On Mon, Feb 7, 2022 at 3:09 PM Gilboa Davara <gilb...@gmail.com> wrote:

>
>
> On Mon, Feb 7, 2022 at 4:03 PM Martin Perina <mper...@redhat.com> wrote:
>
>>
>>
>> On Mon, Feb 7, 2022 at 12:33 PM Gilboa Davara <gilb...@gmail.com> wrote:
>>
>>> Hello,
>>>
>>> On Mon, Feb 7, 2022 at 8:45 AM Yedidyah Bar David <d...@redhat.com>
>>> wrote:
>>>
>>>> On Sun, Feb 6, 2022 at 5:09 PM Gilboa Davara <gilb...@gmail.com> wrote:
>>>> >
>>>> > Unlike my predecessor, I not only lost my vmengine, I also lost the
>>>> vdsm services on all hosts.
>>>> > All seem to be hitting the same issue - read, the certs under
>>>> /etc/pki/vdsm/certs and /etc/pki/ovirt* all expired a couple of days ago.
>>>> > As such, the hosted engine cannot go into global maintenance mode,
>>>>
>>>> What do you mean by that? What happens if you 'hosted-engine
>>>> --set-maintenance --mode=global'?
>>>>
>>>
>>> Failed, stating the cluster is not in global maintenance mode.
>>> (Understandable, given two of 3 hosts were offline due to certificate
>>> issues...)
>>>
>>>
>>>
>>>>
>>>> > preventing engine-setup --offline from running.
>>>>
>>>> Actually just a few days ago I pushed a patch for:
>>>>
>>>> https://bugzilla.redhat.com/show_bug.cgi?id=1700460
>>>>
>>>> But:
>>>>
>>>> If you really have a problem that you can't set global maintenance,
>>>> using this is a risk - HA might intervene in the middle and shutdown
>>>> the VM. So either make sure global maintenance does work, or stop
>>>> all HA services on all hosts.
>>>>
>>>> > Two questions:
>>>> > 1. Is there any automated method to renew the vdsm certificates?
>>>>
>>>> You mean, without an engine?
>>>>
>>>> I think that if you have a functional engine one way or another,
>>>> you can automate this somehow, didn't check. Try checking e.g. the
>>>> python sdk examples - there might be there something you can base
>>>> on.
>>>>
>>>> > 2. Assuming the previous answer is "no", assuming I'm somewhat versed
>>>> in using openssl, how can I manually renew them?
>>>>
>>>> I'd rather not try to invent from memory how this is supposed to work,
>>>> and doing this methodically and verifying before replying is quite
>>>> an effort.
>>>>
>>>> If this is really what you want, I suggest something like:
>>>>
>>>> 1. Set up a test env with an engine and one host
>>>> 2. Backup (or use git on) /etc on both
>>>> 3. Renew the host cert from the UI
>>>> 4. Check what changed
>>>>
>>>> You should find, IMO, that the key(s) on the host didn't
>>>> change. I guess you might also find CSRs on one or both of them.
>>>> So basically it should be something like:
>>>> 1. Create a CSR on the host for the existing key (one or more,
>>>> not sure).
>>>> 2. Copy and sign this on the engine using pki-enroll-request.sh
>>>> (I think you can find examples for it scattered around, perhaps
>>>> even in the main guides)
>>>> 3. Copy back the generated certs to the host
>>>> 4. Perhaps restart one or more services there (vdsm, imageio?,
>>>> ovn, etc.)
>>>>
>>>> You can check the code in
>>>> /usr/share/ovirt-engine/ansible-runner-service-project/project
>>>> to see how it's done when initiated from the UI.
>>>>
>>>> Good luck and best regards,
>>>>
>>>
>>> I more of less found a document stating the above somewhere in the
>>> middle of the night.
>>> Tried it.
>>> Got the WebUI working again.
>>> However, for the life of me I couldn't get the hosts to work to talk to
>>> the engine. (Even though I could use openssl s_client -showcerts -connect
>>> host and got valid certs).
>>> In the end, @around ~4am, I decided to take the brute force route, clean
>>> the hosts, upgrade them to -streams, and redeploy the engine again (3'rd
>>> attempt, after sufficient amount of coffee reminded me the qemu-6.1 is
>>> broken, and needed to be downgraded before trying to deploy the HE...).
>>> Either way, when I finish importing the VMs, I'll open a RFE to add
>>> BIG-WARNING-IN-BOLD-LETTERS in the WebUI to notify the admin that the
>>> certificates are about to expire.
>>>
>>
>> We already have quite a lot of warnings/alters about certificates which
>> are going to expire soon:
>>
>>
>> https://lists.ovirt.org/archives/list/users@ovirt.org/message/TMJVAJMH5MKUVRTSZG2BB46QKXYI6M2D/
>>
>> So what exactly are you missing here?
>>
>
> I don't know how, but the only errors I saw in the WebUI were update
> related (failed to check updates on host).
>

That is not related to certificates errors used for engine <-> VDSM
communication

There was an error in engine-setup, but at this stage it was far, far too
> late.
>

The warning/alerts mentioned above are stored in engine's audit log, which
can be viewed within Events tab in webadmin, where you should see something
like:

Host ${VdsName} certification is about to expire at ${ExpirationDate}.
Please renew the host's certification.

or

Engine's certification is about to expire at ${ExpirationDate}. Please
renew the engine's certification.



> - Gilboa
>
>
>
>>
>>> Thanks for the help!
>>>
>>> - Gilboa
>>>
>>>
>>>
>>>> --
>>>> Didi
>>>>
>>>> _______________________________________________
>>> Users mailing list -- users@ovirt.org
>>> To unsubscribe send an email to users-le...@ovirt.org
>>> Privacy Statement: https://www.ovirt.org/privacy-policy.html
>>> oVirt Code of Conduct:
>>> https://www.ovirt.org/community/about/community-guidelines/
>>> List Archives:
>>> https://lists.ovirt.org/archives/list/users@ovirt.org/message/CGSAB7NPWWOYON6WXIRJXPZASVWCPQJT/
>>>
>>
>>
>> --
>> Martin Perina
>> Manager, Software Engineering
>> Red Hat Czech s.r.o.
>>
>

-- 
Martin Perina
Manager, Software Engineering
Red Hat Czech s.r.o.
_______________________________________________
Users mailing list -- users@ovirt.org
To unsubscribe send an email to users-le...@ovirt.org
Privacy Statement: https://www.ovirt.org/privacy-policy.html
oVirt Code of Conduct: 
https://www.ovirt.org/community/about/community-guidelines/
List Archives: 
https://lists.ovirt.org/archives/list/users@ovirt.org/message/ZD4LHMJYHDD52KIUJNKXBRGJJ4GLZGM6/

Reply via email to