-
Feature Request
-
Resolution: Unresolved
-
Undefined
-
None
-
False
-
False
-
Feature Request Overview (mandatory - Complete while in New status)
What user goal or problem do you need to solve?
In Red Hat OpenStack Services on OpenShift 18 deployments with custom Keystone endpoint configurations, the Octavia Operator currently hardcodes authentication to use the internal Keystone endpoint. This prevents successful Octavia installation when the internal endpoint is not available or when the deployment architecture requires using a custom/external Keystone endpoint.
The Octavia Operator needs the ability to specify custom authentication credentials and endpoint configurations to support diverse deployment architectures where the standard internal endpoint is not used.
Business justification (mandatory - Complete while in New status)
How would this feature benefit the customer?
This feature would enable customers to deploy Octavia in OpenStack environments with custom endpoint configurations, which is critical for:
- Deployment Flexibility: Customers with specific network architectures or security requirements that mandate custom Keystone endpoints can successfully deploy Octavia without workarounds
- Production Readiness: Eliminates a blocking issue preventing load-balancing-as-a-service capabilities in production environments with non-standard configurations
- Security Compliance: Allows customers to maintain their required security posture by using designated authentication endpoints rather than being forced to expose internal endpoints
- Architectural Consistency: Enables consistent endpoint management across all OpenStack services rather than requiring special cases for Octavia
- Reduced Support Burden: Eliminates the need for complex workarounds or manual interventions during deployment
Without this feature, customers cannot utilize Octavia's load balancing capabilities in deployments where custom Keystone endpoints are required, forcing them to either compromise their architecture or forgo load balancing services entirely.
Functional requirements (mandatory - Complete while in New status)
What do you want the result of this feature to be? Add as many requirements as needed.
- FR1: Custom Authentication Secret Support - The Octavia Operator must support configuration of a custom Kubernetes secret containing authentication credentials (username, password, project, domain) that override the default internal endpoint credentials
- FR2: Custom Keystone Endpoint Configuration - The Octavia Operator must allow specification of a custom Keystone authentication endpoint URL through the Octavia CR (Custom Resource) or operator configuration
- FR3: Backward Compatibility - The implementation must maintain backward compatibility with existing deployments using internal endpoints; when no custom authentication is specified, the operator should default to current behavior
- FR4: Validation and Error Reporting - The operator must validate custom authentication credentials and endpoints during reconciliation and provide clear error messages if authentication fails, including which endpoint was attempted
- FR5: Documentation - Comprehensive documentation must be provided showing how to configure custom authentication secrets and endpoints for the Octavia Operator, including examples for common use cases
- FR6: Secret Reference in Octavia CR - Add a new field in the Octavia CR spec (e.g., keystoneAuthSecretRef) that allows referencing a custom secret for authentication rather than using the default secret
- FR7: Endpoint Override Configuration - Add configuration options in the Octavia CR to specify custom endpoints for Keystone authentication (e.g., keystoneAuthURL)
Describe the customer impact
IMPORTANT: Do not include customer names.
- Provide links to the account project: [Add your account project link here if available]
- Provide links to any related support tickets (open or closed):
- https://access.redhat.com/support/cases/#/case/04285608 - Original support case documenting the authentication failure and recommendation to open this RFE
- Current Impact:
- Customer is blocked from deploying Octavia in their Red Hat OpenStack Services on OpenShift 18 environment
- Error: "error while setting the compute quotas: Authentication failed" during Octavia operator reconciliation
- Root cause: Operator attempts to authenticate against internal Keystone endpoint which is unavailable in their deployment architecture
- Customer requires custom Keystone endpoint for their production environment due to network architecture requirements
- Workaround Status: No viable workaround currently exists that maintains the customer's required architecture
(Optional) Point of contact
Provide any additional points of contact for this feature request, such as an account executive, SA, or TAM:
- [Add SA/TAM name and contact if applicable]
- [Add Account Executive if applicable]
(Optional) Additional links
[Use More > Link to add related issues such as:]
- Link to original support case: https://access.redhat.com/support/cases/#/case/04285608
- Any related documentation or architecture diagrams that illustrate the custom endpoint requirement
This RFE provides a comprehensive case for adding flexible authentication configuration to the Octavia Operator while maintaining backward compatibility with existing deployments.