Bug 1405891 - [RFE] Reusing vdsm certs for Gluster infra
Summary: [RFE] Reusing vdsm certs for Gluster infra
Keywords:
Status: CLOSED DEFERRED
Alias: None
Product: ovirt-engine
Classification: oVirt
Component: BLL.Infra
Version: 4.1.0
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
: ---
Assignee: bugs@ovirt.org
QA Contact: SATHEESARAN
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-12-19 05:04 UTC by SATHEESARAN
Modified: 2022-02-23 14:32 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-04-23 07:16:02 UTC
oVirt Team: Gluster
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1217555 0 medium CLOSED [RFE][HC] Configure TLS (1.2 or above) for gluster volume access from oVirt UI 2021-02-22 00:41:40 UTC
Red Hat Issue Tracker RHV-44807 0 None None None 2022-02-23 14:32:32 UTC

Internal Links: 1217555

Description SATHEESARAN 2016-12-19 05:04:13 UTC
Description of problem:
-----------------------
Gluster supports SSL/TLS encryption on management path as well as data path, when enabled on the volume and management daemon.

keys, certs and ca files required for Gluster SSL/TLS to work are 
/etc/glusterfs.key, /etc/glusterfs.pem, /etc/glusterfs.ca respectively.

In the case of Grafton project ( hyperconverged RHV & RHGS ), Gluster could make use of vdsm certs which are generated already. This RFE is to find a detailed process for Gluster to reuse vdsm certs for SSL/TLS encryption.

Version-Release number of selected component (if applicable):
-------------------------------------------------------------
RHV 4.1

How reproducible:
-----------------
Not Applicable for RFE

Steps to Reproduce:
-------------------
Not Applicable for RFE

Actual results:
---------------
Gluster need to generate separate certs for SSL/TLS encryption

Expected results:
-----------------
There should be a flexible way for Gluster to reuse vdsm certs.

Additional info:

Comment 1 SATHEESARAN 2016-12-19 05:10:51 UTC
This issue may sound like there is a solution straight-forward to use vdsm certs. The problem is the correct certs are generated and pushed from engine to the node,
only after the node is added to the engine.

In the case of hyperconvergence, we make use of self hosted-engine which again resides on the gluster volume. In this case, gluster cluster and gluster volumes are created well before hosted-engine deployment. The question here is how to make use of vdsm certs, which would get created post adding the host to the engine

So, we should find a way or process, to make use of vdsm certs for Gluster cluster creation and gluster volume creation. Hence this RFE.

Caveat to note here is, gluster cluster and gluster volume needs to be reinitialized ( restarted ) after enabling SSL/TLS encryption with management and data path.

Comment 6 Sahina Bose 2019-04-23 07:16:02 UTC
Not a priority based on the customer use cases encountered so far. Closing this for now.


Note You need to log in before you can comment on or make changes to this bug.