RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2130010 - [RFE] ha_cluster: convert ha_cluster role to use firewall, selinux and certificate role
Summary: [RFE] ha_cluster: convert ha_cluster role to use firewall, selinux and certif...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 9
Classification: Red Hat
Component: rhel-system-roles
Version: 9.2
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: 9.2
Assignee: Rich Megginson
QA Contact: Evgeny Fedin
Steven J. Levine
URL:
Whiteboard: role:ha_cluster
Depends On:
Blocks: 2130019
TreeView+ depends on / blocked
 
Reported: 2022-09-26 21:25 UTC by Noriko Hosoi
Modified: 2023-06-12 15:19 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
.The `ha_cluster` System Role now supports automated execution of the `firewall`, `selinux`, and `certificate` System Roles The ha_cluster RHEL System Role now supports the following features: Using the `firewall` and `selinux` System Roles to manage port access:: To configure the ports of a cluster to run the `firewalld` and `selinux` services, you can set the new role variables `ha_cluster_manage_firewall` and `ha_cluster_manage_selinux` to `true`. This configures the cluster to use the `firewall` and `selinux` System Roles, automating and performing these operations within the `ha_cluster` System Role. If these variables are set to their default value of `false`, the roles are not performed. With this release, the firewall is no longer configured by default, because it is configured only when `ha_cluster_manage_firewall` is set to `true`. Using the `certificate` System Role to create a `pcsd` private key and certificate pair:: The `ha_cluster` System Role now supports the `ha_cluster_pcsd_certificates` role variable. Setting this variable passes on its value to the `certificate_requests` variable of the `certificate` System Role. This provides an alternative method for creating the private key and certificate pair for `pcsd`.
Clone Of:
: 2130019 (view as bug list)
Environment:
Last Closed: 2023-05-09 07:37:53 UTC
Type: Enhancement
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github linux-system-roles ha_cluster pull 63 0 None Merged Use the firewall role and the selinux role from the ha_cluster role 2022-09-26 21:25:31 UTC
Github linux-system-roles ha_cluster pull 69 0 None Merged Update README for "use other roles from ha_cluster role". 2022-09-26 21:27:35 UTC
Github linux-system-roles ha_cluster pull 71 0 None Merged Use the certificate role to create the cert and the key 2022-10-18 22:36:48 UTC
Red Hat Issue Tracker RHELPLAN-134943 0 None None None 2022-09-26 21:32:29 UTC
Red Hat Product Errata RHEA-2023:2246 0 None None None 2023-05-09 07:38:20 UTC

Description Noriko Hosoi 2022-09-26 21:25:32 UTC
Description of problem:

The ha_cluster role can use the firewall role and the selinux role to manage port access.

#### `ha_cluster_manage_firewall`

boolean, default: false

Manage the `firewall high-availability service` as well as the `fence-virt port`.
When `ha_cluster_manage_firewall` is `true`, the `firewall high-availability
service` and `fence-virt port` are enabled.
When `ha_cluster_manage_firewall` is `false`, the `ha_cluster role` does not
manage the firewall.

NOTE: `ha_cluster_manage_firewall` is limited to *adding* ports.
It cannot be used for *removing* ports.
If you want to remove ports, you will need to use the firewall system
role directly.

NOTE: The version of the `ha_cluster` role is 1.7.5 or older,
the firewall was configured by default if the firewalld was available
when the `ha_cluster` role was executed. In the newer version,
it does not happen unless `ha_cluster_manage_firewall` is set to `true`.

#### `ha_cluster_manage_selinux`

boolean, default: false

Manage the ports belonging to the `firewall high-availability service` using
the selinux role.
When `ha_cluster_manage_selinux` is `true`, the ports belonging to the
`firewall high-availability service` are associated with the selinux port type
`cluster_port_t`.
When `ha_cluster_manage_selinux` is `false`, the `ha_cluster role` does not
manage the selinux.

NOTE: The firewall configuration is prerequisite for managing selinux. If the
firewall is not installed, managing selinux policy is skipped.

NOTE: `ha_cluster_manage_selinux` is limited to *adding* policy.
It cannot be used for *removing* policy.
If you want to remove policy, you will need to use the selinux system
role directly.

Comment 18 errata-xmlrpc 2023-05-09 07:37:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (rhel-system-roles bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2023:2246


Note You need to log in before you can comment on or make changes to this bug.