-
Story
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
-
None
-
8
-
False
-
-
False
-
?
-
?
-
?
-
?
-
-
Today VA1 deploys the Public RGW endpoint on the storage network. This allowed us to get some testing done but ultimately this endpoint should be reachable from the external network for cloud users (who shouldn't have direct access to the storage network).
Per this task we will update VA1 [0] to:
- configure the external network [1] on EDPM nodes
- update the call to ci-framework to use a VIP [2] from the external network
- continue to serve the RGW from the storage network (two VIPs [3])
The second bullet is for customers using RGW like an s3
The third bullet is for customers using RGW as a Glance backend who don't want that traffic to be public
Director already configures both an internal and external VIP for RGW so even if the customer is not using both of the above VIPs they will have them both configured [4]
parameter_defaults: ExternalSwiftPublicUrl: 'http://<Public RGW endpoint or loadbalancer>:8080/swift/v1/AUTH_%(project_id)s' ExternalSwiftInternalUrl: 'http://<Internal RGW endpoint>:8080/swift/v1/AUTH_%(project_id)s' ExternalSwiftAdminUrl: 'http://<Admin RGW endpoint>:8080/swift/v1/AUTH_%(project_id)s'
[0] https://github.com/openstack-k8s-operators/architecture/tree/main/examples/va/hci
- is related to
-
OSPRH-7488 Expose the "storage" network network to tenants for Manila's CephFS scenario testing
- In Progress
- links to
- mentioned on