Bug 1918392 - Unable to access kibana URLafter enabling HTTP2 on Haproxy router
Summary: Unable to access kibana URLafter enabling HTTP2 on Haproxy router
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Networking
Version: 3.11.0
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: 3.11.z
Assignee: Candace Holman
QA Contact: Hongan Li
URL:
Whiteboard:
: 1921122 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-01-20 15:56 UTC by Vijay Samanthapuri
Modified: 2024-06-13 23:58 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-03-03 12:27:45 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:0637 0 None None None 2021-03-03 12:29:08 UTC

Description Vijay Samanthapuri 2021-01-20 15:56:39 UTC
Description of problem:
Unable to access kibana URL after enabling HTTP2 on haproxy router. Which was working fine with lower versions of OCP ( <= OCP 3.11.316)

When we change the haproxy router image to ose-haproxy-router:v3.11.306-10. Kibana URL is working as expected.

Version-Release number of selected component (if applicable):


How reproducible: We can reproduce on any OCP 3.11 version greater than OCP 3.11.317



Steps to Reproduce:
1. Setup the cluster with logging stack
2. Enable HTTP2 with below command
 
   oc set env dc/router ROUTER_ENABLE_HTTP2=true

3. Access kibana URL and you would end with and error. Kibana did not load properly

Actual results: Kibana application page is not loading properly


Expected results: Working kibana web console is expected


Additional info:

Comment 4 Andrew McDermott 2021-01-28 16:20:44 UTC
This looks to be an issue in haproxy-1.8.26; https://github.com/haproxy/haproxy/issues/884#issuecomment-748379574

We should bump to 1.8.28 which appears to be the latest release.

Comment 5 Andrew McDermott 2021-01-28 17:24:25 UTC
*** Bug 1921122 has been marked as a duplicate of this bug. ***

Comment 6 Felipe Campos 2021-01-29 03:20:46 UTC
Hi, 

I'd like to follow this issue.

I'm tracking in my opened case https://access.redhat.com/support/cases/#/case/02829567.

Thank's!

Comment 9 Vijay Samanthapuri 2021-02-02 15:24:45 UTC
Hi Candace,

I have attached files which you have requested.

Thanks,
Vijay

Comment 11 Candace Holman 2021-02-03 21:56:32 UTC
I am bumping the HAProxy version to 1.8.28 as mentioned in https://bugzilla.redhat.com/show_bug.cgi?id=1918392#c4

Comment 12 Candace Holman 2021-02-16 19:20:45 UTC
The HAProxy 1.8.28 RPM has passed all CI testing and was copied to the 3.11 RPM mirror.
It will be available in the next OCP 3.11 version.
QE - please verify in the next 3.11 version.

Comment 15 Hongan Li 2021-02-25 05:56:19 UTC
Verified with v3.11.394 and passed. kibana web console is still working well after enable HTTP2. 

# oc version
oc v3.11.394
kubernetes v1.11.0+d4cacc0
features: Basic-Auth GSSAPI Kerberos SPNEGO

Server https://hongli-311master-etcd-1:8443
openshift v3.11.394
kubernetes v1.11.0+d4cacc0

sh-4.2$ haproxy -v
HA-Proxy version 1.8.28-ef7a974 2021/01/13
Copyright 2000-2021 Willy Tarreau <willy>

sh-4.2$ 
sh-4.2$ rpm -qa | grep haproxy
haproxy18-1.8.28-1.el7.x86_64

Comment 17 errata-xmlrpc 2021-03-03 12:27:45 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: OpenShift Container Platform 3.11.394 bug fix and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:0637

Comment 18 Andrew McDermott 2021-03-09 10:29:48 UTC
The change that we wanted to pickup from upstream was:

commit 179d316c9fcb0651be5b4c2493b8df3a635fa2ff
Author: Christopher Faulet <cfaulet>
Date:   Wed Aug 5 14:37:13 2020 +0200

    BUG/MEDIUM: mux-h2: Don't fail if nothing is parsed for a legacy chunk response

    The parsing of incomplete chunk formatting in legacy HTTP mode was fixed by the
    commit 6ad7cd981 ("BUG/MEDIUM: mux-h2: Emit an error if the response chunk
    formatting is incomplete"). But a bug was introduced. When nothing is parsed, an
    error is also returned. It may happens if the parsing is stopped just after a
    chunk CRLF. When we try to parse the following chunk size, if there is no more
    data to parse, an protocol error is returned. It is obviously wrong.

    The patch was directly introduced on 2.0, there is no upstream commit ID for
    this patch.

    This patch is related to issue #798 and reported in comment in issue #768. It
    must be backported to 1.8.

    (cherry picked from commit 307f31ec34926965ef5c8f4f5b1d7840538f8246)
    Signed-off-by: Christopher Faulet <cfaulet>


Note You need to log in before you can comment on or make changes to this bug.