踩的坑大部分都是selinux的權(quán)限問題,如果不想關(guān)局骤,以下配置可以參考:
SELinux配置
semanage port -m -t http_port_t -p tcp 5000
setsebool -P httpd_can_network_connect_db 1
setsebool -P httpd_can_network_connect 1
setsebool -P glance_api_can_network 1
# 對應(yīng)如下selinux報錯日志
# type=AVC msg=audit(1666868587.049:588): avc: denied { name_connect } for pid=7612 comm="glance-api" dest=11211 scontext=system_u:system_r:glance_api_t:s0 tcontext=system_u:object_r:memcache_port_t:s0 tclass=tcp_socket permissive=0
setsebool -P neutron_can_network 1
# neutron error: [Errno 13] Permission denied
# type=AVC msg=audit(1666884571.298:455): avc: denied { search } for pid=3487 comm="neutron-linuxbr" name="httpd" dev="dm-0" ino=34023364 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir permissive=0
setsebool -P haproxy_connect_any 1
setsebool -P httpd_can_network_memcache 1
semanage port -a -t http_port_t -p tcp 8778
以上配置不一定全攀圈,最后還有個問題沒解決,只能徹底關(guān)掉了
type=AVC msg=audit(1666924895.437:714): avc: denied { create } for pid=4083 comm="/usr/bin/python" name="privsep.sock" scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:neutron_tmp_t:s0 tclass=sock_file permissive=0
防火墻配置
控制節(jié)點防火墻放通端口:
5000:(控制節(jié)點)
5672:rabbit(控制節(jié)點)
8778:placement(控制節(jié)點)
9292:glance(控制節(jié)點)
9696:neutron(控制節(jié)點)
6080:vnc遠程控制臺(控制節(jié)點)
5900-5901:vnc(計算節(jié)點)