Bug 1153604

Summary: Implementing firewall rules for katello and foreman users prevents elastic search from using the port
Product: Red Hat Satellite Reporter: Athene Chan <achan>
Component: Docs Install GuideAssignee: Athene Chan <achan>
Status: CLOSED DUPLICATE QA Contact: David O'Brien <daobrien>
Severity: high Docs Contact:
Priority: unspecified    
Version: UnspecifiedCC: bkearney, mmccune, mmurray, tjay, xdmoon
Target Milestone: Unspecified   
Target Release: Unused   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-12-05 03:55:11 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1115190    

Description Athene Chan 2014-10-16 10:08:46 UTC
Document URL: 
https://access.redhat.com/documentation/en-US/Red_Hat_Satellite/6.0/html/Installation_Guide/chap-Red_Hat_Satellite_Installation.html#Installing_Red_Hat_Satellite

Section Number and Name: 
2.1. Installing Red Hat Satellite


Describe the issue: 
 Run the following commands to configure the firewall to limit elasticsearch to foreman and katello users and make these rules persistent during reboots:

# iptables -A OUTPUT -o lo -p tcp -m tcp --dport 9200 -m owner --uid-owner foreman -j ACCEPT \
&& iptables -A OUTPUT -o lo -p tcp -m tcp --dport 9200 -m owner --uid-owner katello -j ACCEPT \
&& iptables -A OUTPUT -o lo -p tcp -m tcp --dport 9200 -j DROP
# iptables-save > /etc/sysconfig/iptables

Example: the iptables
rules for port 9200 could not possibly work in the original version,
since they were applied before the katellote packages were installed and
therefore before "foreman" and "katello" user accounts existed. The
latest revision moved the step to apply those rules to after the package
install, but they still don't (can't?) work--they only allow packets to
pass if coming from processes owned by "foreman" or "katello" users, but
the process actually listening on port 9200 is owned by
"elasticsearch"--so all of its outbound packets will be dropped.Â
Support has an open case on that one, and has reproduced it.



Needs documentation changes based on developer changes.

Comment 2 RHEL Program Management 2014-10-16 10:13:04 UTC
Since this issue was entered in Red Hat Bugzilla, the release flag has been
set to ? to ensure that it is properly evaluated for this release.

Comment 10 Athene Chan 2014-12-05 03:55:11 UTC

*** This bug has been marked as a duplicate of bug 1161254 ***