Providing Secure Access to the Red Hat OpenStack Platform Services

We will be utilizing a preconfigured yaml file (files/osp-ng-ctlplane-secret.yaml) to create a seperate base64 password for heat and one for the remaining services.

Make sure that you are in the openstack namespace:

oc project openstack

Create the osp-secret Secret:

cd /home/lab-user/labrepo/content/files
oc create -f osp-ng-ctlplane-secret.yaml

Create the libvirt Secret:

oc create -f osp-ng-libvirt-secret.yaml

Prepare the secret to place the NFS server connection used by Cinder

oc create secret generic cinder-nfs-config --from-file=nfs-cinder-conf

Create secret for the subcription manager credentials

Create a secret for the subscription manager:

Add your username and password
oc create secret generic subscription-manager \
--from-literal rhc_auth='{"login": {"username": "your_username", "password": "your_password"}}'
EOF

Create a secret for the Red Hat registry:

Add your username and password
oc create secret generic redhat-registry --from-literal edpm_container_registry_logins='{"registry.redhat.io": {"<username>": "<password>"}}' -n openstack

Configure the ansible dataplane secrets to access

From the bastion server, create Secret for ansible connection and nova migration of virtual machines

oc create secret generic dataplane-ansible-ssh-private-key-secret --save-config --dry-run=client --from-file=authorized_keys=/home/lab-user/.ssh/my-guidkey.pub --from-file=ssh-privatekey=/home/lab-user/.ssh/my-guidkey.pem --from-file=ssh-publickey=/home/lab-user/.ssh/my-guidkey.pub -n openstack -o yaml | oc apply -f-
ssh-keygen -f ./id -t ecdsa-sha2-nistp521 -N ''
oc create secret generic nova-migration-ssh-key --from-file=ssh-privatekey=id --from-file=ssh-publickey=id.pub -n openstack -o yaml | oc apply -f-