Bug 2028061
Summary: | Configuring mTLS on default Ingress breaks ingress canary check & console health checks | ||||||
---|---|---|---|---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Nirupma Kashyap <nkashyap> | ||||
Component: | Networking | Assignee: | Ryan Fredette <rfredette> | ||||
Networking sub component: | router | QA Contact: | Hongan Li <hongli> | ||||
Status: | CLOSED DEFERRED | Docs Contact: | |||||
Severity: | high | ||||||
Priority: | medium | CC: | amcdermo, cpassare, ddharwar, jpatrick, mmasters, nstamate, ppostler, rfredette, sasakshi, zmaciel | ||||
Version: | 4.9 | ||||||
Target Milestone: | --- | ||||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2023-03-09 01:09:30 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
Nirupma Kashyap
2021-12-01 12:19:26 UTC
Using the openshift documentation and creating a configmap for the clientCA (i.e., "router-ca-certs-default") specified here: apiVersion: operator.openshift.io/v1 kind: IngressController metadata: name: default namespace: openshift-ingress-operator spec: clientTLS: clientCertificatePolicy: Required clientCA: name: router-ca-certs-default I see the same issue; both console and ingress go degraded: console 4.9.0-0.nightly-2021-12-01-185844 False False False 22m RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-ln-l2gfksk-72292.origin-ci-int-gce.dev.rhcloud.com): Get "https://console-openshift-console.apps.ci-ln-l2gfksk-72292.origin-ci-int-gce.dev.rhcloud.com": remote error: tls: certificate required csi-snapshot-controller 4.9.0-0.nightly-2021-12-01-185844 True False False 94m dns 4.9.0-0.nightly-2021-12-01-185844 True False False 93m etcd 4.9.0-0.nightly-2021-12-01-185844 True False False 93m image-registry 4.9.0-0.nightly-2021-12-01-185844 True False False 88m ingress 4.9.0-0.nightly-2021-12-01-185844 True False True 4m13s The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing) insights 4.9.0-0.nightly-2021-12-01-185844 True False False 87m If I revert the change so that clientTLS has: spec: clientTLS: clientCertificatePolicy: "" clientCA: name: "" then the console and ingress are no longer degraded. Marking this as blocker+ and we will investigate the must gather to see if this is a configuration issue. Setting blocker- as this is not a regression or upgrade issue but rather a caveat in certain configurations involving a new but already shipped feature. We can make this configuration work by doing the following: * Add an additional canary route that uses passthrough and use this route when the default ingresscontroller requires client certificates. * Add logic in the console operator’s health check to report healthy if the health probe gets a “tls: certificate required” error. Created attachment 1847178 [details] KCS Link : https://access.redhat.com/solutions/6551251 Comment on attachment 1847178 [details] KCS Link : https://access.redhat.com/solutions/6551251 >https://access.redhat.com/solutions/6551251 Moving off of 4.10.0. We'll work on this in the next release. Meanwhile, users should not configure the default ingresscontroller to require client certificates. Hello Team, Can we get some traction on this please, Cu is looking for an update on this? Can you please assist with what release this fix has been targeted for? Regards, Nirupma Hi Team, The customer mentioned that this bug has been open for over 1 year and wants to know is there any timeline for when it will be fixed. OpenShift has moved to Jira for its defect tracking! This bug can now be found in the OCPBUGS project in Jira. https://issues.redhat.com/browse/OCPBUGS-9037 |