Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Corrected the saslPassword field by removing 'pass:' prefix in config #537

Closed

Conversation

chaturvedi-kna
Copy link

Summary

This pull request fixes the saslPassword field configuration in the following files:

  • proc_configuring-the-stf-connection-for-the-overcloud.adoc
  • proc_configuring-the-stf-connection-for-director-operator-for-the-overcloud.adoc

Description

Changed saslPassword: pass:<password_from_stf> to saslPassword: <password_from_stf> to correct the field and enable proper connection.

Verification

Changes have been tested and confirmed to work correctly.

@csibbitt
Copy link
Contributor

Thanks for this contribution, @chaturvedi-kna. Can you provide specific OSP and STF versions where you found this to not work correctly? I'm coordinating with with @ayefimov-1 to test it.

@chaturvedi-kna
Copy link
Author

I Checked that with OSP 16.2 and STF CSV 1.5.1701113935

@chaturvedi-kna
Copy link
Author

Tomorrow I can provide some snapshots for reference and will check with 17.1 as well.

@chaturvedi-kna
Copy link
Author

This is for 16.2

[root@mumbmumbtcucl200co-controller-0 ~]# cat /var/lib/config-data/puppet-generated/metrics_qdr/etc/qpid-dispatch/qdrouterd.conf | grep -i5 saslpassword

connector {

host: default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com

port: 443

role: edge

saslPassword: 4J6nk9XpUwiBPIwXcYusEo1ZjHSKqKC4

saslUsername: guest@default-interconnect

sslProfile: sslProfile

verifyHostname: false

}

[root@mumbmumbtcucl200co-controller-0 ~]# tail -f /var/log/containers/metrics_qdr/metrics_qdr.log

2024-05-30 13:13:53.297544 +0530 SERVER (notice) Listening on 2405:200:802:104a::1ef:5666

2024-05-30 13:13:53.333763 +0530 ROUTER (info) Edge connection (id=1) to interior established

2024-05-30 13:13:53.333814 +0530 ROUTER (info) [C1] Connection Opened: dir=out host=default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 vhost= encrypted=TLSv1.2 auth=PLAIN user=guest@default-interconnect container_id=default-interconnect-5c5f77d6cc-vtm4d props={:product="qpid-dispatch-router", :version="Red Hat AMQ Interconnect 1.10.9 (qpid-dispatch 1.14.0)", :"qd.conn-id"=4209}

2024-05-30 13:13:53.445217 +0530 SERVER (info) [C2] Accepted connection to 2405:200:802:104a::1ef:5666 from 2405:200:802:104a::1ef:59774

2024-05-30 13:13:53.445791 +0530 ROUTER (info) [C2] Connection Opened: dir=in host=2405:200:802:104a::1ef:59774 vhost= encrypted=no auth=ANONYMOUS user=anonymous container_id=metrics props=

2024-05-30 13:13:53.445872 +0530 ROUTER (info) [C2][L13] Link attached: dir=in source={ expire:sess} target={ expire:sess}

2024-05-30 13:13:53.860449 +0530 SERVER (info) [C3] Accepted connection to 2405:200:802:104a::1ef:5666 from 2405:200:802:104a::1ef:59776

2024-05-30 13:13:53.860974 +0530 ROUTER (info) [C3] Connection Opened: dir=in host=2405:200:802:104a::1ef:59776 vhost= encrypted=no auth=no user=anonymous container_id=openstack.org/om/container/mumbmumbtcucl200co-controller-0/ceilometer-agent-notification/16/02d78581527e497fbf737cddd9c82795 props={:process="ceilometer-agent-notification", :pid=16, :node="mumbmumbtcucl200co-controller-0"}

2024-05-30 13:13:53.862121 +0530 ROUTER (info) [C3][L14] Link attached: dir=out source={ expire:sess} target={rpc-response expire:sess}

2024-05-30 13:13:53.863408 +0530 ROUTER (info) [C3][L15] Link attached: dir=in source={/anycast/ceilometer/nlepdgnvmb-metering.sample expire:sess} target={/anycast/ceilometer/nlepdgnvmb-metering.sample expire:sess}

[root@mumbmumbtcucl200co-controller-0 ~]# podman exec -it metrics_qdr qdstat --bus=[2405:200:802:104a::1ef]:5666 --connections

ConnectionsConnections

id host container role dir security authentication tenant

=======================================================================================================================================================================================================================================================================================================================

1 default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 default-interconnect-5c5f77d6cc-vtm4d edge out TLSv1.2(DHE-RSA-AES256-GCM-SHA384) guest@default-interconnect(PLAIN)

2 2405:200:802:104a::1ef:59774 metrics normal in no-security anonymous-user

3 2405:200:802:104a::1ef:59776 openstack.org/om/container/mumbmumbtcucl200co-controller-0/ceilometer-agent-notification/16/02d78581527e497fbf737cddd9c82795 normal in no-security no-auth

4 2405:200:802:104a::1ef:49830 eee4a527-cb2a-4d6f-9892-cd828e02255b normal in no-security no-auth

[root@mumbmumbtcucl200co-controller-0 ~]# vi /var/lib/config-data/puppet-generated/metrics_qdr/etc/qpid-dispatch/qdrouterd.conf

[root@mumbmumbtcucl200co-controller-0 ~]# systemctl restart tripleo_metrics_qdr.service

[root@mumbmumbtcucl200co-controller-0 ~]# cat /var/lib/config-data/puppet-generated/metrics_qdr/etc/qpid-dispatch/qdrouterd.conf | grep -i5 saslpassword

connector {

host: default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com

port: 443

role: edge

saslPassword: pass:4J6nk9XpUwiBPIwXcYusEo1ZjHSKqKC4

saslUsername: guest@default-interconnect

sslProfile: sslProfile

verifyHostname: false

}

[root@mumbmumbtcucl200co-controller-0 ~]# podman exec -it metrics_qdr qdstat --bus=[2405:200:802:104a::1ef]:5666 --connections Connections

id host container role dir security authentication tenant

==================================================================================================================================================================================================================

2 2405:200:802:104a::1ef:57948 metrics normal in no-security anonymous-user

3 2405:200:802:104a::1ef:57950 openstack.org/om/container/mumbmumbtcucl200co-controller-0/ceilometer-agent-notification/16/02d78581527e497fbf737cddd9c82795 normal in no-security no-auth

6 2405:200:802:104a::1ef:33534 0a74dc35-8b63-40e4-bf08-0a2699941e59 normal in no-security no-auth

[root@mumbmumbtcucl200co-controller-0 ~]# tail -f /var/log/containers/metrics_qdr/metrics_qdr.log 2024-05-30 13:16:53.139961 +0530 SERVER (info) [C4] Connection to default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 failed: amqp:unauthorized-access Authentication failed [mech=PLAIN]

2024-05-30 13:16:58.175088 +0530 SERVER (info) [C5] Connection to default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 failed: amqp:unauthorized-access Authentication failed [mech=PLAIN]

2024-05-30 13:17:01.401507 +0530 SERVER (info) [C6] Accepted connection to 2405:200:802:104a::1ef:5666 from 2405:200:802:104a::1ef:33534

2024-05-30 13:17:01.401963 +0530 ROUTER (info) [C6] Connection Opened: dir=in host=2405:200:802:104a::1ef:33534 vhost= encrypted=no auth=no user=anonymous container_id=0a74dc35-8b63-40e4-bf08-0a2699941e59 props=

2024-05-30 13:17:01.403124 +0530 ROUTER (info) [C6][L9] Link attached: dir=in source={ expire:sess} target={$management expire:sess}

2024-05-30 13:17:01.404234 +0530 ROUTER (info) [C6][L10] Link attached: dir=out source={ expire:sess} target={ expire:sess}

2024-05-30 13:17:01.407354 +0530 ROUTER (info) [C6][L9] Link lost: del=1 presett=0 psdrop=0 acc=1 rej=0 rel=0 mod=0 delay1=0 delay10=0

2024-05-30 13:17:01.407368 +0530 ROUTER (info) [C6][L10] Link lost: del=1 presett=1 psdrop=0 acc=0 rej=0 rel=0 mod=0 delay1=0 delay10=0

2024-05-30 13:17:01.407398 +0530 ROUTER (info) [C6] Connection Closed

2024-05-30 13:17:03.215393 +0530 SERVER (info) [C7] Connection to default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 failed: amqp:unauthorized-access Authentication failed [mech=PLAIN]

2024-05-30 13:17:08.248843 +0530 SERVER (info) [C8] Connection to default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 failed: amqp:unauthorized-access Authentication failed [mech=PLAIN]

[root@mumbmumbtcucl200co-controller-0 ~]# vi /var/lib/config-data/puppet-generated/metrics_qdr/etc/qpid-dispatch/qdrouterd.conf [root@mumbmumbtcucl200co-controller-0 ~]# systemctl restart tripleo_metrics_qdr.service [root@mumbmumbtcucl200co-controller-0 ~]#

@csibbitt
Copy link
Contributor

This is for 16.2

saslPassword: 4J6nk9XpUwiBPIwXcYusEo1ZjHSKqKC4
2024-05-30 13:13:53.333814 +0530 ROUTER (info) [C1] Connection Opened: dir=out host=default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 vhost= encrypted=TLSv1.2 auth=PLAIN user=guest@default-interconnect container_id=default-interconnect-5c5f77d6cc-vtm4d props={:product="qpid-dispatch-router", :version="Red Hat AMQ Interconnect 1.10.9 (qpid-dispatch 1.14.0)", :"qd.conn-id"=4209}

...

saslPassword: pass:4J6nk9XpUwiBPIwXcYusEo1ZjHSKqKC4
13:16:53.139961 +0530 SERVER (info) [C4] Connection to default-interconnect-5671-service-telemetry.apps.stf.mh.nvmb.dc.jio.indradhanus.com:443 failed: amqp:unauthorized-access Authentication failed [mech=PLAIN]

Thanks for this, @chaturvedi-kna This is very convincing, but also surprising!

  1. The RH AMQ Interconnect 1.10 docs suggest that the "pass:" prefix is required https://access.redhat.com/documentation/en-us/red_hat_amq/2021.q1/html-single/using_amq_interconnect/index#connecting-using-username-password-authentication-router-rhel (sorry, couldn't find an external link for these old versions)
  2. We use the "pass:" prefix in our automated smoke tests: https://github.com/infrawatch/service-telemetry-operator/blob/master/tests/smoketest/qdr-test.conf.yaml.template#L31
  3. I'm also surprised to see that 1.10.9/1.14.0 version string, because AFAICT the latest release of OSP 16.2 includes qpid-dispatch-router-1.8.0-2.el8.x86_64.rpm. Do you have any insight into this discrepency? FWIW, even the 1.8 docs show the "pass:" prefix: https://access.redhat.com/documentation/en-us/red_hat_amq/7.7/html-single/using_amq_interconnect/index#connecting-using-username-password-authentication-router-rhel

Like I said, your output is very convincing (code > docs!), so we have opened an internal ticket to look closer at this.

@chaturvedi-kna
Copy link
Author

I see that this is been tested I guess so what's the reason is it documenting issue or something else?

@mickogeary
Copy link
Collaborator

mickogeary commented Jun 20, 2024

This change for STF docs should be covered here: #541

@mickogeary mickogeary closed this Jun 21, 2024
@mickogeary
Copy link
Collaborator

this is taken care of with #541

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

4 participants