Uploaded image for project: 'RHOS Request for Features'
  1. RHOS Request for Features
  2. RHOSRFE-289

Octavia Operator custom Keystone endpoint

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • Octavia LBaaS
    • None
    • False
    • False
    • Hide

      None

      Show
      None

      Feature Request Overview (mandatory - Complete while in New status)

      What user goal or problem do you need to solve?

      In Red Hat OpenStack Services on OpenShift 18 deployments with custom Keystone endpoint configurations, the Octavia Operator currently hardcodes authentication to use the internal Keystone endpoint. This prevents successful Octavia installation when the internal endpoint is not available or when the deployment architecture requires using a custom/external Keystone endpoint.

      The Octavia Operator needs the ability to specify custom authentication credentials and endpoint configurations to support diverse deployment architectures where the standard internal endpoint is not used.


      Business justification (mandatory - Complete while in New status)

      How would this feature benefit the customer?

      This feature would enable customers to deploy Octavia in OpenStack environments with custom endpoint configurations, which is critical for:

      1. Deployment Flexibility: Customers with specific network architectures or security requirements that mandate custom Keystone endpoints can successfully deploy Octavia without workarounds
      2. Production Readiness: Eliminates a blocking issue preventing load-balancing-as-a-service capabilities in production environments with non-standard configurations
      3. Security Compliance: Allows customers to maintain their required security posture by using designated authentication endpoints rather than being forced to expose internal endpoints
      4. Architectural Consistency: Enables consistent endpoint management across all OpenStack services rather than requiring special cases for Octavia
      5. Reduced Support Burden: Eliminates the need for complex workarounds or manual interventions during deployment

      Without this feature, customers cannot utilize Octavia's load balancing capabilities in deployments where custom Keystone endpoints are required, forcing them to either compromise their architecture or forgo load balancing services entirely.


      Functional requirements (mandatory - Complete while in New status)

      What do you want the result of this feature to be? Add as many requirements as needed.

      • FR1: Custom Authentication Secret Support - The Octavia Operator must support configuration of a custom Kubernetes secret containing authentication credentials (username, password, project, domain) that override the default internal endpoint credentials
      • FR2: Custom Keystone Endpoint Configuration - The Octavia Operator must allow specification of a custom Keystone authentication endpoint URL through the Octavia CR (Custom Resource) or operator configuration
      • FR3: Backward Compatibility - The implementation must maintain backward compatibility with existing deployments using internal endpoints; when no custom authentication is specified, the operator should default to current behavior
      • FR4: Validation and Error Reporting - The operator must validate custom authentication credentials and endpoints during reconciliation and provide clear error messages if authentication fails, including which endpoint was attempted
      • FR5: Documentation - Comprehensive documentation must be provided showing how to configure custom authentication secrets and endpoints for the Octavia Operator, including examples for common use cases
      • FR6: Secret Reference in Octavia CR - Add a new field in the Octavia CR spec (e.g., keystoneAuthSecretRef) that allows referencing a custom secret for authentication rather than using the default secret
      • FR7: Endpoint Override Configuration - Add configuration options in the Octavia CR to specify custom endpoints for Keystone authentication (e.g., keystoneAuthURL)

      Describe the customer impact

      IMPORTANT: Do not include customer names.

      • Provide links to the account project: [Add your account project link here if available]
      • Provide links to any related support tickets (open or closed):
      • Current Impact:
        • Customer is blocked from deploying Octavia in their Red Hat OpenStack Services on OpenShift 18 environment
        • Error: "error while setting the compute quotas: Authentication failed" during Octavia operator reconciliation
        • Root cause: Operator attempts to authenticate against internal Keystone endpoint which is unavailable in their deployment architecture
        • Customer requires custom Keystone endpoint for their production environment due to network architecture requirements
      • Workaround Status: No viable workaround currently exists that maintains the customer's required architecture

      (Optional) Point of contact

      Provide any additional points of contact for this feature request, such as an account executive, SA, or TAM:

      • [Add SA/TAM name and contact if applicable]
      • [Add Account Executive if applicable]

      (Optional) Additional links

      [Use More > Link to add related issues such as:]


      This RFE provides a comprehensive case for adding flexible authentication configuration to the Octavia Operator while maintaining backward compatibility with existing deployments.

              rh-ee-gurpsing Gurpreet Singh
              p.alex Alexandru Petcu
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: