https://github.com/sovereigncloudstack/openstack-csp-helper
Helper chart for using openstack cluster-stacks
https://github.com/sovereigncloudstack/openstack-csp-helper
k8s
Last synced: 4 months ago
JSON representation
Helper chart for using openstack cluster-stacks
- Host: GitHub
- URL: https://github.com/sovereigncloudstack/openstack-csp-helper
- Owner: SovereignCloudStack
- License: apache-2.0
- Created: 2024-04-16T11:33:13.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2025-05-14T16:00:08.000Z (9 months ago)
- Last Synced: 2025-05-14T16:51:26.921Z (9 months ago)
- Topics: k8s
- Language: Smarty
- Size: 23.4 KB
- Stars: 0
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
This chart can be used to create a new namespace and two secrets for the clusterstacks approach. It reads clouds.yaml files in its raw form either with username and password or with an application credential. The chart is intended to be used once per Openstack-Project/Tenant. It is meant to prepare one corresponding namespace in the cluster-API management cluster (1:1 relation between openstackproject and cluster-namespace). The recommended way to invoke the chart is:
```
helm upgrade -i -credentials -n --create-namespace https://github.com/SovereignCloudStack/openstack-csp-helper/releases/latest/download/openstack-csp-helper.tgz -f clouds.yaml
```
If you want to use OVN provider OpenStack Octavia `--set octavia_ovn=true` to the helm command.
If OpenStack API is protected by the certificate issued by custom CA, add `--set cacert="$(cat /path/to/cacert)"` to the helm command.
If you choose to use clouds.yaml with application credentials (auth_type: `v3applicationcredential`), it is the preferred and more secure option.
If you opt to use clouds.yaml with password authentication (auth_type: `v3password`), that is also acceptable, but:
- Ensure that `project_id` is set, `project_name` works only for CAPO, not for OCCM!
- Using `project_id` guarantees that both CAPO and OCCM function correctly with `v3password` authentication.