Creating and Managing Images
Creating and Managing Images
Abstract
Providing feedback on Red Hat documentation Copy linkLink copied to clipboard!
We appreciate your input on our documentation. Tell us how we can make it better.
Providing documentation feedback in Jira
Use the Create Issue form to provide feedback on the documentation. The Jira issue will be created in the Red Hat OpenStack Platform Jira project, where you can track the progress of your feedback.
- Ensure that you are logged in to Jira. If you do not have a Jira account, create an account to submit feedback.
- Click the following link to open a the Create Issue page: Create Issue
- Complete the Summary and Description fields. In the Description field, include the documentation URL, chapter or section number, and a detailed description of the issue. Do not modify any other fields in the form.
- Click Create.
Chapter 1. The Image service (glance) Copy linkLink copied to clipboard!
Manage images and storage in Red Hat OpenStack Platform (RHOSP).
A virtual machine image is a file that contains a virtual disk with a bootable operating system installed. Virtual machine images are supported in different formats. The following formats are available in RHOSP:
-
RAW- Unstructured disk image format. -
QCOW2- Disk format supported by QEMU emulator. This format includes QCOW2v3 (sometimes referred to as QCOW3), which requires QEMU 1.1 or higher. -
ISO- Sector-by-sector copy of the data on a disk, stored in a binary file. -
AKI- Indicates an Amazon Kernel Image. -
AMI- Indicates an Amazon Machine Image. -
ARI- Indicates an Amazon RAMDisk Image. -
VDI- Disk format supported by VirtualBox virtual machine monitor and the QEMU emulator. -
VHD- Common disk format used by virtual machine monitors from VMware, VirtualBox, and others. -
PLOOP- A disk format supported and used by Virtuozzo to run OS containers. -
OVA- Indicates that what is stored in the Image service (glance) is an OVA tar archive file. -
DOCKER- Indicates that what is stored in the Image service (glance) is a Docker tar archive of the container file system.
Although ISO is not normally considered a virtual machine image format, because ISOs contain bootable file systems with an installed operating system, you use them in the same way as other virtual machine image files.
To download the official Red Hat Enterprise Linux cloud images, your account must have a valid Red Hat Enterprise Linux subscription:
If you are not logged in to the Customer Portal, a prompt opens where you must enter your Red Hat account credentials.
1.1. Understanding the Image service Copy linkLink copied to clipboard!
Red Hat OpenStack Platform (RHOSP) Image service (glance) features.
1.1.1. Supported Image service back ends Copy linkLink copied to clipboard!
The following Image service (glance) back-end scenarios are supported:
- RBD is the default back end when you use Ceph. For more information, see Configuring Ceph Storage in the Advanced Overcloud Customization guide.
- RBD multi-store. For more information, see Section 2.1, “Requirements of storage edge architecture”.
Object Storage (swift). For more information, see Using an external Object Storage cluster in the Advanced Overcloud Customization guide.
The Image service uses the Object Storage type and back end as the default.
- Block Storage (cinder). For more information, see Configuring cinder back end for the Image service in the Advanced Overcloud Customization guide.
NFS. For more information, see Configuring NFS storage in the Advanced Overcloud Customization guide.
- Important
Although NFS is a supported Image service deployment option, more robust options are available.
NFS is not native to the Image service. When you mount an NFS share on the Image service, the Image service does not manage the operation. The Image service writes data to the file system but is unaware that the back end is an NFS share.
In this type of deployment, the Image service cannot retry a request if the share fails. This means that when a failure occurs on the back end, the store might enter read-only mode, or it might continue to write data to the local file system, in which case you risk data loss. To recover from this situation, you must ensure that the share is mounted and in sync, and then restart the Image service. For these reasons, Red Hat does not recommend NFS as an Image service back end.
However, if you do choose to use NFS as an Image service back end, some of the following best practices can help to mitigate risks:
- Use a reliable production-grade NFS back end.
- Ensure that you have a strong and reliable connection between Controller nodes and the NFS back end: Layer 2 (L2) network connectivity is recommended.
- Include monitoring and alerts for the mounted share.
- Set underlying file system permissions. Write permissions must be present in the shared file system that you use as a store.
- Ensure that the user and the group that the glance-api process runs on do not have write permissions on the mount point at the local file system. This means that the process can detect possible mount failure and put the store into read-only mode during a write attempt.
1.1.2. Image signing and verification Copy linkLink copied to clipboard!
Image signing and verification protects image integrity and authenticity by enabling deployers to sign images and save the signatures and public key certificates as image properties.
By taking advantage of this feature, you can do these tasks:
- Sign an image using your private key and upload the image, the signature, and a reference to your public key certificate (the verification metadata). The Image service then verifies that the signature is valid.
- Create an image in the Compute service, have the Compute service sign the image, and upload the image and its verification metadata. The Image service again verifies that the signature is valid.
- Request a signed image in the Compute service. The Image service provides the image and its verification metadata, allowing the Compute service to validate the image before booting it.
For information on image signing and verification, see Validating Image Service (glance) images in the Manage Secrets with OpenStack Key Manager guide.
1.1.3. Image conversion Copy linkLink copied to clipboard!
Image conversion converts images by calling the task API while importing an image.
As part of the import workflow, a plugin provides the image conversion. This plugin can be activated or deactivated based on the deployer configuration. Therefore, the deployer needs to specify the preferred format of images for the deployment.
Internally, the Image service receives the bits of the image in a particular format. These bits are stored in a temporary location. The plugin is then triggered to convert the image to the target format and moved to a final destination. When the task is finished, the temporary location is deleted. As a result, the format uploaded initially is not retained by the Image service.
For more information about image conversion, see Section 1.2.8, “Enabling image conversion”
The conversion can be triggered only when importing an image. It does not run when uploading an image. For example:
1.1.4. Interoperable image import Copy linkLink copied to clipboard!
The interoperable image import workflow enables you to import images in two ways:
-
Use the
web-download(default) method to import images from a URI. -
Use the
glance-directmethod to import images from a local file system.
1.1.5. Improving scalability with Image service caching Copy linkLink copied to clipboard!
Use the glance-api caching mechanism to store copies of images on Image service (glance) API servers and retrieve them automatically to improve scalability. With Image service caching, glance-api can run on multiple hosts. This means that it does not need to retrieve the same image from back end storage multiple times. Image service caching does not affect any Image service operations.
Configure Image service caching with the Red Hat OpenStack Platform director (tripleo) heat templates:
Procedure
In an environment file, set the value of the
GlanceCacheEnabledparameter totrue, which automatically sets theflavorvalue tokeystone+cachemanagementin theglance-api.confheat template:parameter_defaults: GlanceCacheEnabled: trueparameter_defaults: GlanceCacheEnabled: trueCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Include the environment file in the
openstack overcloud deploycommand when you redeploy the overcloud. Optional: Tune the
glance_cache_prunerto an alternative frequency when you redeploy the overcloud. The following example shows a frequency of 5 minutes:parameter_defaults: ControllerExtraConfig: glance::cache::pruner::minute: '*/5'parameter_defaults: ControllerExtraConfig: glance::cache::pruner::minute: '*/5'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Adjust the frequency according to your needs to avoid file system full scenarios. Include the following elements when you choose an alternative frequency:
- The size of the files that you want to cache in your environment.
- The amount of available file system space.
- The frequency at which the environment caches images.
1.1.6. Image pre-caching Copy linkLink copied to clipboard!
Red Hat OpenStack Platform (RHOSP) director can pre-cache images as part of the glance-api service.
1.1.6.1. Configuring the default interval for periodic image pre-caching Copy linkLink copied to clipboard!
The default periodic interval for image pre-caching is 300 seconds. You can increase or decrease the default interval based on your requirements.
Procedure
Add a new interval with the
ExtraConfigparameter in an environment file on the undercloud according to your requirements:parameter_defaults: ControllerExtraConfig: glance::config::glance_api_config: DEFAULT/cache_prefetcher_interval: value: '<300>'parameter_defaults: ControllerExtraConfig: glance::config::glance_api_config: DEFAULT/cache_prefetcher_interval: value: '<300>'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace <300> with the number of seconds that you want as an interval to pre-cache images.
After you adjust the interval in the environment file in
/home/stack/templates/, log in as thestackuser and deploy the configuration:openstack overcloud deploy --templates \ -e /home/stack/templates/<env_file>.yaml
$ openstack overcloud deploy --templates \ -e /home/stack/templates/<env_file>.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace <env_file> with the name of the environment file that contains the
ExtraConfigsettings that you added.ImportantIf you passed any extra environment files when you created the overcloud, pass them again here by using the
-eoption to avoid making undesired changes to the overcloud.
For more information about the openstack overcloud deploy command, see Deployment command in the Director Installation and Usage guide.
1.1.6.2. Using a periodic job to pre-cache an image Copy linkLink copied to clipboard!
Prerequisites
To use a periodic job to pre-cache an image, you must use the glance-cache-manage command connected directly to the node where the glance_api service is running. Do not use a proxy, which hides the node that answers a service request. Because the undercloud might not have access to the network where the glance_api service is running, run commands on the first overcloud node, which is called controller-0 by default.
Complete the following prerequisite procedure to ensure that you run commands from the correct host, have the necessary credentials, and are also running the glance-cache-manage commands from inside the glance-api container.
Procedure
Log in to the undercloud as the stack user and identify the provisioning IP address of
controller-0:openstack server list -f value -c Name -c Networks | grep controller overcloud-controller-1 ctlplane=192.168.24.40 overcloud-controller-2 ctlplane=192.168.24.13 overcloud-controller-0 ctlplane=192.168.24.71
(undercloud) [stack@site-undercloud-0 ~]$ openstack server list -f value -c Name -c Networks | grep controller overcloud-controller-1 ctlplane=192.168.24.40 overcloud-controller-2 ctlplane=192.168.24.13 overcloud-controller-0 ctlplane=192.168.24.71 (undercloud) [stack@site-undercloud-0 ~]$Copy to Clipboard Copied! Toggle word wrap Toggle overflow To authenticate to the overcloud, copy the credentials that are stored in
/home/stack/overcloudrc, by default, tocontroller-0:scp ~/overcloudrc heat-admin@192.168.24.71:/home/heat-admin/
$ scp ~/overcloudrc heat-admin@192.168.24.71:/home/heat-admin/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Connect to
controller-0:ssh heat-admin@192.168.24.71
$ ssh heat-admin@192.168.24.71Copy to Clipboard Copied! Toggle word wrap Toggle overflow On
controller-0as theheat-adminuser, identify the IP address of theglance_api service. In the following example, the IP address is172.25.1.105:grep -A 10 '^listen glance_api' /var/lib/config-data/puppet-generated/haproxy/etc/haproxy/haproxy.cfg listen glance_api server central-controller0-0.internalapi.redhat.local 172.25.1.105:9292 check fall 5 inter 2000 rise 2
(overcloud) [root@controller-0 ~]# grep -A 10 '^listen glance_api' /var/lib/config-data/puppet-generated/haproxy/etc/haproxy/haproxy.cfg listen glance_api server central-controller0-0.internalapi.redhat.local 172.25.1.105:9292 check fall 5 inter 2000 rise 2Copy to Clipboard Copied! Toggle word wrap Toggle overflow Because the
glance-cache-managecommand is only available in theglance_apicontainer, create a script to exec into that container where the environment variables to authenticate to the overcloud are already set. Create a script calledglance_pod.shin/home/heat-adminoncontroller-0with the following contents:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Source the
overcloudrcfile and run theglance_pod.shscript to exec into theglance_apicontainer with the necessary environment variables to authenticate to the overcloud Controller node.source overcloudrc (overcloudrc) [heat-admin@central-controller-0 ~]$ bash glance_pod.sh ()[glance@controller-0 /]$
[heat-admin@controller-0 ~]$ source overcloudrc (overcloudrc) [heat-admin@central-controller-0 ~]$ bash glance_pod.sh ()[glance@controller-0 /]$Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use a command such as
glance image-listto verify that the container can run authenticated commands against the overcloud.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Procedure
As the admin user, queue an image to cache:
glance-cache-manage --host=<host_ip> queue-image <image_id>
$ glance-cache-manage --host=<host_ip> queue-image <image_id>Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace <host_ip> with the IP address of the Controller node where the
glance-apicontainer is running. Replace <image_id> with the ID of the image that you want to queue.
When you have queued the images that you want to pre-cache, the
cache_imagesperiodic job prefetches all queued images concurrently.NoteBecause the image cache is local to each node, if your Red Hat OpenStack Platform is deployed with HA (with 3, 5, or 7 Controllers) then you must specify the host address with the
--hostoption when you run theglance-cache-managecommand.
-
Replace <host_ip> with the IP address of the Controller node where the
Run the following command to view the images in the image cache:
glance-cache-manage --host=<host_ip> list-cached
$ glance-cache-manage --host=<host_ip> list-cachedCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace <host_ip> with the IP address of the host in your environment.
Related information
You can use additional glance-cache-manage commands for the following purposes:
-
list-cachedto list all images that are currently cached. -
list-queuedto list all images that are currently queued for caching. -
queue-imageto queue an image for caching. -
delete-cached-imageto purge an image from the cache. -
delete-all-cached-imagesto remove all images from the cache. -
delete-queued-imageto delete an image from the cache queue. -
delete-all-queued-imagesto delete all images from the cache queue.
1.1.7. Using the Image service API to enable sparse image upload Copy linkLink copied to clipboard!
With the Image service (glance) API, you can use sparse image upload to reduce network traffic and save storage space. This feature is particularly useful in distributed compute node (DCN) environments. With a sparse image file, the Image service does not write null byte sequences. The Image service writes data with a given offset. Storage back ends interpret these offsets as null bytes that do not actually consume storage space.
Limitations
- Sparse image upload is supported only with Ceph RBD.
- Sparse image upload is not supported for file systems.
- Sparseness is not maintained during the transfer between the client and the Image service API. The image is sparsed at the Image service API level.
Prerequisites
- Your Red Hat OpenStack Platform (RHOSP) deployment uses RBD for the Image service back end.
Procedure
-
Log in to the undercloud node as the
stackuser. Source the
stackrccredentials file:source stackrc
$ source stackrcCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create an environment file with the following content:
parameter_defaults: GlanceSparseUploadEnabled: trueparameter_defaults: GlanceSparseUploadEnabled: trueCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add your new environment file to the stack with your other environment files and deploy the overcloud:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more information about uploading images, see Section 1.2.2, “Upload an image”.
Verification
You can import an image and check its size to verify sparse image upload.
Download the image file locally:
wget <file_location>/<file_name>
$ wget <file_location>/<file_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<file_location>with the location of the file. Replace<file_name>with the name of the file.The following procedure uses example commands. Replace the values with those from your environment where appropriate.
wget https://cloud.centos.org/centos/6/images/CentOS-6-x86_64-GenericCloud-1508.qcow2
$ wget https://cloud.centos.org/centos/6/images/CentOS-6-x86_64-GenericCloud-1508.qcow2Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the disk size and the virtual size of the image that you want to upload:
qemu-img info <file_name>
qemu-img info <file_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow The following procedure uses example commands. Replace the values with those from your environment where appropriate.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Import the image:
glance image-create-via-import --disk-format qcow2 --container-format bare --name centos_1 --file <file_name>
$ glance image-create-via-import --disk-format qcow2 --container-format bare --name centos_1 --file <file_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Record the image ID. It is required in a subsequent step.
Verify that the image is imported and in an active state:
openstack image show <image_id>
$ openstack image show <image_id>Copy to Clipboard Copied! Toggle word wrap Toggle overflow From a Ceph Storage node, verify that the size of the image is less than the virtual size from the output of step 1:
sudo rbd -p images diff <image_id> | awk '{ SUM += $2 } END { print SUM/1024/1024/1024 " GB" }' 1.03906 GB$ sudo rbd -p images diff <image_id> | awk '{ SUM += $2 } END { print SUM/1024/1024/1024 " GB" }' 1.03906 GBCopy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: You can confirm that
rbd_thin_provisioningis configured in the glance configuration file on the Controller nodes:Use SSH to access a Controller node:
ssh -A -t heat-admin@<controller_node_IP_address>
$ ssh -A -t heat-admin@<controller_node_IP_address>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Confirm that
rbd_thin_provisioningequalsTrueon that Controller node:sudo podman exec -it glance_api sh -c 'grep ^rbd_thin_provisioning /etc/glance/glance-api.conf'
$ sudo podman exec -it glance_api sh -c 'grep ^rbd_thin_provisioning /etc/glance/glance-api.conf'Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.1.8. Secure metadef APIs Copy linkLink copied to clipboard!
In Red Hat OpenStack Platform (RHOSP), users can define key value pairs and tag metadata with metadata definition (metadef) APIs. Currently, there is no limit on the number of metadef namespaces, objects, properties, resources, or tags that users can create.
Metadef APIs can leak information to unauthorized users. A malicious user can exploit the lack of restrictions and fill the Image service (glance) database with unlimited resources, which can create a Denial of Service (DoS) style attack.
Image service policies control metadef APIs. However, the default policy setting for metadef APIs allows all users to create or read the metadef information. Because metadef resources are not isolated to the owner, metadef resources with potentially sensitive names, such as internal infrastructure details or customer names, can expose that information to malicious users.
1.1.8.1. Configuring a policy to restrict metadef APIs Copy linkLink copied to clipboard!
To make the Image service (glance) more secure, restrict metadef modification APIs to admin-only access by default in your Red Hat OpenStack Platform (RHOSP) deployments.
Procedure
As a cloud administrator, create a separate heat template environment file, such as
lock-down-glance-metadef-api.yaml, to contain policy overrides for the Image service metadef API:Copy to Clipboard Copied! Toggle word wrap Toggle overflow For information about policies and policy syntax, see this Policies chapter.
Include the environment file that contains the policy overrides in the deployment command with the
-eoption when you deploy the overcloud:openstack overcloud deploy -e lock-down-glance-metadef-api.yaml
$ openstack overcloud deploy -e lock-down-glance-metadef-api.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.1.8.2. Enabling metadef APIs Copy linkLink copied to clipboard!
If you previously restricted metadata definition (metadef) APIs or want to relax the new defaults, you can override metadef modification policies to allow users to update their respective resources.
Cloud administrators with users who depend on write access to the metadef APIs can make those APIs accessible to all users. In this type of configuration, however, there is the potential to unintentionally leak sensitive resource names, such as customer names and internal projects. Administrators must audit their systems to identify previously created resources that might be vulnerable even if only read access is enabled for all users.
Procedure
As a cloud administrator, log in to the undercloud and create a file for policy overrides. For example:
cat open-up-glance-api-metadef.yaml
$ cat open-up-glance-api-metadef.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Configure the policy override file to allow metadef API read-write access to all users:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteYou must configure all metadef policies to use
rule:metadef_default. For information about policies and policy syntax, see this Policies chapter.Include the new policy file in the deployment command with the
-eoption when you deploy the overcloud:openstack overcloud deploy -e open-up-glance-api-metadef.yaml
$ openstack overcloud deploy -e open-up-glance-api-metadef.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2. Manage images Copy linkLink copied to clipboard!
The Image service (glance) provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it. You can use stored images as a template to commission new servers quickly and more consistently than installing a server operating system and individually configuring services.
1.2.1. Creating an image Copy linkLink copied to clipboard!
Manually create Red Hat OpenStack Platform (RHOSP) compatible images in the QCOW2 format by using Red Hat Enterprise Linux 7 ISO files, Red Hat Enterprise Linux 6 ISO files, or Windows ISO files.
1.2.1.1. Use a KVM guest image with Red Hat OpenStack Platform Copy linkLink copied to clipboard!
You can use a ready RHEL KVM guest QCOW2 image:
These images are configured with cloud-init and must take advantage of ec2-compatible metadata services for provisioning SSH keys to function correctly.
Ready Windows KVM guest QCOW2 images are not available.
For the KVM guest images:
-
The
rootaccount in the image is disabled, butsudoaccess is granted to a special user namedcloud-user. -
There is no
rootpassword set for this image.
The root password is locked in /etc/shadow by placing !! in the second field.
For a RHOSP instance, generate an ssh keypair from the RHOSP dashboard or command line and use that key combination to perform an SSH public authentication to the instance as root.
When the instance is launched, this public key is injected to it. You can then authenticate by using the private key that you download when you create the keypair.
If you want to create custom Red Hat Enterprise Linux or Windows images, see Create a Red Hat Enterprise Linux 7 Image, Create a Red Hat Enterprise Linux 6 Image, or Section 1.2.1.2.3, “Create a Windows image”.
1.2.1.2. Create custom Red Hat Enterprise Linux or Windows images Copy linkLink copied to clipboard!
Prerequisites
- Linux host machine to create an image. This can be any machine on which you can install and run the Linux packages except for the undercloud or the overcloud.
The advanced-virt repository is enabled:
sudo subscription-manager repos --enable=advanced-virt-for-rhel-8-x86_64-rpms
$ sudo subscription-manager repos --enable=advanced-virt-for-rhel-8-x86_64-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow libvirt, virt-manager to install all packages necessary to create a guest operating system:
sudo dnf module install -y virt
$ sudo dnf module install -y virtCopy to Clipboard Copied! Toggle word wrap Toggle overflow Libguestfs tools to install a set of tools to access and modify virtual machine images:
sudo dnf install -y libguestfs-tools-c
$ sudo dnf install -y libguestfs-tools-cCopy to Clipboard Copied! Toggle word wrap Toggle overflow - A Red Hat Enterprise Linux 7 or 6 ISO file. For more information, see RHEL 7.2 Binary DVD or RHEL 6.8 Binary DVD or a Windows ISO file. If you do not have a Windows ISO file, see the Microsoft Evaluation Center to download an evaluation image.
-
Text editor, if you want to change the
kickstartfiles (RHEL only).
If you install the libguestfs-tools package on the undercloud, disable iscsid.socket to avoid port conflicts with the tripleo_iscsid service on the undercloud:
sudo systemctl disable --now iscsid.socket
$ sudo systemctl disable --now iscsid.socket
1.2.1.2.1. Create a Red Hat Enterprise Linux 7 Image Copy linkLink copied to clipboard!
Manually create a Red Hat OpenStack Platform (RHOSP) compatible image in the QCOW2 format by using a Red Hat Enterprise Linux 7 ISO file.
You must run all commands with the [root@host]# on your host machine.
Start the installation by using
virt-install:Copy to Clipboard Copied! Toggle word wrap Toggle overflow This launches an instance and starts the installation process.
NoteIf the instance does not launch automatically, run the
virt-viewercommand to view the console:virt-viewer rhel7
[root@host]# virt-viewer rhel7Copy to Clipboard Copied! Toggle word wrap Toggle overflow Configure the instance:
- At the initial Installer boot menu, select Install Red Hat Enterprise Linux 7.
- Choose the appropriate Language and Keyboard options.
- When prompted about which type of devices your installation uses, select Auto-detected installation media.
- When prompted about which type of installation destination, select Local Standard Disks. For other storage options, select Automatically configure partitioning.
- For software selection, select Minimal Install.
- For network and host name, select eth0 for network and choose a host name for your device. The default host name is localhost.localdomain.
Enter a password in the Root Password field and enter the same password again in the Confirm field.
- Result
- The installation process completes and the Complete! screen is displayed.
- After the installation is complete, reboot the instance and log in as the root user.
Update the
/etc/sysconfig/network-scripts/ifcfg-eth0file so that it contains only the following values:TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=no
TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=noCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Reboot the machine.
Register the machine with the Content Delivery Network.
sudo subscription-manager register sudo subscription-manager attach --pool=Valid-Pool-Number-123456 sudo subscription-manager repos --enable=rhel-7-server-rpms
# sudo subscription-manager register # sudo subscription-manager attach --pool=Valid-Pool-Number-123456 # sudo subscription-manager repos --enable=rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the system:
dnf -y update
# dnf -y updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow Install the
cloud-initpackages:dnf install -y cloud-utils-growpart cloud-init
# dnf install -y cloud-utils-growpart cloud-initCopy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
/etc/cloud/cloud.cfgconfiguration file and undercloud_init_modulesadd:- resolv-conf
- resolv-confCopy to Clipboard Copied! Toggle word wrap Toggle overflow The
resolv-confoption automatically configures theresolv.confwhen an instance boots for the first time. This file contains information related to the instance such asnameservers,domainand other options.Add the following line to
/etc/sysconfig/networkto avoid problems accessing the EC2 metadata service:NOZEROCONF=yes
NOZEROCONF=yesCopy to Clipboard Copied! Toggle word wrap Toggle overflow To ensure that the console messages appear in the Log tab on the dashboard and the
nova console-logoutput, add the following boot option to the/etc/default/grubfile:GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"
GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the
grub2-mkconfigcommand:grub2-mkconfig -o /boot/grub2/grub.cfg
# grub2-mkconfig -o /boot/grub2/grub.cfgCopy to Clipboard Copied! Toggle word wrap Toggle overflow The output is as follows:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Deregister the instance so that the resulting image does not contain the subscription details for this instance:
subscription-manager repos --disable=* subscription-manager unregister dnf clean all
# subscription-manager repos --disable=* # subscription-manager unregister # dnf clean allCopy to Clipboard Copied! Toggle word wrap Toggle overflow Power off the instance:
poweroff
# poweroffCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reset and clean the image by using the
virt-sysprepcommand so that it can be used to create instances without issues:virt-sysprep -d rhel7
[root@host]# virt-sysprep -d rhel7Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reduce the image size by converting any free space within the disk image back to free space within the host:
virt-sparsify --compress /tmp/rhel7.qcow2 rhel7-cloud.qcow2
[root@host]# virt-sparsify --compress /tmp/rhel7.qcow2 rhel7-cloud.qcow2Copy to Clipboard Copied! Toggle word wrap Toggle overflow This creates a new
rhel7-cloud.qcow2file in the location from where the command is run.
The rhel7-cloud.qcow2 image file is ready to be uploaded to the Image service. For more information about uploading this image to your RHOSP deployment by using the dashboard, see Section 1.2.2, “Upload an image”.
1.2.1.2.2. Create a Red Hat Enterprise Linux 6 Image Copy linkLink copied to clipboard!
Manually create a Red Hat OpenStack Platform (RHOSP) compatible image in the QCOW2 format by using a Red Hat Enterprise Linux 6 ISO file.
You must run all commands with the [root@host]# on your host machine.
Start the installation by using
virt-install:Copy to Clipboard Copied! Toggle word wrap Toggle overflow This launches an instance and starts the installation process.
NoteIf the instance does not launch automatically, run the
virt-viewercommand to view the console:virt-viewer rhel6
[root@host]# virt-viewer rhel6Copy to Clipboard Copied! Toggle word wrap Toggle overflow Configure the instances:
At the initial Installer boot menu, select Install or upgrade an existing system and follow the installation prompts. Accept the defaults.
The disk installer provides an option to test your installation media before installation. Select OK to run the test or Skip to proceed without testing.
- Choose the appropriate Language and Keyboard options.
- When prompted about which type of devices your installation uses, select Basic Storage Devices.
-
Choose a host name for your device. The default host name is
localhost.localdomain. -
Set the timezone and
rootpassword. - Based on the space on the disk, choose the type of installation you want from the options in the Which type of installation would you like? window.
- Choose the Basic Server install, which installs an SSH server.
- The installation process completes and the Congratulations, your Red Hat Enterprise Linux installation is complete screen is displayed.
-
Reboot the instance and log in as the
rootuser. Update the
/etc/sysconfig/network-scripts/ifcfg-eth0file so that it contains only the following values:TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=no
TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=noCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Reboot the machine.
Register the machine with the Content Delivery Network:
sudo subscription-manager register sudo subscription-manager attach --pool=Valid-Pool-Number-123456 sudo subscription-manager repos --enable=rhel-6-server-rpms
# sudo subscription-manager register # sudo subscription-manager attach --pool=Valid-Pool-Number-123456 # sudo subscription-manager repos --enable=rhel-6-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the system:
dnf -y update
# dnf -y updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow Install the
cloud-initpackages:dnf install -y cloud-utils-growpart cloud-init
# dnf install -y cloud-utils-growpart cloud-initCopy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
/etc/cloud/cloud.cfgconfiguration file and add the following content undercloud_init_modules.- resolv-conf
- resolv-confCopy to Clipboard Copied! Toggle word wrap Toggle overflow The
resolv-confoption automatically configures theresolv.confconfiguration file when an instance boots for the first time. This file contains information related to the instance such asnameservers,domain, and other options.To prevent network issues, create
/etc/udev/rules.d/75-persistent-net-generator.rules:echo "#" > /etc/udev/rules.d/75-persistent-net-generator.rules
# echo "#" > /etc/udev/rules.d/75-persistent-net-generator.rulesCopy to Clipboard Copied! Toggle word wrap Toggle overflow This prevents
/etc/udev/rules.d/70-persistent-net.rulesfile from being created. If/etc/udev/rules.d/70-persistent-net.rulesis created, networking might not function correctly when you boot from snapshots, the network interface is created aseth1rather thaneth0and the IP address is not assigned.Add the following line to
/etc/sysconfig/networkto avoid problems accessing the EC2 metadata service:NOZEROCONF=yes
NOZEROCONF=yesCopy to Clipboard Copied! Toggle word wrap Toggle overflow To ensure that the console messages appear in the Log tab on the dashboard and the
nova console-logoutput, add the following boot option to the/etc/grub.conffile:console=tty0 console=ttyS0,115200n8
console=tty0 console=ttyS0,115200n8Copy to Clipboard Copied! Toggle word wrap Toggle overflow Deregister the virtual machine so that the resulting image does not contain the same subscription details for this instance:
subscription-manager repos --disable=* subscription-manager unregister dnf clean all
# subscription-manager repos --disable=* # subscription-manager unregister # dnf clean allCopy to Clipboard Copied! Toggle word wrap Toggle overflow Power off the instance:
poweroff
# poweroffCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reset and clean the image by using the
virt-sysprepcommand so that it can be used to create instances without issues:virt-sysprep -d rhel6
[root@host]# virt-sysprep -d rhel6Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reduce image size by using the
virt-sparsifycommand. This command converts any free space within the disk image back to free space within the host:virt-sparsify --compress rhel6.qcow2 rhel6-cloud.qcow2
[root@host]# virt-sparsify --compress rhel6.qcow2 rhel6-cloud.qcow2Copy to Clipboard Copied! Toggle word wrap Toggle overflow This creates a new
rhel6-cloud.qcow2file in the location from where the command is run.NoteYou must manually resize the partitions of instances based on the image in accordance with the disk space in the flavor that is applied to the instance.
The rhel6-cloud.qcow2 image file is ready to be uploaded to the Image service. For more information about uploading this image to your RHOSP deployment by using the dashboard, see Section 1.2.2, “Upload an image”.
1.2.1.2.3. Create a Windows image Copy linkLink copied to clipboard!
Manually create a Red Hat OpenStack Platform (RHOSP) compatible image in the QCOW2 format by using a Windows ISO file.
You must run all commands with the [root@host]# on your host machine.
Procedure
Start the installation by using
virt-install:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the following values of the
virt-installparameters:- <name> — the name that the Windows instance has.
- <size> — disk size in GB.
- <path> — the path to the Windows installation ISO file.
<RAM> — the requested amount of RAM in MB.
NoteThe
--os-type=windowsparameter ensures that the clock is configured correctly for the Windows guest, and enables its Hyper-V enlightenment features. You must also setos_type=windowsin the image metadata before uploading the image to the Image service.
virt-installsaves the guest image as/var/lib/libvirt/images/<name>.qcow2by default. If you want to keep the guest image elsewhere, change the parameter of the--diskoption:--disk path=<filename>,size=<size>
--disk path=<filename>,size=<size>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace <filename> with the name of the file that stores the instance image, and optionally its path. For example,
path=win8.qcow2,size=8creates an 8 GB file namedwin8.qcow2in the current working directory.TipIf the guest does not launch automatically, run the
virt-viewercommand to view the console:virt-viewer <name>
[root@host]# virt-viewer <name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more information about how to install Windows, see the relevant Microsoft documentation.
-
To allow the newly installed Windows system to use the virtualized hardware, you might need to install VirtIO drivers. To so do, first install the image, which you must attach as a CD-ROM drive to the Windows instance. To install the
virtio-winpackage you must add the VirtIO ISO image to the instance, and install the VirtIO drivers. For more information, see Installing KVM paravirtualized drivers for Windows virtual machines in the Configuring and managing virtualization guide. To complete the configuration, download and execute Cloudbase-Init on the Windows system. At the end of the installation of Cloudbase-Init, select the Run Sysprep and Shutdown checkboxes. The
Syspreptool makes the guest unique by generating an OS ID, which is used by certain Microsoft services.ImportantRed Hat does not provide technical support for Cloudbase-Init. If you encounter an issue, see Contact Cloudbase Solutions.
When the Windows system shuts down, the <name>.qcow2 image file is ready to be uploaded to the Image service. For more information about uploading this image to your RHOSP deployment by using the dashboard or the command line, see Section 1.2.2, “Upload an image”.
libosinfo data
The Compute Service has deprecated support for using libosinfo data to set default device models. Instead, use the following image metadata properties to configure the optimal virtual hardware for an instance:
-
os_distro -
os_version -
hw_cdrom_bus -
hw_disk_bus -
hw_scsi_model -
hw_vif_model -
hw_video_model -
hypervisor_type
For more information about these metadata properties, see Image configuration parameters.
1.2.2. Upload an image Copy linkLink copied to clipboard!
- In the dashboard, select Project > Compute > Images.
- Click Create Image.
- Fill out the values, and click Create Image.
| Field | Notes |
|---|---|
| Name | Name for the image. The name must be unique within the project. |
| Description | Brief description to identify the image. |
| Image Source | Image source: Image Location or Image File. Based on your selection, the next field is displayed. |
| Image Location or Image File |
|
| Format | Image format (for example, qcow2). |
| Architecture | Image architecture. For example, use i686 for a 32-bit architecture or x86_64 for a 64-bit architecture. |
| Minimum Disk (GB) | Minimum disk size required to boot the image. If this field is not specified, the default value is 0 (no minimum). |
| Minimum RAM (MB) | Minimum memory size required to boot the image. If this field is not specified, the default value is 0 (no minimum). |
| Public | If selected, makes the image public to all users with access to the project. |
| Protected | If selected, ensures only users with specific permissions can delete this image. |
When the image has been successfully uploaded, its status is active, which indicates that the image is available for use. Note that the Image service can handle even large images that take a long time to upload — longer than the lifetime of the Identity service token which was used when the upload was initiated. This is due to the fact that the Image service first creates a trust with the Identity service so that a new token can be obtained and used when the upload is complete and the status of the image is to be updated.
You can also use the glance image-create command with the property option to upload an image. More values are available on the command line. For a complete listing, see Appendix A, Image configuration parameters.
1.2.3. Update an image Copy linkLink copied to clipboard!
- In the dashboard, select Project > Compute > Images.
Click Edit Image from the list.
NoteThe Edit Image option is available only when you log in as an
adminuser. When you log in as ademouser, you have the option to Launch an instance or Create Volume.- Update the fields and click Update Image . You can update the following values - name, description, kernel ID, ramdisk ID, architecture, format, minimum disk, minimum RAM, public, protected.
- Click the drop-down menu and select Update Metadata option.
- Specify metadata by adding items from the left column to the right one. In the left column, there are metadata definitions from the Image Service Metadata Catalog. Select Other to add metadata with the key of your choice and click Save when finished.
You can also use the glance image-update command with the property option to update an image. More values are available on the command line; for a complete listing, see Appendix A, Image configuration parameters.
1.2.4. Importing an image Copy linkLink copied to clipboard!
You can import images to the Image service (glance) by using one of the following two methods:
-
Use
web-downloadto import an image from a URI. -
Use
glance-directto import an image from a local file system.
The web-download method is enabled by default. The cloud administrator configures import methods. You can run the glance import-info command to list available import options.
1.2.4.1. Import an image from a remote URI Copy linkLink copied to clipboard!
You can use the web-download method to copy an image from a remote URI.
Create an image and specify the URI of the image to import:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<CONTAINER FORMAT>with the container format that you are setting set for your image (None, ami, ari, aki, bare, ovf, ova, docker). -
Replace
<DISK-FORMAT>with the disk format that you are setting set for your image (None, ami, ari, aki, vhd, vhdx, vmdk, raw, qcow2, vdi, iso, ploop). -
Replace
<NAME>with a descriptive name for your image. -
Replace
<URI>with the URI of your image.
-
Replace
You can check the availability of the image by using the
glance image-show <IMAGE_ID>command.-
Replace
<IMAGE_ID>with the ID you provided during image creation.
-
Replace
The Image service web download method uses a two-stage process to perform the import:
-
The
web downloadmethod creates an image record. -
The
web downloadmethod retrieves the image from the specified URI.
The URI is subject to optional denylist and allowlist filtering.
The Image Property Injection plugin may inject metadata properties to the image. These injected properties determine which compute nodes the image instances are launched on.
1.2.4.2. Import an image from a local volume Copy linkLink copied to clipboard!
The glance-direct method creates an image record, which generates an image ID. After the image is uploaded to the Image service from a local volume, it is stored in a staging area and is made active after it passes any configured checks. The glance-direct method requires a shared staging area when used in a highly available (HA) configuration.
Image uploads that use the glance-direct method can fail in a HA environment if a common staging area is not present. In a HA active-active environment, API calls are distributed to the Image service controllers. The download API call can be sent to a different controller than the API call to upload the image.
The glance-direct method uses three different calls to import an image:
-
glance image-create -
glance image-stage -
glance image-import
You can use the glance image-create-via-import command to perform all three of these calls in one command:
glance image-create-via-import --container-format <CONTAINER FORMAT> --disk-format <DISK-FORMAT> --name <NAME> --file </PATH/TO/IMAGE>
$ glance image-create-via-import --container-format <CONTAINER FORMAT> --disk-format <DISK-FORMAT> --name <NAME> --file </PATH/TO/IMAGE>
-
Replace
<CONTAINER FORMAT>,<DISK-FORMAT>,<NAME>, and</PATH/TO/IMAGE>with the relevant values for your image.
After the image moves from the staging area to the back-end location, the image is listed. However, it might take some time for the image to become active.
You can check the availability of the image by using the glance image-show <IMAGE_ID> command.
-
Replace
<IMAGE_IDwith the ID you provided during image creation.
1.2.5. Delete an image Copy linkLink copied to clipboard!
- In the dashboard, select Project > Compute > Images.
- Select the image you want to delete and click Delete Images.
1.2.6. Hide or unhide an image Copy linkLink copied to clipboard!
You can hide public images from normal listings presented to users. For instance, you can hide obsolete CentOS 7 images and show only the latest version to simplify the user experience. Users can discover and use hidden images.
To hide an image:
glance image-update <image_id> --hidden 'true'
glance image-update <image_id> --hidden 'true'
To create a hidden image, add the --hidden argument to the glance image-create command.
To unhide an image:
glance image-update <image_id> --hidden 'false'
glance image-update <image_id> --hidden 'false'
1.2.8. Enabling image conversion Copy linkLink copied to clipboard!
With the GlanceImageImportPlugins parameter enabled, you can upload a QCOW2 image, and the Image service can convert it to RAW.
Image conversion is automatically enabled when you use Red Hat Ceph Storage RBD to store images and boot Nova instances.
To enable image conversion, create an environment file that contains the following parameter value and include the new environment file with the -e option in the openstack overcloud deploy command:
+
parameter_defaults: GlanceImageImportPlugins:'image_conversion'
parameter_defaults:
GlanceImageImportPlugins:'image_conversion'
1.2.9. Converting an image to RAW format Copy linkLink copied to clipboard!
Red Hat Ceph Storage can store, but does not support using, QCOW2 images to host virtual machine (VM) disks.
When you upload a QCOW2 image and create a VM from it, the compute node downloads the image, converts the image to RAW, and uploads it back into Ceph, which can then use it. This process affects the time it takes to create VMs, especially during parallel VM creation.
For example, when you create multiple VMs simultaneously, uploading the converted image to the Ceph cluster might impact already running workloads. The upload process can starve those workloads of IOPS and impede storage responsiveness.
To boot VMs in Ceph more efficiently (ephemeral back end or boot from volume), the glance image format must be RAW.
Procedure
Converting an image to RAW might yield an image that is larger in size than the original QCOW2 image file. Run the following command before the conversion to determine the final RAW image size:
qemu-img info <image>.qcow2
qemu-img info <image>.qcow2Copy to Clipboard Copied! Toggle word wrap Toggle overflow Convert an image from QCOW2 to RAW format:
qemu-img convert -p -f qcow2 -O raw <original qcow2 image>.qcow2 <new raw image>.raw
qemu-img convert -p -f qcow2 -O raw <original qcow2 image>.qcow2 <new raw image>.rawCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.9.1. Configuring disk formats in the Image service (glance) Copy linkLink copied to clipboard!
You can the configure the Image service (glance) to enable or reject disk formats by using the GlanceDiskFormats parameter.
Procedure
-
Log in to the undercloud host as the
stackuser. Source the undercloud credentials file:
source ~/stackrc
$ source ~/stackrcCopy to Clipboard Copied! Toggle word wrap Toggle overflow Include the
GlanceDiskFormatsparameter in an environment file, for example,glance_disk_formats.yaml:parameter_defaults: GlanceDiskFormats: - <disk_format>parameter_defaults: GlanceDiskFormats: - <disk_format>Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example, use the following configuration to enable only RAW and ISO disk formats:
parameter_defaults: GlanceDiskFormats: - raw - iso
parameter_defaults: GlanceDiskFormats: - raw - isoCopy to Clipboard Copied! Toggle word wrap Toggle overflow Use the following example configuration to reject QCOW2 disk images:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Include the environment file that contains your new configuration in the
openstack overcloud deploycommand with any other environment files that are relevant to your environment:openstack overcloud deploy --templates \ -e <overcloud_environment_files> \ -e <new_environment_file> \ …
$ openstack overcloud deploy --templates \ -e <overcloud_environment_files> \ -e <new_environment_file> \ …Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<overcloud_environment_files>with the list of environment files that are part of your deployment. -
Replace
<new_environment_file>with the environment file that contains your new configuration.
-
Replace
For more information about the disk formats available in RHOSP, see Chapter 1, The Image service (glance).
1.2.10. Storing an image in RAW format Copy linkLink copied to clipboard!
With the GlanceImageImportPlugins parameter enabled, run the following command to store a previously created image in RAW format:
-
For
--name, replaceNAMEwith the name of the image; this is the name that will appear inglance image-list. -
For
--uri, replacehttp://server/image.qcow2with the location and file name of the QCOW2 image.
This command example creates the image record and imports it by using the web-download method. The glance-api downloads the image from the --uri location during the import process. If web-download is not available, glanceclient cannot automatically download the image data. Run the glance import-info command to list the available image import methods.
Chapter 2. Image service with multiple stores Copy linkLink copied to clipboard!
The Red Hat OpenStack Platform Image service (glance) supports using multiple stores with distributed edge architecture so that you can have an image pool at every edge site. You can copy images between the central site, which is also known as the hub site, and the edge sites.
The image metadata contains the location of each copy. For example, an image present on two edge sites is exposed as a single UUID with three locations: the central site plus the two edge sites. This means you can have copies of image data that share a single UUID on many stores. For more information about locations, see Understanding the location of images.
With an RBD image pool at every edge site, you can boot VMs quickly by using Ceph RBD copy-on-write (COW) and snapshot layering technology. This means that you can boot VMs from volumes and have live migration. For more information about layering with Ceph RBD, see Ceph block device layering in the Block Device Guide.
2.1. Requirements of storage edge architecture Copy linkLink copied to clipboard!
- A copy of each image must exist in the Image service at the central location.
- Prior to creating an instance at an edge site, you must have a local copy of the image at that edge site.
- Images uploaded to an edge site must be copied to the central location before they can be copied to other edge sites.
- You must use raw images when deploying a DCN architecture with Ceph storage.
- RBD must be the storage driver for the Image, Compute and Block Storage services.
-
For each site, you must assign the same value to the
NovaComputeAvailabilityZoneandCinderStorageAvailabilityZoneparameters.
2.2. Import an image to multiple stores Copy linkLink copied to clipboard!
Use the interoperable image import workflow to import image data into multiple Ceph Storage clusters. You can import images into the Image service that are available on the local file system or through a web server.
If you import an image from a web server, the image can be imported into multiple stores at once. If the image is not available on a web server, you can import the image from a local file system into the central store and then copy it to additional stores. For more information, see Copy an existing image to multiple stores.
Always store an image copy on the central site, even if there are no instances using the image at the central location. For more information about importing images into the Image service, see the Distributed compute node and storage deployment guide.
2.2.1. Manage image import failures Copy linkLink copied to clipboard!
You can manage failures of the image import operation by using the --allow-failure parameter:
-
If the value of the
--allow-failureparameter totrue, the image status becomesactiveafter the first store successfully imports the data. This is the default setting. You can view a list of stores that failed to import the image data by using theos_glance_failed_importimage property. -
If you set the value of the
--allow-failureparameter tofalse, the image status only becomesactiveafter all specified stores successfully import the data. Failure of any store to import the image data results in an image status offailed. The image is not imported into any of the specified stores.
2.2.2. Importing image data to multiple stores Copy linkLink copied to clipboard!
Because the default setting of the --allow-failure parameter is true, you do not need to include the parameter in the command if it is acceptable for some stores to fail to import the image data.
This procedure does not require all stores to successfully import the image data.
Procedure
Import image data to multiple, specified stores:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Replace IMAGE-NAME with the name of the image you want to import.
- Replace URI with the URI of the image.
- Replace STORE1, STORE2, and STORE3 with the names of the stores to which you want to import the image data.
-
Alternatively, replace
--storeswith--all-stores trueto upload the image to all the stores.
The glance image-create-via-import command, which automatically converts the QCOW2 image to RAW format, works only with the web-download method. The glance-direct method is available, but it works only in deployments with a configured shared file system.
2.2.3. Importing image data to multiple stores without failure Copy linkLink copied to clipboard!
This procedure requires all stores to successfully import the image data.
Procedure
Import image data to multiple, specified stores:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Replace IMAGE-NAME with the name of the image you want to import.
- Replace URI with the URI of the image.
- Replace STORE1, STORE2, and STORE3 with the names of stores to which you want to copy the image data.
Alternatively, replace
--storeswith--all-stores trueto upload the image to all the stores.NoteWith the
--allow-failureparameter set tofalse, the Image service does not ignore stores that fail to import the image data. You can view the list of failed stores with the image propertyos_glance_failed_import. For more information see Checking the progress of image import operation.
Verify that the image data was added to specific stores:
glance image-show IMAGE-ID | grep stores
$ glance image-show IMAGE-ID | grep storesCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace IMAGE-ID with the ID of the original existing image.
The output displays a comma-delimited list of stores.
2.2.4. Importing image data to a single store Copy linkLink copied to clipboard!
You can import image data to a single store.
Procedure
Import image data to a single store:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Replace IMAGE-NAME with the name of the image you want to import.
- Replace URI with the URI of the image.
Replace STORE with the name of the store to which you want to copy the image data.
NoteIf you do not include the options of
--stores,--all-stores, or--storein the command, the Image service creates the image in the central store.
Verify that the image data was added to specific store:
glance image-show IMAGE-ID | grep stores
$ glance image-show IMAGE-ID | grep storesCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace IMAGE-ID with the ID of the original existing image.
The output displays a comma-delimited list of stores.
2.2.5. Checking the progress of the image import operation Copy linkLink copied to clipboard!
The interoperable image import workflow sequentially imports image data into stores. The size of the image, the number of stores, and the network speed between the central site and the edge sites impact how long it takes for the image import operation to complete.
You can follow the progress of the image import by looking at two image properties, which appear in notifications sent during the image import operation:
-
The
os_glance_importing_to_storesproperty lists the stores that have not imported the image data. At the beginning of the import, all requested stores show up in the list. Each time a store successfully imports the image data, the Image service removes the store from the list. -
The
os_glance_failed_importproperty lists the stores that fail to import the image data. This list is empty at the beginning of the image import operation.
In the following procedure, the environment has three Ceph Storage clusters: the central store and two stores at the edge, dcn0 and dcn1.
Procedure
Verify that the image data was added to specific stores:
glance image-show IMAGE-ID
$ glance image-show IMAGE-IDCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace IMAGE-ID with the ID of the original existing image.
The output displays a comma-delimited list of stores similar to the following example snippet:
| os_glance_failed_import | | os_glance_importing_to_stores | central,dcn0,dcn1 | status | importing
| os_glance_failed_import | | os_glance_importing_to_stores | central,dcn0,dcn1 | status | importingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Monitor the status of the image import operation. When you precede a command with
watch, the command output refreshes every two seconds.watch glance image-show IMAGE-ID
$ watch glance image-show IMAGE-IDCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace IMAGE-ID with the ID of the original existing image.
The status of the operation changes as the image import operation progresses:
| os_glance_failed_import | | os_glance_importing_to_stores | dcn0,dcn1 | status | importing
| os_glance_failed_import | | os_glance_importing_to_stores | dcn0,dcn1 | status | importingCopy to Clipboard Copied! Toggle word wrap Toggle overflow Output that shows that an image failed to import resembles the following example:
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | dcn1 | status | importing
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | dcn1 | status | importingCopy to Clipboard Copied! Toggle word wrap Toggle overflow After the operation completes, the status changes to active:
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | | status | active
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | | status | activeCopy to Clipboard Copied! Toggle word wrap Toggle overflow
2.3. Copy an existing image to multiple stores Copy linkLink copied to clipboard!
This feature enables you to copy existing images using Red Hat OpenStack Image service (glance) image data into multiple Ceph Storage stores at the edge by using the interoperable image import workflow.
The image must be present at the central site before you copy it to any edge sites. Only the image owner or administrator can copy existing images to newly added stores.
You can copy existing image data either by setting --all-stores to true or by specifying specific stores to receive the image data.
-
The default setting for the
--all-storesoption isfalse. If--all-storesisfalse, you must specify which stores receive the image data by using--stores STORE1,STORE2. If the image data is already present in any of the specified stores, the request fails. -
If you set
all-storestotrue, and the image data already exists in some of the stores, then those stores are excluded from the list.
After you specify which stores receive the image data, the Image service copies data from the central site to a staging area. Then the Image service imports the image data by using the interoperable image import workflow. For more information, see Importing an image to multiple stores.
Red Hat recommends that administrators carefully avoid closely timed image copy requests. Two closely timed copy-image operations for the same image causes race conditions and unexpected results. Existing image data remains as it is, but copying data to new stores fails.
2.3.1. Copying an image to all stores Copy linkLink copied to clipboard!
Use the following procedure to copy image data to all available stores.
Procedure
Copy image data to all available stores:
glance image-import IMAGE-ID \ --all-stores true \ --import-method copy-image
$ glance image-import IMAGE-ID \ --all-stores true \ --import-method copy-imageCopy to Clipboard Copied! Toggle word wrap Toggle overflow Replace IMAGE-ID with the name of the image you want to copy.
Confirm that the image data successfully replicated to all available stores:
glance image-list --include-stores
$ glance image-list --include-storesCopy to Clipboard Copied! Toggle word wrap Toggle overflow For information about how to check the status of the image import operation, see Checking the progress of the image import operation.
2.3.2. Copying an image to specific stores Copy linkLink copied to clipboard!
Use the following procedure to copy image data to specific stores.
Procedure
Copy image data to specific stores:
glance image-import IMAGE-ID \ --stores STORE1,STORE2 \ --import-method copy-image
$ glance image-import IMAGE-ID \ --stores STORE1,STORE2 \ --import-method copy-imageCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Replace IMAGE-ID with the name of the image you want to copy.
- Replace STORE1 and STORE2 with the names of the stores to which you want to copy the image data.
Confirm that the image data successfully replicated to the specified stores:
glance image-list --include-stores
$ glance image-list --include-storesCopy to Clipboard Copied! Toggle word wrap Toggle overflow For information about how to check the status of the image import operation, see Checking the progress of the image import operation.
2.4. Deleting an image from a specific store Copy linkLink copied to clipboard!
This feature enables you to delete an existing image copy on a specific store using Red Hat OpenStack Image service (glance).
Procedure
Delete an image from a specific store:
glance stores-delete --store _STORE_ID_ _IMAGE_ID_
$ glance stores-delete --store _STORE_ID_ _IMAGE_ID_
- Replace _STORE_ID with the name of the store on which the image copy should be deleted.
- Replace IMAGE_ID with the ID of the image you want to delete.
Using glance image-delete will permanently delete the image across all the sites. All image copies will be deleted, as well as the image instance and metadata.
2.5. Understanding the locations of images Copy linkLink copied to clipboard!
Although an image can be present on multiple sites, there is only a single UUID for a given image. The image metadata contains the locations of each copy. For example, an image present on two edge sites is exposed as a single UUID with three locations: the central site plus the two edge sites.
Procedure
Show the sites on which a copy of the image exists:
glance image-show ID | grep "stores" | stores | default_backend,dcn1,dcn2
$ glance image-show ID | grep "stores" | stores | default_backend,dcn1,dcn2Copy to Clipboard Copied! Toggle word wrap Toggle overflow In the example, the image is present on the central site, the
default_backend, and on the two edge sitesdcn1anddcn2.Alternatively, you can run the
glance image-listcommand with the--include-storesoption to see the sites where the images exist:glance image-list --include-stores | ID | Name | Stores | 2bd882e7-1da0-4078-97fe-f1bb81f61b00 | cirros | default_backend,dcn1,dcn2
$ glance image-list --include-stores | ID | Name | Stores | 2bd882e7-1da0-4078-97fe-f1bb81f61b00 | cirros | default_backend,dcn1,dcn2Copy to Clipboard Copied! Toggle word wrap Toggle overflow List the image locations properties to show the details of each location:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The image properties show the different Ceph RBD URIs for the location of each image.
In the example, the central image location URI is:
rbd://79b70c32-df46-4741-93c0-8118ae2ae284/images/2bd882e7-1da0-4078-97fe-f1bb81f61b00/snap', 'metadata': {'store': 'default_backend'}}rbd://79b70c32-df46-4741-93c0-8118ae2ae284/images/2bd882e7-1da0-4078-97fe-f1bb81f61b00/snap', 'metadata': {'store': 'default_backend'}}Copy to Clipboard Copied! Toggle word wrap Toggle overflow The URI is composed of the following data:
-
79b70c32-df46-4741-93c0-8118ae2ae284corresponds to the central Ceph FSID. Each Ceph cluster has a unique FSID. -
The default value for all sites is
images, which corresponds to the Ceph pool on which the images are stored. -
2bd882e7-1da0-4078-97fe-f1bb81f61b00corresponds to the image UUID. The UUID is the same for a given image regardless of its location. -
The metadata shows the glance store to which this location maps. In this example, it maps to the
default_backend, which is the central hub site.
-
Appendix A. Image configuration parameters Copy linkLink copied to clipboard!
The following keys can be used with the property option for both the glance image-update and glance image-create commands.
glance image-update IMG-UUID --property architecture=x86_64
$ glance image-update IMG-UUID --property architecture=x86_64
| Specific to | Key | Description | Supported values |
|---|---|---|---|
| All |
|
The CPU architecture that must be supported by the hypervisor. For example, |
|
| All |
| The hypervisor type. |
|
| All |
| For snapshot images, this is the UUID of the server used to create this image. | Valid server UUID |
| All |
| The ID of an image stored in the Image Service that should be used as the kernel when booting an AMI-style image. | Valid image ID |
| All |
| The common name of the operating system distribution in lowercase. |
|
| All |
| The operating system version as specified by the distributor. | Version number (for example, "11.10") |
| All |
| The ID of image stored in the Image Service that should be used as the ramdisk when booting an AMI-style image. | Valid image ID |
| All |
| The virtual machine mode. This represents the host/guest ABI (application binary interface) used for the virtual machine. |
|
| libvirt API driver |
| Specifies the type of disk controller to attach disk devices to. |
|
| libvirt API driver |
| Specifies the type of disk controller to attach CD-ROM devices to. |
|
| libvirt API driver |
| Number of NUMA nodes to expose to the instance (does not override flavor definition). | Integer. |
| libvirt API driver |
| Mapping of vCPUs N-M to NUMA node 0 (does not override flavor definition). | Comma-separated list of integers. |
| libvirt API driver |
| Mapping of vCPUs N-M to NUMA node 1 (does not override flavor definition). | Comma-separated list of integers. |
| libvirt API driver |
| Mapping N MB of RAM to NUMA node 0 (does not override flavor definition). | Integer |
| libvirt API driver |
| Mapping N MB of RAM to NUMA node 1 (does not override flavor definition). | Integer |
| libvirt API driver |
|
Guest agent support. If set to |
|
| libvirt API driver |
| Adds a random number generator (RNG) device to instances launched with this image.
The instance flavor enables the RNG device by default. To disable the RNG device, the cloud administrator must set
The default entropy source is |
|
| libvirt API driver |
| Enables the use of VirtIO SCSI (virtio-scsi) to provide block device access for compute instances; by default, instances use VirtIO Block (virtio-blk). VirtIO SCSI is a para-virtualized SCSI controller device that provides improved scalability and performance, and supports advanced SCSI hardware. |
|
| libvirt API driver |
| The video device driver for the display device to use in virtual machine instances. | Set to one of the following values to specify the supported driver to use:
|
| libvirt API driver |
|
Maximum RAM for the video image. Used only if a | Integer in MB (for example, 64) |
| libvirt API driver |
|
Enables a virtual hardware watchdog device that carries out the specified action if the server hangs. The watchdog uses the i6300esb device (emulating a PCI Intel 6300ESB). If |
|
| libvirt API driver |
| The kernel command line to be used by the libvirt driver, instead of the default. For Linux Containers (LXC), the value is used as arguments for initialization. This key is valid only for Amazon kernel, ramdisk, or machine images (aki, ari, or ami). | |
| libvirt API driver and VMware API driver |
| Specifies the model of virtual network interface device to use. | The valid options depend on the configured hypervisor.
|
| VMware API driver |
| The virtual SCSI or IDE controller used by the hypervisor. |
|
| VMware API driver |
|
A VMware GuestID which describes the operating system installed in the image. This value is passed to the hypervisor when creating a virtual machine. If not specified, the key defaults to | For more information, see Images with VMware vSphere. |
| VMware API driver |
| Currently unused. |
|
| XenAPI driver |
|
If true, the root partition on the disk is automatically resized before the instance boots. This value is only taken into account by the Compute service when using a Xen-based hypervisor with the XenAPI driver. The Compute service will only attempt to resize if there is a single partition on the image, and only if the partition is in |
|
| libvirt API driver and XenAPI driver |
|
The operating system installed on the image. The XenAPI driver contains logic that takes different actions depending on the value of the |
|