Description of problem: haproxy.pp assumes that Ceph rgw instances are always using plaintext and do not support SSL connectivity and hence explicitly ignore internal_tls_member_options even if EnableInternalTLS is active. In setups with SSL-protected rgw instances, this leads to a broken haproxy.cfg configuration file in which the Ceph rgw instances refuse to communicate to HAproxy, reporting an SSL handshake failure. To the outside world, this leads to 503 errors when trying to communicate to the Ceph rgw instance, effectively making it impossible to use rgw for instance as storage for OpenShift deployments in TLS-everywhere setups. Version-Release number of selected component (if applicable): Red Hat OpenStack 16 Additional info: Upstream Bug: https://bugs.launchpad.net/tripleo/+bug/1883296
verified on puppet-tripleo-11.5.0-0.20200616033427.8ff1c6a.el8ost.noarc
*** Bug 1856923 has been marked as a duplicate of this bug. ***
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:3148
*** Bug 1866036 has been marked as a duplicate of this bug. ***