Skip to content

Commit 43a0fd0

Browse files
committed
Updates from review
1 parent 4e141c7 commit 43a0fd0

File tree

2 files changed

+15
-11
lines changed

2 files changed

+15
-11
lines changed

doc/source/operations/octavia.rst

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,9 @@ Handling TLS certificates
7070

7171
Octavia uses mutual TLS to secure communication between the amphorae and
7272
Octavia services. It uses a private CA to sign both client and server
73-
certificates. We use the kolla-ansible built-in support for generating these
74-
certificates:
73+
certificates. These certificates need to be generated when first deploying
74+
Octavia, and will later need to be rotated (details below). We use the
75+
kolla-ansible built-in support for generating these certificates:
7576

7677
.. code-block:: console
7778
@@ -136,32 +137,32 @@ Rotating client.cert-and-key.pem
136137

137138
This has a lifetime of 1 year.
138139

139-
1) Follow the steps to restore octavia-certificates so you can reuse the client
140+
#. Follow the steps to restore octavia-certificates so you can reuse the client
140141
CA. See :ref:`restoring-octavia-certificates-directory`.
141142

142-
2) Make sure your config allows you to regenerate a certificate with the same
143+
#. Make sure your config allows you to regenerate a certificate with the same
143144
common name.
144145

145146
.. code-block:: console
146147
:caption: $KOLLA_CONFIG_PATH/octavia-certificates/client_ca/index.txt.attr
147148
148149
unique_subject = no
149150
150-
3) Remove the old files relating to the client certificate:
151+
#. Remove the old files relating to the client certificate:
151152

152153
.. code-block:: console
153154
154155
rm $KOLLA_CONFIG_PATH/octavia-certificates/client_ca/{client.cert-and-key.pem,client.csr.pem,client.cert.pem}
155156
156-
4) Regenerate the certificates
157+
#. Regenerate the certificates
157158

158159
.. code-block:: console
159160
160161
kayobe kolla ansible run octavia-certificates
161162
162-
5) Backup your octavia-certificates directory (see previous section).
163+
#. Backup your octavia-certificates directory (see previous section).
163164

164-
6) Copy your new certificate to the correct location:
165+
#. Copy your new certificate to the correct location:
165166

166167
.. code-block:: console
167168
@@ -170,15 +171,16 @@ This has a lifetime of 1 year.
170171
cp $KOLLA_CONFIG_PATH/octavia-certificates/client_ca/client.cert-and-key.pem .
171172
ansible-vault encrypt client.cert-and-key.pem --vault-password-file ~/vault
172173
173-
7) Reconfigure octavia
174+
#. Reconfigure Octavia
174175

175176
.. code-block:: console
176177
177178
kayobe overcloud service reconfigure -kt octavia
178179
179-
8) Run tempest with the `octavia` test list to check it is working.
180+
#. Run Tempest with the `octavia` test list to check it is working. See
181+
:ref:`running_tempest_with_kayobe_automation`.
180182

181-
9) Commit and push any changes.
183+
#. Commit and push any changes.
182184

183185
Rotating the CAs
184186
~~~~~~~~~~~~~~~~

doc/source/operations/tempest.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
.. _running_tempest_with_kayobe_automation:
2+
13
======================================
24
Running Tempest with Kayobe Automation
35
======================================

0 commit comments

Comments
 (0)