Hi,
Just to clear things up:
I am still trying to figure out how the different components interact, and
exactly what the different parameters on the keystone command does. Once I get
that understanding, things will probably be much easier :)
[Reply]
Yes , that's the keypoint. You must
Exactly
從我的 iPhone 傳送
Brian Ipsen brian.ip...@ryesgade47c.dk 於 2013/1/21 下午4:55 寫道:
Hi,
Just to clear things up:
I am still trying to figure out how the different components interact, and
exactly what the different parameters on the keystone command does. Once I
get that
On Sat, Jan 19, 2013 at 9:57 AM, Kuo Hugo tonyt...@gmail.com wrote:
The swift-client is using --publicurl as I know .
FYI: You can change that behavior with the --os-endpoint-type switch
Chmouel.
___
Mailing list: https://launchpad.net/~openstack
:* 19. januar 2013 09:58
*To:* Brian Ipsen
*Cc:* openstack@lists.launchpad.net
*Subject:* Re: [Openstack] Network setup - Swift / keystone location and
configuraton?
** **
The answer is depends on your service plan .
** **
Generally , the IP for keystone is the network which
The answer is depends on your service plan .
Generally , the IP for keystone is the network which could be accessed from
client .
Also , the publicurl / adminurl / internal could be different .
Keystone is the auth agent for swift(and all other services) , while you
produce a request to ask for
Would you mind to have a network diagram of your environment ?
Hugo
2013/1/19 Brian Ipsen brian.ip...@ryesgade47c.dk
Hi
** **
I am trying to figure out how to build a swift setup with Keystone
identity management – and have the environment secured by a firewall.
** **
I
@lists.launchpad.net
Subject: Re: [Openstack] Network setup - Swift / keystone location and
configuraton?
The answer is depends on your service plan .
Generally , the IP for keystone is the network which could be accessed from
client .
Also , the publicurl / adminurl / internal could be different
Hi
I am trying to figure out how to build a swift setup with Keystone identity
management - and have the environment secured by a firewall.
I expect, that a number of proxy nodes are accessible through the firewall
(traffic will be NAT'ed). The proxy nodes are connected to a private storage
8 matches
Mail list logo