Bug 1855678 - Configure Ceph Messenger for encryption OTW
Summary: Configure Ceph Messenger for encryption OTW
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-tripleo-heat-templates
Version: 16.1 (Train)
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: z2
: 16.2 (Train on RHEL 8.4)
Assignee: Giulio Fidente
QA Contact: Yogev Rabl
URL:
Whiteboard:
Depends On:
Blocks: 1978286
TreeView+ depends on / blocked
 
Reported: 2020-07-10 09:08 UTC by Giulio Fidente
Modified: 2022-03-23 22:29 UTC (History)
10 users (show)

Fixed In Version: openstack-tripleo-heat-templates-11.6.1-2.20210702224947.2a63ac5.el8ost
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-03-23 22:28:29 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
OpenStack gerrit 749362 0 None MERGED Add parameter and CI config to enable Ceph OTW encryption 2021-01-11 17:27:31 UTC
Red Hat Issue Tracker OSP-3271 0 None None None 2022-01-03 15:58:03 UTC
Red Hat Issue Tracker RHOSPDOC-30 0 Medium Ready For Release Ceph. Document how to deploy with Ceph on-wire encryption (msgr2 protocol) with director 2020-12-18 14:41:59 UTC
Red Hat Issue Tracker RHOSPDOC-771 0 None None None 2021-09-30 17:43:58 UTC
Red Hat Product Errata RHSA-2022:0995 0 None None None 2022-03-23 22:29:04 UTC

Description Giulio Fidente 2020-07-10 09:08:44 UTC
We should provide users with an option to enable:

"""
ms_cluster_mode=secure
ms_service_mode=secure
ms_client_mode=secure
"""

in ceph.conf [mons] (or [global]) section so that Ceph is configured to do encryption for its messenger protocol

Comment 11 spower 2020-09-08 13:22:33 UTC
Approved for 16.1.2 on condition is that it goes tech preview if testing doesn't finish

Comment 21 Yogev Rabl 2022-01-26 19:55:18 UTC
This bug has already been resolved and verified

Comment 30 errata-xmlrpc 2022-03-23 22:28:29 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat OpenStack Platform 16.2 (openstack-tripleo-heat-templates) security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0995


Note You need to log in before you can comment on or make changes to this bug.