Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 4. Dashboard
This chapter describes how to configure the OpenStack dashboard with Apache web server.
4.1. Configure the dashboard Link kopierenLink in die Zwischenablage kopiert!
Link kopierenLink in die Zwischenablage kopiert!
You can configure the dashboard for a simple HTTP deployment.
You can configure the dashboard for a secured HTTPS deployment. While the standard installation uses a non-encrypted HTTP channel, you can enable SSL support for the dashboard.
Also, you can configure the size of the VNC window in the dashboard.
4.1.1. Configure the dashboard for HTTP Link kopierenLink in die Zwischenablage kopiert!
Link kopierenLink in die Zwischenablage kopiert!
You can configure the dashboard for a simple HTTP deployment. The standard installation uses a non-encrypted HTTP channel.
- Specify the host for your OpenStack Identity Service endpoint in the
/etc/openstack-dashboard/local_settingsfile with theOPENSTACK_HOSTsetting.The following example shows this setting:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The service catalog configuration in the Identity Service determines whether a service appears in the dashboard.. - Restart Apache http server.
systemctl restart httpd
# systemctl restart httpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow Next, restart memcached:systemctl restart memcached
# systemctl restart memcachedCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.1.2. Configure the dashboard for HTTPS Link kopierenLink in die Zwischenablage kopiert!
Link kopierenLink in die Zwischenablage kopiert!
You can configure the dashboard for a secured HTTPS deployment. While the standard installation uses a non-encrypted HTTP channel, you can enable SSL support for the dashboard.
This example uses the
http://openstack.example.com domain. Use a domain that fits your current setup.
- In the
/etc/openstack-dashboard/local_settingsfile, update the following options:USE_SSL = True CSRF_COOKIE_SECURE = True SESSION_COOKIE_SECURE = True SESSION_COOKIE_HTTPONLY = True
USE_SSL = True CSRF_COOKIE_SECURE = True SESSION_COOKIE_SECURE = True SESSION_COOKIE_HTTPONLY = TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow To enable HTTPS, theUSE_SSL = Trueoption is required.The other options require that HTTPS is enabled; these options defend against cross-site scripting. - Edit the
/etc/httpd/conf.d/openstack-dashboard.conffile as shown in Example 4.2, “After”:Example 4.1. Before
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example 4.2. After
Copy to Clipboard Copied! Toggle word wrap Toggle overflow In this configuration, the Apache HTTP server listens on port 443 and redirects all non-secure requests to the HTTPS protocol. The secured section defines the private key, public key, and certificate to use. - Restart the Apache HTTP server.
systemctl restart httpd
# systemctl restart httpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Restart
memcached:systemctl restart memcached
# systemctl restart memcachedCopy to Clipboard Copied! Toggle word wrap Toggle overflow If you try to access the dashboard through HTTP, the browser redirects you to the HTTPS page.NoteConfiguring the dashboard for HTTPS also requires enablingSSLfor thenoVNCproxy service. On the controller node, add the following additional options to the[DEFAULT]section of the/etc/nova/nova.conffile:[DEFAULT] ... ssl_only = true cert = /etc/apache2/SSL/openstack.example.com.crt key = /etc/apache2/SSL/openstack.example.com.key
[DEFAULT] ... ssl_only = true cert = /etc/apache2/SSL/openstack.example.com.crt key = /etc/apache2/SSL/openstack.example.com.keyCopy to Clipboard Copied! Toggle word wrap Toggle overflow On the compute nodes, ensure thenonvncproxy_base_urloption points to a URL with an HTTPS scheme:[DEFAULT] ... novncproxy_base_url = https://controller:6080/vnc_auto.html
[DEFAULT] ... novncproxy_base_url = https://controller:6080/vnc_auto.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow