Chapter 4. Dashboard
This chapter describes how to configure the OpenStack dashboard with Apache web server.
4.1. Configure the dashboard Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
You can configure the dashboard for a simple HTTP deployment.
You can configure the dashboard for a secured HTTPS deployment. While the standard installation uses a non-encrypted HTTP channel, you can enable SSL support for the dashboard.
Also, you can configure the size of the VNC window in the dashboard.
4.1.1. Configure the dashboard for HTTP Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
You can configure the dashboard for a simple HTTP deployment. The standard installation uses a non-encrypted HTTP channel.
- Specify the host for your OpenStack Identity Service endpoint in the
/etc/openstack-dashboard/local_settings
file with theOPENSTACK_HOST
setting.The following example shows this setting:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The service catalog configuration in the Identity Service determines whether a service appears in the dashboard.. - Restart Apache http server.
systemctl restart httpd
# systemctl restart httpd
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Next, restart memcached:systemctl restart memcached
# systemctl restart memcached
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.1.2. Configure the dashboard for HTTPS Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
You can configure the dashboard for a secured HTTPS deployment. While the standard installation uses a non-encrypted HTTP channel, you can enable SSL support for the dashboard.
This example uses the
http://openstack.example.com
domain. Use a domain that fits your current setup.
- In the
/etc/openstack-dashboard/local_settings
file, update the following options:USE_SSL = True CSRF_COOKIE_SECURE = True SESSION_COOKIE_SECURE = True SESSION_COOKIE_HTTPONLY = True
USE_SSL = True CSRF_COOKIE_SECURE = True SESSION_COOKIE_SECURE = True SESSION_COOKIE_HTTPONLY = True
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To enable HTTPS, theUSE_SSL = True
option is required.The other options require that HTTPS is enabled; these options defend against cross-site scripting. - Edit the
/etc/httpd/conf.d/openstack-dashboard.conf
file as shown in Example 4.2, “After”:Example 4.1. Before
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example 4.2. After
Copy to Clipboard Copied! Toggle word wrap Toggle overflow In this configuration, the Apache HTTP server listens on port 443 and redirects all non-secure requests to the HTTPS protocol. The secured section defines the private key, public key, and certificate to use. - Restart the Apache HTTP server.
systemctl restart httpd
# systemctl restart httpd
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Restart
memcached
:systemctl restart memcached
# systemctl restart memcached
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you try to access the dashboard through HTTP, the browser redirects you to the HTTPS page.NoteConfiguring the dashboard for HTTPS also requires enablingSSL
for thenoVNC
proxy service. On the controller node, add the following additional options to the[DEFAULT]
section of the/etc/nova/nova.conf
file:[DEFAULT] ... ssl_only = true cert = /etc/apache2/SSL/openstack.example.com.crt key = /etc/apache2/SSL/openstack.example.com.key
[DEFAULT] ... ssl_only = true cert = /etc/apache2/SSL/openstack.example.com.crt key = /etc/apache2/SSL/openstack.example.com.key
Copy to Clipboard Copied! Toggle word wrap Toggle overflow On the compute nodes, ensure thenonvncproxy_base_url
option points to a URL with an HTTPS scheme:[DEFAULT] ... novncproxy_base_url = https://controller:6080/vnc_auto.html
[DEFAULT] ... novncproxy_base_url = https://controller:6080/vnc_auto.html
Copy to Clipboard Copied! Toggle word wrap Toggle overflow