Creating and managing images
Create and manage images in Red Hat OpenStack Platform by using the Image service (glance)
Abstract
Providing feedback on Red Hat documentation Copy linkLink copied to clipboard!
We appreciate your input on our documentation. Tell us how we can make it better.
Providing documentation feedback in Jira
Use the Create Issue form to provide feedback on the documentation for Red Hat OpenStack Services on OpenShift (RHOSO) or earlier releases of Red Hat OpenStack Platform (RHOSP). When you create an issue for RHOSO or RHOSP documents, the issue is recorded in the RHOSO Jira project, where you can track the progress of your feedback.
To complete the Create Issue form, ensure that you are logged in to Jira. If you do not have a Red Hat Jira account, you can create an account at https://issues.redhat.com.
- Click the following link to open a Create Issue page: Create Issue
- Complete the Summary and Description fields. In the Description field, include the documentation URL, chapter or section number, and a detailed description of the issue. Do not modify any other fields in the form.
- Click Create.
Chapter 1. The Image service (glance) Copy linkLink copied to clipboard!
The Image service (glance) provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it. You can use stored images as templates to commission new servers quickly and more consistently than installing a server operating system and individually configuring services.
1.1. Virtual machine image formats Copy linkLink copied to clipboard!
A virtual machine (VM) image is a file that contains a virtual disk with a bootable OS installed. Red Hat OpenStack Platform (RHOSP) supports VM images in different formats.
The disk format of a VM image is the format of the underlying disk image. The container format indicates if the VM image is in a file format that also contains metadata about the VM.
When you add an image to the Image service (glance), you can set the disk or container format for your image to any of the values in the following tables by using the --disk-format
and --container-format
command options with the glance image-create
, glance image-create-via-import
, and glance image-update
commands. If you are not sure of the container format of your VM image, you can set it to bare
.
Format | Description |
---|---|
| Indicates an Amazon kernel image that is stored in the Image service. |
| Indicates an Amazon machine image that is stored in the Image service. |
| Indicates an Amazon ramdisk image that is stored in the Image service. |
| Sector-by-sector copy of the data on a disk, stored in a binary file. Although an ISO file is not normally considered a VM image format, these files contain bootable file systems with an installed operating system, and you use them in the same way as other VM image files. |
| A disk format supported and used by Virtuozzo to run OS containers. |
| Supported by QEMU emulator. This format includes QCOW2v3 (sometimes referred to as QCOW3), which requires QEMU 1.1 or higher. |
| Unstructured disk image format. |
| Supported by VirtualBox VM monitor and QEMU emulator. |
| Virtual Hard Disk. Used by VM monitors from VMware, VirtualBox, and others. |
| Virtual Hard Disk v2. Disk image format with a larger storage capacity than VHD. |
| Virtual Machine Disk. Disk image format that allows incremental backups of data changes from the time of the last backup. |
Format | Description |
---|---|
| Indicates an Amazon kernel image that is stored in the Image service. |
| Indicates an Amazon machine image that is stored in the Image service. |
| Indicates an Amazon ramdisk image that is stored in the Image service. |
| Indicates there is no container or metadata envelope for the image. |
| Indicates a TAR archive of the file system of a Docker container that is stored in the Image service. |
| Indicates an Open Virtual Appliance (OVA) TAR archive file that is stored in the Image service. This file is stored in the Open Virtualization Format (OVF) container file. |
| OVF container file format. Open standard for packaging and distributing virtual appliances or software to be run on virtual machines. |
1.2. Supported Image service back ends Copy linkLink copied to clipboard!
The following Image service (glance) back-end scenarios are supported:
- RADOS Block Device (RBD) is the default back end when you use Ceph.
- RBD multi-store.
- Object Storage (swift). The Image service uses the Object Storage type and back end as the default.
- Block Storage (cinder). Each image is stored as a volume (image volume). By default, it is not possible for a user to create multiple instances or volumes from a volume-backed image. But you can configure both the Image service and the Block Storage back end to do this. For more information, see Enabling the creation of multiple instances or volumes from a volume-backed image.
NFS
- Important
Although NFS is a supported Image service deployment option, more robust options are available.
NFS is not native to the Image service. When you mount an NFS share on the Image service, the Image service does not manage the operation. The Image service writes data to the file system but is unaware that the back end is an NFS share.
In this type of deployment, the Image service cannot retry a request if the share fails. This means that when a failure occurs on the back end, the store might enter read-only mode, or it might continue to write data to the local file system, in which case you risk data loss. To recover from this situation, you must ensure that the share is mounted and in sync, and then restart the Image service. For these reasons, Red Hat does not recommend NFS as an Image service back end.
However, if you do choose to use NFS as an Image service back end, some of the following best practices can help to mitigate risks:
- Use a reliable production-grade NFS back end.
- Ensure that you have a strong and reliable connection between Controller nodes and the NFS back end: Layer 2 (L2) network connectivity is recommended.
- Include monitoring and alerts for the mounted share.
- Set underlying file system permissions. Write permissions must be present in the shared file system that you use as a store.
- Ensure that the user and the group that the glance-api process runs on do not have write permissions on the mount point at the local file system. This means that the process can detect possible mount failure and put the store into read-only mode during a write attempt.
1.2.1. Enabling the creation of multiple instances or volumes from a volume-backed image Copy linkLink copied to clipboard!
When using the Block Storage service (cinder) as the back end for the Image service (glance), each image is stored as a volume (image volume) ideally in the Block Storage service project owned by the glance user.
When a user wants to create multiple instances or volumes from a volume-backed image, the Image service host must attach to the image volume to copy the data multiple times. But this causes performance issues and some of these instances or volumes will not be created, because, by default, Block Storage volumes cannot be attached multiple times to the same host. However, most Block Storage back ends support the volume multi-attach property, which enables a volume to be attached multiple times to the same host. Therefore, you can prevent these performance issues by creating a Block Storage volume type for the Image service back end that enables this multi-attach property and configuring the Image service to use this multi-attach volume type.
By default, only the Block Storage project administrator can create volume types.
Procedure
Source the overcloud credentials file:
source ~/<credentials_file>
$ source ~/<credentials_file>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<credentials_file>
with the name of your credentials file, for example,overcloudrc
.
-
Replace
Create a Block Storage volume type for the Image service back end that enables the multi-attach property, as follows:
cinder type-create glance-multiattach cinder type-key glance-multiattach set multiattach="<is> True"
$ cinder type-create glance-multiattach $ cinder type-key glance-multiattach set multiattach="<is> True"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you do not specify a back end for this volume type, then the Block Storage scheduler service determines which back end to use when creating each image volume, therefore these volumes might be saved on different back ends. You can specify the name of the back end by adding the
volume_backend_name
property to this volume type. You might need to ask your Block Storage administrator for the correctvolume_backend_name
for your multi-attach volume type. For this example, we are usingiscsi
as the back-end name.cinder type-key glance-multiattach set volume_backend_name=iscsi
$ cinder type-key glance-multiattach set volume_backend_name=iscsi
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
To configure the Image service to use this Block Storage multi-attach volume type, you must add the following parameter to the end of the [default_backend]` section of the
glance-api.conf
file:cinder_volume_type = glance-multiattach
1.3. Image signing and verification Copy linkLink copied to clipboard!
Image signing and verification protects image integrity and authenticity by enabling deployers to sign images and save the signatures and public key certificates as image properties.
Image signing and verification is not supported if Nova is using RADOS Block Device (RBD) to store virtual machines disks.
For information on image signing and verification, see Validating Image service (glance) images in the Managing secrets with the Key Manager service guide.
1.4. Image format conversion Copy linkLink copied to clipboard!
You can convert images to a different format by activating the image conversion plugin when you import images to the Image service (glance).
You can activate or deactivate the image conversion plugin based on your Red Hat OpenStack Platform (RHOSP) deployment configuration. The deployer configures the preferred format of images for the deployment.
Internally, the Image service receives the bits of the image in a particular format and stores the bits in a temporary location. The Image service triggers the plugin to convert the image to the target format and move the image to a final destination. When the task is finished, the Image service deletes the temporary location. The Image service does not retain the format that was uploaded initially.
You can trigger image conversion only when importing an image. It does not run when uploading an image.
Use the Image service command-line client for image management.
For example:
-
Replace
<name>
with the name of your image.
1.5. Improving scalability with Image service caching Copy linkLink copied to clipboard!
Use the Image service (glance) API caching mechanism to store copies of images on Image service API servers and retrieve them automatically to improve scalability. With Image service caching, you can run glance-api on multiple hosts. This means that it does not need to retrieve the same image from back-end storage multiple times. Image service caching does not affect any Image service operations.
Configure Image service caching with the Red Hat OpenStack Platform director (tripleo) heat templates:
Procedure
In an environment file, set the value of the
GlanceCacheEnabled
parameter totrue
, which automatically sets theflavor
value tokeystone+cachemanagement
in theglance-api.conf
heat template:parameter_defaults: GlanceCacheEnabled: true
parameter_defaults: GlanceCacheEnabled: true
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Include the environment file in the
openstack overcloud deploy
command when you redeploy the overcloud. Optional: Tune the
glance_cache_pruner
to an alternative frequency when you redeploy the overcloud. The following example shows a frequency of 5 minutes:parameter_defaults: ControllerExtraConfig: glance::cache::pruner::minute: '*/5'
parameter_defaults: ControllerExtraConfig: glance::cache::pruner::minute: '*/5'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Adjust the frequency according to your needs to avoid file system full scenarios. Include the following elements when you choose an alternative frequency:
- The size of the files that you want to cache in your environment.
- The amount of available file system space.
- The frequency at which the environment caches images.
1.6. Image pre-caching Copy linkLink copied to clipboard!
You can use Red Hat OpenStack Platform (RHOSP) director to pre-cache images as part of the glance-api
service.
Use the Image service (glance) command-line client for image management.
1.6.1. Configuring the default interval for periodic image pre-caching Copy linkLink copied to clipboard!
The Image service (glance) pre-caching periodic job runs every 300 seconds (5 minutes default time) on each controller node where the glance-api
service is running. To change the default time, you can set the cache_prefetcher_interval
parameter under the Default
section in the glance-api.conf environment file.
Procedure
Add a new interval with the
ExtraConfig
parameter in an environment file on the undercloud according to your requirements:parameter_defaults: ControllerExtraConfig: glance::config::glance_api_config: DEFAULT/cache_prefetcher_interval: value: '<300>'
parameter_defaults: ControllerExtraConfig: glance::config::glance_api_config: DEFAULT/cache_prefetcher_interval: value: '<300>'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<300>
with the number of seconds that you want as an interval to pre-cache images.
-
Replace
After you adjust the interval in the environment file in
/home/stack/templates/
, log in as thestack
user and deploy the configuration:openstack overcloud deploy --templates \ -e /home/stack/templates/<env_file>.yaml
$ openstack overcloud deploy --templates \ -e /home/stack/templates/<env_file>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace <env_file> with the name of the environment file that contains the
ExtraConfig
settings that you added.ImportantIf you passed any extra environment files when you created the overcloud, pass them again here by using the
-e
option to avoid making undesired changes to the overcloud.
Additional resources
For more information about the openstack overcloud deploy
command, see Deployment command in the Installing and managing Red Hat OpenStack Platform with director guide.
1.6.2. Preparing to use a periodic job to pre-cache an image Copy linkLink copied to clipboard!
To use a periodic job to pre-cache an image, you must use the glance-cache-manage
command connected directly to the node where the glance_api
service is running. Do not use a proxy, which hides the node that answers a service request. Because the undercloud might not have access to the network where the glance_api
service is running, run commands on the first overcloud node, which is called controller-0
by default.
Complete the following prerequisite procedure to ensure that you run commands from the correct host, have the necessary credentials, and are also running the glance-cache-manage
commands from inside the glance-api
container.
Procedure
Log in to the undercloud as the stack user and identify the provisioning IP address of
controller-0
:openstack server list -f value -c Name -c Networks | grep controller
(undercloud) [stack@site-undercloud-0 ~]$ openstack server list -f value -c Name -c Networks | grep controller overcloud-controller-1 ctlplane=192.168.24.40 overcloud-controller-2 ctlplane=192.168.24.13 overcloud-controller-0 ctlplane=192.168.24.71 (undercloud) [stack@site-undercloud-0 ~]$
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To authenticate to the overcloud, copy the credentials that are stored in
/home/stack/overcloudrc
, by default, tocontroller-0
:scp ~/overcloudrc tripleo-admin@192.168.24.71:/home/tripleo-admin/
$ scp ~/overcloudrc tripleo-admin@192.168.24.71:/home/tripleo-admin/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Connect to
controller-0
:ssh tripleo-admin@192.168.24.71
$ ssh tripleo-admin@192.168.24.71
Copy to Clipboard Copied! Toggle word wrap Toggle overflow On
controller-0
as thetripleo-admin
user, identify the IP address of theglance_api service
. In the following example, the IP address is172.25.1.105
:grep -A 10 '^listen glance_api' /var/lib/config-data/puppet-generated/haproxy/etc/haproxy/haproxy.cfg
(overcloud) [root@controller-0 ~]# grep -A 10 '^listen glance_api' /var/lib/config-data/puppet-generated/haproxy/etc/haproxy/haproxy.cfg listen glance_api server central-controller0-0.internalapi.redhat.local 172.25.1.105:9292 check fall 5 inter 2000 rise 2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Because the
glance-cache-manage
command is only available in theglance_api
container, create a script to exec into that container where the environment variables to authenticate to the overcloud are already set. Create a script calledglance_pod.sh
in/home/tripleo-admin
oncontroller-0
with the following contents:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Source the
overcloudrc
file and run theglance_pod.sh
script to exec into theglance_api
container with the necessary environment variables to authenticate to the overcloud Controller node.source overcloudrc
[tripleo-admin@controller-0 ~]$ source overcloudrc (overcloudrc) [tripleo-admin@central-controller-0 ~]$ bash glance_pod.sh ()[glance@controller-0 /]$
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use a command such as
glance image-list
to verify that the container can run authenticated commands against the overcloud.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.6.3. Using a periodic job to pre-cache an image Copy linkLink copied to clipboard!
When you have completed the prerequisite procedure in Section 1.6.2, “Preparing to use a periodic job to pre-cache an image”, you can use a periodic job to pre-cache an image.
Procedure
As the admin user, queue an image to cache:
glance-cache-manage --host=<host_ip> queue-image <image_id>
$ glance-cache-manage --host=<host_ip> queue-image <image_id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace <host_ip> with the IP address of the Controller node where the
glance-api
container is running. Replace <image_id> with the ID of the image that you want to queue.
When you have queued the images that you want to pre-cache, the
cache_images
periodic job prefetches all queued images concurrently.NoteBecause the image cache is local to each node, if your Red Hat OpenStack Platform (RHOSP) deployment is HA, with 3, 5, or 7 Controllers, then you must specify the host address with the
--host
option when you run theglance-cache-manage
command.
-
Replace <host_ip> with the IP address of the Controller node where the
Run the following command to view the images in the image cache:
glance-cache-manage --host=<host_ip> list-cached
$ glance-cache-manage --host=<host_ip> list-cached
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Replace <host_ip> with the IP address of the host in your environment.
1.6.4. Image caching command options Copy linkLink copied to clipboard!
You can use the following glance-cache-manage
command options to queue images for caching and manage cached images:
-
list-cached
to list all images that are currently cached. -
list-queued
to list all images that are currently queued for caching. -
queue-image
to queue an image for caching. -
delete-cached-image
to purge an image from the cache. -
delete-all-cached-images
to remove all images from the cache. -
delete-queued-image
to delete an image from the cache queue. -
delete-all-queued-images
to delete all images from the cache queue.
1.7. Using the Image service API to enable sparse image upload Copy linkLink copied to clipboard!
With the Image service (glance) API, you can use sparse image upload to reduce network traffic and save storage space. This feature is particularly useful in distributed compute node (DCN) environments. With a sparse image file, the Image service does not write null byte sequences. The Image service writes data with a given offset. Storage back ends interpret these offsets as null bytes that do not actually consume storage space.
Use the Image service command-line client for image management.
Limitations
- Sparse image upload is supported only with Ceph RADOS Block Device (RBD).
- Sparse image upload is not supported for file systems.
- Sparseness is not maintained during the transfer between the client and the Image service API. The image is sparsed at the Image service API level.
Prerequisites
- Your Red Hat OpenStack Platform (RHOSP) deployment uses RBD for the Image service back end.
Procedure
-
Log in to the undercloud node as the
stack
user. Source the
stackrc
credentials file:source stackrc
$ source stackrc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an environment file with the following content:
parameter_defaults: GlanceSparseUploadEnabled: true
parameter_defaults: GlanceSparseUploadEnabled: true
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add your new environment file to the stack with your other environment files and deploy the overcloud:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
For more information about uploading images, see Uploading images to the Image service.
Verification
You can import an image and check its size to verify sparse image upload.
The following procedure uses example commands. Replace the values with those from your environment where appropriate.
Download the image file locally:
wget <file_location>/<file_name>
$ wget <file_location>/<file_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<file_location>
with the location of the file. Replace
<file_name>
with the name of the file.For example:
wget https://cloud.centos.org/centos/6/images/CentOS-6-x86_64-GenericCloud-1508.qcow2
$ wget https://cloud.centos.org/centos/6/images/CentOS-6-x86_64-GenericCloud-1508.qcow2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
Replace
Check the disk size and the virtual size of the image to be uploaded:
qemu-img info <file_name>
$ qemu-img info <file_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Import the image:
glance image-create-via-import --disk-format qcow2 --container-format bare --name centos_1 --file <file_name>
$ glance image-create-via-import --disk-format qcow2 --container-format bare --name centos_1 --file <file_name>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Record the image ID. It is required in a subsequent step.
Verify that the image is imported and in an active state:
glance image show <image_id>
$ glance image show <image_id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow From a Ceph Storage node, verify that the size of the image is less than the virtual size from the output of step 1:
sudo rbd -p images diff <image_id> | awk '{ SUM += $2 } END { print SUM/1024/1024/1024 " GB" }'
$ sudo rbd -p images diff <image_id> | awk '{ SUM += $2 } END { print SUM/1024/1024/1024 " GB" }' 1.03906 GB
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: You can confirm that
rbd_thin_provisioning
is configured in the Image service configuration file on the Controller nodes:Use SSH to access a Controller node:
ssh -A -t tripleo-admin@<controller_node_IP_address>
$ ssh -A -t tripleo-admin@<controller_node_IP_address>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Confirm that
rbd_thin_provisioning
equalsTrue
on that Controller node:sudo podman exec -it glance_api sh -c 'grep ^rbd_thin_provisioning /etc/glance/glance-api.conf'
$ sudo podman exec -it glance_api sh -c 'grep ^rbd_thin_provisioning /etc/glance/glance-api.conf'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8. Secure metadef APIs Copy linkLink copied to clipboard!
In Red Hat OpenStack Platform (RHOSP), cloud administrators can define key value pairs and tag metadata with metadata definition (metadef) APIs. There is no limit on the number of metadef namespaces, objects, properties, resources, or tags that cloud administrators can create.
Image service policies control metadef APIs. By default, only cloud administrators can create, update, or delete (CUD) metadef APIs. This limitation prevents metadef APIs from exposing information to unauthorized users and mitigates the risk of a malicious user filling the Image service (glance) database with unlimited resources, which can create a Denial of Service (DoS) style attack. However, cloud administrators can override the default policy.
1.9. Enabling metadef API access for cloud users Copy linkLink copied to clipboard!
Cloud administrators with users who depend on write access to metadata definition (metadef) APIs can make those APIs accessible to all users by overriding the default admin-only policy. In this type of configuration, however, there is the potential to unintentionally leak sensitive resource names, such as customer names and internal projects. Administrators must audit their systems to identify previously created resources that might be vulnerable even if only read-access is enabled for all users.
Procedure
As a cloud administrator, log in to the undercloud and create a file for policy overrides. For example:
cat open-up-glance-api-metadef.yaml
$ cat open-up-glance-api-metadef.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Configure the policy override file to allow metadef API read-write access to all users:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteYou must configure all metadef policies to use
rule:metadef_default
. For information about policies and policy syntax, see this Policies chapter.Include the new policy file in the deployment command with the
-e
option when you deploy the overcloud:openstack overcloud deploy -e open-up-glance-api-metadef.yaml
$ openstack overcloud deploy -e open-up-glance-api-metadef.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Chapter 2. Creating RHEL KVM or RHOSP-compatible images Copy linkLink copied to clipboard!
To create images that you can manage in the Red Hat OpenStack Platform (RHOSP) Image service (glance), you can use Red Hat Enterprise Linux (RHEL) Kernel-based Virtual Machine (KVM) instance images, or you can manually create RHOSP-compatible images in the QCOW2 format by using RHEL ISO files or Windows ISO files.
2.1. Creating RHEL KVM images Copy linkLink copied to clipboard!
Use Red Hat Enterprise Linux (RHEL) Kernel-based Virtual Machine (KVM) instance images to create images that you can manage in the Red Hat OpenStack Platform (RHOSP) Image service (glance).
2.1.1. Using a RHEL KVM instance image with Red Hat OpenStack Platform Copy linkLink copied to clipboard!
You can use one of the following Red Hat Enterprise Linux (RHEL) Kernel-based Virtual Machine (KVM) instance images with Red Hat OpenStack Platform (RHOSP):
These QCOW2 images are configured with cloud-init
and must have EC2-compatible metadata services for provisioning Secure Shell (SSH) keys to function correctly.
Ready Windows KVM instance images in QCOW2 format are not available.
For KVM instance images:
-
The
root
account in the image is deactivated, butsudo
access is granted to a special user namedcloud-user
. -
There is no
root
password set for this image.
The root
password is locked in /etc/shadow
by placing !!
in the second field.
For a RHOSP instance, generate an SSH keypair from the RHOSP dashboard or command line, and use that key combination to perform an SSH public authentication to the instance as root user.
When you launch the instance, this public key is injected to it. You can then authenticate by using the private key that you download when you create the keypair.
2.1.2. Creating a RHEL-based root partition image for bare-metal instances Copy linkLink copied to clipboard!
To create a custom root partition image for bare-metal instances, download the base Red Hat Enterprise Linux KVM instance image, and then upload the image to the Image service (glance).
Procedure
- Download the base Red Hat Enterprise Linux KVM instance image from the Customer Portal.
Define
DIB_LOCAL_IMAGE
as the downloaded image:export DIB_LOCAL_IMAGE=rhel-<ver>-x86_64-kvm.qcow2
$ export DIB_LOCAL_IMAGE=rhel-<ver>-x86_64-kvm.qcow2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<ver>
with the RHEL version number of the image.
-
Replace
Set your registration information depending on your method of registration:
Red Hat Customer Portal:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Red Hat Satellite:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace values in angle brackets
<>
with the correct values for your Red Hat Customer Portal or Red Hat Satellite registration.
Optional: If you have any offline repositories, you can define
DIB_YUM_REPO_CONF
as a local repository configuration:export DIB_YUM_REPO_CONF=<file-path>
$ export DIB_YUM_REPO_CONF=<file-path>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<file-path>
with the path to your local repository configuration file.
-
Replace
Use the
diskimage-builder
tool to extract the kernel asrhel-image.vmlinuz
and the initial RAM disk asrhel-image.initrd
:export DIB_RELEASE=<ver> disk-image-create rhel baremetal \ -o rhel-image
$ export DIB_RELEASE=<ver> $ disk-image-create rhel baremetal \ -o rhel-image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Upload the images to the Image service:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.1.3. Creating a RHEL-based whole-disk user image for bare-metal instances Copy linkLink copied to clipboard!
To create a whole-disk user image for bare-metal instances, download the base Red Hat Enterprise Linux KVM instance image, and then upload the image to the Image service (glance).
Procedure
- Download the base Red Hat Enterprise Linux KVM instance image from the Customer Portal.
Define
DIB_LOCAL_IMAGE
as the downloaded image:export DIB_LOCAL_IMAGE=rhel-<ver>-x86_64-kvm.qcow2
$ export DIB_LOCAL_IMAGE=rhel-<ver>-x86_64-kvm.qcow2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<ver>
with the RHEL version number of the image.
-
Replace
Set your registration information depending on your method of registration:
Red Hat Customer Portal:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Red Hat Satellite:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace values in angle brackets
<>
with the correct values for your Red Hat Customer Portal or Red Hat Satellite registration.
Optional: If you have any offline repositories, you can define
DIB_YUM_REPO_CONF
as a local repository configuration:export DIB_YUM_REPO_CONF=<file-path>
$ export DIB_YUM_REPO_CONF=<file-path>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<file-path>
with the path to your local repository configuration file.
-
Replace
Upload the image to the Image service:
openstack image create \ --file rhel-image.qcow2 --public \ --container-format bare \ --disk-format qcow2 \ rhel-whole-disk-bare-metal-image
$ openstack image create \ --file rhel-image.qcow2 --public \ --container-format bare \ --disk-format qcow2 \ rhel-whole-disk-bare-metal-image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.2. Creating instance images with RHEL or Windows ISO files Copy linkLink copied to clipboard!
You can create custom Red Hat Enterprise Linux (RHEL) or Windows images in QCOW2 format from ISO files, and upload these images to the Red Hat OpenStack Platform (RHOSP) Image service (glance) for use when creating instances.
2.2.1. Prerequisites Copy linkLink copied to clipboard!
- A Linux host machine to create an image. This can be any machine on which you can install and run the Linux packages, except for the undercloud or the overcloud.
The
advanced-virt
repository is enabled:sudo subscription-manager repos --enable=advanced-virt-for-rhel-<ver>-x86_64-rpms
$ sudo subscription-manager repos --enable=advanced-virt-for-rhel-<ver>-x86_64-rpms
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
virt-manager
application is installed to have all packages necessary to create a guest operating system:sudo dnf module install -y virt
$ sudo dnf module install -y virt
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
libguestfs-tools
package is installed to have a set of tools to access and modify virtual machine images:sudo dnf install -y libguestfs-tools-c
$ sudo dnf install -y libguestfs-tools-c
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - A RHEL 9 or 8 ISO file or a Windows ISO file. For more information about RHEL ISO files, see RHEL 9.0 Binary DVD or RHEL 8.6 Binary DVD. If you do not have a Windows ISO file, see the Microsoft Evaluation Center to download an evaluation image.
-
A text editor, if you want to change the
kickstart
files (RHEL only).
If you install the libguestfs-tools
package on the undercloud, deactivate iscsid.socket
to avoid port conflicts with the tripleo_iscsid
service on the undercloud:
sudo systemctl disable --now iscsid.socket
$ sudo systemctl disable --now iscsid.socket
When you have the prerequisites in place, you can proceed to create a RHEL or Windows image:
2.2.2. Creating a Red Hat Enterprise Linux 9 image Copy linkLink copied to clipboard!
You can create a Red Hat OpenStack Platform (RHOSP) image in QCOW2 format by using a Red Hat Enterprise Linux (RHEL) 9 ISO file.
Procedure
-
Log on to your host machine as the
root
user. Start the installation by using
virt-install
:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the values in angle brackets
<>
with the correct values for your RHEL 9 image.This command launches an instance and starts the installation process.
NoteIf the instance does not launch automatically, run the
virt-viewer
command to view the console:virt-viewer <rhel9-cloud-image>
[root@host]# virt-viewer <rhel9-cloud-image>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Configure the instance:
- At the initial Installer boot menu, select Install Red Hat Enterprise Linux 9.
- Choose the appropriate Language and Keyboard options.
- When prompted about which type of devices your installation uses, select Auto-detected installation media.
- When prompted about which type of installation destination, select Local Standard Disks. For other storage options, select Automatically configure partitioning.
- In the Which type of installation would you like? window, choose the Basic Server install, which installs an SSH server.
- For network and host name, select eth0 for network and choose a host name for your device. The default host name is localhost.localdomain.
- Enter a password in the Root Password field and enter the same password again in the Confirm field.
- When the on-screen message confirms that the installation is complete, reboot the instance and log in as the root user.
Update the
/etc/sysconfig/network-scripts/ifcfg-eth0
file so that it contains only the following values:TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=no
TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=no
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Reboot the machine.
Register the machine with the Content Delivery Network.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
pool-id
with a valid pool ID. You can see a list of available pool IDs by running thesubscription-manager list --available
command.
-
Replace
Update the system:
dnf -y update
# dnf -y update
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Install the
cloud-init
packages:dnf install -y cloud-utils-growpart cloud-init
# dnf install -y cloud-utils-growpart cloud-init
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
/etc/cloud/cloud.cfg
configuration file and add the following content undercloud_init_modules
:- resolv-conf
- resolv-conf
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
resolv-conf
option automatically configures theresolv.conf
file when an instance boots for the first time. This file contains information related to the instance such asnameservers
,domain
, and other options.Add the following line to
/etc/sysconfig/network
to avoid issues when accessing the EC2 metadata service:NOZEROCONF=yes
NOZEROCONF=yes
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To ensure that the console messages appear in the Log tab on the dashboard and the
nova console-log
output, add the following boot option to the/etc/default/grub
file:GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"
GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the
grub2-mkconfig
command:grub2-mkconfig -o /boot/grub2/grub.cfg
# grub2-mkconfig -o /boot/grub2/grub.cfg
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The output is as follows:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Deregister the instance so that the resulting image does not contain the subscription details for this instance:
subscription-manager repos --disable=* subscription-manager unregister dnf clean all
# subscription-manager repos --disable=* # subscription-manager unregister # dnf clean all
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Power off the instance:
poweroff
# poweroff
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reset and clean the image by using the
virt-sysprep
command so that it can be used to create instances without issues:virt-sysprep -d <rhel9-cloud-image>
[root@host]# virt-sysprep -d <rhel9-cloud-image>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reduce the image size by converting any free space in the disk image back to free space in the host:
virt-sparsify \ --compress <rhel9.qcow2> <rhel9-cloud.qcow2>
[root@host]# virt-sparsify \ --compress <rhel9.qcow2> <rhel9-cloud.qcow2>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This command creates a new
<rhel9-cloud.qcow2>
file in the location from where the command is run.NoteYou must manually resize the partitions of instances based on the image in accordance with the disk space in the flavor that is applied to the instance.
The <rhel9-cloud.qcow2>
image file is ready to be uploaded to the Image service. For more information about uploading this image to your RHOSP deployment, see Uploading images to the Image service.
2.2.3. Creating a Red Hat Enterprise Linux 8 image Copy linkLink copied to clipboard!
You can create a Red Hat OpenStack Platform (RHOSP) image in QCOW2 format by using a Red Hat Enterprise Linux (RHEL) 8 ISO file.
Procedure
-
Log on to your host machine as the
root
user. Start the installation by using
virt-install
:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the values in angle brackets
<>
with the correct values for your RHEL image.This command launches an instance and starts the installation process.
NoteIf the instance does not launch automatically, run the
virt-viewer
command to view the console:virt-viewer <rhel86-cloud-image>
[root@host]# virt-viewer <rhel86-cloud-image>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Configure the instance:
- At the initial Installer boot menu, select Install Red Hat Enterprise Linux 8.
- Choose the appropriate Language and Keyboard options.
- When prompted about which type of devices your installation uses, select Basic Storage Devices.
-
Choose a host name for your device. The default host name is
localhost.localdomain
. -
Set the timezone and
root
password. - In the Which type of installation would you like? window, choose the Basic Server install, which installs an SSH server.
- When the on-screen message confirms that the installation is complete, reboot the instance and log in as the root user.
Update the
/etc/sysconfig/network-scripts/ifcfg-eth0
file so that it contains only the following values:TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=no
TYPE=Ethernet DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp NM_CONTROLLED=no
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Reboot the machine.
Register the machine with the Content Delivery Network:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
pool-id
with a valid pool ID. You can see a list of available pool IDs by running thesubscription-manager list --available
command.
-
Replace
Update the system:
dnf -y update
# dnf -y update
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Install the
cloud-init
packages:dnf install -y cloud-utils-growpart cloud-init
# dnf install -y cloud-utils-growpart cloud-init
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
/etc/cloud/cloud.cfg
configuration file and add the following content undercloud_init_modules
.- resolv-conf
- resolv-conf
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
resolv-conf
option automatically configures theresolv.conf
file when an instance boots for the first time. This file contains information related to the instance such asnameservers
,domain
, and other options.To prevent network issues, create
/etc/udev/rules.d/75-persistent-net-generator.rules
:echo "#" > /etc/udev/rules.d/75-persistent-net-generator.rules
# echo "#" > /etc/udev/rules.d/75-persistent-net-generator.rules
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This prevents the
/etc/udev/rules.d/70-persistent-net.rules
file from being created. If the/etc/udev/rules.d/70-persistent-net.rules
file is created, networking might not function correctly when you boot from snapshots because the network interface is created aseth1
instead ofeth0
and the IP address is not assigned.Add the following line to
/etc/sysconfig/network
to avoid issues when accessing the EC2 metadata service:NOZEROCONF=yes
NOZEROCONF=yes
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To ensure that the console messages appear in the Log tab on the dashboard and the
nova console-log
output, add the following boot option to the/etc/grub.conf
file:GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"
GRUB_CMDLINE_LINUX_DEFAULT="console=tty0 console=ttyS0,115200n8"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Deregister the instance so that the resulting image does not contain the same subscription details for this instance:
subscription-manager repos --disable=* subscription-manager unregister dnf clean all
# subscription-manager repos --disable=* # subscription-manager unregister # dnf clean all
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Power off the instance:
poweroff
# poweroff
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reset and clean the image by using the
virt-sysprep
command so that it can be used to create instances without issues:virt-sysprep -d <rhel86-cloud-image>
[root@host]# virt-sysprep -d <rhel86-cloud-image>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reduce the image size by converting any free space in the disk image back to free space in the host:
virt-sparsify \ --compress <rhel86.qcow2> <rhel86-cloud.qcow2>
[root@host]# virt-sparsify \ --compress <rhel86.qcow2> <rhel86-cloud.qcow2>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This command creates a new
<rhel86-cloud.qcow2>
file in the location from where the command is run.NoteYou must manually resize the partitions of instances based on the image in accordance with the disk space in the flavor that is applied to the instance.
The <rhel86-cloud.qcow2>
image file is ready to be uploaded to the Image service. For more information about uploading this image to your RHOSP deployment, see Uploading images to the Image service.
2.2.4. Creating a Windows image Copy linkLink copied to clipboard!
You can create a Red Hat OpenStack Platform (RHOSP) image in QCOW2 format by using a Windows ISO file.
Procedure
-
Log on to your host machine as the
root
user. Start the installation by using
virt-install
:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the values in angle brackets
<>
withe the correct values for your Windows image.NoteThe
--os-type=windows
parameter ensures that the clock is configured correctly for the Windows instance and enables its Hyper-V enlightenment features. You must also setos_type=windows
in the image metadata before uploading the image to the Image service (glance).
The
virt-install
command saves the instance image as/var/lib/libvirt/images/<windows-image>.qcow2
by default. If you want to keep the instance image elsewhere, change the parameter of the--disk
option:--disk path=<file-name>,size=<size>
--disk path=<file-name>,size=<size>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<file-name>
with the name of the file that stores the instance image, and optionally its path. For example,path=win8.qcow2,size=8
creates an 8 GB file namedwin8.qcow2
in the current working directory.NoteIf the instance does not launch automatically, run the
virt-viewer
command to view the console:virt-viewer <windows-image>
[root@host]# virt-viewer <windows-image>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more information about how to install Windows, see the Microsoft documentation.
- To allow the newly-installed Windows system to use the virtualized hardware, you might need to install VirtIO drivers. For more information, see Installing KVM paravirtualized drivers for Windows virtual machines in Configuring and managing virtualization.
To complete the configuration, download and run Cloudbase-Init on the Windows system. At the end of the installation of Cloudbase-Init, select the Run Sysprep and Shutdown checkboxes. The
Sysprep
tool makes the instance unique by generating an OS ID, which is used by certain Microsoft services.ImportantRed Hat does not provide technical support for Cloudbase-Init. If you encounter an issue, see Contact Cloudbase Solutions.
When the Windows system shuts down, the
<windows-image.qcow2>
image file is ready to be uploaded to the Image service. For more information about uploading this image to your RHOSP deployment, see Uploading images to the Image service.
2.3. Creating an image for UEFI Secure Boot Copy linkLink copied to clipboard!
When the overcloud contains UEFI Secure Boot Compute nodes, you can create a Secure Boot instance image that cloud users can use to launch Secure Boot instances.
Procedure
Create a new image for UEFI Secure Boot:
openstack image create --file <base_image_file> uefi_secure_boot_image
$ openstack image create --file <base_image_file> uefi_secure_boot_image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<base_image_file>
with an image file that supports UEFI and the GUID Partition Table (GPT) standard, and includes an EFI system partition.
-
Replace
If the default machine type is not
q35
, then set the machine type toq35
:openstack image set --property hw_machine_type=q35 uefi_secure_boot_image
$ openstack image set --property hw_machine_type=q35 uefi_secure_boot_image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Specify that the instance must be scheduled on a UEFI Secure Boot host:
openstack image set \ --property hw_firmware_type=uefi \ --property os_secure_boot=required \ uefi_secure_boot_image
$ openstack image set \ --property hw_firmware_type=uefi \ --property os_secure_boot=required \ uefi_secure_boot_image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.4. Metadata properties for virtual hardware Copy linkLink copied to clipboard!
The Compute service (nova) has deprecated support for using libosinfo
data to set default device models. Instead, use the following image metadata properties to configure the optimal virtual hardware for an instance:
-
os_distro
-
os_version
-
hw_cdrom_bus
-
hw_disk_bus
-
hw_scsi_model
-
hw_vif_model
-
hw_video_model
-
hypervisor_type
For more information about these metadata properties, see Image configuration parameters.
Chapter 3. Managing images, image properties, and image formats Copy linkLink copied to clipboard!
Manage images and the properties and formats of images that you upload, import, or store in the Red Hat OpenStack Platform (RHOSP) Image service (glance).
3.1. Uploading images to the Image service Copy linkLink copied to clipboard!
You can upload an image to the Red Hat OpenStack Platform (RHOSP) Image service (glance) by using the glance image-create
command with the --property
option.
For a list of glance image-create
command options, see Image service command options. For a list of property keys, see Image configuration parameters.
Procedure
Use the
glance image-create
command with theproperty
option to upload an image.For example:
glance image-create --name <name> \ --is-public true --disk-format <qcow2> \ --container-format <bare> \ --file </path/to/image> \ --property <os_version>=<11.10>
$ glance image-create --name <name> \ --is-public true --disk-format <qcow2> \ --container-format <bare> \ --file </path/to/image> \ --property <os_version>=<11.10>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<name>
with a descriptive name for your image. -
Replace
<disk-format>
with one of the following disk formats: None, ami, ari, aki, vhd, vhdx, vmdk, raw, qcow2, vdi, iso, ploop. -
Replace
<container-format>
with one of the following container formats: None, ami, ari, aki, bare, ovf, ova, docker. -
Replace
</path/to/image>
with the file path to your image file. -
Replace
<os_version>
and<11.10>
with the key-value pair of the property you want to associate to your image. You can use the--property
option multiple times with different key-value pairs you want to associate to your image.
-
Replace
3.2. Image service image import methods Copy linkLink copied to clipboard!
You can import images to the Red Hat OpenStack Platform (RHOSP) Image service (glance) by using the following methods:
-
Use the
web-download
(default) method to import images from a URI. -
Use the
glance-direct
method to import images from a local file system. -
Use the
copy-image
method to copy an existing image to other Image service back ends that are in your deployment. Use this import method only if multiple Image service back ends are enabled in your deployment.
The web-download
method is enabled by default, but the cloud administrator configures other import methods. You can run the glance import-info
command to list available import options.
3.2.1. Importing an image from a remote URI Copy linkLink copied to clipboard!
You can use the web-download
image import method to copy an image from a remote URI to the Red Hat OpenStack Platform (RHOSP) Image service (glance).
The Image service web-download
method uses a two-stage process to perform the import:
-
The
web-download
method creates an image record. -
The
web-download
method retrieves the image from the specified URI.
The URI is subject to optional denylist
and allowlist
filtering.
The image property injection plugin may inject metadata properties to the image. These injected properties determine which Compute nodes the image instances are launched on.
Procedure
Create an image and specify the URI of the image to import:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<container-format>
with one of the following container formats: None, ami, ari, aki, bare, ovf, ova, docker -
Replace
<disk-format>
with one of the following disk formats: None, ami, ari, aki, vhd, vhdx, vmdk, raw, qcow2, vdi, iso, ploop. -
Replace
<name>
with a descriptive name for your image. -
Replace
<uri>
with the URI of your image.
-
Replace
Verification
Check the availability of the image:
glance image-show <image-id>
$ glance image-show <image-id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-id>
with the image ID you provided during image creation.
-
Replace
3.2.2. Importing an image from a local volume Copy linkLink copied to clipboard!
The glance-direct
image import method creates an image record, which generates an image ID. When you upload an image to the Image service (glance) from a local volume, the image is stored in a staging area and becomes active when it passes any configured checks.
The glance-direct
method requires a shared staging area when used in a highly available (HA) configuration. If you upload images by using the glance-direct
import method, the upload can fail in a HA environment if a shared staging area is not present. In a HA active-active environment, API calls are distributed to the Image service controllers. The download API call can be sent to a different controller than the API call to upload the image.
The glance-direct
image import method uses three different calls to import an image:
-
glance image-create
-
glance image-stage
-
glance image-import
You can use the glance image-create-via-import
command to perform all three of the glance-direct
calls in one command.
Procedure
- Source your credentials file.
Use the
glance image-create-via-import
command to import a local image:glance image-create-via-import \ --container-format <container-format> \ --disk-format <disk-format> \ --name <name> \ --file </path/to/image>
$ glance image-create-via-import \ --container-format <container-format> \ --disk-format <disk-format> \ --name <name> \ --file </path/to/image>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<container-format>
with one of the following container formats: None, ami, ari, aki, bare, ovf, ova, docker -
Replace
<disk-format>
with one of the following disk formats: None, ami, ari, aki, vhd, vhdx, vmdk, raw, qcow2, vdi, iso, ploop. -
Replace
<name>
with a descriptive name for your image. Replace
</path/to/image>
with the file path to your image file.When the image moves from the staging area to the back-end storage location, the image is listed. However, it might take some time for the image to become active.
-
Replace
Verification
Check the availability of the image:
glance image-show <image-id>
$ glance image-show <image-id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-id>
with the image ID you provided during image creation.
-
Replace
3.3. Updating image properties Copy linkLink copied to clipboard!
Update the properties of images that you have stored in the Red Hat OpenStack Platform (RHOSP) Image service (glance).
Procedure
Use the
glance image-update
command with theproperty
option to update an image.For example:
glance image-update IMG-UUID \ --property architecture=x86_64
$ glance image-update IMG-UUID \ --property architecture=x86_64
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
For a list of
glance image-update
command options, see Image service (glance) command options. - For a list of property keys, see Image configuration parameters.
-
For a list of
3.4. Enabling image conversion Copy linkLink copied to clipboard!
You can upload a QCOW2 image to the Image service (glance) by enabling the GlanceImageImportPlugins
parameter. You can then convert the QCOW2 image to RAW format.
Image conversion is automatically enabled when you use Red Hat Ceph Storage RADOS Block Device (RBD) to store images and boot Nova instances.
To enable image conversion, create an environment file that contains the following parameter value. Include the new environment file with the -e
option in the openstack overcloud deploy
command:
parameter_defaults: GlanceImageImportPlugins:'image_conversion'
parameter_defaults:
GlanceImageImportPlugins:'image_conversion'
Use the Image service command-line client for image management.
3.4.1. Converting an image to RAW format Copy linkLink copied to clipboard!
Red Hat Ceph Storage can store, but does not support using, QCOW2 images to host virtual machine (VM) disks.
When you upload a QCOW2 image and create a VM from it, the compute node downloads the image, converts the image to RAW, and uploads it back into Ceph, which can then use it. This process affects the time it takes to create VMs, especially during parallel VM creation.
For example, when you create multiple VMs simultaneously, uploading the converted image to the Ceph cluster might impact already running workloads. The upload process can starve those workloads of IOPS and impede storage responsiveness.
To boot VMs in Ceph more efficiently (ephemeral back end or boot from volume), the glance image format must be RAW.
Procedure
Converting an image to RAW might yield an image that is larger in size than the original QCOW2 image file. Run the following command before the conversion to determine the final RAW image size:
qemu-img info <image>.qcow2
$ qemu-img info <image>.qcow2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Convert an image from QCOW2 to RAW format:
qemu-img convert -p -f qcow2 -O raw <original qcow2 image>.qcow2 <new raw image>.raw
$ qemu-img convert -p -f qcow2 -O raw <original qcow2 image>.qcow2 <new raw image>.raw
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.4.2. Configuring disk formats with the GlanceDiskFormats parameter Copy linkLink copied to clipboard!
You can the configure the Image service (glance) to enable or reject disk formats by using the GlanceDiskFormats
parameter.
Procedure
-
Log in to the undercloud host as the
stack
user. Source the undercloud credentials file:
source ~/stackrc
$ source ~/stackrc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Include the
GlanceDiskFormats
parameter in an environment file, for example,glance_disk_formats.yaml
:parameter_defaults: GlanceDiskFormats: - <disk_format>
parameter_defaults: GlanceDiskFormats: - <disk_format>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example, use the following configuration to enable only RAW and ISO disk formats:
parameter_defaults: GlanceDiskFormats: - raw - iso
parameter_defaults: GlanceDiskFormats: - raw - iso
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the following example configuration to reject QCOW2 disk images:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Include the environment file that contains your new configuration in the
openstack overcloud deploy
command with any other environment files that are relevant to your environment:openstack overcloud deploy --templates \ -e <overcloud_environment_files> \ -e <new_environment_file> \ …
$ openstack overcloud deploy --templates \ -e <overcloud_environment_files> \ -e <new_environment_file> \ …
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<overcloud_environment_files>
with the list of environment files that are part of your deployment. -
Replace
<new_environment_file>
with the environment file that contains your new configuration.
-
Replace
For more information about the disk formats available in RHOSP, see Image configuration parameters.
3.4.3. Storing an image in RAW format Copy linkLink copied to clipboard!
With the GlanceImageImportPlugins
parameter enabled, run the following command to store a previously created image in RAW format:
-
Replace
<name>
with the name of the image; this is the name that will appear inglance image-list
. -
Replace
<http://server/image.qcow2>
with the location and file name of the QCOW2 image.
This command example creates the image record and imports it by using the web-download
method. The glance-api downloads the image from the --uri
location during the import process. If web-download
is not available, glanceclient
cannot automatically download the image data. Run the glance import-info
command to list the available image import methods.
3.5. Hiding or unhiding images Copy linkLink copied to clipboard!
You can hide public images from normal listings presented to users. For example, you can hide obsolete CentOS 7 images and show only the latest version to simplify the user experience. Users can discover and use hidden images.
To create a hidden image, add the --hidden
argument to the glance image-create
command.
Procedure
Hide an image:
glance image-update <image_id> --hidden 'true'
$ glance image-update <image_id> --hidden 'true'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Unhide an image:
glance image-update <image_id> --hidden 'false'
$ glance image-update <image_id> --hidden 'false'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow List hidden images:
glance image-list --hidden 'true'
$ glance image-list --hidden 'true'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.6. Deleting images from the Image service Copy linkLink copied to clipboard!
Use the glance image-delete
command to delete one or more images that you do not need to store in the Image service (glance).
Procedure
Delete one or more images:
glance image-delete <image-id> [<image-id> ...]
$ glance image-delete <image-id> [<image-id> ...]
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<image-id>
with the ID of the image you want to delete.WarningThe
glance image-delete
command permanently deletes the image and all copies of the image, as well as the image instance and metadata.
Chapter 4. Configuring the Image service image import method Copy linkLink copied to clipboard!
The default settings for the Image service (glance) are determined by the Orchestration service (heat) templates that you use when you install Red Hat OpenStack Platform (RHOSP). The Orchestration service template for the Image service is deployment/glance/glance-api-container-puppet.yaml
.
You can customize aspects of the Image service with a custom environment file, which is a special type of template you can use to customize your Orchestration service templates. For more information about Orchestration service templates and environment files, see Understanding heat templates in Installing and managing Red Hat OpenStack Platform with director.
As a cloud administrator, you can configure an image import workflow for cloud users to upload their own images to the Image service by using the web-download
or glance-direct
import methods. You can monitor uploaded images in a staging area before they go active in a storage back end, and you can configure the import workflow to run a set of plugins to make user images discoverable, for example, the image property injection plugin for metadata or the image conversion plugin for image formats.
The web-download
image import method is enabled by default, but cloud administrators can configure the glance-direct
method. For further information about the available import methods in Red Hat OpenStack Platform (RHOSP), see Image service image import methods.
4.1. Configuring the glance-direct image import method Copy linkLink copied to clipboard!
When cloud administrators enable the glance-direct
image import method, cloud users can upload local images to a shared staging area in the OpenStack Image service (glance), a temporary shared storage location common to all Image service API workers.
Procedure
-
Log in to the undercloud host as the
stack
user. Source the
stackrc
undercloud credentials file:source ~/stackrc
$ source ~/stackrc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create or open a YAML environment file to configure the import parameters:
Example
vi /home/stack/templates/<glance-import-settings>.yaml
$ vi /home/stack/templates/<glance-import-settings>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<glance-import-settings>
with the name of your file.
-
Replace
Configure the NFS back end that is required for shared staging:
parameter_defaults: GlanceBackend: file GlanceNfsEnabled: true GlanceNfsShare: 192.168.122.1:/export/glance
parameter_defaults: GlanceBackend: file GlanceNfsEnabled: true GlanceNfsShare: 192.168.122.1:/export/glance
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add
glance-direct
to theGlanceEnabledImportMethods
parameter to enable theglance-direct
import method:parameter_defaults: [...] GlanceEnabledImportMethods: glance-direct,web-download
parameter_defaults: [...] GlanceEnabledImportMethods: glance-direct,web-download
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Configure the NFS staging area that is required for the
glance-direct
import method:parameter_defaults: [...] GlanceStagingNfsShare: 192.168.122.1:/export/glance-staging
parameter_defaults: [...] GlanceStagingNfsShare: 192.168.122.1:/export/glance-staging
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
GlanceEnabledImportMethods
parameter is necessary if you want to enable methods other thanweb-download
. For more information about theGlanceBackend
,GlanceNfsEnabled
, andGlanceStagingNfsShare
parameters, see Image Storage (glance) Parameters in Overcloud parameters.Add your
<glance-import-settings>.yaml
file to the stack with your other environment files and deploy the overcloud:openstack overcloud deploy --templates \ -e [your environment files] \ -e /home/stack/templates/<glance-import-settings>.yaml
(undercloud)$ openstack overcloud deploy --templates \ -e [your environment files] \ -e /home/stack/templates/<glance-import-settings>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.2. Controlling image web-import sources Copy linkLink copied to clipboard!
You can limit the sources of web-import image downloads by adding URI blocklists and allowlists to the optional glance-image-import.conf
file.
You can allow or block image source URIs at three levels:
- scheme (allowed_schemes, disallowed_schemes)
- host (allowed_hosts, disallowed_hosts)
- port (allowed_ports, disallowed_ports)
If you specify both allowlist and blocklist at any level, the allowlist is honored and the blocklist is ignored.
The Image service (glance) applies the following decision logic to validate image source URIs:
The scheme is checked.
- Missing scheme: reject
- If there is an allowlist, and the scheme is not present in the allowlist: reject. Otherwise, skip C and continue on to 2.
- If there is a blocklist, and the scheme is present in the blocklist: reject.
The host name is checked.
- Missing host name: reject
- If there is an allowlist, and the host name is not present in the allowlist: reject. Otherwise, skip C and continue on to 3.
- If there is a blocklist, and the host name is present in the blocklist: reject.
If there is a port in the URI, the port is checked.
- If there is a allowlist, and the port is not present in the allowlist: reject. Otherwise, skip B and continue on to 4.
- If there is a blocklist, and the port is present in the blocklist: reject.
- The URI is accepted as valid.
If you allow a scheme, either by adding it to an allowlist or by not adding it to a blocklist, any URI that uses the default port for that scheme by not including a port in the URI is allowed. If it does include a port in the URI, the URI is validated according to the default decision logic.
4.2.1. Image import allowlist example Copy linkLink copied to clipboard!
In this example, the default port for FTP is 21.
Because ftp
is in the list for allowed_schemes
, this URL to the image resource is allowed: ftp://example.org/some/resource.
However, because 21 is not in the list for allowed_ports
, this URL to the same image resource is rejected: ftp://example.org:21/some/resource.
4.2.2. Default image import blocklist and allowlist settings Copy linkLink copied to clipboard!
The glance-image-import.conf
file is an optional file that contains the following default options:
- allowed_schemes - [http, https]
- disallowed_schemes - empty list
- allowed_hosts - empty list
- disallowed_hosts - empty list
- allowed_ports - [80, 443]
- disallowed_ports - empty list
If you use the defaults, end users can access URIs by using only the http
or https
scheme. The only ports that users can specify are 80
and 443
. Users do not have to specify a port, but if they do, it must be either 80
or 443
.
You can find the glance-image-import.conf
file in the etc/
subdirectory of the Image service source code tree. Ensure that you are looking in the correct branch for your release of Red Hat OpenStack Platform.
4.3. Injecting metadata on image import to control where instances launch Copy linkLink copied to clipboard!
Cloud users can upload images to the Image service (glance) and use these images to launch instances. Cloud users must launch these images on a specific set of Compute nodes. You can control the assignment of an instance to a Compute node by using image metadata properties.
The image property injection plugin injects metadata properties to images during import. You can specify the properties by editing the [image_import_opts]
and [inject_metadata_properties]
sections of the glance-image-import.conf
file. You can find the glance-image-import.conf
file in the etc/
subdirectory of the Image service source code tree. Ensure that you are looking in the correct branch for your release of Red Hat OpenStack Platform (RHOSP).
To enable the image property injection plugin, add the following line to the [image_import_opts]
section:
[image_import_opts] image_import_plugins = [inject_image_metadata]
[image_import_opts]
image_import_plugins = [inject_image_metadata]
To limit the metadata injection to images provided by a certain set of users, set the ignore_user_roles
parameter. For example, use the following configuration to inject one value for property1
and two values for property2
into images downloaded by any non-admin user.
The parameter ignore_user_roles
is a comma-separated list of the Identity service (keystone) roles that the plugin ignores. This means that if the user that makes the image import call has any of these roles, the plugin does not inject any properties into the image.
The parameter inject
is a comma-separated list of properties and values that are injected into the image record for the imported image. Each property and value must be quoted and separated by a colon (‘:’)
.
Chapter 5. Image service with multiple stores Copy linkLink copied to clipboard!
The Red Hat OpenStack Platform (RHOSP) Image service (glance) supports using multiple stores with distributed edge architecture so that you can have an image pool at every edge site.
5.1. Image copies on multiple stores Copy linkLink copied to clipboard!
When you use multiple stores with distributed edge architecture, you can have an image pool at every edge site. You can copy images between the central site, which is also known as the hub site, and the edge sites.
The image metadata contains the location of each copy. For example, an image present on two edge sites is exposed as a single UUID with three locations: the central site plus the two edge sites. This means you can have copies of image data that share a single UUID on many stores. For more information about locations, see Understanding the location of images.
With a RADOS Block Device (RBD) image pool at every edge site, you can boot Virtual Machines (VMs) quickly by using Ceph RBD copy-on-write (COW) and snapshot layering technology. This means that you can boot VMs from volumes and have live migration. For more information about layering with Ceph RBD, see Ceph block device layering in the Block Device Guide.
When you launch an instance at an edge site, the required image is copied to the local Image service (glance) store automatically. However, you can copy images in advance from the central image store to edge sites to save time during instance launch.
5.2. Requirements of storage edge architecture Copy linkLink copied to clipboard!
Refer to the following requirements to use images with edge sites:
- A copy of each image must exist in the Image service (glance) at the central location.
- You must copy images from an edge site to the central location before you can copy them to other edge sites.
- You must use raw images when deploying a Distributed Compute Node (DCN) architecture with Red Hat Ceph Storage.
-
For each site, you must assign the same value to the
NovaComputeAvailabilityZone
andCinderStorageAvailabilityZone
parameters.
5.3. Multiple Block Storage service stores Copy linkLink copied to clipboard!
You can configure multiple Block Storage service (cinder) back ends for the Image service (glance), and configure volume types for each back end by using the enabled_backends
and cinder_volume_type
configuration options in the glance-api.conf
file.
While you can associate one back end with multiple volume types in the Block Storage service, you can only associate a back end with one volume type in the Image service.
The Image service generates a location URL with a unique ID to identify which back end an image is stored in. When you upgrade from using a single Block Storage service store to using multiple Block Storage service stores, the location URLs for legacy images are updated from cinder://volume-id
to cinder://store-name/volume-id
.
Example 1: New deployment with two volume types
The following example shows the Image service configuration in the glance-api.conf
file for a new deployment when the Block Storage service has two volume types, for example, fast
and slow
:
Example 2: Upgrade from single store to multiple stores
The following example shows the Image service configuration in the glance-api.conf
file for an upgrade from a single Block Storage service store to multiple stores. You must identify the default_volume_type
that is used in cinder.conf
, and update the cinder_volume_type
in glance-api.conf
to match:
5.4. Importing an image to multiple stores Copy linkLink copied to clipboard!
Use the interoperable image import workflow to import image data into multiple Red Hat Ceph Storage clusters. You can import images to the Image service (glance) that are available on the local file system or through a web server.
If you import an image from a web server, the image can be imported into multiple stores at once. If the image is not available on a web server, you can import the image from a local file system into the central store and then copy it to additional stores. For more information, see Copy an existing image to multiple stores.
Use the Image service command-line client for image management.
Always store an image copy on the central site, even if there are no instances using the image at the central location. For more information about importing images into the Image service, see the Deploying a Distributed Compute Node architecture guide.
5.4.1. Managing image import failures Copy linkLink copied to clipboard!
You can manage failures of the image import operation by using the --allow-failure
parameter:
-
If the value of the
--allow-failure
parameter totrue
, the image status becomesactive
after the first store successfully imports the data. This is the default setting. You can view a list of stores that failed to import the image data by using theos_glance_failed_import
image property. -
If you set the value of the
--allow-failure
parameter tofalse
, the image status only becomesactive
after all specified stores successfully import the data. Failure of any store to import the image data results in an image status offailed
. The image is not imported into any of the specified stores.
5.4.2. Importing image data to multiple stores Copy linkLink copied to clipboard!
Because the default setting of the --allow-failure
parameter is true
, you do not need to include the parameter in the command if it is acceptable for some stores to fail to import the image data.
This procedure does not require all stores to successfully import the image data.
Procedure
Import image data to multiple, specified stores:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-name>
with the name of the image you want to import. -
Replace
<uri>
with the URI of the image. -
Replace
<store-1>
,<store-2>
, and<store-3>
with the names of the stores to which you want to import the image data. -
Alternatively, replace
--stores
with--all-stores true
to upload the image to all the stores.
-
Replace
The glance image-create-via-import
command, which automatically converts the QCOW2 image to RAW format, works only with the web-download
method. The glance-direct
method is available, but it works only in deployments with a configured shared file system.
5.4.3. Importing image data to multiple stores without failure Copy linkLink copied to clipboard!
This procedure requires all stores to successfully import the image data.
Procedure
Import image data to multiple, specified stores:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-name>
with the name of the image you want to import. -
Replace
<uri>
with the URI of the image. -
Replace
<store-1>
,<store-2>
, and<store-3>
with the names of stores to which you want to copy the image data. Alternatively, replace
--stores
with--all-stores true
to upload the image to all the stores.NoteWith the
--allow-failure
parameter set tofalse
, the Image service (glance) does not ignore stores that fail to import the image data. You can view the list of failed stores with the image propertyos_glance_failed_import
. For more information, see Section 5.5, “Checking the progress of the image import operation”.
-
Replace
Verify that the image data was added to specific stores:
glance image-show <image-id> | grep stores
$ glance image-show <image-id> | grep stores
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<image-id>
with the ID of the original existing image.The output displays a comma-delimited list of stores.
5.4.4. Importing image data to a single store Copy linkLink copied to clipboard!
You can use the Image service (glance) to import image data to a single store.
Procedure
Import image data to a single store:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-name>
with the name of the image you want to import. -
Replace
<uri>
with the URI of the image. Replace
<store>
with the name of the store to which you want to copy the image data.NoteIf you do not include the options of
--stores
,--all-stores
, or--store
in the command, the Image service creates the image in the central store.
-
Replace
Verify that the image data was added to specific store:
glance image-show <image-id> | grep stores
$ glance image-show <image-id> | grep stores
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<image-id>
with the ID of the original existing image.The output displays a comma-delimited list of stores.
5.5. Checking the progress of the image import operation Copy linkLink copied to clipboard!
The interoperable image import workflow sequentially imports image data into stores. The size of the image, the number of stores, and the network speed between the central site and the edge sites impact how long it takes for the image import operation to complete.
You can follow the progress of the image import by looking at two image properties, which appear in notifications sent during the image import operation:
-
The
os_glance_importing_to_stores
property lists the stores that have not imported the image data. At the beginning of the import, all requested stores show up in the list. Each time a store successfully imports the image data, the Image service removes the store from the list. -
The
os_glance_failed_import
property lists the stores that fail to import the image data. This list is empty at the beginning of the image import operation.
In the following procedure, the environment has three Red Hat Ceph Storage clusters: the central
store and two stores at the edge, dcn0
and dcn1
.
Procedure
Verify that the image data was added to specific stores:
glance image-show <image-id>
$ glance image-show <image-id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<image-id>
with the ID of the original existing image.The output displays a comma-delimited list of stores similar to the following example snippet:
| os_glance_failed_import | | os_glance_importing_to_stores | central,dcn0,dcn1 | status | importing
| os_glance_failed_import | | os_glance_importing_to_stores | central,dcn0,dcn1 | status | importing
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Monitor the status of the image import operation. When you precede a command with
watch
, the command output refreshes every two seconds.watch glance image-show <image-id>
$ watch glance image-show <image-id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace
<image-id>
with the ID of the original existing image.The status of the operation changes as the image import operation progresses:
| os_glance_failed_import | | os_glance_importing_to_stores | dcn0,dcn1 | status | importing
| os_glance_failed_import | | os_glance_importing_to_stores | dcn0,dcn1 | status | importing
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Output that shows that an image failed to import resembles the following example:
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | dcn1 | status | importing
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | dcn1 | status | importing
Copy to Clipboard Copied! Toggle word wrap Toggle overflow After the operation completes, the status changes to active:
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | | status | active
| os_glance_failed_import | dcn0 | os_glance_importing_to_stores | | status | active
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
5.6. Copying an existing image to multiple stores Copy linkLink copied to clipboard!
This feature enables you to copy existing images using Red Hat OpenStack Image service (glance) image data into multiple Red Hat Ceph Storage stores at the edge by using the interoperable image import workflow.
The image must be present at the central site before you copy it to any edge sites. Only the image owner or administrator can copy existing images to newly added stores.
You can copy existing image data either by setting --all-stores
to true
or by specifying specific stores to receive the image data.
-
The default setting for the
--all-stores
option isfalse
. If--all-stores
isfalse
, you must specify which stores receive the image data by using--stores <store-1>,<store-2>
. If the image data is already present in any of the specified stores, the request fails. -
If you set
all-stores
totrue
, and the image data already exists in some of the stores, then those stores are excluded from the list.
After you specify which stores receive the image data, the Image service (glance) copies data from the central site to a staging area. Then the Image service imports the image data by using the interoperable image import workflow. For more information, see Importing an image to multiple stores.
Use the Image service command-line client for image management.
Red Hat recommends that administrators carefully avoid closely timed image copy requests. Two closely timed copy-image operations for the same image causes race conditions and unexpected results. Existing image data remains as it is, but copying data to new stores fails.
5.6.1. Copying an image to all stores Copy linkLink copied to clipboard!
Use the following procedure to copy image data to all available stores.
Procedure
Copy image data to all available stores:
glance image-import <image-id> \ --all-stores true \ --import-method copy-image
$ glance image-import <image-id> \ --all-stores true \ --import-method copy-image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-id>
with the name of the image you want to copy.
-
Replace
Confirm that the image data successfully replicated to all available stores:
glance image-list --include-stores
$ glance image-list --include-stores
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For information about how to check the status of the image import operation, see Section 5.5, “Checking the progress of the image import operation”.
5.6.2. Copying an image to specific stores Copy linkLink copied to clipboard!
Use the following procedure to copy image data to specific stores.
Procedure
Copy image data to specific stores:
glance image-import <image-id> \ --stores <store-1>,<store-2> \ --import-method copy-image
$ glance image-import <image-id> \ --stores <store-1>,<store-2> \ --import-method copy-image
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<image-id>
with the name of the image you want to copy. -
Replace
<store-1>
and<store-2>
with the names of the stores to which you want to copy the image data.
-
Replace
Confirm that the image data successfully replicated to the specified stores:
glance image-list --include-stores
$ glance image-list --include-stores
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For information about how to check the status of the image import operation, see Section 5.5, “Checking the progress of the image import operation”.
5.7. Deleting an image from a specific store Copy linkLink copied to clipboard!
Delete an existing image copy on a specific store by using the Red Hat OpenStack Platform (RHOSP) Image service (glance).
Use the Image service command-line client for image management.
Procedure
Delete an image from a specific store:
glance stores-delete --store <store-id> <image-id>
$ glance stores-delete --store <store-id> <image-id>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<store-id>
with the name of the store on which the image copy should be deleted. -
Replace
<image-id>
with the ID of the image you want to delete.
The glance image-delete
command permanently deletes the image across all the sites. All image copies are deleted, as well as the image instance and metadata.
5.8. Listing image locations and location properties Copy linkLink copied to clipboard!
Although an image can be present on multiple sites, there is only a single Universal Unique Identifier (UUID) for a given image. The image metadata contains the locations of each copy. For example, an image present on two edge sites is exposed as a single UUID with three locations: the central site and the two edge sites.
Use the Image service (glance) command-line client instead of the OpenStack command-line client for image management. However, use the openstack image show
command to list image location properties. The glance image-show
command output does not include locations.
Procedure
Show the sites on which a copy of the image exists:
glance image-show ID | grep "stores"
$ glance image-show ID | grep "stores" | stores | default_backend,dcn1,dcn2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow In the example, the image is present on the central site, the
default_backend
, and on the two edge sitesdcn1
anddcn2
.Alternatively, you can run the
glance image-list
command with the--include-stores
option to see the sites where the images exist:glance image-list --include-stores
$ glance image-list --include-stores | ID | Name | Stores | 2bd882e7-1da0-4078-97fe-f1bb81f61b00 | cirros | default_backend,dcn1,dcn2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow List the image location properties to show the details of each location:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The image properties show the different Ceph RBD URIs for the location of each image.
In the example, the central image location URI is:
rbd://79b70c32-df46-4741-93c0-8118ae2ae284/images/2bd882e7-1da0-4078-97fe-f1bb81f61b00/snap', 'metadata': {'store': 'default_backend'}}
rbd://79b70c32-df46-4741-93c0-8118ae2ae284/images/2bd882e7-1da0-4078-97fe-f1bb81f61b00/snap', 'metadata': {'store': 'default_backend'}}
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The URI is composed of the following data:
-
79b70c32-df46-4741-93c0-8118ae2ae284
corresponds to the central Ceph FSID. Each Ceph cluster has a unique FSID. -
The default value for all sites is
images
, which corresponds to the Ceph pool on which the images are stored. -
2bd882e7-1da0-4078-97fe-f1bb81f61b00
corresponds to the image UUID. The UUID is the same for a given image regardless of its location. -
The metadata shows the glance store to which this location maps. In this example, it maps to the
default_backend
, which is the central hub site.
-
Appendix A. Image service command options Copy linkLink copied to clipboard!
You can use the following optional arguments with the glance image-create
, glance image-create-via-import
, and glance image-update
commands.
Specific to | Option | Description |
---|---|---|
All |
| Operating system architecture as specified in https://docs.openstack.org/glance/latest/user/common-image-properties.html#architecture |
All |
| If true, image will not be deletable. |
All |
| Descriptive name for the image |
All |
| Metadata that can be used to record which instance this image is associated with. (Informational only, does not create an instance snapshot.) |
All |
| Amount of disk space (in GB) required to boot image. |
All |
| Scope of image accessibility. Valid values: public, private, community, shared |
All |
| ID of image stored in the Image service (glance) that should be used as the kernel when booting an AMI-style image. |
All |
| Operating system version as specified by the distributor |
All |
| Format of the disk. Valid values: None, ami, ari, aki, vhd, vhdx, vmdk, raw, qcow2, vdi, iso, ploop |
All |
| Common name of operating system distribution as specified in https://docs.openstack.org/glance/latest/user/common-image-properties.html#os-distro |
All |
| Owner of the image |
All |
| ID of image stored in the Image service that should be used as the ramdisk when booting an AMI-style image. |
All |
| Amount of RAM (in MB) required to boot image. |
All |
| Format of the container. Valid values: None, ami, ari, aki, bare, ovf, ova, docker |
All |
| Arbitrary property to associate with image. May be used multiple times. |
|
| List of strings related to the image |
|
| An identifier for the image |
|
| Key name of arbitrary property to remove from the image. |
Appendix B. Image configuration parameters Copy linkLink copied to clipboard!
You can use the following keys with the --property
option for the glance image-create
, glance image-create-via-import
, and glance image-update
commands.
Specific to | Key | Description | Supported values |
---|---|---|---|
All |
|
The CPU architecture that must be supported by the hypervisor. For example, |
|
All |
| The hypervisor type. |
|
All |
| For snapshot images, this is the UUID of the server used to create this image. | Valid server UUID |
All |
| The ID of an image stored in the Image Service that should be used as the kernel when booting an AMI-style image. | Valid image ID |
All |
| The common name of the operating system distribution in lowercase. |
|
All |
| The operating system version as specified by the distributor. | Version number (for example, "11.10") |
All |
| The ID of image stored in the Image Service that should be used as the ramdisk when booting an AMI-style image. | Valid image ID |
All |
| The virtual machine mode. This represents the host/guest ABI (application binary interface) used for the virtual machine. |
|
libvirt API driver |
| Specifies the type of disk controller to attach CD-ROM devices to. |
|
libvirt API driver |
| Specifies the type of disk controller to attach disk devices to. |
|
libvirt API driver |
| Specifies the type of firmware to use to boot the instance. | Set to one of the following valid values:
|
libvirt API driver |
| Enables booting an ARM system using the specified machine type. If an ARM image is used and its machine type is not explicitly specified, then Compute uses the virt machine type as the default for ARMv7 and AArch64. |
Valid types can be viewed by using the |
libvirt API driver |
| Number of NUMA nodes to expose to the instance (does not override flavor definition). | Integer. |
libvirt API driver |
| Mapping of vCPUs N-M to NUMA node 0 (does not override flavor definition). | Comma-separated list of integers. |
libvirt API driver |
| Mapping of vCPUs N-M to NUMA node 1 (does not override flavor definition). | Comma-separated list of integers. |
libvirt API driver |
| Mapping N MB of RAM to NUMA node 0 (does not override flavor definition). | Integer |
libvirt API driver |
| Mapping N MB of RAM to NUMA node 1 (does not override flavor definition). | Integer |
libvirt API driver |
| Specifies the NUMA affinity policy for PCI passthrough devices and SR-IOV interfaces. | Set to one of the following valid values:
|
libvirt API driver |
|
Guest agent support. If set to |
|
libvirt API driver |
| Adds a random number generator (RNG) device to instances launched with this image.
The instance flavor enables the RNG device by default. To disable the RNG device, the cloud administrator must set
The default entropy source is |
|
libvirt API driver |
| Enables the use of VirtIO SCSI (virtio-scsi) to provide block device access for compute instances; by default, instances use VirtIO Block (virtio-blk). VirtIO SCSI is a para-virtualized SCSI controller device that provides improved scalability and performance, and supports advanced SCSI hardware. |
|
libvirt API driver |
|
Set to the model of TPM device to use. Ignored if |
|
libvirt API driver |
|
Set to the version of TPM to use. TPM version |
|
libvirt API driver |
| The video device driver for the display device to use in virtual machine instances. | Set to one of the following values to specify the supported driver to use:
|
libvirt API driver |
|
Maximum RAM for the video image. Used only if a | Integer in MB (for example, 64) |
libvirt API driver |
|
Enables a virtual hardware watchdog device that carries out the specified action if the server hangs. The watchdog uses the i6300esb device (emulating a PCI Intel 6300ESB). If |
|
libvirt API driver |
|
The kernel command line to be used by the | |
libvirt API driver |
| Use to create an instance that is protected with UEFI Secure Boot. | Set to one of the following valid values:
|
libvirt API driver and VMware API driver |
| Specifies the model of virtual network interface device to use. | The valid options depend on the configured hypervisor.
|
VMware API driver |
| The virtual SCSI or IDE controller used by the hypervisor. |
|
VMware API driver |
|
A VMware GuestID which describes the operating system installed in the image. This value is passed to the hypervisor when creating a virtual machine. If not specified, the key defaults to | For more information, see Images with VMware vSphere. |
VMware API driver |
| Currently unused. |
|
XenAPI driver |
|
If true, the root partition on the disk is automatically resized before the instance boots. This value is only taken into account by the Compute service when using a Xen-based hypervisor with the XenAPI driver. The Compute service will only attempt to resize if there is a single partition on the image, and only if the partition is in |
|
libvirt API driver and XenAPI driver |
|
The operating system installed on the image. The XenAPI driver contains logic that takes different actions depending on the value of the |
|