Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1330759 - engine-log-collector --insecure option does not work
engine-log-collector --insecure option does not work
Status: CLOSED ERRATA
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-log-collector (Show other bugs)
3.6.5
Unspecified Unspecified
unspecified Severity medium
: ovirt-4.0.4
: ---
Assigned To: Rafael Martins
Gonza
: TestOnly, ZStream
Depends On:
Blocks: 1371405
  Show dependency treegraph
 
Reported: 2016-04-26 17:40 EDT by Marina
Modified: 2018-05-02 03:49 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-09-28 18:18:05 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: Integration
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2016:1952 normal SHIPPED_LIVE ovirt-log-collector bug fix update for RHV 4.0.4 2016-09-28 21:25:10 EDT

  None (edit)
Description Marina 2016-04-26 17:40:10 EDT
Description of problem:
engine-log-collector --insecure option does not work

Reading the help for log collector, I understand that insecure option would not verify the ssl certificate:
~~~
  --cert-file=/etc/pki/ovirt-engine/ca.pem
                        The CA certificate used to validate the engine.
                        (default=/etc/pki/ovirt-engine/ca.pem)
  --insecure            Do not make an attempt to verify the engine.
~~~

However, when I run it with that option, it fails:
~~~
# engine-log-collector --insecure list
...
Please provide the REST API password for the admin@internal oVirt Engine user (CTRL+D to skip): 
ERROR: Problem connecting to the REST API.Is the service available and does the CA certificate exist?
ERROR: _get_hypervisors_from_api: [ERROR]::RHEV API connection failure, (60, 'Peer certificate cannot be authenticated with known CA certificates')
INFO: No hypervisors were found, therefore no hypervisor data will be listed.
~~~


Version-Release number of selected component (if applicable):
3.6.5 and below

How reproducible:
100%

Steps to Reproduce:
1. Run:
# engine-log-collector --insecure list
2. Provide correct API password.


Actual results:
Fails and cannot connect to restAPI.

Expected results:
Should list the hosts info collected from restAPI.
Comment 1 Yaniv Lavi 2016-05-09 07:01:38 EDT
oVirt 4.0 Alpha has been released, moving to oVirt 4.0 Beta target.
Comment 5 Rafael Martins 2016-08-01 06:04:53 EDT
I've just tested this on 4.0.1 and it works, can QE please check?

Thanks
Comment 6 Gonza 2016-08-29 10:47:27 EDT
Verified with:
ovirt-log-collector-4.0.0-1.el7ev.noarch

# ovirt-log-collector --insecure list
This command will collect system configuration and diagnostic
information from this system.
The generated archive may contain data considered sensitive and its
content should be reviewed by the originating organization before
being passed to any third party.
No changes will be made to system configuration.
Please provide the REST API password for the admin@internal oVirt Engine user (CTRL+D to skip): 
WARNING: This ovirt-log-collector call will collect logs from all available hosts. This may take long time, depending on the size of your deployment
Host list (datacenter=None, cluster=None, host=None):
Data Center          | Cluster              | Hostname/IP Address
golden_env_mixed     | golden_env_mixed_1   | x1.redhat.com
golden_env_mixed     | golden_env_mixed_1   | x2.redhat.com
golden_env_mixed     | golden_env_mixed_1   | x3.redhat.com
Comment 8 errata-xmlrpc 2016-09-28 18:18:05 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-1952.html

Note You need to log in before you can comment on or make changes to this bug.