Bug 2184892

Summary: Don't pass encryption options to ceph cluster in odf external mode to provider/consumer cluster
Product: [Red Hat Storage] Red Hat OpenShift Data Foundation Reporter: Malay Kumar parida <mparida>
Component: ocs-operatorAssignee: Malay Kumar parida <mparida>
Status: CLOSED ERRATA QA Contact: Vijay Avuthu <vavuthu>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.13CC: ocs-bugs, odf-bz-bot, pakamble
Target Milestone: ---   
Target Release: ODF 4.13.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-06-21 15:25:02 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Malay Kumar parida 2023-04-06 06:45:41 UTC
Description of problem (please be detailed as possible and provide log
snippests):
As per the discussion here https://issues.redhat.com/browse/RHSTOR-2516
Msgr2 port can't be enabled in ODF external mode in either provider or consumer clusters.
If msgr2 port can't be enabled we can't enable in-transit encryption also there.
So even if the encryption flag is added to the storagecluster we should not pass it to the cephcluster.

Version of all relevant components (if applicable):
4.13.0

Does this issue impact your ability to continue to work with the product
(please explain in detail what is the user impact)?


Is there any workaround available to the best of your knowledge?


Rate from 1 - 5 the complexity of the scenario you performed that caused this
bug (1 - very simple, 5 - very complex)?


Can this issue reproducible?


Can this issue reproduce from the UI?
Yes

If this is a regression, please provide more details to justify this:


Steps to Reproduce:
1.
2.
3.


Actual results:


Expected results:


Additional info:

Comment 7 Vijay Avuthu 2023-06-06 16:16:16 UTC
Update:
========

Bug description was different from https://issues.redhat.com/browse/RHSTOR-2516 , got confirmation from dev ( Malay Kumar parida ) that in-transit encryption is supported in external mode

Version used:
openshift installer (4.13.0-0.nightly-2023-06-05-164816)
ocs-registry:4.13.0-214

jenkins job: https://url.corp.redhat.com/68702a1
https://url.corp.redhat.com/a8e0ed9
must gather: https://url.corp.redhat.com/c25981c

acceptance suite job: https://url.corp.redhat.com/dffb1c0

BUILD ID: 4.13.0-214 RUN ID: 1686048740

Summary 

28 tests ran in 3205.84 seconds.
28 passed, 6 skipped, 0 failed, 0 errors, 0 expected failures, 0 unexpected passes

[root@ceph-hk-rec-fkqny3-node9 ~]# ceph mon dump
epoch 3
fsid 68c6c962-045b-11ee-8cc2-fa163ead6046
last_changed 2023-06-06T11:19:07.436996+0000
created 2023-06-06T11:15:32.099392+0000
min_mon_release 17 (quincy)
election_strategy: 1
0: [v2:10.0.210.32:3300/0,v1:10.0.210.32:6789/0] mon.ceph-hk-rec-fkqny3-node1-installer
1: [v2:10.0.208.63:3300/0,v1:10.0.208.63:6789/0] mon.ceph-hk-rec-fkqny3-node3
2: [v2:10.0.209.68:3300/0,v1:10.0.209.68:6789/0] mon.ceph-hk-rec-fkqny3-node2
dumped monmap epoch 3
[root@ceph-hk-rec-fkqny3-node9 ~]#

oc get cm rook-ceph-csi-config -oyaml
apiVersion: v1
data:
  csi-cluster-config-json: '[{"clusterID":"openshift-storage","monitors":["10.0.208.160:3300","10.0.208.66:3300","10.0.211.177:3300","10.0.210.25:3300","10.0.209.184:3300"],"namespace":"openshift-storage"}]'
kind: ConfigMap
metadata:
  creationTimestamp: "2023-06-05T16:37:22Z"
  name: rook-ceph-csi-config
  namespace: openshift-storage
  ownerReferences:
  - apiVersion: apps/v1
    blockOwnerDeletion: false
    controller: true
    kind: Deployment
    name: rook-ceph-operator
    uid: 4165b412-257a-4824-a299-ccbedf63bfca
  resourceVersion: "49500"
  uid: c1003a5f-09ee-4092-8f10-08ac3b7b6e9a

Comment 9 errata-xmlrpc 2023-06-21 15:25:02 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat OpenShift Data Foundation 4.13.0 enhancement and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:3742