
Instead of using SSH to live migrate VM's use TLS as this is more secure and SSH migrations are deprecated. https://docs.openstack.org/nova/xena/admin/secure-live-migration-with-qemu-native-tls.html A pre-existing PKI (Public Key Infrastruture) setup is required. TLS live migrations require that all compute hosts can communcate with each other on port 16514 and port range 49152 to 49261. To enable TLS live migrations, both libvirt and QEMU require server and client certificates, the server certicicates is used to verify servers and the client cert is used by servers to authenticate clients. A single cert is created by the pki role, that can be used by both libvirt and QEMU for both client and server auth. The client, server and CA certifcates need to installed in a number of locations on each compute host: * For Libvirt https://libvirt.org/tlscerts.html * For QEMU https://github.com/libvirt/libvirt/blob/master/src/qemu/qemu.conf Depends-On: https://review.opendev.org/c/openstack/ansible-role-pki/+/815007 Depends-On: https://review.opendev.org/c/openstack/ansible-role-pki/+/815849 Depends-On: https://review.opendev.org/c/openstack/ansible-role-pki/+/816857 Change-Id: Iddbe8764bb6d3cd3eaee122b2d5ddc02fa3f7662
14 lines
483 B
YAML
14 lines
483 B
YAML
---
|
|
features:
|
|
- |
|
|
Nova now defaults to to using the "QEMU-native TLS" feature
|
|
for live migrations, rather than the deprecated SSH method.
|
|
A pre-existing PKI (Public Key Infrastructure) setup is
|
|
required.
|
|
|
|
QEMU-native TLS requires all compute hosts to accept TCP connections on
|
|
port 16514 and port range 49152 to 49261.
|
|
|
|
More information can be found here:
|
|
https://docs.openstack.org/nova/latest/admin/secure-live-migration-with-qemu-native-tls.html
|