that can be used to reach the Internet. It might also be used to
|
||||||
integrate with VLANs in the network that already have a defined meaning
|
integrate with VLANs in the network that already have a defined meaning
|
||||||
(for example, enable a VM from the marketing department to be placed
|
(for example, enable a VM from the marketing department to be placed
|
||||||
@ -62,14 +62,14 @@ configuration of plug-ins supporting the provider extension:
|
|||||||
| |extension and the plug-in configurations identify |
|
| |extension and the plug-in configurations identify |
|
||||||
| |physical networks using simple string names. |
|
| |physical networks using simple string names. |
|
||||||
+----------------------+-----------------------------------------------------+
|
+----------------------+-----------------------------------------------------+
|
||||||
| **tenant network** |A virtual network that a tenant or an administrator |
|
| **project network** |A virtual network that a project or an administrator |
|
||||||
| |creates. The physical details of the network are not |
|
| |creates. The physical details of the network are not |
|
||||||
| |exposed to the tenant. |
|
| |exposed to the project. |
|
||||||
+----------------------+-----------------------------------------------------+
|
+----------------------+-----------------------------------------------------+
|
||||||
| **provider network** | A virtual network administratively created to map to|
|
| **provider network** | A virtual network administratively created to map to|
|
||||||
| | a specific network in the data center, typically to |
|
| | a specific network in the data center, typically to |
|
||||||
| | enable direct access to non-OpenStack resources on |
|
| | enable direct access to non-OpenStack resources on |
|
||||||
| | that network. Tenants can be given access to |
|
| | that network. Project can be given access to |
|
||||||
| | provider networks. |
|
| | provider networks. |
|
||||||
+----------------------+-----------------------------------------------------+
|
+----------------------+-----------------------------------------------------+
|
||||||
| **VLAN network** | A virtual network implemented as packets on a |
|
| **VLAN network** | A virtual network implemented as packets on a |
|
||||||
@ -138,7 +138,7 @@ these attributes:
|
|||||||
``vxlan``, corresponding to flat networks, VLAN networks, local
|
``vxlan``, corresponding to flat networks, VLAN networks, local
|
||||||
networks, GRE networks, and VXLAN networks as defined above.
|
networks, GRE networks, and VXLAN networks as defined above.
|
||||||
All types of provider networks can be created by administrators,
|
All types of provider networks can be created by administrators,
|
||||||
while tenant networks can be implemented as ``vlan``, ``gre``,
|
while project networks can be implemented as ``vlan``, ``gre``,
|
||||||
``vxlan``, or ``local`` network types depending on plug-in
|
``vxlan``, or ``local`` network types depending on plug-in
|
||||||
configuration.
|
configuration.
|
||||||
* - provider: physical_network
|
* - provider: physical_network
|
||||||
@ -187,7 +187,7 @@ The L3 router provides basic NAT capabilities on gateway ports that
|
|||||||
uplink the router to external networks. This router SNATs all traffic by
|
uplink the router to external networks. This router SNATs all traffic by
|
||||||
default and supports floating IPs, which creates a static one-to-one
|
default and supports floating IPs, which creates a static one-to-one
|
||||||
mapping from a public IP on the external network to a private IP on one
|
mapping from a public IP on the external network to a private IP on one
|
||||||
of the other subnets attached to the router. This allows a tenant to
|
of the other subnets attached to the router. This allows a project to
|
||||||
selectively expose VMs on private networks to other hosts on the
|
selectively expose VMs on private networks to other hosts on the
|
||||||
external network (and often to all hosts on the Internet). You can
|
external network (and often to all hosts on the Internet). You can
|
||||||
allocate and map floating IPs from one port to another, as needed.
|
allocate and map floating IPs from one port to another, as needed.
|
||||||
@ -327,7 +327,7 @@ Security groups
|
|||||||
~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
Security groups and security group rules allow administrators and
|
Security groups and security group rules allow administrators and
|
||||||
tenants to specify the type of traffic and direction
|
projects to specify the type of traffic and direction
|
||||||
(ingress/egress) that is allowed to pass through a port. A security
|
(ingress/egress) that is allowed to pass through a port. A security
|
||||||
group is a container for security group rules.
|
group is a container for security group rules.
|
||||||
|
|
||||||
@ -525,7 +525,7 @@ VMware NSX QoS extension
|
|||||||
|
|
||||||
The VMware NSX QoS extension rate-limits network ports to guarantee a
|
The VMware NSX QoS extension rate-limits network ports to guarantee a
|
||||||
specific amount of bandwidth for each port. This extension, by default,
|
specific amount of bandwidth for each port. This extension, by default,
|
||||||
is only accessible by a tenant with an admin role but is configurable
|
is only accessible by a project with an admin role but is configurable
|
||||||
through the ``policy.json`` file. To use this extension, create a queue
|
through the ``policy.json`` file. To use this extension, create a queue
|
||||||
and specify the min/max bandwidth rates (kbps) and optionally set the
|
and specify the min/max bandwidth rates (kbps) and optionally set the
|
||||||
QoS Marking and DSCP value (if your network fabric uses these values to
|
QoS Marking and DSCP value (if your network fabric uses these values to
|
||||||
@ -736,7 +736,7 @@ This section explains the Big Switch neutron plug-in-specific extension.
|
|||||||
Big Switch router rules
|
Big Switch router rules
|
||||||
^^^^^^^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Big Switch allows router rules to be added to each tenant router. These
|
Big Switch allows router rules to be added to each project router. These
|
||||||
rules can be used to enforce routing policies such as denying traffic
|
rules can be used to enforce routing policies such as denying traffic
|
||||||
between subnets or traffic to external networks. By enforcing these at
|
between subnets or traffic to external networks. By enforcing these at
|
||||||
the router level, network segmentation policies can be enforced across
|
the router level, network segmentation policies can be enforced across
|
||||||
@ -745,7 +745,7 @@ many VMs that have differing security groups.
|
|||||||
Router rule attributes
|
Router rule attributes
|
||||||
''''''''''''''''''''''
|
''''''''''''''''''''''
|
||||||
|
|
||||||
Each tenant router has a set of router rules associated with it. Each
|
Each project router has a set of router rules associated with it. Each
|
||||||
router rule has the attributes in this table. Router rules and their
|
router rule has the attributes in this table. Router rules and their
|
||||||
attributes can be set using the :command:`neutron router-update` command,
|
attributes can be set using the :command:`neutron router-update` command,
|
||||||
through the horizon interface or the Networking API.
|
through the horizon interface or the Networking API.
|
||||||
@ -832,7 +832,7 @@ traffic that goes through a virtual router.
|
|||||||
The L3 metering extension is decoupled from the technology that
|
The L3 metering extension is decoupled from the technology that
|
||||||
implements the measurement. Two abstractions have been added: One is the
|
implements the measurement. Two abstractions have been added: One is the
|
||||||
metering label that can contain metering rules. Because a metering label
|
metering label that can contain metering rules. Because a metering label
|
||||||
is associated with a tenant, all virtual routers in this tenant are
|
is associated with a project, all virtual routers in this project are
|
||||||
associated with this label.
|
associated with this label.
|
||||||
|
|
||||||
Basic L3 metering operations
|
Basic L3 metering operations
|
||||||
|
@ -35,16 +35,16 @@ include the following agents:
|
|||||||
| | Certain plug-ins do not require an agent. |
|
| | Certain plug-ins do not require an agent. |
|
||||||
+----------------------------+---------------------------------------------+
|
+----------------------------+---------------------------------------------+
|
||||||
|**dhcp agent** | |
|
|**dhcp agent** | |
|
||||||
|(``neutron-dhcp-agent``) | Provides DHCP services to tenant networks. |
|
|(``neutron-dhcp-agent``) | Provides DHCP services to project networks. |
|
||||||
| | Required by certain plug-ins. |
|
| | Required by certain plug-ins. |
|
||||||
+----------------------------+---------------------------------------------+
|
+----------------------------+---------------------------------------------+
|
||||||
|**l3 agent** | |
|
|**l3 agent** | |
|
||||||
|(``neutron-l3-agent``) | Provides L3/NAT forwarding to provide |
|
|(``neutron-l3-agent``) | Provides L3/NAT forwarding to provide |
|
||||||
| | external network access for VMs on tenant |
|
| | external network access for VMs on project |
|
||||||
| | networks. Required by certain plug-ins. |
|
| | networks. Required by certain plug-ins. |
|
||||||
+----------------------------+---------------------------------------------+
|
+----------------------------+---------------------------------------------+
|
||||||
|**metering agent** | |
|
|**metering agent** | |
|
||||||
|(``neutron-metering-agent``)| Provides L3 traffic metering for tenant |
|
|(``neutron-metering-agent``)| Provides L3 traffic metering for project |
|
||||||
| | networks. |
|
| | networks. |
|
||||||
+----------------------------+---------------------------------------------+
|
+----------------------------+---------------------------------------------+
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ ways:
|
|||||||
VM into a particular network.
|
VM into a particular network.
|
||||||
|
|
||||||
- The dashboard (horizon) integrates with the Networking API, enabling
|
- The dashboard (horizon) integrates with the Networking API, enabling
|
||||||
administrators and tenant users to create and manage network services
|
administrators and project users to create and manage network services
|
||||||
through a web-based GUI.
|
through a web-based GUI.
|
||||||
|
|
||||||
VMware NSX integration
|
VMware NSX integration
|
||||||
|
@ -13,11 +13,11 @@ about authentication with the Identity service, see `OpenStack Identity
|
|||||||
service API v2.0
|
service API v2.0
|
||||||
Reference <http://developer.openstack.org/api-ref/identity/v2/>`__.
|
Reference <http://developer.openstack.org/api-ref/identity/v2/>`__.
|
||||||
When the Identity service is enabled, it is not mandatory to specify the
|
When the Identity service is enabled, it is not mandatory to specify the
|
||||||
tenant ID for resources in create requests because the tenant ID is
|
project ID for resources in create requests because the project ID is
|
||||||
derived from the authentication token.
|
derived from the authentication token.
|
||||||
|
|
||||||
The default authorization settings only allow administrative users
|
The default authorization settings only allow administrative users
|
||||||
to create resources on behalf of a different tenant. Networking uses
|
to create resources on behalf of a different project. Networking uses
|
||||||
information received from Identity to authorize user requests.
|
information received from Identity to authorize user requests.
|
||||||
Networking handles two kind of authorization policies:
|
Networking handles two kind of authorization policies:
|
||||||
|
|
||||||
@ -80,15 +80,15 @@ terminal rules:
|
|||||||
- **Generic rules** compare an attribute in the resource with an
|
- **Generic rules** compare an attribute in the resource with an
|
||||||
attribute extracted from the user's security credentials and
|
attribute extracted from the user's security credentials and
|
||||||
evaluates successfully if the comparison is successful. For instance
|
evaluates successfully if the comparison is successful. For instance
|
||||||
``"tenant_id:%(tenant_id)s"`` is successful if the tenant identifier
|
``"tenant_id:%(tenant_id)s"`` is successful if the project identifier
|
||||||
in the resource is equal to the tenant identifier of the user
|
in the resource is equal to the project identifier of the user
|
||||||
submitting the request.
|
submitting the request.
|
||||||
|
|
||||||
This extract is from the default ``policy.json`` file:
|
This extract is from the default ``policy.json`` file:
|
||||||
|
|
||||||
- A rule that evaluates successfully if the current user is an
|
- A rule that evaluates successfully if the current user is an
|
||||||
administrator or the owner of the resource specified in the request
|
administrator or the owner of the resource specified in the request
|
||||||
(tenant identifier is equal).
|
(project identifier is equal).
|
||||||
|
|
||||||
.. code-block:: json
|
.. code-block:: json
|
||||||
|
|
||||||
@ -226,7 +226,7 @@ This extract is from the default ``policy.json`` file:
|
|||||||
}
|
}
|
||||||
|
|
||||||
In some cases, some operations are restricted to administrators only.
|
In some cases, some operations are restricted to administrators only.
|
||||||
This example shows you how to modify a policy file to permit tenants to
|
This example shows you how to modify a policy file to permit project to
|
||||||
define networks, see their resources, and permit administrative users to
|
define networks, see their resources, and permit administrative users to
|
||||||
perform all other operations:
|
perform all other operations:
|
||||||
|
|
||||||
|
@ -154,7 +154,7 @@ Configure L3 agent
|
|||||||
~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
The OpenStack Networking service has a widely used API extension to
|
The OpenStack Networking service has a widely used API extension to
|
||||||
allow administrators and tenants to create routers to interconnect L2
|
allow administrators and projects to create routers to interconnect L2
|
||||||
networks, and floating IPs to make ports on private networks publicly
|
networks, and floating IPs to make ports on private networks publicly
|
||||||
accessible.
|
accessible.
|
||||||
|
|
||||||
|
@ -83,7 +83,7 @@ Configure Identity service for Networking
|
|||||||
|
|
||||||
You must provide admin user credentials that Compute and some internal
|
You must provide admin user credentials that Compute and some internal
|
||||||
Networking components can use to access the Networking API. Create a
|
Networking components can use to access the Networking API. Create a
|
||||||
special ``service`` tenant and a ``neutron`` user within this tenant,
|
special ``service`` project and a ``neutron`` user within this project,
|
||||||
and assign an ``admin`` role to this role.
|
and assign an ``admin`` role to this role.
|
||||||
|
|
||||||
a. Create the ``admin`` role:
|
a. Create the ``admin`` role:
|
||||||
@ -100,14 +100,14 @@ Configure Identity service for Networking
|
|||||||
--password "$NEUTRON_PASSWORD" --email demo@example.com \
|
--password "$NEUTRON_PASSWORD" --email demo@example.com \
|
||||||
--project service)
|
--project service)
|
||||||
|
|
||||||
c. Create the ``service`` tenant:
|
c. Create the ``service`` project:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ SERVICE_TENANT=$(get_id openstack project create service \
|
$ SERVICE_TENANT=$(get_id openstack project create service \
|
||||||
--description "Services project")
|
--description "Services project")
|
||||||
|
|
||||||
d. Establish the relationship among the tenant, user, and role:
|
d. Establish the relationship among the project, user, and role:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
@ -133,7 +133,7 @@ most network-related decisions to Networking.
|
|||||||
Networking can cause problems, as can stale iptables rules pushed
|
Networking can cause problems, as can stale iptables rules pushed
|
||||||
down by previously running ``nova-network``.
|
down by previously running ``nova-network``.
|
||||||
|
|
||||||
Compute proxies tenant-facing API calls to manage security groups and
|
Compute proxies project-facing API calls to manage security groups and
|
||||||
floating IPs to Networking APIs. However, operator-facing tools such
|
floating IPs to Networking APIs. However, operator-facing tools such
|
||||||
as ``nova-manage``, are not proxied and should not be used.
|
as ``nova-manage``, are not proxied and should not be used.
|
||||||
|
|
||||||
@ -174,8 +174,8 @@ happen, you must configure the following items in the ``nova.conf`` file
|
|||||||
for this deployment.
|
for this deployment.
|
||||||
* - ``[neutron] auth_strategy``
|
* - ``[neutron] auth_strategy``
|
||||||
- Keep the default ``keystone`` value for all production deployments.
|
- Keep the default ``keystone`` value for all production deployments.
|
||||||
* - ``[neutron] admin_tenant_name``
|
* - ``[neutron] admin_project_name``
|
||||||
- Update to the name of the service tenant created in the above section on
|
- Update to the name of the service project created in the above section on
|
||||||
Identity configuration.
|
Identity configuration.
|
||||||
* - ``[neutron] admin_username``
|
* - ``[neutron] admin_username``
|
||||||
- Update to the name of the user created in the above section on Identity
|
- Update to the name of the user created in the above section on Identity
|
||||||
@ -248,7 +248,7 @@ To enable proxying the requests, you must update the following fields in
|
|||||||
|
|
||||||
As a precaution, even when using ``metadata_proxy_shared_secret``,
|
As a precaution, even when using ``metadata_proxy_shared_secret``,
|
||||||
we recommend that you do not expose metadata using the same
|
we recommend that you do not expose metadata using the same
|
||||||
nova-api instances that are used for tenants. Instead, you should
|
nova-api instances that are used for projects. Instead, you should
|
||||||
run a dedicated set of nova-api instances for metadata that are
|
run a dedicated set of nova-api instances for metadata that are
|
||||||
available only on your management network. Whether a given nova-api
|
available only on your management network. Whether a given nova-api
|
||||||
instance exposes metadata APIs is determined by the value of
|
instance exposes metadata APIs is determined by the value of
|
||||||
|
@ -148,7 +148,7 @@ formerly known as Nicira NVP.
|
|||||||
load balancing requests on the various API endpoints.
|
load balancing requests on the various API endpoints.
|
||||||
|
|
||||||
- The UUID of the NSX-mh transport zone that should be used by default
|
- The UUID of the NSX-mh transport zone that should be used by default
|
||||||
when a tenant creates a network. You can get this value from the
|
when a project creates a network. You can get this value from the
|
||||||
Transport Zones page for the NSX-mh manager:
|
Transport Zones page for the NSX-mh manager:
|
||||||
|
|
||||||
Alternatively the transport zone identifier can be retrieved by query
|
Alternatively the transport zone identifier can be retrieved by query
|
||||||
|
@ -53,9 +53,9 @@ To configure rich network topologies, you can create and configure
|
|||||||
networks and subnets and instruct other OpenStack services like Compute
|
networks and subnets and instruct other OpenStack services like Compute
|
||||||
to attach virtual devices to ports on these networks.
|
to attach virtual devices to ports on these networks.
|
||||||
|
|
||||||
In particular, Networking supports each tenant having multiple private
|
In particular, Networking supports each project having multiple private
|
||||||
networks and enables tenants to choose their own IP addressing scheme,
|
networks and enables projects to choose their own IP addressing scheme,
|
||||||
even if those IP addresses overlap with those that other tenants use.
|
even if those IP addresses overlap with those that other projects use.
|
||||||
|
|
||||||
The Networking service:
|
The Networking service:
|
||||||
|
|
||||||
@ -317,7 +317,7 @@ an IP address between two instances to enable fast data plane failover.
|
|||||||
Virtual-Private-Network-as-a-Service (VPNaaS)
|
Virtual-Private-Network-as-a-Service (VPNaaS)
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
The VPNaaS extension enables OpenStack tenants to extend private networks
|
The VPNaaS extension enables OpenStack projects to extend private networks
|
||||||
across the internet.
|
across the internet.
|
||||||
|
|
||||||
VPNaas is a :term:`service`. It is a parent object that associates a VPN
|
VPNaas is a :term:`service`. It is a parent object that associates a VPN
|
||||||
@ -338,7 +338,7 @@ The current implementation of the VPNaaS extension provides:
|
|||||||
|
|
||||||
- Site-to-site VPN that connects two private networks.
|
- Site-to-site VPN that connects two private networks.
|
||||||
|
|
||||||
- Multiple VPN connections per tenant.
|
- Multiple VPN connections per project.
|
||||||
|
|
||||||
- IKEv1 policy support with 3des, aes-128, aes-256, or aes-192 encryption.
|
- IKEv1 policy support with 3des, aes-128, aes-256, or aes-192 encryption.
|
||||||
|
|
||||||
|
@ -16,14 +16,14 @@ Log files are in the ``/var/log/neutron`` directory.
|
|||||||
|
|
||||||
Configuration files are in the ``/etc/neutron`` directory.
|
Configuration files are in the ``/etc/neutron`` directory.
|
||||||
|
|
||||||
Administrators and tenants can use OpenStack Networking to build
|
Administrators and projects can use OpenStack Networking to build
|
||||||
rich network topologies. Administrators can create network
|
rich network topologies. Administrators can create network
|
||||||
connectivity on behalf of tenants.
|
connectivity on behalf of projects.
|
||||||
|
|
||||||
Core Networking API features
|
Core Networking API features
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
After you install and configure Networking, tenants and administrators
|
After you install and configure Networking, projects and administrators
|
||||||
can perform create-read-update-delete (CRUD) API networking operations
|
can perform create-read-update-delete (CRUD) API networking operations
|
||||||
by using the Networking API directly or neutron command-line interface
|
by using the Networking API directly or neutron command-line interface
|
||||||
(CLI). The neutron CLI is a wrapper around the Networking API. Every
|
(CLI). The neutron CLI is a wrapper around the Networking API. Every
|
||||||
@ -57,12 +57,12 @@ basic network operations:
|
|||||||
| | ``net1 10.0.0.0/24`` |
|
| | ``net1 10.0.0.0/24`` |
|
||||||
+-------------------------+-------------------------------------------------+
|
+-------------------------+-------------------------------------------------+
|
||||||
|Lists ports for a | |
|
|Lists ports for a | |
|
||||||
|specified tenant. | |
|
|specified project. | |
|
||||||
| | |
|
| | |
|
||||||
| | ``$ neutron port-list`` |
|
| | ``$ neutron port-list`` |
|
||||||
+-------------------------+-------------------------------------------------+
|
+-------------------------+-------------------------------------------------+
|
||||||
|Lists ports for a | |
|
|Lists ports for a | |
|
||||||
|specified tenant | |
|
|specified project | |
|
||||||
|and displays the ``id``, | |
|
|and displays the ``id``, | |
|
||||||
|``fixed_ips``, | |
|
|``fixed_ips``, | |
|
||||||
|and ``device_owner`` | |
|
|and ``device_owner`` | |
|
||||||
@ -91,7 +91,7 @@ Administrative operations
|
|||||||
-------------------------
|
-------------------------
|
||||||
|
|
||||||
The administrator can run any :command:`neutron` command on behalf of
|
The administrator can run any :command:`neutron` command on behalf of
|
||||||
tenants by specifying an Identity ``tenant_id`` in the command, as
|
projects by specifying an Identity ``tenant_id`` in the command, as
|
||||||
follows:
|
follows:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -106,7 +106,7 @@ For example:
|
|||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
To view all tenant IDs in Identity, run the following command as an
|
To view all project IDs in Identity, run the following command as an
|
||||||
Identity service admin user:
|
Identity service admin user:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -123,7 +123,7 @@ advanced network operations:
|
|||||||
| Operation | Command |
|
| Operation | Command |
|
||||||
+===============================+============================================+
|
+===============================+============================================+
|
||||||
|Creates a network that | |
|
|Creates a network that | |
|
||||||
|all tenants can use. | |
|
|all projects can use. | |
|
||||||
| | |
|
| | |
|
||||||
| | ``$ neutron net-create`` |
|
| | ``$ neutron net-create`` |
|
||||||
| | ``--shared public-net`` |
|
| | ``--shared public-net`` |
|
||||||
@ -258,7 +258,7 @@ complete advanced VM creation operations:
|
|||||||
+-------------------------------------+--------------------------------------+
|
+-------------------------------------+--------------------------------------+
|
||||||
|Boots a VM that connects to all | |
|
|Boots a VM that connects to all | |
|
||||||
|networks that are accessible to the | |
|
|networks that are accessible to the | |
|
||||||
|tenant who submits the request | |
|
|projectt who submits the request | |
|
||||||
|(without the ``--nic`` option). | |
|
|(without the ``--nic`` option). | |
|
||||||
| | |
|
| | |
|
||||||
| |``$ nova boot --image IMAGE --flavor``|
|
| |``$ nova boot --image IMAGE --flavor``|
|
||||||
|
@ -1,18 +1,18 @@
|
|||||||
=============================================================
|
==============================================================
|
||||||
Configure tenant-specific image locations with Object Storage
|
Configure project-specific image locations with Object Storage
|
||||||
=============================================================
|
==============================================================
|
||||||
|
|
||||||
For some deployers, it is not ideal to store all images in one place to
|
For some deployers, it is not ideal to store all images in one place to
|
||||||
enable all tenants and users to access them. You can configure the Image
|
enable all projects and users to access them. You can configure the Image
|
||||||
service to store image data in tenant-specific image locations. Then,
|
service to store image data in project-specific image locations. Then,
|
||||||
only the following tenants can use the Image service to access the
|
only the following projects can use the Image service to access the
|
||||||
created image:
|
created image:
|
||||||
|
|
||||||
- The tenant who owns the image
|
- The project who owns the image
|
||||||
- Tenants that are defined in ``swift_store_admin_tenants`` and that
|
- Projects that are defined in ``swift_store_admin_tenants`` and that
|
||||||
have admin-level accounts
|
have admin-level accounts
|
||||||
|
|
||||||
**To configure tenant-specific image locations**
|
**To configure project-specific image locations**
|
||||||
|
|
||||||
#. Configure swift as your ``default_store`` in the
|
#. Configure swift as your ``default_store`` in the
|
||||||
``glance-api.conf`` file.
|
``glance-api.conf`` file.
|
||||||
|
@ -373,12 +373,12 @@ status share should have status ``available``:
|
|||||||
+----------------------+----------------------------------------------------------------------+
|
+----------------------+----------------------------------------------------------------------+
|
||||||
|
|
||||||
``is_public`` defines the level of visibility for the share: whether other
|
``is_public`` defines the level of visibility for the share: whether other
|
||||||
tenants can or cannot see the share. By default, the share is private.
|
projects can or cannot see the share. By default, the share is private.
|
||||||
|
|
||||||
Update share
|
Update share
|
||||||
------------
|
------------
|
||||||
|
|
||||||
Update the name, or description, or level of visibility for all tenants for
|
Update the name, or description, or level of visibility for all projects for
|
||||||
the share if you need:
|
the share if you need:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -602,7 +602,7 @@ state using soft-deletion you'll get an error:
|
|||||||
A share cannot be deleted in a transitional status, that it why an error from
|
A share cannot be deleted in a transitional status, that it why an error from
|
||||||
``python-manilaclient`` appeared.
|
``python-manilaclient`` appeared.
|
||||||
|
|
||||||
Print the list of all shares for all tenants:
|
Print the list of all shares for all projects:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -89,9 +89,9 @@ Share Networks
|
|||||||
~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~
|
||||||
|
|
||||||
A ``share network`` is an object that defines a relationship between a
|
A ``share network`` is an object that defines a relationship between a
|
||||||
tenant network and subnet, as defined in an OpenStack Networking service or
|
project network and subnet, as defined in an OpenStack Networking service or
|
||||||
Compute service. The ``share network`` is also defined in ``shares``
|
Compute service. The ``share network`` is also defined in ``shares``
|
||||||
created by the same tenant. A tenant may find it desirable to
|
created by the same project. A project may find it desirable to
|
||||||
provision ``shares`` such that only instances connected to a particular
|
provision ``shares`` such that only instances connected to a particular
|
||||||
OpenStack-defined network have access to the ``share``. Also,
|
OpenStack-defined network have access to the ``share``. Also,
|
||||||
``security services`` can be attached to ``share networks``,
|
``security services`` can be attached to ``share networks``,
|
||||||
|
@ -6,7 +6,7 @@ Network plug-ins
|
|||||||
|
|
||||||
The Shared File Systems service architecture defines an abstraction layer for
|
The Shared File Systems service architecture defines an abstraction layer for
|
||||||
network resource provisioning and allowing administrators to choose from a
|
network resource provisioning and allowing administrators to choose from a
|
||||||
different options for how network resources are assigned to their tenants’
|
different options for how network resources are assigned to their projects’
|
||||||
networked storage. There are a set of network plug-ins that provide a variety
|
networked storage. There are a set of network plug-ins that provide a variety
|
||||||
of integration approaches with the network services that are available with
|
of integration approaches with the network services that are available with
|
||||||
OpenStack.
|
OpenStack.
|
||||||
@ -36,7 +36,7 @@ Shared File Systems service:
|
|||||||
the ``neutron_subnet_id`` to be provided when defining the share network
|
the ``neutron_subnet_id`` to be provided when defining the share network
|
||||||
that will be used for the creation of share servers. The user may define
|
that will be used for the creation of share servers. The user may define
|
||||||
any number of share networks corresponding to the various physical
|
any number of share networks corresponding to the various physical
|
||||||
network segments in a tenant environment.
|
network segments in a project environment.
|
||||||
|
|
||||||
b) ``manila.network.neutron.neutron_network_plugin.
|
b) ``manila.network.neutron.neutron_network_plugin.
|
||||||
NeutronSingleNetworkPlugin``. This is a simplification of the previous
|
NeutronSingleNetworkPlugin``. This is a simplification of the previous
|
||||||
|
@ -7,7 +7,7 @@ Quotas and limits
|
|||||||
Limits
|
Limits
|
||||||
~~~~~~
|
~~~~~~
|
||||||
|
|
||||||
Limits are the resource limitations that are allowed for each tenant (project).
|
Limits are the resource limitations that are allowed for each project.
|
||||||
An administrator can configure limits in the ``manila.conf`` file.
|
An administrator can configure limits in the ``manila.conf`` file.
|
||||||
|
|
||||||
Users can query their rate and absolute limits.
|
Users can query their rate and absolute limits.
|
||||||
@ -85,22 +85,22 @@ Quotas
|
|||||||
|
|
||||||
Quota sets provide quota management support.
|
Quota sets provide quota management support.
|
||||||
|
|
||||||
To list the quotas for a tenant or user, use the :command:`manila quota-show`
|
To list the quotas for a project or user, use the :command:`manila quota-show`
|
||||||
command. If you specify the optional :option:`--user` parameter, you get the
|
command. If you specify the optional :option:`--user` parameter, you get the
|
||||||
quotas for this user in the specified tenant. If you omit this parameter,
|
quotas for this user in the specified project. If you omit this parameter,
|
||||||
you get the quotas for the specified project.
|
you get the quotas for the specified project.
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
The Shared File Systems service does not perform mapping of usernames and
|
The Shared File Systems service does not perform mapping of usernames and
|
||||||
tenant/project names to IDs. Provide only ID values to get correct setup
|
project names to IDs. Provide only ID values to get correct setup
|
||||||
of quotas. Setting it by names you set quota for nonexistent tenant/user.
|
of quotas. Setting it by names you set quota for nonexistent project/user.
|
||||||
In case quota is not set explicitly by tenant/user ID,
|
In case quota is not set explicitly by project/user ID,
|
||||||
The Shared File Systems service just applies default quotas.
|
The Shared File Systems service just applies default quotas.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ manila quota-show --tenant %tenant_id% --user %user_id%
|
$ manila quota-show --tenant %project_id% --user %user_id%
|
||||||
+--------------------+-------+
|
+--------------------+-------+
|
||||||
| Property | Value |
|
| Property | Value |
|
||||||
+--------------------+-------+
|
+--------------------+-------+
|
||||||
@ -117,7 +117,7 @@ the :command:`manila quota-defaults` command:
|
|||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ manila quota-defaults --tenant %tenant_id%
|
$ manila quota-defaults --tenant %project_id%
|
||||||
+--------------------+-------+
|
+--------------------+-------+
|
||||||
| Property | Value |
|
| Property | Value |
|
||||||
+--------------------+-------+
|
+--------------------+-------+
|
||||||
@ -128,14 +128,14 @@ the :command:`manila quota-defaults` command:
|
|||||||
| share_networks | 10 |
|
| share_networks | 10 |
|
||||||
+--------------------+-------+
|
+--------------------+-------+
|
||||||
|
|
||||||
The administrator can update the quotas for a specific tenant, or for a
|
The administrator can update the quotas for a specific project, or for a
|
||||||
specific user by providing both the ``--tenant`` and ``--user`` optional
|
specific user by providing both the ``--tenant`` and ``--user`` optional
|
||||||
arguments. It is possible to update the ``shares``, ``snapshots``,
|
arguments. It is possible to update the ``shares``, ``snapshots``,
|
||||||
``gigabytes``, ``snapshot-gigabytes``, and ``share-networks`` quotas.
|
``gigabytes``, ``snapshot-gigabytes``, and ``share-networks`` quotas.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ manila quota-update %tenant_id% --user %user_id% --shares 49 --snapshots 49
|
$ manila quota-update %project_id% --user %user_id% --shares 49 --snapshots 49
|
||||||
|
|
||||||
As administrator, you can also permit or deny the force-update of a quota that
|
As administrator, you can also permit or deny the force-update of a quota that
|
||||||
is already used, or if the requested value exceeds the configured quota limit.
|
is already used, or if the requested value exceeds the configured quota limit.
|
||||||
@ -143,10 +143,10 @@ To force-update a quota, use ``force`` optional key.
|
|||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ manila quota-update %tenant_id% --shares 51 --snapshots 51 --force
|
$ manila quota-update %project_id% --shares 51 --snapshots 51 --force
|
||||||
|
|
||||||
To revert quotas to default for a project or for a user, delete quotas:
|
To revert quotas to default for a project or for a user, delete quotas:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
$ manila quota-delete --tenant %tenant_id% --user %user_id%
|
$ manila quota-delete --tenant %project_id% --user %user_id%
|
||||||
|
@ -33,9 +33,9 @@ You can add the security service to the
|
|||||||
:ref:`share network <shared_file_systems_share_networks>`.
|
:ref:`share network <shared_file_systems_share_networks>`.
|
||||||
|
|
||||||
To create a security service, specify the security service type, a
|
To create a security service, specify the security service type, a
|
||||||
description of a security service, DNS IP address used inside tenant's
|
description of a security service, DNS IP address used inside project's
|
||||||
network, security service IP address or host name, domain, security
|
network, security service IP address or host name, domain, security
|
||||||
service user or group used by tenant, and a password for the user. The
|
service user or group used by project, and a password for the user. The
|
||||||
share name is optional.
|
share name is optional.
|
||||||
|
|
||||||
Create a ``ldap`` security service:
|
Create a ``ldap`` security service:
|
||||||
|
@ -12,7 +12,7 @@ creating a new share network.
|
|||||||
How to create share network
|
How to create share network
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
To list networks in a tenant, run:
|
To list networks in a project, run:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -104,4 +104,4 @@ Solution
|
|||||||
|
|
||||||
Some drivers in the Shared File Systems service can create service entities,
|
Some drivers in the Shared File Systems service can create service entities,
|
||||||
like servers and networks. If it is necessary, you can log in to
|
like servers and networks. If it is necessary, you can log in to
|
||||||
tenant ``service`` and take manual control over it.
|
project ``service`` and take manual control over it.
|
||||||
|
@ -5,7 +5,7 @@ Shared File Systems
|
|||||||
===================
|
===================
|
||||||
|
|
||||||
Shared File Systems service provides a set of services for management of
|
Shared File Systems service provides a set of services for management of
|
||||||
shared file systems in a multi-tenant cloud environment. The service resembles
|
shared file systems in a multi-project cloud environment. The service resembles
|
||||||
OpenStack block-based storage management from the OpenStack Block Storage
|
OpenStack block-based storage management from the OpenStack Block Storage
|
||||||
service project. With the Shared File Systems service, you can
|
service project. With the Shared File Systems service, you can
|
||||||
create a remote file system, mount the file system on your instances, and then
|
create a remote file system, mount the file system on your instances, and then
|
||||||
|
@ -245,7 +245,7 @@ could indicate that:
|
|||||||
instance)
|
instance)
|
||||||
|
|
||||||
* *or*, that the identified instance is not visible to the
|
* *or*, that the identified instance is not visible to the
|
||||||
user/tenant owning the alarm
|
user/project owning the alarm
|
||||||
|
|
||||||
* *or*, simply that an alarm evaluation cycle hasn't kicked off since
|
* *or*, simply that an alarm evaluation cycle hasn't kicked off since
|
||||||
the alarm was created (by default, alarms are evaluated once per
|
the alarm was created (by default, alarms are evaluated once per
|
||||||
@ -259,7 +259,7 @@ could indicate that:
|
|||||||
* admin users see *all* alarms, regardless of the owner
|
* admin users see *all* alarms, regardless of the owner
|
||||||
|
|
||||||
* non-admin users see only the alarms associated with their project
|
* non-admin users see only the alarms associated with their project
|
||||||
(as per the normal tenant segregation in OpenStack)
|
(as per the normal project segregation in OpenStack)
|
||||||
|
|
||||||
Alarm update
|
Alarm update
|
||||||
------------
|
------------
|
||||||
|
@ -24,7 +24,7 @@ of meters, alarm definitions and so forth.
|
|||||||
The Telemetry API URL can be retrieved from the service catalog provided
|
The Telemetry API URL can be retrieved from the service catalog provided
|
||||||
by OpenStack Identity, which is populated during the installation
|
by OpenStack Identity, which is populated during the installation
|
||||||
process. The API access needs a valid token and proper permission to
|
process. The API access needs a valid token and proper permission to
|
||||||
retrieve data, as described in :ref:`telemetry-users-roles-tenants`.
|
retrieve data, as described in :ref:`telemetry-users-roles-projects`.
|
||||||
|
|
||||||
Further information about the available API endpoints can be found in
|
Further information about the available API endpoints can be found in
|
||||||
the `Telemetry API Reference
|
the `Telemetry API Reference
|
||||||
@ -230,7 +230,7 @@ be used:
|
|||||||
|
|
||||||
The :command:`ceilometer` command was run with ``admin`` rights, which means
|
The :command:`ceilometer` command was run with ``admin`` rights, which means
|
||||||
that all the data is accessible in the database. For more information
|
that all the data is accessible in the database. For more information
|
||||||
about access right see :ref:`telemetry-users-roles-tenants`. As it can be seen
|
about access right see :ref:`telemetry-users-roles-projects`. As it can be seen
|
||||||
in the above example, there are two VM instances existing in the system, as
|
in the above example, there are two VM instances existing in the system, as
|
||||||
there are VM instance related meters on the top of the result list. The
|
there are VM instance related meters on the top of the result list. The
|
||||||
existence of these meters does not indicate that these instances are running at
|
existence of these meters does not indicate that these instances are running at
|
||||||
|
@ -148,10 +148,10 @@ external networking services:
|
|||||||
- `OpenContrail <http://www.opencontrail.org/>`__
|
- `OpenContrail <http://www.opencontrail.org/>`__
|
||||||
|
|
||||||
|
|
||||||
.. _telemetry-users-roles-tenants:
|
.. _telemetry-users-roles-projects:
|
||||||
|
|
||||||
Users, roles, and tenants
|
Users, roles, and projects
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
This service of OpenStack uses OpenStack Identity for authenticating and
|
This service of OpenStack uses OpenStack Identity for authenticating and
|
||||||
authorizing users. The required configuration options are listed in the
|
authorizing users. The required configuration options are listed in the
|
||||||
|
Loading…
x
Reference in New Issue
Block a user