Switch octavia to use service project in service_auth
Recently a patch [1] was merged to stop adding the octavia user to the admin project, and remove it on upgrade. However, the octavia configuration was not updated to use the service project, causing load balancer creation to fail. There is also an issue for existing deployments in simply switching to the service project. While existing load balancers appear to continue to work, creating new load balancers fails due to the security group belonging to the admin project. At a minimum, the deployer needs to create a security group in the service project, and update 'octavia_amp_secgroup_list' to match its ID. Ideally the flavor and network would also be recreated in the service project, although this does not seem to impact operation and will result in downtime for existing Amphorae. This change adds a new variable, 'octavia_service_auth_project', that can be used to set the project. The default in Ussuri is 'service', switching to the new behaviour. For backports of this patch it should be switched to 'admin' to maintain compatibility. If a deployer sets 'octavia_service_auth_project' to 'admin', the octavia user will be assigned the admin role in the admin project, as was done previously. Closes-Bug: #1882643 Related-Bug: #1873176 [1] https://review.opendev.org/720243/ Co-Authored-By:Mark Goddard <mark@stackhpc.com> Change-Id: I1efd0154ebaee69373ae5bccd391ee9c68d09b30
Showing
- ansible/roles/octavia/defaults/main.yml 4 additions, 0 deletionsansible/roles/octavia/defaults/main.yml
- ansible/roles/octavia/tasks/register.yml 14 additions, 0 deletionsansible/roles/octavia/tasks/register.yml
- ansible/roles/octavia/templates/octavia.conf.j2 1 addition, 1 deletionansible/roles/octavia/templates/octavia.conf.j2
- releasenotes/notes/remove-octavia-user-in-admin-project-action-95c87ca45a1188d6.yaml 16 additions, 3 deletions...ctavia-user-in-admin-project-action-95c87ca45a1188d6.yaml
Please register or sign in to comment