Re: [Openstack] openstack vs neutron CLI (mikata)

2016-08-18 Thread Sean.Boran
Steve, I upgraded and can no longer use networking functions ☹. Where should I report the issue, is this the right place? Upgraded my client with: pip install --upgrade python-openstackclient openstack --version openstack 2.6.0 openstack --debug --insecure network list …. REQ: curl -g -i --inse

Re: [Openstack] openstack vs neutron CLI (mikata)

2016-08-17 Thread Sean.Boran
Thanks Darek, being new to openstack your links help me understand the situation much better. The openstack client being used what that installed on a controller by Fuel v9/mikata, i.e. 2.2.0. I’ll install 2.6.0 on my workstation and try from there. [1] also links to python-openstacksdk, which

[Openstack] openstack vs neutron CLI (mikata)

2016-08-17 Thread Sean.Boran
A bit of help with scripting CLIs for managing network objects would be appreciated… Networks can be created: openstack network create --project my-project1 my_net1 -- but how does one create a subnet? Neutron can do it: neutron subnet-create --tenant-id my-project1 --name my_subnet1 my_net1

Re: [Openstack] (keystone/horizon) ActiveDirectory/ldap for users/groups

2016-08-05 Thread Sean.Boran
Hi, By setting the following one can limit the number of users shown (see also https://bugs.launchpad.net/keystone/+bug/1501698 which shows the commit earlier this year to include that feature) [identity] list_limit = 50 The efficiency of the query for getting users can be improved by the foll

Re: [Openstack] (keystone/horizon) ActiveDirectory/ldap for users/groups

2016-08-02 Thread Sean.Boran
1. For example, to list users: ldapsearch -x -D cn='service-account,dc=example,dc=net' '(&(objectClass=person)(cn=*))' -W 2. admin_token is not commented it has a hash value, so doing curl -v -s -H "X-Auth-Token: " http://192.168.0.2:5000/v3/users < HTTP/1.1 401 Unauthorized in the keystone

Re: [Openstack] (keystone/horizon) ActiveDirectory/ldap for users/groups

2016-08-02 Thread Sean.Boran
Hi, So I logged in as admin/default, then switched to the ldap domain(horizon/identity/domains/), added a role. Next try to add a user to that role (/horizon/identity/users), but “Unable to retrieve user list”. In /var/log/user.log I see LDAP bind: who=cn=bind-user,dc=example,dc=net <14>Aug 2

[Openstack] (keystone/horizon) ActiveDirectory/ldap for users/groups

2016-08-02 Thread Sean.Boran
Hi, I’m having a bit of fun try to use AD for identifying and authorising Users on Openstack . The idea is to use AD for read-only access to users/group definitions, but all authorisation data to be stored in SQL. What works: Users can be authenticated (LDAP bind works, verification of the use