Bug 1985999
Summary: | Octavia client certs are not updated uniformly across all nodes on update/upgrade. | |||
---|---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Brian J. Atkisson <batkisso> | |
Component: | tripleo-ansible | Assignee: | Brent Eagles <beagles> | |
Status: | CLOSED ERRATA | QA Contact: | Bruna Bonguardo <bbonguar> | |
Severity: | high | Docs Contact: | ||
Priority: | urgent | |||
Version: | 16.1 (Train) | CC: | ahasson, averi, beagles, cmuresan, gthiemon, ihrachys, lpeer, majopela, mchappel, michjohn, mturner, njohnston, oschwart, pveiga, scohen, ykaul | |
Target Milestone: | z8 | Keywords: | Triaged | |
Target Release: | 16.1 (Train on RHEL 8.2) | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | tripleo-ansible-0.5.1-1.20211124153402.902c3c8.el8ost | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 2017829 (view as bug list) | Environment: | ||
Last Closed: | 2022-03-24 11:00:12 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2017829 |
Description
Brian J. Atkisson
2021-07-26 13:20:01 UTC
Here is a little background information on how the mutual-authentication TLS works in Octavia and OSP. Communication between the control plane and the amphora (load balancing service VMs) is over a TLS connection using mutual authentication. This means that the control plane authenticates certificates issued to the amphora and the amphora authenticate certificates provided by the control plane. They are only used for service-to-service communication. In the case of the amphora certificates, they are issued at boot time and the Octavia housekeeping process rotates them as necessary based on the configuration settings. On the control plane side, in the case of RHOSP, the certificates are created and managed by tripleo/director. We are looking into why that "client" certificate has incorrect information on it. Brent, please find the needed info in https://access.redhat.com/support/cases/#/case/02996461 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat OpenStack Platform 16.1.8 bug fix and enhancement advisory), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:0986 |