Bug 2121370 - Not able to use KMS volume encryption ft. using APIkey created from service ID (HPCS KMS)
Summary: Not able to use KMS volume encryption ft. using APIkey created from service I...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: rook
Version: 4.10
Hardware: All
OS: All
unspecified
high
Target Milestone: ---
: ---
Assignee: Rakshith
QA Contact: Neha Berry
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-08-25 09:33 UTC by Gayathri Menath
Modified: 2023-08-09 17:03 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-11-02 10:35:42 UTC
Embargoed:


Attachments (Terms of Use)
ocs mustgather (180 bytes, application/zip)
2022-08-25 09:33 UTC, Gayathri Menath
no flags Details

Description Gayathri Menath 2022-08-25 09:33:06 UTC
Created attachment 1907516 [details]
ocs mustgather

Description of problem (please be detailed as possible and provide log
snippests):
I tried to use the APIKey created from a service ID which is restricted to KMS, ODF operator is not able to create the -encrypted class. It is showing not able to create because some prerequisites are not met. Also I am able to see error message - IBMKeyProtect as KMS provider or Vault authentication via Service Account is unsupported configuration for RGW KMS, hence skipping

cephblockpool is in progressing state, cephcluster is ready.

I am able to use the same KMS instance if I use the user APIkey which is having no restriction. 

It looks like a bug as using the user APIkey is not safe.

Version of all relevant components (if applicable):
ODF 4.10

Does this issue impact your ability to continue to work with the product
(please explain in detail what is the user impact)?
yes, KMS encryption is not usable

Is there any workaround available to the best of your knowledge?
yes, but providing the user api key is not recommended as it doesn't have any restriction. So KMS cannot use by the customer in prod.

Rate from 1 - 5 the complexity of the scenario you performed that caused this
bug (1 - very simple, 5 - very complex)?
2

Can this issue reproducible?
yes

Can this issue reproduce from the UI?
yes

If this is a regression, please provide more details to justify this:


Steps to Reproduce:
1. Enable KMS volume encryption
2. Use the KMS apikey created from a service ID


Actual results:
encrypted class is not created, cephblockpool is in progressing state

Expected results:
encrypted class should be ready for use

Additional info:

Comment 3 Sanjal Katiyar 2022-08-30 05:56:31 UTC
`Also I am able to see error message - IBMKeyProtect as KMS provider or Vault authentication via Service Account is unsupported configuration for RGW KMS, hence skipping` --> this is not an error, it is an info log.

`cephblockpool is in progressing state, cephcluster is ready` --> rbd storageclasses won't get created unless CephBlockPool is Ready.

`I tried to use the APIKey created from a service ID which is restricted to KMS.
I am able to use the same KMS instance if I use the user APIkey which is having no restriction.` --> this is unrelated to UI or ocs operator, it's better if it is confirmed by someone from ceph-csi/rook or noobaa side as it could/could not be internal implementation.

Also, try to check why CephBlockPool is not getting Ready, must gather attached above are broken, there is nothing inside the folder.

Comment 4 Sanjal Katiyar 2022-08-30 05:58:37 UTC
Just to reference, this BZ is regarding IBM HPCS KMS.

Comment 5 Gayathri Menath 2022-09-02 07:15:55 UTC
Is there any update on this

Comment 6 Gayathri Menath 2022-09-05 12:46:01 UTC
When can we expect this feature

Comment 7 Nitin Goyal 2022-10-12 11:58:24 UTC
Moving it to rook, if you think this should be moved to CSI please do so

Comment 8 Madhu Rajanna 2022-10-12 13:01:11 UTC
Attached must-gather doesnt contains anything please attach the must-gather.

Comment 10 Travis Nielsen 2022-10-17 15:11:15 UTC
Rakshith PTAL

Comment 11 Rakshith 2022-10-18 06:43:47 UTC
(In reply to Travis Nielsen from comment #10)
> Rakshith PTAL

okay,

This BZ is still waiting for mustgather.

Comment 13 Gayathri Menath 2022-11-02 10:35:42 UTC
I am closing this issue, as I am not able to reproduce this and the old clusters are removed, not able to collect any details


Note You need to log in before you can comment on or make changes to this bug.