Files
3engines_doc/docs/cloud/OpenStack-user-roles-on-3Engines-Cloud.html.md
2025-06-19 20:19:21 +05:30

235 lines
11 KiB
Markdown

OpenStack User Roles on 3Engines Cloud[🔗](#openstack-user-roles-on-brand-name "Permalink to this headline")
=============================================================================================================
A **user role** in OpenStack cloud is a set of permissions that govern how members of specific groups interact with system resources, their access scope, and capabilities.
This guide simplifies OpenStack roles for casual users of 3Engines Cloud VMs. It focuses on practical use cases and commonly required roles.
What We Are Going To Cover[🔗](#what-we-are-going-to-cover "Permalink to this headline")
---------------------------------------------------------------------------------------
> * Frequently used user roles
>
> > * Common user roles
> > * Roles for Kubernetes users
> > * Roles for Load Balancer users
>
> * Examples of using user roles
>
> > * Using user roles while creating application credential in Horizon
> > * Using user roles while creating application credential via the CLI
> > * Using user roles while creating a new project
> > * Using member role only while creating a new user
>
> * Dictionary of other roles
Prerequisites[🔗](#prerequisites "Permalink to this headline")
-------------------------------------------------------------
**1. Account**
You need a 3Engines Cloud hosting account with Horizon access: <https://horizon.3Engines.com>.
Also see:
[What is an OpenStack project on 3Engines Cloud](What-is-an-OpenStack-project-on-3Engines-Cloud.html.md)
[What is an OpenStack domain on 3Engines Cloud](What-is-an-OpenStack-domain-on-3Engines-Cloud.html.md)
[How to generate or use Application Credentials via CLI on 3Engines Cloud](How-to-generate-or-use-Application-Credentials-via-CLI-on-3Engines-Cloud.html.md)
**2. Familiarity with OpenStack Commands**
Ensure you know the following OpenStack commands:
**openstack**
: The primary CLI for interacting with OpenStack services.
[How to install OpenStackClient for Linux on 3Engines Cloud](../openstackcli/How-to-install-OpenStackClient-for-Linux-on-3Engines-Cloud.html.md)
**kubectl**
: CLI for Kubernetes clusters. Example article:
[How To Access Kubernetes Cluster Post Deployment Using Kubectl On 3Engines Cloud OpenStack Magnum](../kubernetes/How-To-Access-Kubernetes-Cluster-Post-Deployment-Using-Kubectl-On-3Engines-Cloud-OpenStack-Magnum.html.md)
Frequently used user roles[🔗](#frequently-used-user-roles "Permalink to this headline")
---------------------------------------------------------------------------------------
### Common user roles[🔗](#common-user-roles "Permalink to this headline")
**member**
: Grants standard access to project resources.
Note
Older OpenStack versions may use **\_member\_**. If both **member** and **\_member\_** exist, choose **member**.
* Horizon: **Project** -> **Overview**
* CLI: **openstack server list**, **openstack project list**
**observer**
: Read-only access for monitoring and auditing resources. Suitable for third-party tools like Prometheus or Grafana.
* Horizon: **Project** -> **Overview**
* CLI: **openstack server show**, **openstack project show**
**reader**
: Read-only access with slightly broader permissions than **observer**. Ideal for monitoring and analytics tools requiring detailed resource data.
* Horizon: **Project** -> **Overview**
* CLI: **openstack server list**, **openstack project list**
### Roles for Kubernetes users[🔗](#roles-for-kubernetes-users "Permalink to this headline")
**k8s\_admin**
: Administrative access to manage Kubernetes clusters and resources.
* Horizon: **Kubernetes** -> **Clusters**
* CLI: **kubectl create deployment**, **kubectl get pods**
**k8s\_developer**
: For developers deploying applications within Kubernetes.
* Horizon: **Kubernetes** -> **Workloads**
* CLI: **kubectl create**, **kubectl apply**
**k8s\_viewer**
: Read-only access to monitor Kubernetes resources.
* Horizon: **Kubernetes** -> **Overview**
* CLI: **kubectl get pods**, **kubectl describe pod**
### Roles for Load Balancer users[🔗](#roles-for-load-balancer-users "Permalink to this headline")
**load-balancer\_member**
: Grants access to deploy applications behind load balancers.
* Horizon: **Network** -> **Load Balancers**
* CLI: **openstack loadbalancer member create**, **openstack loadbalancer member list**
**load-balancer\_observer**
: Read-only access to monitor load balancer configurations.
* Horizon: **Network** -> **Load Balancers**
* CLI: **openstack loadbalancer show**, **openstack loadbalancer stats show**
How to View Roles in Horizon[🔗](#how-to-view-roles-in-horizon "Permalink to this headline")
-------------------------------------------------------------------------------------------
You can view roles in Horizon by navigating to **Identity** -> **Roles**.
| | |
| --- | --- |
| ../_images/user-roles-list-2.png | ../_images/user-roles-list-1.png |
Assigning multiple roles is best done during project creation rather than user creation.
![openstack-user-roles-create-4.png](../_images/openstack-user-roles-create-4.png)
Examples of using user roles[🔗](#examples-of-using-user-roles "Permalink to this headline")
-------------------------------------------------------------------------------------------
The following articles, as one of many steps, describe how to assign a role to the new project, credential, user or group.
### Using user roles while creating application credential in Horizon[🔗](#using-user-roles-while-creating-application-credential-in-horizon "Permalink to this headline")
Normally, you access the cloud via user credentials, which may be one- or two-factor credentials. OpenStack provides a more direct procedure of gaining access to cloud with application credential and you can create a credential with several user roles.
That S3 article selects user roles when creating an application credential, through Horizon:
/s3/Create-S3-bucket-and-use-it-in-Sentinel-Hub-requests
![user-roles-list-create-2.png](../_images/user-roles-list-create-2.png)
### Using user roles while creating application credential via the CLI[🔗](#using-user-roles-while-creating-application-credential-via-the-cli "Permalink to this headline")
This is the main article about application credentials; it is mostly using CLI:
[How to generate or use Application Credentials via CLI on 3Engines Cloud](How-to-generate-or-use-Application-Credentials-via-CLI-on-3Engines-Cloud.html.md)
Here is how to specify user roles through CLI parameters:
![user-roles-list-create-1.png](../_images/user-roles-list-create-1.png)
### Using user roles while creating a new project[🔗](#using-user-roles-while-creating-a-new-project "Permalink to this headline")
In article [How to Create and Configure New Openstack Project Through Horizon on 3Engines Cloud Cloud](../openstackcli/How-To-Create-and-Configure-New-Project-on-3Engines-Cloud-Cloud.html.md) we use command **Project Members** to define which users to include into the project:
![user-roles-list-create-4.png](../_images/user-roles-list-create-4.png)
You would then continue by defining the roles for each user in the project:
![user-roles-list-create-5.png](../_images/user-roles-list-create-5.png)
> See this Rancher article, [How to install Rancher RKE2 Kubernetes on 3Engines Cloud](../kubernetes/How-to-install-Rancher-RKE2-Kubernetes-on-3Engines-Cloud-cloud.html.md). Then, in Preparation step 1, a new project is created, with the following user roles:
* **load-balancer\_member**,
* **member** and
* **creator**.
![user-roles-list-create-6.png](../_images/user-roles-list-create-6.png)
### Using member role only while creating a new user[🔗](#using-member-role-only-while-creating-a-new-user "Permalink to this headline")
In SLURM article, we first create a new OpenStack Keystone user, with the role of **member**.
/cuttingedge/Sample-SLURM-Cluster-on-3Engines-Cloud-Cloud-with-ElastiCluster
![user-roles-list-create-3.png](../_images/user-roles-list-create-3.png)
That user can login to Horizon and use project resources together with other users which are defined in a similar way.
Dictionary of other roles[🔗](#dictionary-of-other-roles "Permalink to this headline")
-------------------------------------------------------------------------------------
**admin**
: Grants unrestricted access to all resources and configurations in the system. Typically reserved for superusers or administrators.
**project\_admin**
: Provides administrative privileges within a specific project, allowing users to manage resources, members, and settings at the project level.
**network\_admin**
: Focused on managing networking resources, including creating networks, subnets, and routers, as well as assigning IPs.
**storage\_admin**
: Offers full control over storage resources, such as creating, modifying, and deleting volumes and snapshots.
**database\_admin**
: Designed for managing database resources, including provisioning, scaling, and backup configurations.
**audit\_viewer**
: A read-only role dedicated to viewing logs, system events, and audit trails for compliance and monitoring purposes.
**compute\_operator**
: Allows management of compute resources, such as starting, stopping, and resizing virtual machines, but without administrative privileges.
**volume\_user**
: Enables users to attach and detach volumes to/from instances and perform basic volume management tasks.
**image\_creator**
: Provides permissions to upload, manage, and delete virtual machine images in the image repository.
**security\_group\_manager**
: Focused on managing security groups and rules, including creating and updating firewall configurations.
**dns\_admin**
: Grants administrative privileges over DNS zones, records, and configurations.
**keypair\_user**
: A role for managing SSH key pairs used for authenticating access to virtual machines.
**heat\_stack\_owner**
: Enables users to create and manage orchestration stacks using Heat templates, including scaling and updating stacks.
**backup\_admin**
: Offers full control over backup operations, such as scheduling backups, restoring data, and managing backup repositories.
**report\_viewer**
: A read-only role that provides access to reports and analytics dashboards without the ability to modify data.
**api\_user**
: Designed for programmatic access to the system via APIs, allowing automation and integration tasks.
**support\_role**
: A limited-access role for customer support agents, enabling them to troubleshoot issues without full system access.
**custom\_role (generic)**
: Represents a user-defined role tailored for specific permissions or organizational policies. Refer to system administrators for details on its scope.