[Triple0 - Wallaby] Overcloud deployment getting failed with SSL
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4: ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ in the deploy.sh: openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml: # ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True # Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' # The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: '' # The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY----- # ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem # ********************* # End static parameters # ********************* inject-trust-anchor.yaml # ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. * Any idea around this error would be of great help. -- skype: lokendrarathour
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert? On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
Hey, It looks like you have set the dns name on the SSL certificate to overcloud.example.com instead of the IP address. So the SSL cert validation is failing. Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),)) Note point number 1 here: https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features... It's actually worded poorly. I don't believe IP's can be set for the common name, and we need to use subjectAltName instead. See below: So, when you create this file: [req]default_bits = 2048prompt = nodefault_md = sha256distinguished_name = dn[dn]C=AUST=QueenslandL=BrisbaneO=your-orgOU=adminemailAddress=me@example.comCN=openstack.example.com Remove the CN= part from that file: [req]default_bits = 2048prompt = nodefault_md = sha256distinguished_name = dn[dn]C=AUST=QueenslandL=BrisbaneO=your-orgOU=adminemailAddress=me@example.com Then in the v3.ext file set IP.1=fd00:fd00:fd00:9900::2ef like so: authorityKeyIdentifier=keyid,issuerbasicConstraints=CA:FALSEkeyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEnciphermentsubjectAltName = @alt_names[alt_names]IP.1=fd00:fd00:fd00:9900::2ef On Fri, 8 Jul 2022 at 10:31 pm, Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
Thanks Brandon for your input. We have this IP as stated getting allocated. Maybe we can pass domain name to get this more predictable. But in that case also we would need to do the same way as you suggest ? Will try your and Swogat's suggestions. Best Regards, Lokendra On Sat, 9 Jul 2022, 02:51 Brendan Shephard, <bshephar@redhat.com> wrote:
Hey,
It looks like you have set the dns name on the SSL certificate to overcloud.example.com instead of the IP address. So the SSL cert validation is failing.
Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))
Note point number 1 here:
https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features...
It's actually worded poorly. I don't believe IP's can be set for the common name, and we need to use subjectAltName instead. See below:
So, when you create this file:
[req]default_bits = 2048prompt = nodefault_md = sha256distinguished_name = dn[dn]C=AUST=QueenslandL=BrisbaneO=your-orgOU=adminemailAddress=me@example.comCN=openstack.example.com
Remove the CN= part from that file:
[req]default_bits = 2048prompt = nodefault_md = sha256distinguished_name = dn[dn]C=AUST=QueenslandL=BrisbaneO=your-orgOU=adminemailAddress=me@example.com
Then in the v3.ext file set IP.1=fd00:fd00:fd00:9900::2ef like so:
authorityKeyIdentifier=keyid,issuerbasicConstraints=CA:FALSEkeyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEnciphermentsubjectAltName = @alt_names[alt_names]IP.1=fd00:fd00:fd00:9900::2ef
On Fri, 8 Jul 2022 at 10:31 pm, Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
Hey, I personally use DNS names. I updated that documentation, so that is essentially exactly what I'm using in my environment. I just pasted in exactly what I have in my files and changed the domain names to example.com. So what we have in that documentation should work with DNS names. I also made a video about this: https://www.youtube.com/watch?v=FmO6n1fUiYU I believe the only difference when using IP's instead of domain names is that you can't use the common name (CN) field. Brendan Shephard Software Engineer Red Hat APAC <https://www.redhat.com> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit> On Sat, Jul 9, 2022 at 2:30 PM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Thanks Brandon for your input. We have this IP as stated getting allocated. Maybe we can pass domain name to get this more predictable. But in that case also we would need to do the same way as you suggest ? Will try your and Swogat's suggestions.
Best Regards, Lokendra
On Sat, 9 Jul 2022, 02:51 Brendan Shephard, <bshephar@redhat.com> wrote:
Hey,
It looks like you have set the dns name on the SSL certificate to overcloud.example.com instead of the IP address. So the SSL cert validation is failing.
Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))
Note point number 1 here:
https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features...
It's actually worded poorly. I don't believe IP's can be set for the common name, and we need to use subjectAltName instead. See below:
So, when you create this file:
[req]default_bits = 2048prompt = nodefault_md = sha256distinguished_name = dn[dn]C=AUST=QueenslandL=BrisbaneO=your-orgOU=adminemailAddress=me@example.comCN=openstack.example.com
Remove the CN= part from that file:
[req]default_bits = 2048prompt = nodefault_md = sha256distinguished_name = dn[dn]C=AUST=QueenslandL=BrisbaneO=your-orgOU=adminemailAddress=me@example.com
Then in the v3.ext file set IP.1=fd00:fd00:fd00:9900::2ef like so:
authorityKeyIdentifier=keyid,issuerbasicConstraints=CA:FALSEkeyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEnciphermentsubjectAltName = @alt_names[alt_names]IP.1=fd00:fd00:fd00:9900::2ef
On Fri, 8 Jul 2022 at 10:31 pm, Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf. And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com. On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error: :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 Checking further the endpoint list: I see only one endpoint for keystone is gettin created. DeprecationWarning +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL | +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 | +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support. Best Regards, Lokendra On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
Hi Team, Any input on this case raised. Thanks, Lokendra On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created.
DeprecationWarning
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
--
Hi Lokendra, Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf. On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created.
DeprecationWarning
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
--
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png] to re-state, we are failing at the time of deployment at step4 : PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0 Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81 Using these files we create other certificates. Please check and let me know in case we need anything else. On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created.
DeprecationWarning
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < lokendrarathour@gmail.com> wrote:
Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml:
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # *********************
inject-trust-anchor.yaml
# ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e* Self-signed IP-based certificate, without DNS. *
Any idea around this error would be of great help.
-- skype: lokendrarathour
--
-- ~ Lokendra skype: lokendrarathour
Hi Lokendra, The CN field is missing. Can you add that and generate the certificate again. CN=ipaddress Also add dns.1=ipaddress under alt_names for precaution. Vikarna On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png]
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created.
DeprecationWarning
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com> wrote:
What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < lokendrarathour@gmail.com> wrote:
> Hi Team, > We were trying to install overcloud with SSL enabled for which the > UC is installed, but OC install is getting failed at step 4: > > ERROR > :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max > retries exceeded with url: / (Caused by > SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't > match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": > "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} > 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | > FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | > item={'service_name': 'cinderv3', 'service_type': 'volume'} | > error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": > "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": > "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover > available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. > Attempting to parse version from URL.\nTraceback (most recent call last):\n > File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line > 600, in urlopen\n chunked=chunked)\n File > \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, > in _make_request\n self._validate_conn(conn)\n File > \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, > in _validate_conn\n conn.connect()\n File > \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in > connect\n _match_hostname(cert, self.assert_hostname or > server_hostname)\n File > \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in > _match_hostname\n match_hostname(cert, asserted_hostname)\n File > \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % > (hostname, dnsnames[0]))\nssl.CertificateError: hostname > 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring > handling of the above exception, another exception occurred:\n\nTraceback > (most recent call last):\n File > \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in > send\n timeout=timeout\n File > \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, > in urlopen\n _stacktrace=sys.exc_info()[2])\n File > \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in > increment\n raise MaxRetryError(_pool, url, error or > ResponseError(cause))\nurllib3.exceptions.MaxRetryError: > HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max > retries exceeded with url: / (Caused by > SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't > match 'undercloud.com'\",),))\n\nDuring handling of the above > exception, another exception occurred:\n\nTraceback (most recent call > last):\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, > in _send_request\n resp = self.session.request(method, url, **kwargs)\n > File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, > in request\n resp = self.send(prep, **send_kwargs)\n File > \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in > send\n r = adapter.send(request, **kwargs)\n File > \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in > send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: > HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max > retries exceeded with url: / (Caused by > SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't > match 'undercloud.com'\",),))\n\nDuring handling of the above > exception, another exception occurred:\n\nTraceback (most recent call > last):\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", > line 138, in _do_create_plugin\n authenticated=False)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line > 610, in get_discovery\n authenticated=authenticated)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, > in get_discovery\n disc = Discover(session, url, > authenticated=authenticated)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, > in __init__\n authenticated=authenticated)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, > in get_version_data\n resp = session.get(url, headers=headers, > authenticated=authenticated)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, > in get\n return self.request(url, 'GET', **kwargs)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in > request\n resp = send(**kwargs)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, > in _send_request\n raise > exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL > exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: > HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max > retries exceeded with url: / (Caused by > SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't > match 'undercloud.com'\",),))\n\nDuring handling of the above > exception, another exception occurred:\n\nTraceback (most recent call > last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line > 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n > File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n > return _run_module_code(code, init_globals, run_name, mod_spec)\n File > \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n > mod_name, mod_spec, pkg_name, script_name)\n File > \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, > run_globals)\n File > \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", > line 185, in <module>\n File > \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", > line 181, in main\n File > \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", > line 407, in __call__\n File > \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", > line 141, in run\n File > \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line > 517, in search_services\n services = self.list_services()\n File > \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line > 492, in list_services\n if self._is_client_version('identity', 2):\n > File > \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", > line 460, in _is_client_version\n client = getattr(self, client_name)\n > File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", > line 32, in _identity_client\n 'identity', min_version=2, > max_version='3.latest')\n File > \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", > line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in > get_endpoint\n return self.session.get_endpoint(auth or self.auth, > **kwargs)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, > in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line > 380, in get_endpoint\n allow_version_hack=allow_version_hack, > **kwargs)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line > 271, in get_endpoint_data\n service_catalog = > self.get_access(session).service_catalog\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line > 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", > line 206, in get_auth_ref\n self._plugin = > self._do_create_plugin(session)\n File > \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", > line 161, in _do_create_plugin\n 'auth_url is correct. %s' % > e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find > versioned identity endpoints when attempting to authenticate. Please check > that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: > HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max > retries exceeded with url: / (Caused by > SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't > match 'overcloud.example.com'\",),))\n", "module_stdout": "", > "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} > 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | > TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | > 0:11:01.271914 | 2.47s > 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | > TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | > 0:11:01.273659 | 2.47s > > PLAY RECAP > ********************************************************************* > localhost : ok=0 changed=0 unreachable=0 > failed=0 skipped=2 rescued=0 ignored=0 > overcloud-controller-0 : ok=437 changed=104 unreachable=0 > failed=0 skipped=214 rescued=0 ignored=0 > overcloud-controller-1 : ok=436 changed=101 unreachable=0 > failed=0 skipped=214 rescued=0 ignored=0 > overcloud-controller-2 : ok=431 changed=101 unreachable=0 > failed=0 skipped=214 rescued=0 ignored=0 > overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 > failed=0 skipped=198 rescued=0 ignored=0 > undercloud : ok=28 changed=7 unreachable=0 > failed=1 skipped=3 rescued=0 ignored=0 > 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total > Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > > in the deploy.sh: > > openstack overcloud deploy --templates \ > -r /home/stack/templates/roles_data.yaml \ > --networks-file /home/stack/templates/custom_network_data.yaml \ > --vip-file /home/stack/templates/custom_vip_data.yaml \ > --baremetal-deployment > /home/stack/templates/overcloud-baremetal-deploy.yaml \ > --network-config \ > -e /home/stack/templates/environment.yaml \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml > \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml > \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml > \ > -e /home/stack/templates/ironic-config.yaml \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml > \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml > \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml > \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml > \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ > -e > /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ > -e /home/stack/containers-prepare-parameter.yaml > > Addition lines as highlighted in yellow were passed with > modifications: > tls-endpoints-public-ip.yaml: > Passed as is in the defaults. > enable-tls.yaml: > > # ******************************************************************* > # This file was created automatically by the sample environment > # generator. Developers should use `tox -e genconfig` to update it. > # Users are recommended to make changes to a copy of the file instead > # of the original, if any customizations are needed. > # ******************************************************************* > # title: Enable SSL on OpenStack Public Endpoints > # description: | > # Use this environment to pass in certificates for SSL deployments. > # For these values to take effect, one of the tls-endpoints-*.yaml > # environments must also be used. > parameter_defaults: > # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon > # Type: boolean > HorizonSecureCookies: True > > # Specifies the default CA cert to use if TLS is used for services > in the public network. > # Type: string > PublicTLSCAFile: > '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' > > # The content of the SSL certificate (without Key) in PEM format. > # Type: string > SSLRootCertificate: | > -----BEGIN CERTIFICATE----- > ----*** CERTICATELINES TRIMMED ** > -----END CERTIFICATE----- > > SSLCertificate: | > -----BEGIN CERTIFICATE----- > ----*** CERTICATELINES TRIMMED ** > -----END CERTIFICATE----- > # The content of an SSL intermediate CA certificate in PEM format. > # Type: string > SSLIntermediateCertificate: '' > > # The content of the SSL Key in PEM format. > # Type: string > SSLKey: | > -----BEGIN PRIVATE KEY----- > ----*** CERTICATELINES TRIMMED ** > -----END PRIVATE KEY----- > > # ****************************************************** > # Static parameters - these are values that must be > # included in the environment but should not be changed. > # ****************************************************** > # The filepath of the certificate as it will be stored in the > controller. > # Type: string > DeployedSSLCertificatePath: > /etc/pki/tls/private/overcloud_endpoint.pem > > # ********************* > # End static parameters > # ********************* > > inject-trust-anchor.yaml > > # ******************************************************************* > # This file was created automatically by the sample environment > # generator. Developers should use `tox -e genconfig` to update it. > # Users are recommended to make changes to a copy of the file instead > # of the original, if any customizations are needed. > # ******************************************************************* > # title: Inject SSL Trust Anchor on Overcloud Nodes > # description: | > # When using an SSL certificate signed by a CA that is not in the > default > # list of CAs, this environment allows adding a custom CA > certificate to > # the overcloud nodes. > parameter_defaults: > # The content of a CA's SSL certificate file in PEM format. This > is evaluated on the client side. > # Mandatory. This parameter must be set by the user. > # Type: string > SSLRootCertificate: | > -----BEGIN CERTIFICATE----- > ----*** CERTICATELINES TRIMMED ** > -----END CERTIFICATE----- > > resource_registry: > OS::TripleO::NodeTLSCAData: > ../../puppet/extraconfig/tls/ca-inject.yaml > > > > > The procedure to create such files was followed using: > Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) > <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> > > Idea is to deploy overcloud with SSL enabled i.e* Self-signed > IP-based certificate, without DNS. * > > Any idea around this error would be of great help. > > -- > skype: lokendrarathour > > >
--
-- ~ Lokendra skype: lokendrarathour
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it. Also please follow Mr. Tathe's mail to add the cn first. With regards Swogat Pradhan On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png]
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created.
DeprecationWarning
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com or overcloud.example.com. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com is the default domain for overcloud.example.com.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < swogatpradhan22@gmail.com> wrote:
> What is the domain name you have specified in the undercloud.conf > file? > And what is the fqdn name used for the generation of the SSL cert? > > On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < > lokendrarathour@gmail.com> wrote: > >> Hi Team, >> We were trying to install overcloud with SSL enabled for which the >> UC is installed, but OC install is getting failed at step 4: >> >> ERROR >> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >> retries exceeded with url: / (Caused by >> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >> match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": >> "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >> 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | >> FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | >> item={'service_name': 'cinderv3', 'service_type': 'volume'} | >> error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": >> "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": >> "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover >> available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >> Attempting to parse version from URL.\nTraceback (most recent call last):\n >> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >> 600, in urlopen\n chunked=chunked)\n File >> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >> in _make_request\n self._validate_conn(conn)\n File >> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >> in _validate_conn\n conn.connect()\n File >> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >> connect\n _match_hostname(cert, self.assert_hostname or >> server_hostname)\n File >> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >> handling of the above exception, another exception occurred:\n\nTraceback >> (most recent call last):\n File >> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >> send\n timeout=timeout\n File >> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >> increment\n raise MaxRetryError(_pool, url, error or >> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >> retries exceeded with url: / (Caused by >> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >> match 'undercloud.com'\",),))\n\nDuring handling of the above >> exception, another exception occurred:\n\nTraceback (most recent call >> last):\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >> in request\n resp = self.send(prep, **send_kwargs)\n File >> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >> send\n r = adapter.send(request, **kwargs)\n File >> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >> retries exceeded with url: / (Caused by >> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >> match 'undercloud.com'\",),))\n\nDuring handling of the above >> exception, another exception occurred:\n\nTraceback (most recent call >> last):\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >> line 138, in _do_create_plugin\n authenticated=False)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >> 610, in get_discovery\n authenticated=authenticated)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >> in get_discovery\n disc = Discover(session, url, >> authenticated=authenticated)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >> in __init__\n authenticated=authenticated)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >> in get_version_data\n resp = session.get(url, headers=headers, >> authenticated=authenticated)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >> in get\n return self.request(url, 'GET', **kwargs)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >> request\n resp = send(**kwargs)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >> in _send_request\n raise >> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >> retries exceeded with url: / (Caused by >> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >> match 'undercloud.com'\",),))\n\nDuring handling of the above >> exception, another exception occurred:\n\nTraceback (most recent call >> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >> mod_name, mod_spec, pkg_name, script_name)\n File >> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >> run_globals)\n File >> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >> line 185, in <module>\n File >> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >> line 181, in main\n File >> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >> line 407, in __call__\n File >> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >> line 141, in run\n File >> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >> 517, in search_services\n services = self.list_services()\n File >> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >> 492, in list_services\n if self._is_client_version('identity', 2):\n >> File >> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >> line 460, in _is_client_version\n client = getattr(self, client_name)\n >> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >> line 32, in _identity_client\n 'identity', min_version=2, >> max_version='3.latest')\n File >> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >> **kwargs)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >> **kwargs)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >> 271, in get_endpoint_data\n service_catalog = >> self.get_access(session).service_catalog\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >> line 206, in get_auth_ref\n self._plugin = >> self._do_create_plugin(session)\n File >> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >> line 161, in _do_create_plugin\n 'auth_url is correct. %s' % >> e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find >> versioned identity endpoints when attempting to authenticate. Please check >> that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >> retries exceeded with url: / (Caused by >> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >> match 'overcloud.example.com'\",),))\n", "module_stdout": "", >> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >> 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | >> TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | >> 0:11:01.271914 | 2.47s >> 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | >> TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | >> 0:11:01.273659 | 2.47s >> >> PLAY RECAP >> ********************************************************************* >> localhost : ok=0 changed=0 unreachable=0 >> failed=0 skipped=2 rescued=0 ignored=0 >> overcloud-controller-0 : ok=437 changed=104 unreachable=0 >> failed=0 skipped=214 rescued=0 ignored=0 >> overcloud-controller-1 : ok=436 changed=101 unreachable=0 >> failed=0 skipped=214 rescued=0 ignored=0 >> overcloud-controller-2 : ok=431 changed=101 unreachable=0 >> failed=0 skipped=214 rescued=0 ignored=0 >> overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 >> failed=0 skipped=198 rescued=0 ignored=0 >> undercloud : ok=28 changed=7 unreachable=0 >> failed=1 skipped=3 rescued=0 ignored=0 >> 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total >> Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> >> >> in the deploy.sh: >> >> openstack overcloud deploy --templates \ >> -r /home/stack/templates/roles_data.yaml \ >> --networks-file /home/stack/templates/custom_network_data.yaml \ >> --vip-file /home/stack/templates/custom_vip_data.yaml \ >> --baremetal-deployment >> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >> --network-config \ >> -e /home/stack/templates/environment.yaml \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >> \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >> \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >> \ >> -e /home/stack/templates/ironic-config.yaml \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >> \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >> \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >> \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >> \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >> -e >> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >> -e /home/stack/containers-prepare-parameter.yaml >> >> Addition lines as highlighted in yellow were passed with >> modifications: >> tls-endpoints-public-ip.yaml: >> Passed as is in the defaults. >> enable-tls.yaml: >> >> # >> ******************************************************************* >> # This file was created automatically by the sample environment >> # generator. Developers should use `tox -e genconfig` to update it. >> # Users are recommended to make changes to a copy of the file >> instead >> # of the original, if any customizations are needed. >> # >> ******************************************************************* >> # title: Enable SSL on OpenStack Public Endpoints >> # description: | >> # Use this environment to pass in certificates for SSL >> deployments. >> # For these values to take effect, one of the tls-endpoints-*.yaml >> # environments must also be used. >> parameter_defaults: >> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >> # Type: boolean >> HorizonSecureCookies: True >> >> # Specifies the default CA cert to use if TLS is used for >> services in the public network. >> # Type: string >> PublicTLSCAFile: >> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >> >> # The content of the SSL certificate (without Key) in PEM format. >> # Type: string >> SSLRootCertificate: | >> -----BEGIN CERTIFICATE----- >> ----*** CERTICATELINES TRIMMED ** >> -----END CERTIFICATE----- >> >> SSLCertificate: | >> -----BEGIN CERTIFICATE----- >> ----*** CERTICATELINES TRIMMED ** >> -----END CERTIFICATE----- >> # The content of an SSL intermediate CA certificate in PEM format. >> # Type: string >> SSLIntermediateCertificate: '' >> >> # The content of the SSL Key in PEM format. >> # Type: string >> SSLKey: | >> -----BEGIN PRIVATE KEY----- >> ----*** CERTICATELINES TRIMMED ** >> -----END PRIVATE KEY----- >> >> # ****************************************************** >> # Static parameters - these are values that must be >> # included in the environment but should not be changed. >> # ****************************************************** >> # The filepath of the certificate as it will be stored in the >> controller. >> # Type: string >> DeployedSSLCertificatePath: >> /etc/pki/tls/private/overcloud_endpoint.pem >> >> # ********************* >> # End static parameters >> # ********************* >> >> inject-trust-anchor.yaml >> >> # >> ******************************************************************* >> # This file was created automatically by the sample environment >> # generator. Developers should use `tox -e genconfig` to update it. >> # Users are recommended to make changes to a copy of the file >> instead >> # of the original, if any customizations are needed. >> # >> ******************************************************************* >> # title: Inject SSL Trust Anchor on Overcloud Nodes >> # description: | >> # When using an SSL certificate signed by a CA that is not in the >> default >> # list of CAs, this environment allows adding a custom CA >> certificate to >> # the overcloud nodes. >> parameter_defaults: >> # The content of a CA's SSL certificate file in PEM format. This >> is evaluated on the client side. >> # Mandatory. This parameter must be set by the user. >> # Type: string >> SSLRootCertificate: | >> -----BEGIN CERTIFICATE----- >> ----*** CERTICATELINES TRIMMED ** >> -----END CERTIFICATE----- >> >> resource_registry: >> OS::TripleO::NodeTLSCAData: >> ../../puppet/extraconfig/tls/ca-inject.yaml >> >> >> >> >> The procedure to create such files was followed using: >> Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) >> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >> >> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >> IP-based certificate, without DNS. * >> >> Any idea around this error would be of great help. >> >> -- >> skype: lokendrarathour >> >> >>
--
-- ~ Lokendra skype: lokendrarathour
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error: 022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2. Certificate configs: [stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$ the difference we see from others is that we are using self-signed certificates. please let me know in case we need to check something else. Somehow this issue remains stuck. On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png]
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created.
DeprecationWarning
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
> I had faced a similar kind of issue, for ip based setup you need to > specify the domain name as the ip that you are going to use, this error is > showing up because the ssl is ip based but the fqdns seems to be > undercloud.com or overcloud.example.com. > I think for undercloud you can change the undercloud.conf. > > And will it work if we specify clouddomain parameter to the IP > address for overcloud? because it seems he has not specified the > clouddomain parameter and overcloud.example.com is the default > domain for overcloud.example.com. > > On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < > swogatpradhan22@gmail.com> wrote: > >> What is the domain name you have specified in the undercloud.conf >> file? >> And what is the fqdn name used for the generation of the SSL cert? >> >> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >> lokendrarathour@gmail.com> wrote: >> >>> Hi Team, >>> We were trying to install overcloud with SSL enabled for which the >>> UC is installed, but OC install is getting failed at step 4: >>> >>> ERROR >>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>> retries exceeded with url: / (Caused by >>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>> match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": >>> "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>> 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac >>> | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud >>> | item={'service_name': 'cinderv3', 'service_type': 'volume'} | >>> error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": >>> "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": >>> "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover >>> available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>> 600, in urlopen\n chunked=chunked)\n File >>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>> in _make_request\n self._validate_conn(conn)\n File >>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>> in _validate_conn\n conn.connect()\n File >>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>> connect\n _match_hostname(cert, self.assert_hostname or >>> server_hostname)\n File >>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>> handling of the above exception, another exception occurred:\n\nTraceback >>> (most recent call last):\n File >>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>> send\n timeout=timeout\n File >>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>> increment\n raise MaxRetryError(_pool, url, error or >>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>> retries exceeded with url: / (Caused by >>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>> exception, another exception occurred:\n\nTraceback (most recent call >>> last):\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>> in request\n resp = self.send(prep, **send_kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>> send\n r = adapter.send(request, **kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>> retries exceeded with url: / (Caused by >>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>> exception, another exception occurred:\n\nTraceback (most recent call >>> last):\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>> line 138, in _do_create_plugin\n authenticated=False)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>> 610, in get_discovery\n authenticated=authenticated)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>> in get_discovery\n disc = Discover(session, url, >>> authenticated=authenticated)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>> in __init__\n authenticated=authenticated)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>> in get_version_data\n resp = session.get(url, headers=headers, >>> authenticated=authenticated)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>> in get\n return self.request(url, 'GET', **kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>> request\n resp = send(**kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>> in _send_request\n raise >>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>> retries exceeded with url: / (Caused by >>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>> exception, another exception occurred:\n\nTraceback (most recent call >>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>> mod_name, mod_spec, pkg_name, script_name)\n File >>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>> run_globals)\n File >>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>> line 185, in <module>\n File >>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>> line 181, in main\n File >>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>> line 407, in __call__\n File >>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>> line 141, in run\n File >>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>> 517, in search_services\n services = self.list_services()\n File >>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>> File >>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>> line 32, in _identity_client\n 'identity', min_version=2, >>> max_version='3.latest')\n File >>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>> **kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>> **kwargs)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>> 271, in get_endpoint_data\n service_catalog = >>> self.get_access(session).service_catalog\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>> line 206, in get_auth_ref\n self._plugin = >>> self._do_create_plugin(session)\n File >>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>> line 161, in _do_create_plugin\n 'auth_url is correct. %s' % >>> e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find >>> versioned identity endpoints when attempting to authenticate. Please check >>> that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>> retries exceeded with url: / (Caused by >>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>> match 'overcloud.example.com'\",),))\n", "module_stdout": "", >>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>> 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac >>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>> | 0:11:01.271914 | 2.47s >>> 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac >>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>> | 0:11:01.273659 | 2.47s >>> >>> PLAY RECAP >>> ********************************************************************* >>> localhost : ok=0 changed=0 unreachable=0 >>> failed=0 skipped=2 rescued=0 ignored=0 >>> overcloud-controller-0 : ok=437 changed=104 unreachable=0 >>> failed=0 skipped=214 rescued=0 ignored=0 >>> overcloud-controller-1 : ok=436 changed=101 unreachable=0 >>> failed=0 skipped=214 rescued=0 ignored=0 >>> overcloud-controller-2 : ok=431 changed=101 unreachable=0 >>> failed=0 skipped=214 rescued=0 ignored=0 >>> overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 >>> failed=0 skipped=198 rescued=0 ignored=0 >>> undercloud : ok=28 changed=7 unreachable=0 >>> failed=1 skipped=3 rescued=0 ignored=0 >>> 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>> Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>> Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>> >>> >>> in the deploy.sh: >>> >>> openstack overcloud deploy --templates \ >>> -r /home/stack/templates/roles_data.yaml \ >>> --networks-file /home/stack/templates/custom_network_data.yaml >>> \ >>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>> --baremetal-deployment >>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>> --network-config \ >>> -e /home/stack/templates/environment.yaml \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>> \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>> \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>> \ >>> -e /home/stack/templates/ironic-config.yaml \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>> \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>> \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>> \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>> \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>> -e >>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>> -e /home/stack/containers-prepare-parameter.yaml >>> >>> Addition lines as highlighted in yellow were passed with >>> modifications: >>> tls-endpoints-public-ip.yaml: >>> Passed as is in the defaults. >>> enable-tls.yaml: >>> >>> # >>> ******************************************************************* >>> # This file was created automatically by the sample environment >>> # generator. Developers should use `tox -e genconfig` to update it. >>> # Users are recommended to make changes to a copy of the file >>> instead >>> # of the original, if any customizations are needed. >>> # >>> ******************************************************************* >>> # title: Enable SSL on OpenStack Public Endpoints >>> # description: | >>> # Use this environment to pass in certificates for SSL >>> deployments. >>> # For these values to take effect, one of the >>> tls-endpoints-*.yaml >>> # environments must also be used. >>> parameter_defaults: >>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>> # Type: boolean >>> HorizonSecureCookies: True >>> >>> # Specifies the default CA cert to use if TLS is used for >>> services in the public network. >>> # Type: string >>> PublicTLSCAFile: >>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>> >>> # The content of the SSL certificate (without Key) in PEM format. >>> # Type: string >>> SSLRootCertificate: | >>> -----BEGIN CERTIFICATE----- >>> ----*** CERTICATELINES TRIMMED ** >>> -----END CERTIFICATE----- >>> >>> SSLCertificate: | >>> -----BEGIN CERTIFICATE----- >>> ----*** CERTICATELINES TRIMMED ** >>> -----END CERTIFICATE----- >>> # The content of an SSL intermediate CA certificate in PEM >>> format. >>> # Type: string >>> SSLIntermediateCertificate: '' >>> >>> # The content of the SSL Key in PEM format. >>> # Type: string >>> SSLKey: | >>> -----BEGIN PRIVATE KEY----- >>> ----*** CERTICATELINES TRIMMED ** >>> -----END PRIVATE KEY----- >>> >>> # ****************************************************** >>> # Static parameters - these are values that must be >>> # included in the environment but should not be changed. >>> # ****************************************************** >>> # The filepath of the certificate as it will be stored in the >>> controller. >>> # Type: string >>> DeployedSSLCertificatePath: >>> /etc/pki/tls/private/overcloud_endpoint.pem >>> >>> # ********************* >>> # End static parameters >>> # ********************* >>> >>> inject-trust-anchor.yaml >>> >>> # >>> ******************************************************************* >>> # This file was created automatically by the sample environment >>> # generator. Developers should use `tox -e genconfig` to update it. >>> # Users are recommended to make changes to a copy of the file >>> instead >>> # of the original, if any customizations are needed. >>> # >>> ******************************************************************* >>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>> # description: | >>> # When using an SSL certificate signed by a CA that is not in >>> the default >>> # list of CAs, this environment allows adding a custom CA >>> certificate to >>> # the overcloud nodes. >>> parameter_defaults: >>> # The content of a CA's SSL certificate file in PEM format. This >>> is evaluated on the client side. >>> # Mandatory. This parameter must be set by the user. >>> # Type: string >>> SSLRootCertificate: | >>> -----BEGIN CERTIFICATE----- >>> ----*** CERTICATELINES TRIMMED ** >>> -----END CERTIFICATE----- >>> >>> resource_registry: >>> OS::TripleO::NodeTLSCAData: >>> ../../puppet/extraconfig/tls/ca-inject.yaml >>> >>> >>> >>> >>> The procedure to create such files was followed using: >>> Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) >>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>> >>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>> IP-based certificate, without DNS. * >>> >>> Any idea around this error would be of great help. >>> >>> -- >>> skype: lokendrarathour >>> >>> >>>
--
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hey, Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem. What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list Do you get the same error? Brendan Shephard Software Engineer Red Hat APAC <https://www.redhat.com> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit> On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, <lokendrarathour@gmail.com> wrote:
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png]
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
> Hi Shephard/Swogat, > I tried changing the setting as suggested and it looks like it has > failed at step 4 with error: > > :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | > tripleo_keystone_resources : Create identity public endpoint | undercloud | > 0:24:47.736198 | 2.21s > 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | > TASK | Create identity internal endpoint > 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | > FATAL | Create identity internal endpoint | undercloud | > error={"changed": false, "extra_data": {"data": null, "details": "The > request you have made requires authentication.", "response": > "{\"error\":{\"code\":401,\"message\":\"The request you have made requires > authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list > services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, > The request you have made requires authentication."} > 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 > > > Checking further the endpoint list: > I see only one endpoint for keystone is gettin created. > > DeprecationWarning > > +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ > | ID | Region | Service Name | > Service Type | Enabled | Interface | URL > | > > +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ > | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | > identity | True | admin | http://30.30.30.173:35357 > | > | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | > identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 > | > | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | > identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 > | > > +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ > > > it looks like something related to the SSL, we have also verified > that the GUI login screen shows that Certificates are applied. > exploring more in logs, meanwhile any suggestions or know > observation would be of great help. > thanks again for the support. > > Best Regards, > Lokendra > > > On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < > swogatpradhan22@gmail.com> wrote: > >> I had faced a similar kind of issue, for ip based setup you need to >> specify the domain name as the ip that you are going to use, this error is >> showing up because the ssl is ip based but the fqdns seems to be >> undercloud.com or overcloud.example.com. >> I think for undercloud you can change the undercloud.conf. >> >> And will it work if we specify clouddomain parameter to the IP >> address for overcloud? because it seems he has not specified the >> clouddomain parameter and overcloud.example.com is the default >> domain for overcloud.example.com. >> >> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >> swogatpradhan22@gmail.com> wrote: >> >>> What is the domain name you have specified in the undercloud.conf >>> file? >>> And what is the fqdn name used for the generation of the SSL cert? >>> >>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>> lokendrarathour@gmail.com> wrote: >>> >>>> Hi Team, >>>> We were trying to install overcloud with SSL enabled for which >>>> the UC is installed, but OC install is getting failed at step 4: >>>> >>>> ERROR >>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>> retries exceeded with url: / (Caused by >>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>> match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": >>>> "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>> 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac >>>> | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | item={'service_name': 'cinderv3', 'service_type': 'volume'} | >>>> error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": >>>> "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": >>>> "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover >>>> available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>>> 600, in urlopen\n chunked=chunked)\n File >>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>> in _make_request\n self._validate_conn(conn)\n File >>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>> in _validate_conn\n conn.connect()\n File >>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>> connect\n _match_hostname(cert, self.assert_hostname or >>>> server_hostname)\n File >>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>> handling of the above exception, another exception occurred:\n\nTraceback >>>> (most recent call last):\n File >>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>> send\n timeout=timeout\n File >>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>> increment\n raise MaxRetryError(_pool, url, error or >>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>> retries exceeded with url: / (Caused by >>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>> exception, another exception occurred:\n\nTraceback (most recent call >>>> last):\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>> send\n r = adapter.send(request, **kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>> retries exceeded with url: / (Caused by >>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>> exception, another exception occurred:\n\nTraceback (most recent call >>>> last):\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>> in get_discovery\n disc = Discover(session, url, >>>> authenticated=authenticated)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>> in __init__\n authenticated=authenticated)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>> in get_version_data\n resp = session.get(url, headers=headers, >>>> authenticated=authenticated)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>> request\n resp = send(**kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>> in _send_request\n raise >>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>> retries exceeded with url: / (Caused by >>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>> exception, another exception occurred:\n\nTraceback (most recent call >>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>> run_globals)\n File >>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>> line 185, in <module>\n File >>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>> line 181, in main\n File >>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>> line 407, in __call__\n File >>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>> line 141, in run\n File >>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>> 517, in search_services\n services = self.list_services()\n File >>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>> File >>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>> line 32, in _identity_client\n 'identity', min_version=2, >>>> max_version='3.latest')\n File >>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>> **kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>> **kwargs)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>> 271, in get_endpoint_data\n service_catalog = >>>> self.get_access(session).service_catalog\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>> line 206, in get_auth_ref\n self._plugin = >>>> self._do_create_plugin(session)\n File >>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>> line 161, in _do_create_plugin\n 'auth_url is correct. %s' % >>>> e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find >>>> versioned identity endpoints when attempting to authenticate. Please check >>>> that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>> retries exceeded with url: / (Caused by >>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>> match 'overcloud.example.com'\",),))\n", "module_stdout": "", >>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>> 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac >>>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | 0:11:01.271914 | 2.47s >>>> 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac >>>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | 0:11:01.273659 | 2.47s >>>> >>>> PLAY RECAP >>>> ********************************************************************* >>>> localhost : ok=0 changed=0 unreachable=0 >>>> failed=0 skipped=2 rescued=0 ignored=0 >>>> overcloud-controller-0 : ok=437 changed=104 unreachable=0 >>>> failed=0 skipped=214 rescued=0 ignored=0 >>>> overcloud-controller-1 : ok=436 changed=101 unreachable=0 >>>> failed=0 skipped=214 rescued=0 ignored=0 >>>> overcloud-controller-2 : ok=431 changed=101 unreachable=0 >>>> failed=0 skipped=214 rescued=0 ignored=0 >>>> overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 >>>> failed=0 skipped=198 rescued=0 ignored=0 >>>> undercloud : ok=28 changed=7 unreachable=0 >>>> failed=1 skipped=3 rescued=0 ignored=0 >>>> 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>> Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>> Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>> >>>> >>>> in the deploy.sh: >>>> >>>> openstack overcloud deploy --templates \ >>>> -r /home/stack/templates/roles_data.yaml \ >>>> --networks-file >>>> /home/stack/templates/custom_network_data.yaml \ >>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>> --baremetal-deployment >>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>> --network-config \ >>>> -e /home/stack/templates/environment.yaml \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>> \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>> \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>> \ >>>> -e /home/stack/templates/ironic-config.yaml \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>> \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>> \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>> \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>> \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>> -e >>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>> -e /home/stack/containers-prepare-parameter.yaml >>>> >>>> Addition lines as highlighted in yellow were passed with >>>> modifications: >>>> tls-endpoints-public-ip.yaml: >>>> Passed as is in the defaults. >>>> enable-tls.yaml: >>>> >>>> # >>>> ******************************************************************* >>>> # This file was created automatically by the sample environment >>>> # generator. Developers should use `tox -e genconfig` to update >>>> it. >>>> # Users are recommended to make changes to a copy of the file >>>> instead >>>> # of the original, if any customizations are needed. >>>> # >>>> ******************************************************************* >>>> # title: Enable SSL on OpenStack Public Endpoints >>>> # description: | >>>> # Use this environment to pass in certificates for SSL >>>> deployments. >>>> # For these values to take effect, one of the >>>> tls-endpoints-*.yaml >>>> # environments must also be used. >>>> parameter_defaults: >>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>>> # Type: boolean >>>> HorizonSecureCookies: True >>>> >>>> # Specifies the default CA cert to use if TLS is used for >>>> services in the public network. >>>> # Type: string >>>> PublicTLSCAFile: >>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>> >>>> # The content of the SSL certificate (without Key) in PEM >>>> format. >>>> # Type: string >>>> SSLRootCertificate: | >>>> -----BEGIN CERTIFICATE----- >>>> ----*** CERTICATELINES TRIMMED ** >>>> -----END CERTIFICATE----- >>>> >>>> SSLCertificate: | >>>> -----BEGIN CERTIFICATE----- >>>> ----*** CERTICATELINES TRIMMED ** >>>> -----END CERTIFICATE----- >>>> # The content of an SSL intermediate CA certificate in PEM >>>> format. >>>> # Type: string >>>> SSLIntermediateCertificate: '' >>>> >>>> # The content of the SSL Key in PEM format. >>>> # Type: string >>>> SSLKey: | >>>> -----BEGIN PRIVATE KEY----- >>>> ----*** CERTICATELINES TRIMMED ** >>>> -----END PRIVATE KEY----- >>>> >>>> # ****************************************************** >>>> # Static parameters - these are values that must be >>>> # included in the environment but should not be changed. >>>> # ****************************************************** >>>> # The filepath of the certificate as it will be stored in the >>>> controller. >>>> # Type: string >>>> DeployedSSLCertificatePath: >>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>> >>>> # ********************* >>>> # End static parameters >>>> # ********************* >>>> >>>> inject-trust-anchor.yaml >>>> >>>> # >>>> ******************************************************************* >>>> # This file was created automatically by the sample environment >>>> # generator. Developers should use `tox -e genconfig` to update >>>> it. >>>> # Users are recommended to make changes to a copy of the file >>>> instead >>>> # of the original, if any customizations are needed. >>>> # >>>> ******************************************************************* >>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>> # description: | >>>> # When using an SSL certificate signed by a CA that is not in >>>> the default >>>> # list of CAs, this environment allows adding a custom CA >>>> certificate to >>>> # the overcloud nodes. >>>> parameter_defaults: >>>> # The content of a CA's SSL certificate file in PEM format. >>>> This is evaluated on the client side. >>>> # Mandatory. This parameter must be set by the user. >>>> # Type: string >>>> SSLRootCertificate: | >>>> -----BEGIN CERTIFICATE----- >>>> ----*** CERTICATELINES TRIMMED ** >>>> -----END CERTIFICATE----- >>>> >>>> resource_registry: >>>> OS::TripleO::NodeTLSCAData: >>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>> >>>> >>>> >>>> >>>> The procedure to create such files was followed using: >>>> Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) >>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>> >>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>> IP-based certificate, without DNS. * >>>> >>>> Any idea around this error would be of great help. >>>> >>>> -- >>>> skype: lokendrarathour >>>> >>>> >>>> > > >
--
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this: (undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list +----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL | +----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 | +----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$ On the other note that i notices was as below: - HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms do let me know in case we need anything more around it. thanks once again for the support. -Lokendra On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan <swogatpradhan22@gmail.com> wrote:
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < lokendrarathour@gmail.com> wrote:
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png]
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < lokendrarathour@gmail.com> wrote:
> Hi Team, > Any input on this case raised. > > Thanks, > Lokendra > > > On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < > lokendrarathour@gmail.com> wrote: > >> Hi Shephard/Swogat, >> I tried changing the setting as suggested and it looks like it has >> failed at step 4 with error: >> >> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | >> tripleo_keystone_resources : Create identity public endpoint | undercloud | >> 0:24:47.736198 | 2.21s >> 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | >> TASK | Create identity internal endpoint >> 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | >> FATAL | Create identity internal endpoint | undercloud | >> error={"changed": false, "extra_data": {"data": null, "details": "The >> request you have made requires authentication.", "response": >> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >> The request you have made requires authentication."} >> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >> >> >> Checking further the endpoint list: >> I see only one endpoint for keystone is gettin created. >> >> DeprecationWarning >> >> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >> | ID | Region | Service Name | >> Service Type | Enabled | Interface | URL >> | >> >> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | >> identity | True | admin | http://30.30.30.173:35357 >> | >> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | >> identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 >> | >> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | >> identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 >> | >> >> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >> >> >> it looks like something related to the SSL, we have also verified >> that the GUI login screen shows that Certificates are applied. >> exploring more in logs, meanwhile any suggestions or know >> observation would be of great help. >> thanks again for the support. >> >> Best Regards, >> Lokendra >> >> >> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >> swogatpradhan22@gmail.com> wrote: >> >>> I had faced a similar kind of issue, for ip based setup you need >>> to specify the domain name as the ip that you are going to use, this error >>> is showing up because the ssl is ip based but the fqdns seems to be >>> undercloud.com or overcloud.example.com. >>> I think for undercloud you can change the undercloud.conf. >>> >>> And will it work if we specify clouddomain parameter to the IP >>> address for overcloud? because it seems he has not specified the >>> clouddomain parameter and overcloud.example.com is the default >>> domain for overcloud.example.com. >>> >>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>> swogatpradhan22@gmail.com> wrote: >>> >>>> What is the domain name you have specified in the undercloud.conf >>>> file? >>>> And what is the fqdn name used for the generation of the SSL cert? >>>> >>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>> lokendrarathour@gmail.com> wrote: >>>> >>>>> Hi Team, >>>>> We were trying to install overcloud with SSL enabled for which >>>>> the UC is installed, but OC install is getting failed at step 4: >>>>> >>>>> ERROR >>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>> retries exceeded with url: / (Caused by >>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": >>>>> "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>> 2022-07-08 17:03:23.606739 | >>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>> identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>>>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>>>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>>>> 600, in urlopen\n chunked=chunked)\n File >>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>> in _make_request\n self._validate_conn(conn)\n File >>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>> in _validate_conn\n conn.connect()\n File >>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>> server_hostname)\n File >>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>> (most recent call last):\n File >>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>> send\n timeout=timeout\n File >>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>> retries exceeded with url: / (Caused by >>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>> last):\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>> retries exceeded with url: / (Caused by >>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>> last):\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>> in get_discovery\n disc = Discover(session, url, >>>>> authenticated=authenticated)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>> in __init__\n authenticated=authenticated)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>> authenticated=authenticated)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>> request\n resp = send(**kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>> in _send_request\n raise >>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>> retries exceeded with url: / (Caused by >>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>> run_globals)\n File >>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>> line 185, in <module>\n File >>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>> line 181, in main\n File >>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>> line 407, in __call__\n File >>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>> line 141, in run\n File >>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>> 517, in search_services\n services = self.list_services()\n File >>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>> File >>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>> max_version='3.latest')\n File >>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>> **kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>> **kwargs)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>> 271, in get_endpoint_data\n service_catalog = >>>>> self.get_access(session).service_catalog\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>> line 206, in get_auth_ref\n self._plugin = >>>>> self._do_create_plugin(session)\n File >>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>> line 161, in _do_create_plugin\n 'auth_url is correct. %s' % >>>>> e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find >>>>> versioned identity endpoints when attempting to authenticate. Please check >>>>> that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>> retries exceeded with url: / (Caused by >>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": "", >>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>> 2022-07-08 17:03:23.609354 | >>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>> 2022-07-08 17:03:23.611094 | >>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>> >>>>> PLAY RECAP >>>>> ********************************************************************* >>>>> localhost : ok=0 changed=0 unreachable=0 >>>>> failed=0 skipped=2 rescued=0 ignored=0 >>>>> overcloud-controller-0 : ok=437 changed=104 unreachable=0 >>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>> overcloud-controller-1 : ok=436 changed=101 unreachable=0 >>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>> overcloud-controller-2 : ok=431 changed=101 unreachable=0 >>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>> overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 >>>>> failed=0 skipped=198 rescued=0 ignored=0 >>>>> undercloud : ok=28 changed=7 unreachable=0 >>>>> failed=1 skipped=3 rescued=0 ignored=0 >>>>> 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>> Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>> Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>> >>>>> >>>>> in the deploy.sh: >>>>> >>>>> openstack overcloud deploy --templates \ >>>>> -r /home/stack/templates/roles_data.yaml \ >>>>> --networks-file >>>>> /home/stack/templates/custom_network_data.yaml \ >>>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>>> --baremetal-deployment >>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>> --network-config \ >>>>> -e /home/stack/templates/environment.yaml \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>> \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>> \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>> \ >>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>> \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>> \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>> \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>> \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>> -e >>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>> >>>>> Addition lines as highlighted in yellow were passed with >>>>> modifications: >>>>> tls-endpoints-public-ip.yaml: >>>>> Passed as is in the defaults. >>>>> enable-tls.yaml: >>>>> >>>>> # >>>>> ******************************************************************* >>>>> # This file was created automatically by the sample environment >>>>> # generator. Developers should use `tox -e genconfig` to update >>>>> it. >>>>> # Users are recommended to make changes to a copy of the file >>>>> instead >>>>> # of the original, if any customizations are needed. >>>>> # >>>>> ******************************************************************* >>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>> # description: | >>>>> # Use this environment to pass in certificates for SSL >>>>> deployments. >>>>> # For these values to take effect, one of the >>>>> tls-endpoints-*.yaml >>>>> # environments must also be used. >>>>> parameter_defaults: >>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>>>> # Type: boolean >>>>> HorizonSecureCookies: True >>>>> >>>>> # Specifies the default CA cert to use if TLS is used for >>>>> services in the public network. >>>>> # Type: string >>>>> PublicTLSCAFile: >>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>> >>>>> # The content of the SSL certificate (without Key) in PEM >>>>> format. >>>>> # Type: string >>>>> SSLRootCertificate: | >>>>> -----BEGIN CERTIFICATE----- >>>>> ----*** CERTICATELINES TRIMMED ** >>>>> -----END CERTIFICATE----- >>>>> >>>>> SSLCertificate: | >>>>> -----BEGIN CERTIFICATE----- >>>>> ----*** CERTICATELINES TRIMMED ** >>>>> -----END CERTIFICATE----- >>>>> # The content of an SSL intermediate CA certificate in PEM >>>>> format. >>>>> # Type: string >>>>> SSLIntermediateCertificate: '' >>>>> >>>>> # The content of the SSL Key in PEM format. >>>>> # Type: string >>>>> SSLKey: | >>>>> -----BEGIN PRIVATE KEY----- >>>>> ----*** CERTICATELINES TRIMMED ** >>>>> -----END PRIVATE KEY----- >>>>> >>>>> # ****************************************************** >>>>> # Static parameters - these are values that must be >>>>> # included in the environment but should not be changed. >>>>> # ****************************************************** >>>>> # The filepath of the certificate as it will be stored in the >>>>> controller. >>>>> # Type: string >>>>> DeployedSSLCertificatePath: >>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>> >>>>> # ********************* >>>>> # End static parameters >>>>> # ********************* >>>>> >>>>> inject-trust-anchor.yaml >>>>> >>>>> # >>>>> ******************************************************************* >>>>> # This file was created automatically by the sample environment >>>>> # generator. Developers should use `tox -e genconfig` to update >>>>> it. >>>>> # Users are recommended to make changes to a copy of the file >>>>> instead >>>>> # of the original, if any customizations are needed. >>>>> # >>>>> ******************************************************************* >>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>> # description: | >>>>> # When using an SSL certificate signed by a CA that is not in >>>>> the default >>>>> # list of CAs, this environment allows adding a custom CA >>>>> certificate to >>>>> # the overcloud nodes. >>>>> parameter_defaults: >>>>> # The content of a CA's SSL certificate file in PEM format. >>>>> This is evaluated on the client side. >>>>> # Mandatory. This parameter must be set by the user. >>>>> # Type: string >>>>> SSLRootCertificate: | >>>>> -----BEGIN CERTIFICATE----- >>>>> ----*** CERTICATELINES TRIMMED ** >>>>> -----END CERTIFICATE----- >>>>> >>>>> resource_registry: >>>>> OS::TripleO::NodeTLSCAData: >>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>> >>>>> >>>>> >>>>> >>>>> The procedure to create such files was followed using: >>>>> Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) >>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>> >>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>> IP-based certificate, without DNS. * >>>>> >>>>> Any idea around this error would be of great help. >>>>> >>>>> -- >>>>> skype: lokendrarathour >>>>> >>>>> >>>>> >> >> >> > > -- >
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hi Brendan / Team, Any lead for the issue raised? -Lokendra On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this:
(undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below:
- HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms
do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < lokendrarathour@gmail.com> wrote:
HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. [image: image.png]
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe < vikarnatathe@gmail.com> wrote:
> Hi Lokendra, > > Are you able to access all the tabs in the OpenStack dashboard > without any error? If not, please retry generating the certificate. Also, > share the openssl.cnf or server.cnf. > > On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < > lokendrarathour@gmail.com> wrote: > >> Hi Team, >> Any input on this case raised. >> >> Thanks, >> Lokendra >> >> >> On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < >> lokendrarathour@gmail.com> wrote: >> >>> Hi Shephard/Swogat, >>> I tried changing the setting as suggested and it looks like it has >>> failed at step 4 with error: >>> >>> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING >>> | tripleo_keystone_resources : Create identity public endpoint | undercloud >>> | 0:24:47.736198 | 2.21s >>> 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf >>> | TASK | Create identity internal endpoint >>> 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf >>> | FATAL | Create identity internal endpoint | undercloud | >>> error={"changed": false, "extra_data": {"data": null, "details": "The >>> request you have made requires authentication.", "response": >>> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >>> The request you have made requires authentication."} >>> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >>> >>> >>> Checking further the endpoint list: >>> I see only one endpoint for keystone is gettin created. >>> >>> DeprecationWarning >>> >>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>> | ID | Region | Service Name | >>> Service Type | Enabled | Interface | URL >>> | >>> >>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | >>> identity | True | admin | http://30.30.30.173:35357 >>> | >>> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | >>> identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 >>> | >>> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | >>> identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 >>> | >>> >>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>> >>> >>> it looks like something related to the SSL, we have also verified >>> that the GUI login screen shows that Certificates are applied. >>> exploring more in logs, meanwhile any suggestions or know >>> observation would be of great help. >>> thanks again for the support. >>> >>> Best Regards, >>> Lokendra >>> >>> >>> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >>> swogatpradhan22@gmail.com> wrote: >>> >>>> I had faced a similar kind of issue, for ip based setup you need >>>> to specify the domain name as the ip that you are going to use, this error >>>> is showing up because the ssl is ip based but the fqdns seems to be >>>> undercloud.com or overcloud.example.com. >>>> I think for undercloud you can change the undercloud.conf. >>>> >>>> And will it work if we specify clouddomain parameter to the IP >>>> address for overcloud? because it seems he has not specified the >>>> clouddomain parameter and overcloud.example.com is the default >>>> domain for overcloud.example.com. >>>> >>>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>>> swogatpradhan22@gmail.com> wrote: >>>> >>>>> What is the domain name you have specified in the >>>>> undercloud.conf file? >>>>> And what is the fqdn name used for the generation of the SSL >>>>> cert? >>>>> >>>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>>> lokendrarathour@gmail.com> wrote: >>>>> >>>>>> Hi Team, >>>>>> We were trying to install overcloud with SSL enabled for which >>>>>> the UC is installed, but OC install is getting failed at step 4: >>>>>> >>>>>> ERROR >>>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>> retries exceeded with url: / (Caused by >>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": >>>>>> "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>> 2022-07-08 17:03:23.606739 | >>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>>> identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>>>>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>>>>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>>>>> 600, in urlopen\n chunked=chunked)\n File >>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>>> in _make_request\n self._validate_conn(conn)\n File >>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>>> in _validate_conn\n conn.connect()\n File >>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>>> server_hostname)\n File >>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>>> (most recent call last):\n File >>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>>> send\n timeout=timeout\n File >>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>> retries exceeded with url: / (Caused by >>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>>> last):\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>> retries exceeded with url: / (Caused by >>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>>> last):\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>>> in get_discovery\n disc = Discover(session, url, >>>>>> authenticated=authenticated)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>>> in __init__\n authenticated=authenticated)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>>> authenticated=authenticated)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>>> request\n resp = send(**kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>>> in _send_request\n raise >>>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>> retries exceeded with url: / (Caused by >>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>>> run_globals)\n File >>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>> line 185, in <module>\n File >>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>> line 181, in main\n File >>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>>> line 407, in __call__\n File >>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>> line 141, in run\n File >>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>> 517, in search_services\n services = self.list_services()\n File >>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>>> File >>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>>> max_version='3.latest')\n File >>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>>> **kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>>> **kwargs)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>> 271, in get_endpoint_data\n service_catalog = >>>>>> self.get_access(session).service_catalog\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>> line 206, in get_auth_ref\n self._plugin = >>>>>> self._do_create_plugin(session)\n File >>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>> line 161, in _do_create_plugin\n 'auth_url is correct. %s' >>>>>> % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find >>>>>> versioned identity endpoints when attempting to authenticate. Please check >>>>>> that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>> retries exceeded with url: / (Caused by >>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": "", >>>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>> 2022-07-08 17:03:23.609354 | >>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>>> 2022-07-08 17:03:23.611094 | >>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>>> >>>>>> PLAY RECAP >>>>>> ********************************************************************* >>>>>> localhost : ok=0 changed=0 unreachable=0 >>>>>> failed=0 skipped=2 rescued=0 ignored=0 >>>>>> overcloud-controller-0 : ok=437 changed=104 unreachable=0 >>>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>>> overcloud-controller-1 : ok=436 changed=101 unreachable=0 >>>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>>> overcloud-controller-2 : ok=431 changed=101 unreachable=0 >>>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>>> overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 >>>>>> failed=0 skipped=198 rescued=0 ignored=0 >>>>>> undercloud : ok=28 changed=7 unreachable=0 >>>>>> failed=1 skipped=3 rescued=0 ignored=0 >>>>>> 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>> Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>> Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>> >>>>>> >>>>>> in the deploy.sh: >>>>>> >>>>>> openstack overcloud deploy --templates \ >>>>>> -r /home/stack/templates/roles_data.yaml \ >>>>>> --networks-file >>>>>> /home/stack/templates/custom_network_data.yaml \ >>>>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>>>> --baremetal-deployment >>>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>>> --network-config \ >>>>>> -e /home/stack/templates/environment.yaml \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>>> \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>>> \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>>> \ >>>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>>> \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>>> \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>>> \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>>> \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>>> -e >>>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>>> >>>>>> Addition lines as highlighted in yellow were passed with >>>>>> modifications: >>>>>> tls-endpoints-public-ip.yaml: >>>>>> Passed as is in the defaults. >>>>>> enable-tls.yaml: >>>>>> >>>>>> # >>>>>> ******************************************************************* >>>>>> # This file was created automatically by the sample environment >>>>>> # generator. Developers should use `tox -e genconfig` to update >>>>>> it. >>>>>> # Users are recommended to make changes to a copy of the file >>>>>> instead >>>>>> # of the original, if any customizations are needed. >>>>>> # >>>>>> ******************************************************************* >>>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>>> # description: | >>>>>> # Use this environment to pass in certificates for SSL >>>>>> deployments. >>>>>> # For these values to take effect, one of the >>>>>> tls-endpoints-*.yaml >>>>>> # environments must also be used. >>>>>> parameter_defaults: >>>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>>>>> # Type: boolean >>>>>> HorizonSecureCookies: True >>>>>> >>>>>> # Specifies the default CA cert to use if TLS is used for >>>>>> services in the public network. >>>>>> # Type: string >>>>>> PublicTLSCAFile: >>>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>>> >>>>>> # The content of the SSL certificate (without Key) in PEM >>>>>> format. >>>>>> # Type: string >>>>>> SSLRootCertificate: | >>>>>> -----BEGIN CERTIFICATE----- >>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>> -----END CERTIFICATE----- >>>>>> >>>>>> SSLCertificate: | >>>>>> -----BEGIN CERTIFICATE----- >>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>> -----END CERTIFICATE----- >>>>>> # The content of an SSL intermediate CA certificate in PEM >>>>>> format. >>>>>> # Type: string >>>>>> SSLIntermediateCertificate: '' >>>>>> >>>>>> # The content of the SSL Key in PEM format. >>>>>> # Type: string >>>>>> SSLKey: | >>>>>> -----BEGIN PRIVATE KEY----- >>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>> -----END PRIVATE KEY----- >>>>>> >>>>>> # ****************************************************** >>>>>> # Static parameters - these are values that must be >>>>>> # included in the environment but should not be changed. >>>>>> # ****************************************************** >>>>>> # The filepath of the certificate as it will be stored in the >>>>>> controller. >>>>>> # Type: string >>>>>> DeployedSSLCertificatePath: >>>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>>> >>>>>> # ********************* >>>>>> # End static parameters >>>>>> # ********************* >>>>>> >>>>>> inject-trust-anchor.yaml >>>>>> >>>>>> # >>>>>> ******************************************************************* >>>>>> # This file was created automatically by the sample environment >>>>>> # generator. Developers should use `tox -e genconfig` to update >>>>>> it. >>>>>> # Users are recommended to make changes to a copy of the file >>>>>> instead >>>>>> # of the original, if any customizations are needed. >>>>>> # >>>>>> ******************************************************************* >>>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>>> # description: | >>>>>> # When using an SSL certificate signed by a CA that is not in >>>>>> the default >>>>>> # list of CAs, this environment allows adding a custom CA >>>>>> certificate to >>>>>> # the overcloud nodes. >>>>>> parameter_defaults: >>>>>> # The content of a CA's SSL certificate file in PEM format. >>>>>> This is evaluated on the client side. >>>>>> # Mandatory. This parameter must be set by the user. >>>>>> # Type: string >>>>>> SSLRootCertificate: | >>>>>> -----BEGIN CERTIFICATE----- >>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>> -----END CERTIFICATE----- >>>>>> >>>>>> resource_registry: >>>>>> OS::TripleO::NodeTLSCAData: >>>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> The procedure to create such files was followed using: >>>>>> Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) >>>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>>> >>>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>>> IP-based certificate, without DNS. * >>>>>> >>>>>> Any idea around this error would be of great help. >>>>>> >>>>>> -- >>>>>> skype: lokendrarathour >>>>>> >>>>>> >>>>>> >>> >>> >>> >> >> -- >> >
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hey, I think it's weird that you got a response at all when you run the openstack endpoint list, since you said haproxy isn't running. So there should be nothing serving that endpoint. I noticed you have the stackrc file sourced. Try it again without that file sourced, so: $ su - stack $ OS_CLOUD=overcloud openstack endpoint list I would suspect that nothing should be responding. It could be the stackrc file causing issues with some of the environment variables. If the above command doesn't return anything, then my suggestion would be to re-run the deployment like this: $ su - stack $ export OS_CLOUD=undercloud # Then run your deployment script again $ bash overcloud_deploy.sh The OS_CLOUD variable tells the openstackclient to lookup the details about that cloud from your clouds.yaml file. Which will be located in /home/stack/.config/openstack/clouds.yaml. This method is preferable to the sourcing of RC files. Reference: https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_conf... Regarding the HAProxy warnings. I don't think they should be fatal. afaik, HAProxy should still be starting. If it's not, there might be another error that you will need to look for in the log files under /var/log/containers/haproxy/ I wasn't able to reproduce that warning by following the documentation for enabling TLS though. So it seems like an odd error to be getting. Brendan Shephard Software Engineer Red Hat APAC <https://www.redhat.com> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit> On Wed, Jul 20, 2022 at 7:02 PM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Brendan / Team, Any lead for the issue raised?
-Lokendra
On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this:
(undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below:
- HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms
do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < lokendrarathour@gmail.com> wrote:
> HI Vikarna, > Thanks for the inputs. > I am note able to access any tabs in GUI. > [image: image.png] > > to re-state, we are failing at the time of deployment at step4 : > > > PLAY [External deployment step 4] > ********************************************** > 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | > TASK | External deployment step 4 > 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | > OK | External deployment step 4 | undercloud -> localhost | result={ > "changed": false, > "msg": "Use --start-at-task 'External deployment step 4' to > resume from this task" > } > [WARNING]: ('undercloud -> localhost', > '525400ae-089b-870a-fab6-0000000000d7') > missing from stats > 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | > TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s > 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | > INCLUDED | > /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml > | undercloud > 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | > TASK | Clean up legacy Cinder keystone catalog entries > 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | > OK | Clean up legacy Cinder keystone catalog entries | undercloud | > item={'service_name': 'cinderv2', 'service_type': 'volumev2'} > 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | > TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | > 0:11:24.204562 | 2.48s > 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | > OK | Clean up legacy Cinder keystone catalog entries | undercloud | > item={'service_name': 'cinderv3', 'service_type': 'volume'} > 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | > TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | > 0:11:26.122584 | 4.40s > 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | > TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | > 0:11:26.124296 | 4.40s > 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | > TASK | Manage Keystone resources for OpenStack services > 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | > TIMING | Manage Keystone resources for OpenStack services | undercloud > | 0:11:26.169842 | 0.03s > 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | > TASK | Gather variables for each operating system > 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | > TIMING | tripleo_keystone_resources : Gather variables for each > operating system | undercloud | 0:11:26.253383 | 0.04s > 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | > TASK | Create Keystone Admin resources > 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | > TIMING | tripleo_keystone_resources : Create Keystone Admin resources | > undercloud | 0:11:26.299608 | 0.03s > 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | > INCLUDED | > /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | > undercloud > 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | > TASK | Create default domain > 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | > OK | Create default domain | undercloud > 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | > TIMING | tripleo_keystone_resources : Create default domain | > undercloud | 0:11:28.437360 | 2.09s > 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | > TASK | Create admin and service projects > 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | > TIMING | tripleo_keystone_resources : Create admin and service projects > | undercloud | 0:11:28.483468 | 0.03s > 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | > INCLUDED | > /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | > undercloud > 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | > TASK | Async creation of Keystone project > 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | > CHANGED | Async creation of Keystone project | undercloud | item=admin > 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | > TIMING | tripleo_keystone_resources : Async creation of Keystone > project | undercloud | 0:11:29.238078 | 0.72s > 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | > CHANGED | Async creation of Keystone project | undercloud | item=service > 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | > TIMING | tripleo_keystone_resources : Async creation of Keystone > project | undercloud | 0:11:29.586587 | 1.06s > 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | > TIMING | tripleo_keystone_resources : Async creation of Keystone > project | undercloud | 0:11:29.587916 | 1.07s > 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | > TASK | Check Keystone project status > 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | > WAITING | Check Keystone project status | undercloud | 30 retries left > 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | > OK | Check Keystone project status | undercloud | item=admin > 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | > TIMING | tripleo_keystone_resources : Check Keystone project status | > undercloud | 0:11:35.260666 | 5.66s > 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | > OK | Check Keystone project status | undercloud | item=service > 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | > TIMING | tripleo_keystone_resources : Check Keystone project status | > undercloud | 0:11:35.494729 | 5.89s > 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | > TIMING | tripleo_keystone_resources : Check Keystone project status | > undercloud | 0:11:35.498771 | 5.89s > 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | > TASK | Create admin role > 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | > OK | Create admin role | undercloud > 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | > TIMING | tripleo_keystone_resources : Create admin role | undercloud | > 0:11:37.725949 | 2.20s > 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | > TASK | Create _member_ role > 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | > SKIPPED | Create _member_ role | undercloud > 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | > TIMING | tripleo_keystone_resources : Create _member_ role | undercloud > | 0:11:37.783369 | 0.04s > 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | > TASK | Create admin user > 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | > CHANGED | Create admin user | undercloud > 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | > TIMING | tripleo_keystone_resources : Create admin user | undercloud | > 0:11:41.145472 | 3.34s > 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | > TASK | Assign admin role to admin project for admin user > 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | > OK | Assign admin role to admin project for admin user | undercloud > 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | > TIMING | tripleo_keystone_resources : Assign admin role to admin > project for admin user | undercloud | 0:11:44.288848 | 3.13s > 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | > TASK | Assign _member_ role to admin project for admin user > 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | > SKIPPED | Assign _member_ role to admin project for admin user | > undercloud > 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | > TIMING | tripleo_keystone_resources : Assign _member_ role to admin > project for admin user | undercloud | 0:11:44.346479 | 0.04s > 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | > TASK | Create identity service > 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | > OK | Create identity service | undercloud > 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | > TIMING | tripleo_keystone_resources : Create identity service | > undercloud | 0:11:46.022362 | 1.66s > 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | > TASK | Create identity public endpoint > 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | > OK | Create identity public endpoint | undercloud > 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | > TIMING | tripleo_keystone_resources : Create identity public endpoint | > undercloud | 0:11:48.233349 | 2.19s > 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | > TASK | Create identity internal endpoint > 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | > FATAL | Create identity internal endpoint | undercloud | > error={"changed": false, "extra_data": {"data": null, "details": "The > request you have made requires authentication.", "response": > "{\"error\":{\"code\":401,\"message\":\"The request you have made requires > authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list > services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, > The request you have made requires authentication."} > 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | > TIMING | tripleo_keystone_resources : Create identity internal endpoint > | undercloud | 0:11:50.660654 | 2.41s > > PLAY RECAP > ********************************************************************* > localhost : ok=1 changed=0 unreachable=0 > failed=0 skipped=2 rescued=0 ignored=0 > overcloud-controller-0 : ok=437 changed=103 unreachable=0 > failed=0 skipped=214 rescued=0 ignored=0 > overcloud-controller-1 : ok=435 changed=101 unreachable=0 > failed=0 skipped=214 rescued=0 ignored=0 > overcloud-controller-2 : ok=432 changed=101 unreachable=0 > failed=0 skipped=214 rescued=0 ignored=0 > overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 > failed=0 skipped=198 rescued=0 ignored=0 > undercloud : ok=39 changed=7 unreachable=0 > failed=1 skipped=6 rescued=0 ignored=0 > > Also : > (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf > [req] > default_bits = 2048 > prompt = no > default_md = sha256 > distinguished_name = dn > [dn] > C=IN > ST=UTTAR PRADESH > L=NOIDA > O=HSC > OU=HSC > emailAddress=demo@demo.com > > v3.ext: > (undercloud) [stack@undercloud oc-cert]$ cat v3.ext > authorityKeyIdentifier=keyid,issuer > basicConstraints=CA:FALSE > keyUsage = digitalSignature, nonRepudiation, keyEncipherment, > dataEncipherment > subjectAltName = @alt_names > [alt_names] > IP.1=fd00:fd00:fd00:9900::81 > > Using these files we create other certificates. > Please check and let me know in case we need anything else. > > > On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe < > vikarnatathe@gmail.com> wrote: > >> Hi Lokendra, >> >> Are you able to access all the tabs in the OpenStack dashboard >> without any error? If not, please retry generating the certificate. Also, >> share the openssl.cnf or server.cnf. >> >> On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < >> lokendrarathour@gmail.com> wrote: >> >>> Hi Team, >>> Any input on this case raised. >>> >>> Thanks, >>> Lokendra >>> >>> >>> On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < >>> lokendrarathour@gmail.com> wrote: >>> >>>> Hi Shephard/Swogat, >>>> I tried changing the setting as suggested and it looks like it >>>> has failed at step 4 with error: >>>> >>>> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING >>>> | tripleo_keystone_resources : Create identity public endpoint | undercloud >>>> | 0:24:47.736198 | 2.21s >>>> 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf >>>> | TASK | Create identity internal endpoint >>>> 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf >>>> | FATAL | Create identity internal endpoint | undercloud | >>>> error={"changed": false, "extra_data": {"data": null, "details": "The >>>> request you have made requires authentication.", "response": >>>> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >>>> The request you have made requires authentication."} >>>> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >>>> >>>> >>>> Checking further the endpoint list: >>>> I see only one endpoint for keystone is gettin created. >>>> >>>> DeprecationWarning >>>> >>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>> | ID | Region | Service Name | >>>> Service Type | Enabled | Interface | URL >>>> | >>>> >>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | >>>> identity | True | admin | http://30.30.30.173:35357 >>>> | >>>> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | >>>> identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 >>>> | >>>> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | >>>> identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 >>>> | >>>> >>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>> >>>> >>>> it looks like something related to the SSL, we have also verified >>>> that the GUI login screen shows that Certificates are applied. >>>> exploring more in logs, meanwhile any suggestions or know >>>> observation would be of great help. >>>> thanks again for the support. >>>> >>>> Best Regards, >>>> Lokendra >>>> >>>> >>>> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >>>> swogatpradhan22@gmail.com> wrote: >>>> >>>>> I had faced a similar kind of issue, for ip based setup you need >>>>> to specify the domain name as the ip that you are going to use, this error >>>>> is showing up because the ssl is ip based but the fqdns seems to be >>>>> undercloud.com or overcloud.example.com. >>>>> I think for undercloud you can change the undercloud.conf. >>>>> >>>>> And will it work if we specify clouddomain parameter to the IP >>>>> address for overcloud? because it seems he has not specified the >>>>> clouddomain parameter and overcloud.example.com is the default >>>>> domain for overcloud.example.com. >>>>> >>>>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>>>> swogatpradhan22@gmail.com> wrote: >>>>> >>>>>> What is the domain name you have specified in the >>>>>> undercloud.conf file? >>>>>> And what is the fqdn name used for the generation of the SSL >>>>>> cert? >>>>>> >>>>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>>>> lokendrarathour@gmail.com> wrote: >>>>>> >>>>>>> Hi Team, >>>>>>> We were trying to install overcloud with SSL enabled for which >>>>>>> the UC is installed, but OC install is getting failed at step 4: >>>>>>> >>>>>>> ERROR >>>>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): >>>>>>> Max retries exceeded with url: / (Caused by >>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", "msg": >>>>>>> "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>> 2022-07-08 17:03:23.606739 | >>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>>>> identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>>>>>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>>>>>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>>>>>> 600, in urlopen\n chunked=chunked)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>>>> in _make_request\n self._validate_conn(conn)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>>>> in _validate_conn\n conn.connect()\n File >>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>>>> server_hostname)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>>>> (most recent call last):\n File >>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>>>> send\n timeout=timeout\n File >>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>> retries exceeded with url: / (Caused by >>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>>>> last):\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>> retries exceeded with url: / (Caused by >>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>>>> last):\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>>>> in get_discovery\n disc = Discover(session, url, >>>>>>> authenticated=authenticated)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>>>> in __init__\n authenticated=authenticated)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>>>> authenticated=authenticated)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>>>> request\n resp = send(**kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>>>> in _send_request\n raise >>>>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>>>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>> retries exceeded with url: / (Caused by >>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the above >>>>>>> exception, another exception occurred:\n\nTraceback (most recent call >>>>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>>>> run_globals)\n File >>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>> line 185, in <module>\n File >>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>> line 181, in main\n File >>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>>>> line 407, in __call__\n File >>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>> line 141, in run\n File >>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>> 517, in search_services\n services = self.list_services()\n File >>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>>>> File >>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>>>> max_version='3.latest')\n File >>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>>>> **kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>>>> **kwargs)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>> 271, in get_endpoint_data\n service_catalog = >>>>>>> self.get_access(session).service_catalog\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>> line 206, in get_auth_ref\n self._plugin = >>>>>>> self._do_create_plugin(session)\n File >>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>> line 161, in _do_create_plugin\n 'auth_url is correct. %s' >>>>>>> % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find >>>>>>> versioned identity endpoints when attempting to authenticate. Please check >>>>>>> that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>> retries exceeded with url: / (Caused by >>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": "", >>>>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>> 2022-07-08 17:03:23.609354 | >>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>>>> 2022-07-08 17:03:23.611094 | >>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>>>> >>>>>>> PLAY RECAP >>>>>>> ********************************************************************* >>>>>>> localhost : ok=0 changed=0 >>>>>>> unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 >>>>>>> overcloud-controller-0 : ok=437 changed=104 >>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>> overcloud-controller-1 : ok=436 changed=101 >>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>> overcloud-controller-2 : ok=431 changed=101 >>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>> overcloud-novacompute-0 : ok=345 changed=83 >>>>>>> unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 >>>>>>> undercloud : ok=28 changed=7 >>>>>>> unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 >>>>>>> 2022-07-08 17:03:23.647270 | >>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information >>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>> Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>> >>>>>>> >>>>>>> in the deploy.sh: >>>>>>> >>>>>>> openstack overcloud deploy --templates \ >>>>>>> -r /home/stack/templates/roles_data.yaml \ >>>>>>> --networks-file >>>>>>> /home/stack/templates/custom_network_data.yaml \ >>>>>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>>>>> --baremetal-deployment >>>>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>>>> --network-config \ >>>>>>> -e /home/stack/templates/environment.yaml \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>>>> \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>>>> \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>>>> \ >>>>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>>>> \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>>>> \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>>>> \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>>>> \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>>>> -e >>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>>>> >>>>>>> Addition lines as highlighted in yellow were passed with >>>>>>> modifications: >>>>>>> tls-endpoints-public-ip.yaml: >>>>>>> Passed as is in the defaults. >>>>>>> enable-tls.yaml: >>>>>>> >>>>>>> # >>>>>>> ******************************************************************* >>>>>>> # This file was created automatically by the sample environment >>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>> update it. >>>>>>> # Users are recommended to make changes to a copy of the file >>>>>>> instead >>>>>>> # of the original, if any customizations are needed. >>>>>>> # >>>>>>> ******************************************************************* >>>>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>>>> # description: | >>>>>>> # Use this environment to pass in certificates for SSL >>>>>>> deployments. >>>>>>> # For these values to take effect, one of the >>>>>>> tls-endpoints-*.yaml >>>>>>> # environments must also be used. >>>>>>> parameter_defaults: >>>>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>>>>>> # Type: boolean >>>>>>> HorizonSecureCookies: True >>>>>>> >>>>>>> # Specifies the default CA cert to use if TLS is used for >>>>>>> services in the public network. >>>>>>> # Type: string >>>>>>> PublicTLSCAFile: >>>>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>>>> >>>>>>> # The content of the SSL certificate (without Key) in PEM >>>>>>> format. >>>>>>> # Type: string >>>>>>> SSLRootCertificate: | >>>>>>> -----BEGIN CERTIFICATE----- >>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>> -----END CERTIFICATE----- >>>>>>> >>>>>>> SSLCertificate: | >>>>>>> -----BEGIN CERTIFICATE----- >>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>> -----END CERTIFICATE----- >>>>>>> # The content of an SSL intermediate CA certificate in PEM >>>>>>> format. >>>>>>> # Type: string >>>>>>> SSLIntermediateCertificate: '' >>>>>>> >>>>>>> # The content of the SSL Key in PEM format. >>>>>>> # Type: string >>>>>>> SSLKey: | >>>>>>> -----BEGIN PRIVATE KEY----- >>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>> -----END PRIVATE KEY----- >>>>>>> >>>>>>> # ****************************************************** >>>>>>> # Static parameters - these are values that must be >>>>>>> # included in the environment but should not be changed. >>>>>>> # ****************************************************** >>>>>>> # The filepath of the certificate as it will be stored in >>>>>>> the controller. >>>>>>> # Type: string >>>>>>> DeployedSSLCertificatePath: >>>>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>>>> >>>>>>> # ********************* >>>>>>> # End static parameters >>>>>>> # ********************* >>>>>>> >>>>>>> inject-trust-anchor.yaml >>>>>>> >>>>>>> # >>>>>>> ******************************************************************* >>>>>>> # This file was created automatically by the sample environment >>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>> update it. >>>>>>> # Users are recommended to make changes to a copy of the file >>>>>>> instead >>>>>>> # of the original, if any customizations are needed. >>>>>>> # >>>>>>> ******************************************************************* >>>>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>>>> # description: | >>>>>>> # When using an SSL certificate signed by a CA that is not >>>>>>> in the default >>>>>>> # list of CAs, this environment allows adding a custom CA >>>>>>> certificate to >>>>>>> # the overcloud nodes. >>>>>>> parameter_defaults: >>>>>>> # The content of a CA's SSL certificate file in PEM format. >>>>>>> This is evaluated on the client side. >>>>>>> # Mandatory. This parameter must be set by the user. >>>>>>> # Type: string >>>>>>> SSLRootCertificate: | >>>>>>> -----BEGIN CERTIFICATE----- >>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>> -----END CERTIFICATE----- >>>>>>> >>>>>>> resource_registry: >>>>>>> OS::TripleO::NodeTLSCAData: >>>>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> The procedure to create such files was followed using: >>>>>>> Deploying with SSL — TripleO 3.0.0 documentation >>>>>>> (openstack.org) >>>>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>>>> >>>>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>>>> IP-based certificate, without DNS. * >>>>>>> >>>>>>> Any idea around this error would be of great help. >>>>>>> >>>>>>> -- >>>>>>> skype: lokendrarathour >>>>>>> >>>>>>> >>>>>>> >>>> >>>> >>>> >>> >>> -- >>> >> > > -- > ~ Lokendra > skype: lokendrarathour > > >
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hi Brendan, Apologies for this delay, i had to redo the setup to reach this point, and also this time just to eliminate my Doubt i removed SSL for overcloud. Now I am only using DNS Server. In this case also I am getting the same error. | 0:13:20.198877 | 1.86s 2022-07-25 14:37:29.657118 | 525400a7-0932-2ed1-d313-000000007193 | TASK | Create identity internal endpoint 2022-07-25 14:37:31.995131 | 525400a7-0932-2ed1-d313-000000007193 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: http://[fd00:fd00:fd00:9900::a0]:5000/v3/services, The request you have made requires authentication."} To answer your question please note: "OS_CLOUD=overcloud openstack endpoint list" [root@GGNLABPM4 ~]# ssh stack@10.0.1.29 stack@10.0.1.29's password: Activate the web console with: systemctl enable --now cockpit.socket Last login: Mon Jul 25 14:38:44 2022 from 10.0.1.4 [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list +----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL | +----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | 1ecd328b5ea1426bb411d157b8339dd2 | regionOne | keystone | identity | True | public | http://[fd00:fd00:fd00:9900::a0]:5000 | | 518cfa0f2ece43b684710006c9fa5b25 | regionOne | keystone | identity | True | admin | http://30.30.30.181:35357 | | 8cda413052c24718b073578bb497f483 | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::a0]:5000 | +----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ [stack@undercloud ~]$ it is giving us only keystone endpoints. Also note that I am trying to deploy the end to end setup with FQDN only. and in this case as well I am facing the same issue as old. thanks once again for your inputs. -Lokendra On Wed, Jul 20, 2022 at 3:07 PM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
I think it's weird that you got a response at all when you run the openstack endpoint list, since you said haproxy isn't running. So there should be nothing serving that endpoint.
I noticed you have the stackrc file sourced. Try it again without that file sourced, so: $ su - stack $ OS_CLOUD=overcloud openstack endpoint list
I would suspect that nothing should be responding. It could be the stackrc file causing issues with some of the environment variables. If the above command doesn't return anything, then my suggestion would be to re-run the deployment like this:
$ su - stack $ export OS_CLOUD=undercloud # Then run your deployment script again $ bash overcloud_deploy.sh
The OS_CLOUD variable tells the openstackclient to lookup the details about that cloud from your clouds.yaml file. Which will be located in /home/stack/.config/openstack/clouds.yaml.
This method is preferable to the sourcing of RC files.
Reference:
https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_conf...
Regarding the HAProxy warnings. I don't think they should be fatal. afaik, HAProxy should still be starting. If it's not, there might be another error that you will need to look for in the log files under /var/log/containers/haproxy/
I wasn't able to reproduce that warning by following the documentation for enabling TLS though. So it seems like an odd error to be getting.
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Wed, Jul 20, 2022 at 7:02 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan / Team, Any lead for the issue raised?
-Lokendra
On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this:
(undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below:
- HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms
do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com> wrote:
> Hi Lokendra, > > The CN field is missing. Can you add that and generate the > certificate again. > > CN=ipaddress > > Also add dns.1=ipaddress under alt_names for precaution. > > Vikarna > > On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < > lokendrarathour@gmail.com> wrote: > >> HI Vikarna, >> Thanks for the inputs. >> I am note able to access any tabs in GUI. >> [image: image.png] >> >> to re-state, we are failing at the time of deployment at step4 : >> >> >> PLAY [External deployment step 4] >> ********************************************** >> 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | >> TASK | External deployment step 4 >> 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | >> OK | External deployment step 4 | undercloud -> localhost | result={ >> "changed": false, >> "msg": "Use --start-at-task 'External deployment step 4' to >> resume from this task" >> } >> [WARNING]: ('undercloud -> localhost', >> '525400ae-089b-870a-fab6-0000000000d7') >> missing from stats >> 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | >> TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s >> 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | >> INCLUDED | >> /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml >> | undercloud >> 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | >> TASK | Clean up legacy Cinder keystone catalog entries >> 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | >> OK | Clean up legacy Cinder keystone catalog entries | undercloud | >> item={'service_name': 'cinderv2', 'service_type': 'volumev2'} >> 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | >> TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | >> 0:11:24.204562 | 2.48s >> 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | >> OK | Clean up legacy Cinder keystone catalog entries | undercloud | >> item={'service_name': 'cinderv3', 'service_type': 'volume'} >> 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | >> TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | >> 0:11:26.122584 | 4.40s >> 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | >> TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | >> 0:11:26.124296 | 4.40s >> 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | >> TASK | Manage Keystone resources for OpenStack services >> 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | >> TIMING | Manage Keystone resources for OpenStack services | undercloud >> | 0:11:26.169842 | 0.03s >> 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | >> TASK | Gather variables for each operating system >> 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | >> TIMING | tripleo_keystone_resources : Gather variables for each >> operating system | undercloud | 0:11:26.253383 | 0.04s >> 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | >> TASK | Create Keystone Admin resources >> 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | >> TIMING | tripleo_keystone_resources : Create Keystone Admin resources | >> undercloud | 0:11:26.299608 | 0.03s >> 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | >> INCLUDED | >> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | >> undercloud >> 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | >> TASK | Create default domain >> 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | >> OK | Create default domain | undercloud >> 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | >> TIMING | tripleo_keystone_resources : Create default domain | >> undercloud | 0:11:28.437360 | 2.09s >> 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | >> TASK | Create admin and service projects >> 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | >> TIMING | tripleo_keystone_resources : Create admin and service projects >> | undercloud | 0:11:28.483468 | 0.03s >> 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | >> INCLUDED | >> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | >> undercloud >> 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | >> TASK | Async creation of Keystone project >> 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | >> CHANGED | Async creation of Keystone project | undercloud | item=admin >> 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | >> TIMING | tripleo_keystone_resources : Async creation of Keystone >> project | undercloud | 0:11:29.238078 | 0.72s >> 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | >> CHANGED | Async creation of Keystone project | undercloud | item=service >> 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | >> TIMING | tripleo_keystone_resources : Async creation of Keystone >> project | undercloud | 0:11:29.586587 | 1.06s >> 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | >> TIMING | tripleo_keystone_resources : Async creation of Keystone >> project | undercloud | 0:11:29.587916 | 1.07s >> 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | >> TASK | Check Keystone project status >> 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | >> WAITING | Check Keystone project status | undercloud | 30 retries left >> 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | >> OK | Check Keystone project status | undercloud | item=admin >> 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | >> TIMING | tripleo_keystone_resources : Check Keystone project status | >> undercloud | 0:11:35.260666 | 5.66s >> 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | >> OK | Check Keystone project status | undercloud | item=service >> 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | >> TIMING | tripleo_keystone_resources : Check Keystone project status | >> undercloud | 0:11:35.494729 | 5.89s >> 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | >> TIMING | tripleo_keystone_resources : Check Keystone project status | >> undercloud | 0:11:35.498771 | 5.89s >> 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | >> TASK | Create admin role >> 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | >> OK | Create admin role | undercloud >> 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | >> TIMING | tripleo_keystone_resources : Create admin role | undercloud | >> 0:11:37.725949 | 2.20s >> 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | >> TASK | Create _member_ role >> 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | >> SKIPPED | Create _member_ role | undercloud >> 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | >> TIMING | tripleo_keystone_resources : Create _member_ role | undercloud >> | 0:11:37.783369 | 0.04s >> 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | >> TASK | Create admin user >> 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | >> CHANGED | Create admin user | undercloud >> 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | >> TIMING | tripleo_keystone_resources : Create admin user | undercloud | >> 0:11:41.145472 | 3.34s >> 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | >> TASK | Assign admin role to admin project for admin user >> 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | >> OK | Assign admin role to admin project for admin user | undercloud >> 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | >> TIMING | tripleo_keystone_resources : Assign admin role to admin >> project for admin user | undercloud | 0:11:44.288848 | 3.13s >> 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | >> TASK | Assign _member_ role to admin project for admin user >> 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | >> SKIPPED | Assign _member_ role to admin project for admin user | >> undercloud >> 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | >> TIMING | tripleo_keystone_resources : Assign _member_ role to admin >> project for admin user | undercloud | 0:11:44.346479 | 0.04s >> 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | >> TASK | Create identity service >> 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | >> OK | Create identity service | undercloud >> 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | >> TIMING | tripleo_keystone_resources : Create identity service | >> undercloud | 0:11:46.022362 | 1.66s >> 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | >> TASK | Create identity public endpoint >> 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | >> OK | Create identity public endpoint | undercloud >> 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | >> TIMING | tripleo_keystone_resources : Create identity public endpoint | >> undercloud | 0:11:48.233349 | 2.19s >> 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | >> TASK | Create identity internal endpoint >> 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | >> FATAL | Create identity internal endpoint | undercloud | >> error={"changed": false, "extra_data": {"data": null, "details": "The >> request you have made requires authentication.", "response": >> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >> The request you have made requires authentication."} >> 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | >> TIMING | tripleo_keystone_resources : Create identity internal endpoint >> | undercloud | 0:11:50.660654 | 2.41s >> >> PLAY RECAP >> ********************************************************************* >> localhost : ok=1 changed=0 unreachable=0 >> failed=0 skipped=2 rescued=0 ignored=0 >> overcloud-controller-0 : ok=437 changed=103 unreachable=0 >> failed=0 skipped=214 rescued=0 ignored=0 >> overcloud-controller-1 : ok=435 changed=101 unreachable=0 >> failed=0 skipped=214 rescued=0 ignored=0 >> overcloud-controller-2 : ok=432 changed=101 unreachable=0 >> failed=0 skipped=214 rescued=0 ignored=0 >> overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 >> failed=0 skipped=198 rescued=0 ignored=0 >> undercloud : ok=39 changed=7 unreachable=0 >> failed=1 skipped=6 rescued=0 ignored=0 >> >> Also : >> (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf >> [req] >> default_bits = 2048 >> prompt = no >> default_md = sha256 >> distinguished_name = dn >> [dn] >> C=IN >> ST=UTTAR PRADESH >> L=NOIDA >> O=HSC >> OU=HSC >> emailAddress=demo@demo.com >> >> v3.ext: >> (undercloud) [stack@undercloud oc-cert]$ cat v3.ext >> authorityKeyIdentifier=keyid,issuer >> basicConstraints=CA:FALSE >> keyUsage = digitalSignature, nonRepudiation, keyEncipherment, >> dataEncipherment >> subjectAltName = @alt_names >> [alt_names] >> IP.1=fd00:fd00:fd00:9900::81 >> >> Using these files we create other certificates. >> Please check and let me know in case we need anything else. >> >> >> On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe < >> vikarnatathe@gmail.com> wrote: >> >>> Hi Lokendra, >>> >>> Are you able to access all the tabs in the OpenStack dashboard >>> without any error? If not, please retry generating the certificate. Also, >>> share the openssl.cnf or server.cnf. >>> >>> On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < >>> lokendrarathour@gmail.com> wrote: >>> >>>> Hi Team, >>>> Any input on this case raised. >>>> >>>> Thanks, >>>> Lokendra >>>> >>>> >>>> On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < >>>> lokendrarathour@gmail.com> wrote: >>>> >>>>> Hi Shephard/Swogat, >>>>> I tried changing the setting as suggested and it looks like it >>>>> has failed at step 4 with error: >>>>> >>>>> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | >>>>> TIMING | tripleo_keystone_resources : Create identity public endpoint | >>>>> undercloud | 0:24:47.736198 | 2.21s >>>>> 2022-07-12 21:31:32.185594 | >>>>> 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity >>>>> internal endpoint >>>>> 2022-07-12 21:31:34.468996 | >>>>> 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity >>>>> internal endpoint | undercloud | error={"changed": false, "extra_data": >>>>> {"data": null, "details": "The request you have made requires >>>>> authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The >>>>> request you have made requires >>>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>>> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >>>>> The request you have made requires authentication."} >>>>> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >>>>> >>>>> >>>>> Checking further the endpoint list: >>>>> I see only one endpoint for keystone is gettin created. >>>>> >>>>> DeprecationWarning >>>>> >>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>> | ID | Region | Service Name | >>>>> Service Type | Enabled | Interface | URL >>>>> | >>>>> >>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | >>>>> identity | True | admin | http://30.30.30.173:35357 >>>>> | >>>>> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | >>>>> identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 >>>>> | >>>>> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | >>>>> identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 >>>>> | >>>>> >>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>> >>>>> >>>>> it looks like something related to the SSL, we have also >>>>> verified that the GUI login screen shows that Certificates are applied. >>>>> exploring more in logs, meanwhile any suggestions or know >>>>> observation would be of great help. >>>>> thanks again for the support. >>>>> >>>>> Best Regards, >>>>> Lokendra >>>>> >>>>> >>>>> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >>>>> swogatpradhan22@gmail.com> wrote: >>>>> >>>>>> I had faced a similar kind of issue, for ip based setup you >>>>>> need to specify the domain name as the ip that you are going to use, this >>>>>> error is showing up because the ssl is ip based but the fqdns seems to be >>>>>> undercloud.com or overcloud.example.com. >>>>>> I think for undercloud you can change the undercloud.conf. >>>>>> >>>>>> And will it work if we specify clouddomain parameter to the IP >>>>>> address for overcloud? because it seems he has not specified the >>>>>> clouddomain parameter and overcloud.example.com is the default >>>>>> domain for overcloud.example.com. >>>>>> >>>>>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>>>>> swogatpradhan22@gmail.com> wrote: >>>>>> >>>>>>> What is the domain name you have specified in the >>>>>>> undercloud.conf file? >>>>>>> And what is the fqdn name used for the generation of the SSL >>>>>>> cert? >>>>>>> >>>>>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>>>>> lokendrarathour@gmail.com> wrote: >>>>>>> >>>>>>>> Hi Team, >>>>>>>> We were trying to install overcloud with SSL enabled for >>>>>>>> which the UC is installed, but OC install is getting failed at step 4: >>>>>>>> >>>>>>>> ERROR >>>>>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): >>>>>>>> Max retries exceeded with url: / (Caused by >>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", >>>>>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>> 2022-07-08 17:03:23.606739 | >>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>>>>> identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>>>>>>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>>>>>>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>>>>>>> 600, in urlopen\n chunked=chunked)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>>>>> in _make_request\n self._validate_conn(conn)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>>>>> in _validate_conn\n conn.connect()\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>>>>> server_hostname)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>>>>> (most recent call last):\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>>>>> send\n timeout=timeout\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>> retries exceeded with url: / (Caused by >>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>> last):\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>> retries exceeded with url: / (Caused by >>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>> last):\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>>>>> in get_discovery\n disc = Discover(session, url, >>>>>>>> authenticated=authenticated)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>>>>> in __init__\n authenticated=authenticated)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>>>>> authenticated=authenticated)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>>>>> request\n resp = send(**kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>>>>> in _send_request\n raise >>>>>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>>>>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>> retries exceeded with url: / (Caused by >>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>>>>> run_globals)\n File >>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>> line 185, in <module>\n File >>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>> line 181, in main\n File >>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>>>>> line 407, in __call__\n File >>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>> line 141, in run\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>> 517, in search_services\n services = self.list_services()\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>>>>> File >>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>>>>> max_version='3.latest')\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>>>>> **kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>>>>> **kwargs)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>> 271, in get_endpoint_data\n service_catalog = >>>>>>>> self.get_access(session).service_catalog\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>> line 206, in get_auth_ref\n self._plugin = >>>>>>>> self._do_create_plugin(session)\n File >>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>> line 161, in _do_create_plugin\n 'auth_url is correct. >>>>>>>> %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not >>>>>>>> find versioned identity endpoints when attempting to authenticate. Please >>>>>>>> check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>> retries exceeded with url: / (Caused by >>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": >>>>>>>> "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>> 2022-07-08 17:03:23.609354 | >>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>>>>> 2022-07-08 17:03:23.611094 | >>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>>>>> >>>>>>>> PLAY RECAP >>>>>>>> ********************************************************************* >>>>>>>> localhost : ok=0 changed=0 >>>>>>>> unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 >>>>>>>> overcloud-controller-0 : ok=437 changed=104 >>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>> overcloud-controller-1 : ok=436 changed=101 >>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>> overcloud-controller-2 : ok=431 changed=101 >>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>> overcloud-novacompute-0 : ok=345 changed=83 >>>>>>>> unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 >>>>>>>> undercloud : ok=28 changed=7 >>>>>>>> unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 >>>>>>>> 2022-07-08 17:03:23.647270 | >>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information >>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>> 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>> Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>> >>>>>>>> >>>>>>>> in the deploy.sh: >>>>>>>> >>>>>>>> openstack overcloud deploy --templates \ >>>>>>>> -r /home/stack/templates/roles_data.yaml \ >>>>>>>> --networks-file >>>>>>>> /home/stack/templates/custom_network_data.yaml \ >>>>>>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>>>>>> --baremetal-deployment >>>>>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>>>>> --network-config \ >>>>>>>> -e /home/stack/templates/environment.yaml \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>>>>> \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>>>>> \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>>>>> \ >>>>>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>>>>> \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>>>>> \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>>>>> \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>>>>> \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>>>>> -e >>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>>>>> >>>>>>>> Addition lines as highlighted in yellow were passed with >>>>>>>> modifications: >>>>>>>> tls-endpoints-public-ip.yaml: >>>>>>>> Passed as is in the defaults. >>>>>>>> enable-tls.yaml: >>>>>>>> >>>>>>>> # >>>>>>>> ******************************************************************* >>>>>>>> # This file was created automatically by the sample >>>>>>>> environment >>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>> update it. >>>>>>>> # Users are recommended to make changes to a copy of the file >>>>>>>> instead >>>>>>>> # of the original, if any customizations are needed. >>>>>>>> # >>>>>>>> ******************************************************************* >>>>>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>>>>> # description: | >>>>>>>> # Use this environment to pass in certificates for SSL >>>>>>>> deployments. >>>>>>>> # For these values to take effect, one of the >>>>>>>> tls-endpoints-*.yaml >>>>>>>> # environments must also be used. >>>>>>>> parameter_defaults: >>>>>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>>>>>>> # Type: boolean >>>>>>>> HorizonSecureCookies: True >>>>>>>> >>>>>>>> # Specifies the default CA cert to use if TLS is used for >>>>>>>> services in the public network. >>>>>>>> # Type: string >>>>>>>> PublicTLSCAFile: >>>>>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>>>>> >>>>>>>> # The content of the SSL certificate (without Key) in PEM >>>>>>>> format. >>>>>>>> # Type: string >>>>>>>> SSLRootCertificate: | >>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>> -----END CERTIFICATE----- >>>>>>>> >>>>>>>> SSLCertificate: | >>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>> -----END CERTIFICATE----- >>>>>>>> # The content of an SSL intermediate CA certificate in PEM >>>>>>>> format. >>>>>>>> # Type: string >>>>>>>> SSLIntermediateCertificate: '' >>>>>>>> >>>>>>>> # The content of the SSL Key in PEM format. >>>>>>>> # Type: string >>>>>>>> SSLKey: | >>>>>>>> -----BEGIN PRIVATE KEY----- >>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>> -----END PRIVATE KEY----- >>>>>>>> >>>>>>>> # ****************************************************** >>>>>>>> # Static parameters - these are values that must be >>>>>>>> # included in the environment but should not be changed. >>>>>>>> # ****************************************************** >>>>>>>> # The filepath of the certificate as it will be stored in >>>>>>>> the controller. >>>>>>>> # Type: string >>>>>>>> DeployedSSLCertificatePath: >>>>>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>>>>> >>>>>>>> # ********************* >>>>>>>> # End static parameters >>>>>>>> # ********************* >>>>>>>> >>>>>>>> inject-trust-anchor.yaml >>>>>>>> >>>>>>>> # >>>>>>>> ******************************************************************* >>>>>>>> # This file was created automatically by the sample >>>>>>>> environment >>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>> update it. >>>>>>>> # Users are recommended to make changes to a copy of the file >>>>>>>> instead >>>>>>>> # of the original, if any customizations are needed. >>>>>>>> # >>>>>>>> ******************************************************************* >>>>>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>>>>> # description: | >>>>>>>> # When using an SSL certificate signed by a CA that is not >>>>>>>> in the default >>>>>>>> # list of CAs, this environment allows adding a custom CA >>>>>>>> certificate to >>>>>>>> # the overcloud nodes. >>>>>>>> parameter_defaults: >>>>>>>> # The content of a CA's SSL certificate file in PEM format. >>>>>>>> This is evaluated on the client side. >>>>>>>> # Mandatory. This parameter must be set by the user. >>>>>>>> # Type: string >>>>>>>> SSLRootCertificate: | >>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>> -----END CERTIFICATE----- >>>>>>>> >>>>>>>> resource_registry: >>>>>>>> OS::TripleO::NodeTLSCAData: >>>>>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> The procedure to create such files was followed using: >>>>>>>> Deploying with SSL — TripleO 3.0.0 documentation >>>>>>>> (openstack.org) >>>>>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>>>>> >>>>>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>>>>> IP-based certificate, without DNS. * >>>>>>>> >>>>>>>> Any idea around this error would be of great help. >>>>>>>> >>>>>>>> -- >>>>>>>> skype: lokendrarathour >>>>>>>> >>>>>>>> >>>>>>>> >>>>> >>>>> >>>>> >>>> >>>> -- >>>> >>> >> >> -- >> ~ Lokendra >> skype: lokendrarathour >> >> >>
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hi Team, I tried again with DNS enabled, but the error remains the same. tone_resources : Create identity public endpoint | undercloud | 0:24:59.456181 | 2.31s 2022-07-27 15:20:48.735838 | 5254006e-bbd1-cd20-647c-00000000736c | TASK | Create identity internal endpoint 2022-07-27 15:20:51.227000 | 5254006e-bbd1-cd20-647c-00000000736c | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-publ ic.myhsc.com:13000/v3/services, The request you have made requires authentication."} Checking further in the keystone logs in container: 2022-07-27 19:35:37.447 33 WARNING keystone.server.flask.application [req-bb4621d8-73ad-4bad-831f-5c2370e92e71 - - - - -] Authorization failed. The request you have made requires authentication. from fd00:fd00:fd00:9900::29: keystone.exception.Unauthorized: The request you have made requires authentication. 2022-07-27 19:35:37.998 26 WARNING py.warnings [req-54d44e3a-5e34-4e40-b2dc-e8213353ea05 ab5e9670632544f8a8c7e1b3ac175bcd e4185872cadb442aa9a59980b3227941 - default default] /usr/lib/python3.6/site-packages/oslo_policy/policy.py:1065: UserWarning: Policy identity:list_projects failed scope check. The token used to make the request was project scoped but the policy requires ['system', 'domain'] scope. This behavior may change in the future where using the intended scope is required I am kind of blocked now, any lead would let me understand the problem more and maybe it can solve the issue. Best Regards, Lokendra On Mon, Jul 25, 2022 at 3:12 PM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Brendan, Apologies for this delay, i had to redo the setup to reach this point, and also this time just to eliminate my Doubt i removed SSL for overcloud. Now I am only using DNS Server. In this case also I am getting the same error.
| 0:13:20.198877 | 1.86s 2022-07-25 14:37:29.657118 | 525400a7-0932-2ed1-d313-000000007193 | TASK | Create identity internal endpoint 2022-07-25 14:37:31.995131 | 525400a7-0932-2ed1-d313-000000007193 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: http://[fd00:fd00:fd00:9900::a0]:5000/v3/services, The request you have made requires authentication."}
To answer your question please note:
"OS_CLOUD=overcloud openstack endpoint list"
[root@GGNLABPM4 ~]# ssh stack@10.0.1.29 stack@10.0.1.29's password: Activate the web console with: systemctl enable --now cockpit.socket
Last login: Mon Jul 25 14:38:44 2022 from 10.0.1.4 [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | 1ecd328b5ea1426bb411d157b8339dd2 | regionOne | keystone | identity | True | public | http://[fd00:fd00:fd00:9900::a0]:5000 | | 518cfa0f2ece43b684710006c9fa5b25 | regionOne | keystone | identity | True | admin | http://30.30.30.181:35357 | | 8cda413052c24718b073578bb497f483 | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::a0]:5000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ [stack@undercloud ~]$
it is giving us only keystone endpoints.
Also note that I am trying to deploy the end to end setup with FQDN only. and in this case as well I am facing the same issue as old.
thanks once again for your inputs.
-Lokendra
On Wed, Jul 20, 2022 at 3:07 PM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
I think it's weird that you got a response at all when you run the openstack endpoint list, since you said haproxy isn't running. So there should be nothing serving that endpoint.
I noticed you have the stackrc file sourced. Try it again without that file sourced, so: $ su - stack $ OS_CLOUD=overcloud openstack endpoint list
I would suspect that nothing should be responding. It could be the stackrc file causing issues with some of the environment variables. If the above command doesn't return anything, then my suggestion would be to re-run the deployment like this:
$ su - stack $ export OS_CLOUD=undercloud # Then run your deployment script again $ bash overcloud_deploy.sh
The OS_CLOUD variable tells the openstackclient to lookup the details about that cloud from your clouds.yaml file. Which will be located in /home/stack/.config/openstack/clouds.yaml.
This method is preferable to the sourcing of RC files.
Reference:
https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_conf...
Regarding the HAProxy warnings. I don't think they should be fatal. afaik, HAProxy should still be starting. If it's not, there might be another error that you will need to look for in the log files under /var/log/containers/haproxy/
I wasn't able to reproduce that warning by following the documentation for enabling TLS though. So it seems like an odd error to be getting.
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Wed, Jul 20, 2022 at 7:02 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan / Team, Any lead for the issue raised?
-Lokendra
On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this:
(undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below:
- HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms
do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard
Software Engineer
Red Hat APAC <https://www.redhat.com>
193 N Quay
Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com CN=overcloud-hsc.com [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan < swogatpradhan22@gmail.com> wrote:
> I was facing a similar kind of issue. > https://bugzilla.redhat.com/show_bug.cgi?id=2089442 > Here is the solution that helped me fix it. > Also make sure the cn that you will use is reachable from undercloud > (maybe) script should take care of it. > > Also please follow Mr. Tathe's mail to add the cn first. > > With regards > Swogat Pradhan > > On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe < > vikarnatathe@gmail.com> wrote: > >> Hi Lokendra, >> >> The CN field is missing. Can you add that and generate the >> certificate again. >> >> CN=ipaddress >> >> Also add dns.1=ipaddress under alt_names for precaution. >> >> Vikarna >> >> On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < >> lokendrarathour@gmail.com> wrote: >> >>> HI Vikarna, >>> Thanks for the inputs. >>> I am note able to access any tabs in GUI. >>> [image: image.png] >>> >>> to re-state, we are failing at the time of deployment at step4 : >>> >>> >>> PLAY [External deployment step 4] >>> ********************************************** >>> 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 >>> | TASK | External deployment step 4 >>> 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 >>> | OK | External deployment step 4 | undercloud -> localhost | >>> result={ >>> "changed": false, >>> "msg": "Use --start-at-task 'External deployment step 4' to >>> resume from this task" >>> } >>> [WARNING]: ('undercloud -> localhost', >>> '525400ae-089b-870a-fab6-0000000000d7') >>> missing from stats >>> 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 >>> | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s >>> 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 >>> | INCLUDED | >>> /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml >>> | undercloud >>> 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 >>> | TASK | Clean up legacy Cinder keystone catalog entries >>> 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 >>> | OK | Clean up legacy Cinder keystone catalog entries | undercloud >>> | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} >>> 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 >>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>> | 0:11:24.204562 | 2.48s >>> 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 >>> | OK | Clean up legacy Cinder keystone catalog entries | undercloud >>> | item={'service_name': 'cinderv3', 'service_type': 'volume'} >>> 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 >>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>> | 0:11:26.122584 | 4.40s >>> 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 >>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>> | 0:11:26.124296 | 4.40s >>> 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c >>> | TASK | Manage Keystone resources for OpenStack services >>> 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c >>> | TIMING | Manage Keystone resources for OpenStack services | >>> undercloud | 0:11:26.169842 | 0.03s >>> 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b >>> | TASK | Gather variables for each operating system >>> 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b >>> | TIMING | tripleo_keystone_resources : Gather variables for each >>> operating system | undercloud | 0:11:26.253383 | 0.04s >>> 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c >>> | TASK | Create Keystone Admin resources >>> 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c >>> | TIMING | tripleo_keystone_resources : Create Keystone Admin resources >>> | undercloud | 0:11:26.299608 | 0.03s >>> 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 >>> | INCLUDED | >>> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | >>> undercloud >>> 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad >>> | TASK | Create default domain >>> 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad >>> | OK | Create default domain | undercloud >>> 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad >>> | TIMING | tripleo_keystone_resources : Create default domain | >>> undercloud | 0:11:28.437360 | 2.09s >>> 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae >>> | TASK | Create admin and service projects >>> 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae >>> | TIMING | tripleo_keystone_resources : Create admin and service >>> projects | undercloud | 0:11:28.483468 | 0.03s >>> 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 >>> | INCLUDED | >>> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | >>> undercloud >>> 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 >>> | TASK | Async creation of Keystone project >>> 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 >>> | CHANGED | Async creation of Keystone project | undercloud | item=admin >>> 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 >>> | TIMING | tripleo_keystone_resources : Async creation of Keystone >>> project | undercloud | 0:11:29.238078 | 0.72s >>> 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 >>> | CHANGED | Async creation of Keystone project | undercloud | >>> item=service >>> 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 >>> | TIMING | tripleo_keystone_resources : Async creation of Keystone >>> project | undercloud | 0:11:29.586587 | 1.06s >>> 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 >>> | TIMING | tripleo_keystone_resources : Async creation of Keystone >>> project | undercloud | 0:11:29.587916 | 1.07s >>> 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 >>> | TASK | Check Keystone project status >>> 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 >>> | WAITING | Check Keystone project status | undercloud | 30 retries left >>> 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 >>> | OK | Check Keystone project status | undercloud | item=admin >>> 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 >>> | TIMING | tripleo_keystone_resources : Check Keystone project status | >>> undercloud | 0:11:35.260666 | 5.66s >>> 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 >>> | OK | Check Keystone project status | undercloud | item=service >>> 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 >>> | TIMING | tripleo_keystone_resources : Check Keystone project status | >>> undercloud | 0:11:35.494729 | 5.89s >>> 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 >>> | TIMING | tripleo_keystone_resources : Check Keystone project status | >>> undercloud | 0:11:35.498771 | 5.89s >>> 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af >>> | TASK | Create admin role >>> 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af >>> | OK | Create admin role | undercloud >>> 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af >>> | TIMING | tripleo_keystone_resources : Create admin role | undercloud >>> | 0:11:37.725949 | 2.20s >>> 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 >>> | TASK | Create _member_ role >>> 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 >>> | SKIPPED | Create _member_ role | undercloud >>> 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 >>> | TIMING | tripleo_keystone_resources : Create _member_ role | >>> undercloud | 0:11:37.783369 | 0.04s >>> 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 >>> | TASK | Create admin user >>> 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 >>> | CHANGED | Create admin user | undercloud >>> 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 >>> | TIMING | tripleo_keystone_resources : Create admin user | undercloud >>> | 0:11:41.145472 | 3.34s >>> 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 >>> | TASK | Assign admin role to admin project for admin user >>> 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 >>> | OK | Assign admin role to admin project for admin user | >>> undercloud >>> 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 >>> | TIMING | tripleo_keystone_resources : Assign admin role to admin >>> project for admin user | undercloud | 0:11:44.288848 | 3.13s >>> 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 >>> | TASK | Assign _member_ role to admin project for admin user >>> 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 >>> | SKIPPED | Assign _member_ role to admin project for admin user | >>> undercloud >>> 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 >>> | TIMING | tripleo_keystone_resources : Assign _member_ role to admin >>> project for admin user | undercloud | 0:11:44.346479 | 0.04s >>> 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 >>> | TASK | Create identity service >>> 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 >>> | OK | Create identity service | undercloud >>> 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 >>> | TIMING | tripleo_keystone_resources : Create identity service | >>> undercloud | 0:11:46.022362 | 1.66s >>> 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 >>> | TASK | Create identity public endpoint >>> 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 >>> | OK | Create identity public endpoint | undercloud >>> 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 >>> | TIMING | tripleo_keystone_resources : Create identity public endpoint >>> | undercloud | 0:11:48.233349 | 2.19s >>> 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 >>> | TASK | Create identity internal endpoint >>> 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 >>> | FATAL | Create identity internal endpoint | undercloud | >>> error={"changed": false, "extra_data": {"data": null, "details": "The >>> request you have made requires authentication.", "response": >>> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >>> The request you have made requires authentication."} >>> 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 >>> | TIMING | tripleo_keystone_resources : Create identity internal >>> endpoint | undercloud | 0:11:50.660654 | 2.41s >>> >>> PLAY RECAP >>> ********************************************************************* >>> localhost : ok=1 changed=0 unreachable=0 >>> failed=0 skipped=2 rescued=0 ignored=0 >>> overcloud-controller-0 : ok=437 changed=103 unreachable=0 >>> failed=0 skipped=214 rescued=0 ignored=0 >>> overcloud-controller-1 : ok=435 changed=101 unreachable=0 >>> failed=0 skipped=214 rescued=0 ignored=0 >>> overcloud-controller-2 : ok=432 changed=101 unreachable=0 >>> failed=0 skipped=214 rescued=0 ignored=0 >>> overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 >>> failed=0 skipped=198 rescued=0 ignored=0 >>> undercloud : ok=39 changed=7 unreachable=0 >>> failed=1 skipped=6 rescued=0 ignored=0 >>> >>> Also : >>> (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf >>> [req] >>> default_bits = 2048 >>> prompt = no >>> default_md = sha256 >>> distinguished_name = dn >>> [dn] >>> C=IN >>> ST=UTTAR PRADESH >>> L=NOIDA >>> O=HSC >>> OU=HSC >>> emailAddress=demo@demo.com >>> >>> v3.ext: >>> (undercloud) [stack@undercloud oc-cert]$ cat v3.ext >>> authorityKeyIdentifier=keyid,issuer >>> basicConstraints=CA:FALSE >>> keyUsage = digitalSignature, nonRepudiation, keyEncipherment, >>> dataEncipherment >>> subjectAltName = @alt_names >>> [alt_names] >>> IP.1=fd00:fd00:fd00:9900::81 >>> >>> Using these files we create other certificates. >>> Please check and let me know in case we need anything else. >>> >>> >>> On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe < >>> vikarnatathe@gmail.com> wrote: >>> >>>> Hi Lokendra, >>>> >>>> Are you able to access all the tabs in the OpenStack dashboard >>>> without any error? If not, please retry generating the certificate. Also, >>>> share the openssl.cnf or server.cnf. >>>> >>>> On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < >>>> lokendrarathour@gmail.com> wrote: >>>> >>>>> Hi Team, >>>>> Any input on this case raised. >>>>> >>>>> Thanks, >>>>> Lokendra >>>>> >>>>> >>>>> On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < >>>>> lokendrarathour@gmail.com> wrote: >>>>> >>>>>> Hi Shephard/Swogat, >>>>>> I tried changing the setting as suggested and it looks like it >>>>>> has failed at step 4 with error: >>>>>> >>>>>> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | >>>>>> TIMING | tripleo_keystone_resources : Create identity public endpoint | >>>>>> undercloud | 0:24:47.736198 | 2.21s >>>>>> 2022-07-12 21:31:32.185594 | >>>>>> 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity >>>>>> internal endpoint >>>>>> 2022-07-12 21:31:34.468996 | >>>>>> 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity >>>>>> internal endpoint | undercloud | error={"changed": false, "extra_data": >>>>>> {"data": null, "details": "The request you have made requires >>>>>> authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The >>>>>> request you have made requires >>>>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>>>> services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, >>>>>> The request you have made requires authentication."} >>>>>> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >>>>>> >>>>>> >>>>>> Checking further the endpoint list: >>>>>> I see only one endpoint for keystone is gettin created. >>>>>> >>>>>> DeprecationWarning >>>>>> >>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>> | ID | Region | Service Name | >>>>>> Service Type | Enabled | Interface | URL >>>>>> | >>>>>> >>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | >>>>>> identity | True | admin | http://30.30.30.173:35357 >>>>>> | >>>>>> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | >>>>>> identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 >>>>>> | >>>>>> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | >>>>>> identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 >>>>>> | >>>>>> >>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>> >>>>>> >>>>>> it looks like something related to the SSL, we have also >>>>>> verified that the GUI login screen shows that Certificates are applied. >>>>>> exploring more in logs, meanwhile any suggestions or know >>>>>> observation would be of great help. >>>>>> thanks again for the support. >>>>>> >>>>>> Best Regards, >>>>>> Lokendra >>>>>> >>>>>> >>>>>> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >>>>>> swogatpradhan22@gmail.com> wrote: >>>>>> >>>>>>> I had faced a similar kind of issue, for ip based setup you >>>>>>> need to specify the domain name as the ip that you are going to use, this >>>>>>> error is showing up because the ssl is ip based but the fqdns seems to be >>>>>>> undercloud.com or overcloud.example.com. >>>>>>> I think for undercloud you can change the undercloud.conf. >>>>>>> >>>>>>> And will it work if we specify clouddomain parameter to the IP >>>>>>> address for overcloud? because it seems he has not specified the >>>>>>> clouddomain parameter and overcloud.example.com is the >>>>>>> default domain for overcloud.example.com. >>>>>>> >>>>>>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>>>>>> swogatpradhan22@gmail.com> wrote: >>>>>>> >>>>>>>> What is the domain name you have specified in the >>>>>>>> undercloud.conf file? >>>>>>>> And what is the fqdn name used for the generation of the SSL >>>>>>>> cert? >>>>>>>> >>>>>>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>>>>>> lokendrarathour@gmail.com> wrote: >>>>>>>> >>>>>>>>> Hi Team, >>>>>>>>> We were trying to install overcloud with SSL enabled for >>>>>>>>> which the UC is installed, but OC install is getting failed at step 4: >>>>>>>>> >>>>>>>>> ERROR >>>>>>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): >>>>>>>>> Max retries exceeded with url: / (Caused by >>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", >>>>>>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>>> 2022-07-08 17:03:23.606739 | >>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>>>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>>>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>>>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>>>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>>>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>>>>>> identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. >>>>>>>>> Attempting to parse version from URL.\nTraceback (most recent call last):\n >>>>>>>>> File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line >>>>>>>>> 600, in urlopen\n chunked=chunked)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>>>>>> in _make_request\n self._validate_conn(conn)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>>>>>> in _validate_conn\n conn.connect()\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>>>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>>>>>> server_hostname)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>>>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>>>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>>>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>>>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>>>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>>>>>> (most recent call last):\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>>>>>> send\n timeout=timeout\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>>>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>>>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>>>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>> last):\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>>>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>>>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>>>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>>>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>>>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>> last):\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>>>>>> in get_discovery\n disc = Discover(session, url, >>>>>>>>> authenticated=authenticated)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>>>>>> in __init__\n authenticated=authenticated)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>>>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>>>>>> authenticated=authenticated)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>>>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>>>>>> request\n resp = send(**kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>>>>>> in _send_request\n raise >>>>>>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>>>>>> exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>>>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>>>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>>>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>>>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>>>>>> run_globals)\n File >>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>> line 185, in <module>\n File >>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>> line 181, in main\n File >>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>>>>>> line 407, in __call__\n File >>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>> line 141, in run\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>>> 517, in search_services\n services = self.list_services()\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>>>>>> File >>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>>>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>>>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>>>>>> max_version='3.latest')\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>>>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>>>>>> **kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>>>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>>>>>> **kwargs)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>> 271, in get_endpoint_data\n service_catalog = >>>>>>>>> self.get_access(session).service_catalog\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>> line 206, in get_auth_ref\n self._plugin = >>>>>>>>> self._do_create_plugin(session)\n File >>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>> line 161, in _do_create_plugin\n 'auth_url is correct. >>>>>>>>> %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not >>>>>>>>> find versioned identity endpoints when attempting to authenticate. Please >>>>>>>>> check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": >>>>>>>>> "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>>> 2022-07-08 17:03:23.609354 | >>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>>>>>> 2022-07-08 17:03:23.611094 | >>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>>>>>> >>>>>>>>> PLAY RECAP >>>>>>>>> ********************************************************************* >>>>>>>>> localhost : ok=0 changed=0 >>>>>>>>> unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 >>>>>>>>> overcloud-controller-0 : ok=437 changed=104 >>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>> overcloud-controller-1 : ok=436 changed=101 >>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>> overcloud-controller-2 : ok=431 changed=101 >>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>> overcloud-novacompute-0 : ok=345 changed=83 >>>>>>>>> unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 >>>>>>>>> undercloud : ok=28 changed=7 >>>>>>>>> unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 >>>>>>>>> 2022-07-08 17:03:23.647270 | >>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information >>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>>> 2022-07-08 17:03:23.647907 | >>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 >>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>>> >>>>>>>>> >>>>>>>>> in the deploy.sh: >>>>>>>>> >>>>>>>>> openstack overcloud deploy --templates \ >>>>>>>>> -r /home/stack/templates/roles_data.yaml \ >>>>>>>>> --networks-file >>>>>>>>> /home/stack/templates/custom_network_data.yaml \ >>>>>>>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>>>>>>> --baremetal-deployment >>>>>>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>>>>>> --network-config \ >>>>>>>>> -e /home/stack/templates/environment.yaml \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>>>>>> \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>>>>>> \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>>>>>> \ >>>>>>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>>>>>> \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>>>>>> \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>>>>>> \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>>>>>> \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>>>>>> -e >>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>>>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>>>>>> >>>>>>>>> Addition lines as highlighted in yellow were passed with >>>>>>>>> modifications: >>>>>>>>> tls-endpoints-public-ip.yaml: >>>>>>>>> Passed as is in the defaults. >>>>>>>>> enable-tls.yaml: >>>>>>>>> >>>>>>>>> # >>>>>>>>> ******************************************************************* >>>>>>>>> # This file was created automatically by the sample >>>>>>>>> environment >>>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>>> update it. >>>>>>>>> # Users are recommended to make changes to a copy of the >>>>>>>>> file instead >>>>>>>>> # of the original, if any customizations are needed. >>>>>>>>> # >>>>>>>>> ******************************************************************* >>>>>>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>>>>>> # description: | >>>>>>>>> # Use this environment to pass in certificates for SSL >>>>>>>>> deployments. >>>>>>>>> # For these values to take effect, one of the >>>>>>>>> tls-endpoints-*.yaml >>>>>>>>> # environments must also be used. >>>>>>>>> parameter_defaults: >>>>>>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon >>>>>>>>> # Type: boolean >>>>>>>>> HorizonSecureCookies: True >>>>>>>>> >>>>>>>>> # Specifies the default CA cert to use if TLS is used for >>>>>>>>> services in the public network. >>>>>>>>> # Type: string >>>>>>>>> PublicTLSCAFile: >>>>>>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>>>>>> >>>>>>>>> # The content of the SSL certificate (without Key) in PEM >>>>>>>>> format. >>>>>>>>> # Type: string >>>>>>>>> SSLRootCertificate: | >>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>> -----END CERTIFICATE----- >>>>>>>>> >>>>>>>>> SSLCertificate: | >>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>> -----END CERTIFICATE----- >>>>>>>>> # The content of an SSL intermediate CA certificate in PEM >>>>>>>>> format. >>>>>>>>> # Type: string >>>>>>>>> SSLIntermediateCertificate: '' >>>>>>>>> >>>>>>>>> # The content of the SSL Key in PEM format. >>>>>>>>> # Type: string >>>>>>>>> SSLKey: | >>>>>>>>> -----BEGIN PRIVATE KEY----- >>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>> -----END PRIVATE KEY----- >>>>>>>>> >>>>>>>>> # ****************************************************** >>>>>>>>> # Static parameters - these are values that must be >>>>>>>>> # included in the environment but should not be changed. >>>>>>>>> # ****************************************************** >>>>>>>>> # The filepath of the certificate as it will be stored in >>>>>>>>> the controller. >>>>>>>>> # Type: string >>>>>>>>> DeployedSSLCertificatePath: >>>>>>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>>>>>> >>>>>>>>> # ********************* >>>>>>>>> # End static parameters >>>>>>>>> # ********************* >>>>>>>>> >>>>>>>>> inject-trust-anchor.yaml >>>>>>>>> >>>>>>>>> # >>>>>>>>> ******************************************************************* >>>>>>>>> # This file was created automatically by the sample >>>>>>>>> environment >>>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>>> update it. >>>>>>>>> # Users are recommended to make changes to a copy of the >>>>>>>>> file instead >>>>>>>>> # of the original, if any customizations are needed. >>>>>>>>> # >>>>>>>>> ******************************************************************* >>>>>>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>>>>>> # description: | >>>>>>>>> # When using an SSL certificate signed by a CA that is not >>>>>>>>> in the default >>>>>>>>> # list of CAs, this environment allows adding a custom CA >>>>>>>>> certificate to >>>>>>>>> # the overcloud nodes. >>>>>>>>> parameter_defaults: >>>>>>>>> # The content of a CA's SSL certificate file in PEM >>>>>>>>> format. This is evaluated on the client side. >>>>>>>>> # Mandatory. This parameter must be set by the user. >>>>>>>>> # Type: string >>>>>>>>> SSLRootCertificate: | >>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>> -----END CERTIFICATE----- >>>>>>>>> >>>>>>>>> resource_registry: >>>>>>>>> OS::TripleO::NodeTLSCAData: >>>>>>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> The procedure to create such files was followed using: >>>>>>>>> Deploying with SSL — TripleO 3.0.0 documentation >>>>>>>>> (openstack.org) >>>>>>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>>>>>> >>>>>>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>>>>>> IP-based certificate, without DNS. * >>>>>>>>> >>>>>>>>> Any idea around this error would be of great help. >>>>>>>>> >>>>>>>>> -- >>>>>>>>> skype: lokendrarathour >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>> >>>>>> >>>>>> >>>>> >>>>> -- >>>>> >>>> >>> >>> -- >>> ~ Lokendra >>> skype: lokendrarathour >>> >>> >>>
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hey, It’s probably best that you raise a bug here at this stage: https://bugs.launchpad.net/tripleo <https://bugs.launchpad.net/tripleo> Can you attach all of the templates you’re using to that bug, the overcloud deploy command script that you’re running and also the log files that you have shared here? I wasn’t able to reproduce your issue, but if you raise a bug we can direct it to the right team who can help out with your keystone errors. Brendan Shephard Senior Software Engineer Brisbane, Australia
On 28 Jul 2022, at 2:55 am, Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Team, I tried again with DNS enabled, but the error remains the same. tone_resources : Create identity public endpoint | undercloud | 0:24:59.456181 | 2.31s 2022-07-27 15:20:48.735838 | 5254006e-bbd1-cd20-647c-00000000736c | TASK | Create identity internal endpoint 2022-07-27 15:20:51.227000 | 5254006e-bbd1-cd20-647c-00000000736c | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-publ <https://overcloud-publ/>ic.myhsc.com:13000/v3/services <http://ic.myhsc.com:13000/v3/services>, The request you have made requires authentication."} Checking further in the keystone logs in container:
2022-07-27 19:35:37.447 33 WARNING keystone.server.flask.application [req-bb4621d8-73ad-4bad-831f-5c2370e92e71 - - - - -] Authorization failed. The request you have made requires authentication. from fd00:fd00:fd00:9900::29: keystone.exception.Unauthorized: The request you have made requires authentication. 2022-07-27 19:35:37.998 26 WARNING py.warnings [req-54d44e3a-5e34-4e40-b2dc-e8213353ea05 ab5e9670632544f8a8c7e1b3ac175bcd e4185872cadb442aa9a59980b3227941 - default default] /usr/lib/python3.6/site-packages/oslo_policy/policy.py:1065: UserWarning: Policy identity:list_projects failed scope check. The token used to make the request was project scoped but the policy requires ['system', 'domain'] scope. This behavior may change in the future where using the intended scope is required
I am kind of blocked now, any lead would let me understand the problem more and maybe it can solve the issue.
Best Regards, Lokendra
On Mon, Jul 25, 2022 at 3:12 PM Lokendra Rathour <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Brendan, Apologies for this delay, i had to redo the setup to reach this point, and also this time just to eliminate my Doubt i removed SSL for overcloud. Now I am only using DNS Server. In this case also I am getting the same error. | 0:13:20.198877 | 1.86s 2022-07-25 14:37:29.657118 | 525400a7-0932-2ed1-d313-000000007193 | TASK | Create identity internal endpoint 2022-07-25 14:37:31.995131 | 525400a7-0932-2ed1-d313-000000007193 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: http://[fd00:fd00:fd00:9900::a0]:5000/v3/services, The request you have made requires authentication."}
To answer your question please note:
"OS_CLOUD=overcloud openstack endpoint list" [root@GGNLABPM4 ~]# ssh stack@10.0.1.29 <mailto:stack@10.0.1.29> stack@10.0.1.29 <mailto:stack@10.0.1.29>'s password: Activate the web console with: systemctl enable --now cockpit.socket
Last login: Mon Jul 25 14:38:44 2022 from 10.0.1.4 [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list +----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL | +----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | 1ecd328b5ea1426bb411d157b8339dd2 | regionOne | keystone | identity | True | public | http://[fd00:fd00:fd00:9900::a0]:5000 | | 518cfa0f2ece43b684710006c9fa5b25 | regionOne | keystone | identity | True | admin | http://30.30.30.181:35357 <http://30.30.30.181:35357/> | | 8cda413052c24718b073578bb497f483 | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::a0]:5000 | +----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ [stack@undercloud ~]$
it is giving us only keystone endpoints.
Also note that I am trying to deploy the end to end setup with FQDN only. and in this case as well I am facing the same issue as old.
thanks once again for your inputs.
-Lokendra
On Wed, Jul 20, 2022 at 3:07 PM Brendan Shephard <bshephar@redhat.com <mailto:bshephar@redhat.com>> wrote: Hey,
I think it's weird that you got a response at all when you run the openstack endpoint list, since you said haproxy isn't running. So there should be nothing serving that endpoint.
I noticed you have the stackrc file sourced. Try it again without that file sourced, so: $ su - stack $ OS_CLOUD=overcloud openstack endpoint list
I would suspect that nothing should be responding. It could be the stackrc file causing issues with some of the environment variables. If the above command doesn't return anything, then my suggestion would be to re-run the deployment like this:
$ su - stack $ export OS_CLOUD=undercloud # Then run your deployment script again $ bash overcloud_deploy.sh
The OS_CLOUD variable tells the openstackclient to lookup the details about that cloud from your clouds.yaml file. Which will be located in /home/stack/.config/openstack/clouds.yaml.
This method is preferable to the sourcing of RC files.
Reference: https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_conf... <https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_config.html>
Regarding the HAProxy warnings. I don't think they should be fatal. afaik, HAProxy should still be starting. If it's not, there might be another error that you will need to look for in the log files under /var/log/containers/haproxy/
I wasn't able to reproduce that warning by following the documentation for enabling TLS though. So it seems like an odd error to be getting.
Brendan Shephard Software Engineer Red Hat APAC <https://www.redhat.com/> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Wed, Jul 20, 2022 at 7:02 PM Lokendra Rathour <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Brendan / Team, Any lead for the issue raised?
-Lokendra
On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this: (undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list +----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL | +----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 <http://30.30.30.173:35357/> | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 <https://overcloud-hsc.com:13000/> | +----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below: HAproxy container is not running. [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ Checking logs: 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. pcs status also show that proxy is down for the controller with VIP: Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com <mailto:bshephar@redhat.com>> wrote: Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard Software Engineer Red Hat APAC <https://www.redhat.com/> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Swogat and Vikarna, We have tried adding the DNS entry for the overcloud domain. we are getting the same error:
022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:18.785769 | 2.16s 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | TASK | Create identity internal endpoint 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-hsc.com:13000/v3/services <https://overcloud-hsc.com:13000/v3/services>, The request you have made requires authentication."} 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:21.074605 | 2.
Certificate configs:
[stack@undercloud oc-domain-name]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com <mailto:demo@demo.com> CN=overcloud-hsc.com <http://overcloud-hsc.com/> [stack@undercloud oc-domain-name]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] DNS.1=overcloud-hsc.com <http://overcloud-hsc.com/> [stack@undercloud oc-domain-name]$
the difference we see from others is that we are using self-signed certificates.
please let me know in case we need to check something else. Somehow this issue remains stuck.
On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan <swogatpradhan22@gmail.com <mailto:swogatpradhan22@gmail.com>> wrote: I was facing a similar kind of issue. https://bugzilla.redhat.com/show_bug.cgi?id=2089442 <https://bugzilla.redhat.com/show_bug.cgi?id=2089442> Here is the solution that helped me fix it. Also make sure the cn that you will use is reachable from undercloud (maybe) script should take care of it.
Also please follow Mr. Tathe's mail to add the cn first.
With regards Swogat Pradhan
On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe <vikarnatathe@gmail.com <mailto:vikarnatathe@gmail.com>> wrote: Hi Lokendra,
The CN field is missing. Can you add that and generate the certificate again.
CN=ipaddress
Also add dns.1=ipaddress under alt_names for precaution.
Vikarna
On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: HI Vikarna, Thanks for the inputs. I am note able to access any tabs in GUI. <image.png>
to re-state, we are failing at the time of deployment at step4 :
PLAY [External deployment step 4] ********************************************** 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment step 4 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment step 4 | undercloud -> localhost | result={ "changed": false, "msg": "Use --start-at-task 'External deployment step 4' to resume from this task" } [WARNING]: ('undercloud -> localhost', '525400ae-089b-870a-fab6-0000000000d7') missing from stats 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml | undercloud 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder keystone catalog entries 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone resources for OpenStack services 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for each operating system 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b | TIMING | tripleo_keystone_resources : Gather variables for each operating system | undercloud | 0:11:26.253383 | 0.04s 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin resources 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c | TIMING | tripleo_keystone_resources : Create Keystone Admin resources | undercloud | 0:11:26.299608 | 0.03s 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | undercloud 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | undercloud 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad | TIMING | tripleo_keystone_resources : Create default domain | undercloud | 0:11:28.437360 | 2.09s 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and service projects 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae | TIMING | tripleo_keystone_resources : Create admin and service projects | undercloud | 0:11:28.483468 | 0.03s 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | undercloud 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of Keystone project 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=admin 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.238078 | 0.72s 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of Keystone project | undercloud | item=service 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.586587 | 1.06s 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 | TIMING | tripleo_keystone_resources : Async creation of Keystone project | undercloud | 0:11:29.587916 | 1.07s 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project status 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project status | undercloud | 30 retries left 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=admin 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.260666 | 5.66s 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project status | undercloud | item=service 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.494729 | 5.89s 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 | TIMING | tripleo_keystone_resources : Check Keystone project status | undercloud | 0:11:35.498771 | 5.89s 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | undercloud 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af | TIMING | tripleo_keystone_resources : Create admin role | undercloud | 0:11:37.725949 | 2.20s 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | undercloud 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 | TIMING | tripleo_keystone_resources : Create _member_ role | undercloud | 0:11:37.783369 | 0.04s 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | undercloud 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 | TIMING | tripleo_keystone_resources : Create admin user | undercloud | 0:11:41.145472 | 3.34s 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to admin project for admin user 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to admin project for admin user | undercloud 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 | TIMING | tripleo_keystone_resources : Assign admin role to admin project for admin user | undercloud | 0:11:44.288848 | 3.13s 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to admin project for admin user 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to admin project for admin user | undercloud 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 | TIMING | tripleo_keystone_resources : Assign _member_ role to admin project for admin user | undercloud | 0:11:44.346479 | 0.04s 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service | undercloud 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 | TIMING | tripleo_keystone_resources : Create identity service | undercloud | 0:11:46.022362 | 1.66s 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public endpoint 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public endpoint | undercloud 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:11:48.233349 | 2.19s 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity internal endpoint 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 | TIMING | tripleo_keystone_resources : Create identity internal endpoint | undercloud | 0:11:50.660654 | 2.41s
PLAY RECAP ********************************************************************* localhost : ok=1 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=103 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=435 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=432 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=39 changed=7 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0
Also : (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf [req] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn [dn] C=IN ST=UTTAR PRADESH L=NOIDA O=HSC OU=HSC emailAddress=demo@demo.com <mailto:demo@demo.com>
v3.ext: (undercloud) [stack@undercloud oc-cert]$ cat v3.ext authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment subjectAltName = @alt_names [alt_names] IP.1=fd00:fd00:fd00:9900::81
Using these files we create other certificates. Please check and let me know in case we need anything else.
On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe <vikarnatathe@gmail.com <mailto:vikarnatathe@gmail.com>> wrote: Hi Lokendra,
Are you able to access all the tabs in the OpenStack dashboard without any error? If not, please retry generating the certificate. Also, share the openssl.cnf or server.cnf.
On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Team, Any input on this case raised.
Thanks, Lokendra
On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Shephard/Swogat, I tried changing the setting as suggested and it looks like it has failed at step 4 with error:
:31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | TIMING | tripleo_keystone_resources : Create identity public endpoint | undercloud | 0:24:47.736198 | 2.21s 2022-07-12 21:31:32.185594 | 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity internal endpoint 2022-07-12 21:31:34.468996 | 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request you have made requires authentication."} 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000
Checking further the endpoint list: I see only one endpoint for keystone is gettin created. DeprecationWarning +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL | +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 <http://30.30.30.173:35357/> | | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone | identity | True | public | https://[fd00:fd00:fd00:9900::81]:13000 | +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+
it looks like something related to the SSL, we have also verified that the GUI login screen shows that Certificates are applied. exploring more in logs, meanwhile any suggestions or know observation would be of great help. thanks again for the support.
Best Regards, Lokendra
On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan <swogatpradhan22@gmail.com <mailto:swogatpradhan22@gmail.com>> wrote: I had faced a similar kind of issue, for ip based setup you need to specify the domain name as the ip that you are going to use, this error is showing up because the ssl is ip based but the fqdns seems to be undercloud.com <http://undercloud.com/> or overcloud.example.com <http://overcloud.example.com/>. I think for undercloud you can change the undercloud.conf.
And will it work if we specify clouddomain parameter to the IP address for overcloud? because it seems he has not specified the clouddomain parameter and overcloud.example.com <http://overcloud.example.com/> is the default domain for overcloud.example.com <http://overcloud.example.com/>.
On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, <swogatpradhan22@gmail.com <mailto:swogatpradhan22@gmail.com>> wrote: What is the domain name you have specified in the undercloud.conf file? And what is the fqdn name used for the generation of the SSL cert?
On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, <lokendrarathour@gmail.com <mailto:lokendrarathour@gmail.com>> wrote: Hi Team, We were trying to install overcloud with SSL enabled for which the UC is installed, but OC install is getting failed at step 4:
ERROR :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com <http://undercloud.com/>'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.606739 | 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder keystone catalog entries | undercloud | item={'service_name': 'cinderv3', 'service_type': 'volume'} | error={"ansible_index_var": "cinder_api_service", "ansible_loop_var": "item", "changed": false, "cinder_api_service": 1, "item": {"service_name": "cinderv3", "service_type": "volume"}, "module_stderr": "Failed to discover available identity versions when contacting https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to parse version from URL.\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, in urlopen\n chunked=chunked)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, in _make_request\n self._validate_conn(conn)\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, in _validate_conn\n conn.connect()\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in connect\n _match_hostname(cert, self.assert_hostname or server_hostname)\n File \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in _match_hostname\n match_hostname(cert, asserted_hostname)\n File \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % (hostname, dnsnames[0]))\nssl.CertificateError: hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com <http://undercloud.com/>'\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in send\n timeout=timeout\n File \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, in urlopen\n _stacktrace=sys.exc_info()[2])\n File \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in increment\n raise MaxRetryError(_pool, url, error or ResponseError(cause))\nurllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com <http://undercloud.com/>'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, in _send_request\n resp = self.session.request(method, url, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, in request\n resp = self.send(prep, **send_kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in send\n r = adapter.send(request, **kwargs)\n File \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com <http://undercloud.com/>'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 138, in _do_create_plugin\n authenticated=False)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 610, in get_discovery\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, in get_discovery\n disc = Discover(session, url, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, in __init__\n authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, in get_version_data\n resp = session.get(url, headers=headers, authenticated=authenticated)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, in get\n return self.request(url, 'GET', **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in request\n resp = send(**kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, in _send_request\n raise exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com <http://undercloud.com/>'\",),))\n\nDuring handling of the above exception, another exception occurred:\n\nTraceback (most recent call last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n return _run_module_code(code, init_globals, run_name, mod_spec)\n File \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n mod_name, mod_spec, pkg_name, script_name)\n File \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, run_globals)\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 185, in <module>\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 181, in main\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", line 407, in __call__\n File \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", line 141, in run\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 517, in search_services\n services = self.list_services()\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 492, in list_services\n if self._is_client_version('identity', 2):\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 460, in _is_client_version\n client = getattr(self, client_name)\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line 32, in _identity_client\n 'identity', min_version=2, max_version='3.latest')\n File \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in get_endpoint\n return self.session.get_endpoint(auth or self.auth, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 380, in get_endpoint\n allow_version_hack=allow_version_hack, **kwargs)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 271, in get_endpoint_data\n service_catalog = self.get_access(session).service_catalog\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 206, in get_auth_ref\n self._plugin = self._do_create_plugin(session)\n File \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", line 161, in _do_create_plugin\n 'auth_url is correct. %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://[fd00:fd00:fd00:9900::2ef]:13000: HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max retries exceeded with url: / (Caused by SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't match 'overcloud.example.com <http://overcloud.example.com/>'\",),))\n", "module_stdout": "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} 2022-07-08 17:03:23.609354 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s 2022-07-08 17:03:23.611094 | 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s
PLAY RECAP ********************************************************************* localhost : ok=0 changed=0 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 overcloud-controller-0 : ok=437 changed=104 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-1 : ok=436 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-controller-2 : ok=431 changed=101 unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 overcloud-novacompute-0 : ok=345 changed=83 unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 undercloud : ok=28 changed=7 unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 2022-07-08 17:03:23.647270 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2022-07-08 17:03:23.647907 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
in the deploy.sh:
openstack overcloud deploy --templates \ -r /home/stack/templates/roles_data.yaml \ --networks-file /home/stack/templates/custom_network_data.yaml \ --vip-file /home/stack/templates/custom_vip_data.yaml \ --baremetal-deployment /home/stack/templates/overcloud-baremetal-deploy.yaml \ --network-config \ -e /home/stack/templates/environment.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml \ -e /home/stack/templates/ironic-config.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ -e /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ -e /home/stack/containers-prepare-parameter.yaml
Addition lines as highlighted in yellow were passed with modifications: tls-endpoints-public-ip.yaml: Passed as is in the defaults. enable-tls.yaml: # ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Enable SSL on OpenStack Public Endpoints # description: | # Use this environment to pass in certificates for SSL deployments. # For these values to take effect, one of the tls-endpoints-*.yaml # environments must also be used. parameter_defaults: # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in Horizon # Type: boolean HorizonSecureCookies: True
# Specifies the default CA cert to use if TLS is used for services in the public network. # Type: string PublicTLSCAFile: '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem'
# The content of the SSL certificate (without Key) in PEM format. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
SSLCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE----- # The content of an SSL intermediate CA certificate in PEM format. # Type: string SSLIntermediateCertificate: ''
# The content of the SSL Key in PEM format. # Type: string SSLKey: | -----BEGIN PRIVATE KEY----- ----*** CERTICATELINES TRIMMED ** -----END PRIVATE KEY-----
# ****************************************************** # Static parameters - these are values that must be # included in the environment but should not be changed. # ****************************************************** # The filepath of the certificate as it will be stored in the controller. # Type: string DeployedSSLCertificatePath: /etc/pki/tls/private/overcloud_endpoint.pem
# ********************* # End static parameters # ********************* inject-trust-anchor.yaml # ******************************************************************* # This file was created automatically by the sample environment # generator. Developers should use `tox -e genconfig` to update it. # Users are recommended to make changes to a copy of the file instead # of the original, if any customizations are needed. # ******************************************************************* # title: Inject SSL Trust Anchor on Overcloud Nodes # description: | # When using an SSL certificate signed by a CA that is not in the default # list of CAs, this environment allows adding a custom CA certificate to # the overcloud nodes. parameter_defaults: # The content of a CA's SSL certificate file in PEM format. This is evaluated on the client side. # Mandatory. This parameter must be set by the user. # Type: string SSLRootCertificate: | -----BEGIN CERTIFICATE----- ----*** CERTICATELINES TRIMMED ** -----END CERTIFICATE-----
resource_registry: OS::TripleO::NodeTLSCAData: ../../puppet/extraconfig/tls/ca-inject.yaml
The procedure to create such files was followed using: Deploying with SSL — TripleO 3.0.0 documentation (openstack.org) <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html>
Idea is to deploy overcloud with SSL enabled i.e Self-signed IP-based certificate, without DNS.
Any idea around this error would be of great help.
-- skype: lokendrarathour
--
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hi Brendan, Thanks for the advice. bug is reported: https://bugs.launchpad.net/tripleo/+bug/1982996 On Thu, Jul 28, 2022 at 5:34 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
It’s probably best that you raise a bug here at this stage: https://bugs.launchpad.net/tripleo
Can you attach all of the templates you’re using to that bug, the overcloud deploy command script that you’re running and also the log files that you have shared here?
I wasn’t able to reproduce your issue, but if you raise a bug we can direct it to the right team who can help out with your keystone errors.
Brendan Shephard Senior Software Engineer Brisbane, Australia
On 28 Jul 2022, at 2:55 am, Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Team, I tried again with DNS enabled, but the error remains the same.
tone_resources : Create identity public endpoint | undercloud | 0:24:59.456181 | 2.31s 2022-07-27 15:20:48.735838 | 5254006e-bbd1-cd20-647c-00000000736c | TASK | Create identity internal endpoint 2022-07-27 15:20:51.227000 | 5254006e-bbd1-cd20-647c-00000000736c | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-publ ic.myhsc.com:13000/v3/services, The request you have made requires authentication."}
Checking further in the keystone logs in container:
2022-07-27 19:35:37.447 33 WARNING keystone.server.flask.application [req-bb4621d8-73ad-4bad-831f-5c2370e92e71 - - - - -] Authorization failed. The request you have made requires authentication. from fd00:fd00:fd00:9900::29: keystone.exception.Unauthorized: The request you have made requires authentication. 2022-07-27 19:35:37.998 26 WARNING py.warnings [req-54d44e3a-5e34-4e40-b2dc-e8213353ea05 ab5e9670632544f8a8c7e1b3ac175bcd e4185872cadb442aa9a59980b3227941 - default default] /usr/lib/python3.6/site-packages/oslo_policy/policy.py:1065: UserWarning: Policy identity:list_projects failed scope check. The token used to make the request was project scoped but the policy requires ['system', 'domain'] scope. This behavior may change in the future where using the intended scope is required
I am kind of blocked now, any lead would let me understand the problem more and maybe it can solve the issue.
Best Regards, Lokendra
On Mon, Jul 25, 2022 at 3:12 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan, Apologies for this delay, i had to redo the setup to reach this point, and also this time just to eliminate my Doubt i removed SSL for overcloud. Now I am only using DNS Server. In this case also I am getting the same error.
| 0:13:20.198877 | 1.86s 2022-07-25 14:37:29.657118 | 525400a7-0932-2ed1-d313-000000007193 | TASK | Create identity internal endpoint 2022-07-25 14:37:31.995131 | 525400a7-0932-2ed1-d313-000000007193 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: http://[fd00:fd00:fd00:9900::a0]:5000/v3/services, The request you have made requires authentication."}
To answer your question please note:
"OS_CLOUD=overcloud openstack endpoint list"
[root@GGNLABPM4 ~]# ssh stack@10.0.1.29 stack@10.0.1.29's password: Activate the web console with: systemctl enable --now cockpit.socket
Last login: Mon Jul 25 14:38:44 2022 from 10.0.1.4 [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | 1ecd328b5ea1426bb411d157b8339dd2 | regionOne | keystone | identity | True | public | http://[fd00:fd00:fd00:9900::a0]:5000 | | 518cfa0f2ece43b684710006c9fa5b25 | regionOne | keystone | identity | True | admin | http://30.30.30.181:35357 | | 8cda413052c24718b073578bb497f483 | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::a0]:5000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ [stack@undercloud ~]$
it is giving us only keystone endpoints.
Also note that I am trying to deploy the end to end setup with FQDN only. and in this case as well I am facing the same issue as old.
thanks once again for your inputs.
-Lokendra
On Wed, Jul 20, 2022 at 3:07 PM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
I think it's weird that you got a response at all when you run the openstack endpoint list, since you said haproxy isn't running. So there should be nothing serving that endpoint.
I noticed you have the stackrc file sourced. Try it again without that file sourced, so: $ su - stack $ OS_CLOUD=overcloud openstack endpoint list
I would suspect that nothing should be responding. It could be the stackrc file causing issues with some of the environment variables. If the above command doesn't return anything, then my suggestion would be to re-run the deployment like this:
$ su - stack $ export OS_CLOUD=undercloud # Then run your deployment script again $ bash overcloud_deploy.sh
The OS_CLOUD variable tells the openstackclient to lookup the details about that cloud from your clouds.yaml file. Which will be located in /home/stack/.config/openstack/clouds.yaml.
This method is preferable to the sourcing of RC files.
Reference:
https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_conf...
Regarding the HAProxy warnings. I don't think they should be fatal. afaik, HAProxy should still be starting. If it's not, there might be another error that you will need to look for in the log files under /var/log/containers/haproxy/
I wasn't able to reproduce that warning by following the documentation for enabling TLS though. So it seems like an odd error to be getting.
Brendan Shephard Software Engineer
Red Hat APAC <https://www.redhat.com/> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Wed, Jul 20, 2022 at 7:02 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan / Team, Any lead for the issue raised?
-Lokendra
On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this:
(undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below:
- HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms
do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
Doesn't look like there is anything wrong with the certificate there. You would be getting a TLS error if that was the problem.
What does your clouds.yaml file look like now? What happens if you run this command from the Undercloud node: $ OS_CLOUD=overcloud openstack endpoint list
Do you get the same error?
Brendan Shephard Software Engineer
Red Hat APAC <https://www.redhat.com/> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
> Hi Swogat and Vikarna, > We have tried adding the DNS entry for the overcloud domain. we are > getting the same error: > > 022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | > TIMING | tripleo_keystone_resources : Create identity public endpoint | > undercloud | 0:11:18.785769 | 2.16s > 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | > TASK | Create identity internal endpoint > 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | > FATAL | Create identity internal endpoint | undercloud | > error={"changed": false, "extra_data": {"data": null, "details": "The > request you have made requires authentication.", "response": > "{\"error\":{\"code\":401,\"message\":\"The request you have made requires > authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list > services: Client Error for url: > https://overcloud-hsc.com:13000/v3/services, The request you have > made requires authentication."} > 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | > TIMING | tripleo_keystone_resources : Create identity internal endpoint > | undercloud | 0:11:21.074605 | 2. > > > Certificate configs: > > [stack@undercloud oc-domain-name]$ cat server.csr.cnf > [req] > default_bits = 2048 > prompt = no > default_md = sha256 > distinguished_name = dn > [dn] > C=IN > ST=UTTAR PRADESH > L=NOIDA > O=HSC > OU=HSC > emailAddress=demo@demo.com > CN=overcloud-hsc.com > [stack@undercloud oc-domain-name]$ cat v3.ext > authorityKeyIdentifier=keyid,issuer > basicConstraints=CA:FALSE > keyUsage = digitalSignature, nonRepudiation, keyEncipherment, > dataEncipherment > subjectAltName = @alt_names > [alt_names] > DNS.1=overcloud-hsc.com > [stack@undercloud oc-domain-name]$ > > the difference we see from others is that we are using self-signed > certificates. > > please let me know in case we need to check something else. Somehow > this issue remains stuck. > > > On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan < > swogatpradhan22@gmail.com> wrote: > >> I was facing a similar kind of issue. >> https://bugzilla.redhat.com/show_bug.cgi?id=2089442 >> Here is the solution that helped me fix it. >> Also make sure the cn that you will use is reachable from >> undercloud (maybe) script should take care of it. >> >> Also please follow Mr. Tathe's mail to add the cn first. >> >> With regards >> Swogat Pradhan >> >> On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe < >> vikarnatathe@gmail.com> wrote: >> >>> Hi Lokendra, >>> >>> The CN field is missing. Can you add that and generate the >>> certificate again. >>> >>> CN=ipaddress >>> >>> Also add dns.1=ipaddress under alt_names for precaution. >>> >>> Vikarna >>> >>> On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < >>> lokendrarathour@gmail.com> wrote: >>> >>>> HI Vikarna, >>>> Thanks for the inputs. >>>> I am note able to access any tabs in GUI. >>>> <image.png> >>>> >>>> to re-state, we are failing at the time of deployment at step4 : >>>> >>>> >>>> PLAY [External deployment step 4] >>>> ********************************************** >>>> 2022-07-13 21:35:22.505148 | 525400ae-089b-870a-fab6-0000000000d7 >>>> | TASK | External deployment step 4 >>>> 2022-07-13 21:35:22.534899 | 525400ae-089b-870a-fab6-0000000000d7 >>>> | OK | External deployment step 4 | undercloud -> localhost | >>>> result={ >>>> "changed": false, >>>> "msg": "Use --start-at-task 'External deployment step 4' to >>>> resume from this task" >>>> } >>>> [WARNING]: ('undercloud -> localhost', >>>> '525400ae-089b-870a-fab6-0000000000d7') >>>> missing from stats >>>> 2022-07-13 21:35:22.591268 | 525400ae-089b-870a-fab6-0000000000d8 >>>> | TIMING | include_tasks | undercloud | 0:11:21.683453 | 0.04s >>>> 2022-07-13 21:35:22.605901 | f29c4b58-75a5-4993-97b8-3921a49d79d7 >>>> | INCLUDED | >>>> /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml >>>> | undercloud >>>> 2022-07-13 21:35:22.627112 | 525400ae-089b-870a-fab6-000000007239 >>>> | TASK | Clean up legacy Cinder keystone catalog entries >>>> 2022-07-13 21:35:25.110635 | 525400ae-089b-870a-fab6-000000007239 >>>> | OK | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | item={'service_name': 'cinderv2', 'service_type': 'volumev2'} >>>> 2022-07-13 21:35:25.112368 | 525400ae-089b-870a-fab6-000000007239 >>>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | 0:11:24.204562 | 2.48s >>>> 2022-07-13 21:35:27.029270 | 525400ae-089b-870a-fab6-000000007239 >>>> | OK | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | item={'service_name': 'cinderv3', 'service_type': 'volume'} >>>> 2022-07-13 21:35:27.030383 | 525400ae-089b-870a-fab6-000000007239 >>>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | 0:11:26.122584 | 4.40s >>>> 2022-07-13 21:35:27.032091 | 525400ae-089b-870a-fab6-000000007239 >>>> | TIMING | Clean up legacy Cinder keystone catalog entries | undercloud >>>> | 0:11:26.124296 | 4.40s >>>> 2022-07-13 21:35:27.047913 | 525400ae-089b-870a-fab6-00000000723c >>>> | TASK | Manage Keystone resources for OpenStack services >>>> 2022-07-13 21:35:27.077672 | 525400ae-089b-870a-fab6-00000000723c >>>> | TIMING | Manage Keystone resources for OpenStack services | >>>> undercloud | 0:11:26.169842 | 0.03s >>>> 2022-07-13 21:35:27.120270 | 525400ae-089b-870a-fab6-00000000726b >>>> | TASK | Gather variables for each operating system >>>> 2022-07-13 21:35:27.161225 | 525400ae-089b-870a-fab6-00000000726b >>>> | TIMING | tripleo_keystone_resources : Gather variables for each >>>> operating system | undercloud | 0:11:26.253383 | 0.04s >>>> 2022-07-13 21:35:27.177798 | 525400ae-089b-870a-fab6-00000000726c >>>> | TASK | Create Keystone Admin resources >>>> 2022-07-13 21:35:27.207430 | 525400ae-089b-870a-fab6-00000000726c >>>> | TIMING | tripleo_keystone_resources : Create Keystone Admin resources >>>> | undercloud | 0:11:26.299608 | 0.03s >>>> 2022-07-13 21:35:27.230985 | 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 >>>> | INCLUDED | >>>> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | >>>> undercloud >>>> 2022-07-13 21:35:27.256076 | 525400ae-089b-870a-fab6-0000000072ad >>>> | TASK | Create default domain >>>> 2022-07-13 21:35:29.343399 | 525400ae-089b-870a-fab6-0000000072ad >>>> | OK | Create default domain | undercloud >>>> 2022-07-13 21:35:29.345172 | 525400ae-089b-870a-fab6-0000000072ad >>>> | TIMING | tripleo_keystone_resources : Create default domain | >>>> undercloud | 0:11:28.437360 | 2.09s >>>> 2022-07-13 21:35:29.361643 | 525400ae-089b-870a-fab6-0000000072ae >>>> | TASK | Create admin and service projects >>>> 2022-07-13 21:35:29.391295 | 525400ae-089b-870a-fab6-0000000072ae >>>> | TIMING | tripleo_keystone_resources : Create admin and service >>>> projects | undercloud | 0:11:28.483468 | 0.03s >>>> 2022-07-13 21:35:29.402539 | af7a4a76-4998-4679-ac6f-58acc0867554 >>>> | INCLUDED | >>>> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | >>>> undercloud >>>> 2022-07-13 21:35:29.428918 | 525400ae-089b-870a-fab6-000000007304 >>>> | TASK | Async creation of Keystone project >>>> 2022-07-13 21:35:30.144295 | 525400ae-089b-870a-fab6-000000007304 >>>> | CHANGED | Async creation of Keystone project | undercloud | item=admin >>>> 2022-07-13 21:35:30.145884 | 525400ae-089b-870a-fab6-000000007304 >>>> | TIMING | tripleo_keystone_resources : Async creation of Keystone >>>> project | undercloud | 0:11:29.238078 | 0.72s >>>> 2022-07-13 21:35:30.493458 | 525400ae-089b-870a-fab6-000000007304 >>>> | CHANGED | Async creation of Keystone project | undercloud | >>>> item=service >>>> 2022-07-13 21:35:30.494386 | 525400ae-089b-870a-fab6-000000007304 >>>> | TIMING | tripleo_keystone_resources : Async creation of Keystone >>>> project | undercloud | 0:11:29.586587 | 1.06s >>>> 2022-07-13 21:35:30.495729 | 525400ae-089b-870a-fab6-000000007304 >>>> | TIMING | tripleo_keystone_resources : Async creation of Keystone >>>> project | undercloud | 0:11:29.587916 | 1.07s >>>> 2022-07-13 21:35:30.511748 | 525400ae-089b-870a-fab6-000000007306 >>>> | TASK | Check Keystone project status >>>> 2022-07-13 21:35:30.908189 | 525400ae-089b-870a-fab6-000000007306 >>>> | WAITING | Check Keystone project status | undercloud | 30 retries left >>>> 2022-07-13 21:35:36.166541 | 525400ae-089b-870a-fab6-000000007306 >>>> | OK | Check Keystone project status | undercloud | item=admin >>>> 2022-07-13 21:35:36.168506 | 525400ae-089b-870a-fab6-000000007306 >>>> | TIMING | tripleo_keystone_resources : Check Keystone project status | >>>> undercloud | 0:11:35.260666 | 5.66s >>>> 2022-07-13 21:35:36.400914 | 525400ae-089b-870a-fab6-000000007306 >>>> | OK | Check Keystone project status | undercloud | item=service >>>> 2022-07-13 21:35:36.402534 | 525400ae-089b-870a-fab6-000000007306 >>>> | TIMING | tripleo_keystone_resources : Check Keystone project status | >>>> undercloud | 0:11:35.494729 | 5.89s >>>> 2022-07-13 21:35:36.406576 | 525400ae-089b-870a-fab6-000000007306 >>>> | TIMING | tripleo_keystone_resources : Check Keystone project status | >>>> undercloud | 0:11:35.498771 | 5.89s >>>> 2022-07-13 21:35:36.427719 | 525400ae-089b-870a-fab6-0000000072af >>>> | TASK | Create admin role >>>> 2022-07-13 21:35:38.632266 | 525400ae-089b-870a-fab6-0000000072af >>>> | OK | Create admin role | undercloud >>>> 2022-07-13 21:35:38.633754 | 525400ae-089b-870a-fab6-0000000072af >>>> | TIMING | tripleo_keystone_resources : Create admin role | undercloud >>>> | 0:11:37.725949 | 2.20s >>>> 2022-07-13 21:35:38.649721 | 525400ae-089b-870a-fab6-0000000072b0 >>>> | TASK | Create _member_ role >>>> 2022-07-13 21:35:38.689773 | 525400ae-089b-870a-fab6-0000000072b0 >>>> | SKIPPED | Create _member_ role | undercloud >>>> 2022-07-13 21:35:38.691172 | 525400ae-089b-870a-fab6-0000000072b0 >>>> | TIMING | tripleo_keystone_resources : Create _member_ role | >>>> undercloud | 0:11:37.783369 | 0.04s >>>> 2022-07-13 21:35:38.706920 | 525400ae-089b-870a-fab6-0000000072b1 >>>> | TASK | Create admin user >>>> 2022-07-13 21:35:42.051623 | 525400ae-089b-870a-fab6-0000000072b1 >>>> | CHANGED | Create admin user | undercloud >>>> 2022-07-13 21:35:42.053285 | 525400ae-089b-870a-fab6-0000000072b1 >>>> | TIMING | tripleo_keystone_resources : Create admin user | undercloud >>>> | 0:11:41.145472 | 3.34s >>>> 2022-07-13 21:35:42.069370 | 525400ae-089b-870a-fab6-0000000072b2 >>>> | TASK | Assign admin role to admin project for admin user >>>> 2022-07-13 21:35:45.194891 | 525400ae-089b-870a-fab6-0000000072b2 >>>> | OK | Assign admin role to admin project for admin user | >>>> undercloud >>>> 2022-07-13 21:35:45.196669 | 525400ae-089b-870a-fab6-0000000072b2 >>>> | TIMING | tripleo_keystone_resources : Assign admin role to admin >>>> project for admin user | undercloud | 0:11:44.288848 | 3.13s >>>> 2022-07-13 21:35:45.212674 | 525400ae-089b-870a-fab6-0000000072b3 >>>> | TASK | Assign _member_ role to admin project for admin user >>>> 2022-07-13 21:35:45.252884 | 525400ae-089b-870a-fab6-0000000072b3 >>>> | SKIPPED | Assign _member_ role to admin project for admin user | >>>> undercloud >>>> 2022-07-13 21:35:45.254283 | 525400ae-089b-870a-fab6-0000000072b3 >>>> | TIMING | tripleo_keystone_resources : Assign _member_ role to admin >>>> project for admin user | undercloud | 0:11:44.346479 | 0.04s >>>> 2022-07-13 21:35:45.270310 | 525400ae-089b-870a-fab6-0000000072b4 >>>> | TASK | Create identity service >>>> 2022-07-13 21:35:46.928715 | 525400ae-089b-870a-fab6-0000000072b4 >>>> | OK | Create identity service | undercloud >>>> 2022-07-13 21:35:46.930167 | 525400ae-089b-870a-fab6-0000000072b4 >>>> | TIMING | tripleo_keystone_resources : Create identity service | >>>> undercloud | 0:11:46.022362 | 1.66s >>>> 2022-07-13 21:35:46.946797 | 525400ae-089b-870a-fab6-0000000072b5 >>>> | TASK | Create identity public endpoint >>>> 2022-07-13 21:35:49.139298 | 525400ae-089b-870a-fab6-0000000072b5 >>>> | OK | Create identity public endpoint | undercloud >>>> 2022-07-13 21:35:49.141158 | 525400ae-089b-870a-fab6-0000000072b5 >>>> | TIMING | tripleo_keystone_resources : Create identity public endpoint >>>> | undercloud | 0:11:48.233349 | 2.19s >>>> 2022-07-13 21:35:49.157768 | 525400ae-089b-870a-fab6-0000000072b6 >>>> | TASK | Create identity internal endpoint >>>> 2022-07-13 21:35:51.566826 | 525400ae-089b-870a-fab6-0000000072b6 >>>> | FATAL | Create identity internal endpoint | undercloud | >>>> error={"changed": false, "extra_data": {"data": null, "details": "The >>>> request you have made requires authentication.", "response": >>>> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>> services: Client Error for url: >>>> https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The request >>>> you have made requires authentication."} >>>> 2022-07-13 21:35:51.568473 | 525400ae-089b-870a-fab6-0000000072b6 >>>> | TIMING | tripleo_keystone_resources : Create identity internal >>>> endpoint | undercloud | 0:11:50.660654 | 2.41s >>>> >>>> PLAY RECAP >>>> ********************************************************************* >>>> localhost : ok=1 changed=0 unreachable=0 >>>> failed=0 skipped=2 rescued=0 ignored=0 >>>> overcloud-controller-0 : ok=437 changed=103 unreachable=0 >>>> failed=0 skipped=214 rescued=0 ignored=0 >>>> overcloud-controller-1 : ok=435 changed=101 unreachable=0 >>>> failed=0 skipped=214 rescued=0 ignored=0 >>>> overcloud-controller-2 : ok=432 changed=101 unreachable=0 >>>> failed=0 skipped=214 rescued=0 ignored=0 >>>> overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 >>>> failed=0 skipped=198 rescued=0 ignored=0 >>>> undercloud : ok=39 changed=7 unreachable=0 >>>> failed=1 skipped=6 rescued=0 ignored=0 >>>> >>>> Also : >>>> (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf >>>> [req] >>>> default_bits = 2048 >>>> prompt = no >>>> default_md = sha256 >>>> distinguished_name = dn >>>> [dn] >>>> C=IN >>>> ST=UTTAR PRADESH >>>> L=NOIDA >>>> O=HSC >>>> OU=HSC >>>> emailAddress=demo@demo.com >>>> >>>> v3.ext: >>>> (undercloud) [stack@undercloud oc-cert]$ cat v3.ext >>>> authorityKeyIdentifier=keyid,issuer >>>> basicConstraints=CA:FALSE >>>> keyUsage = digitalSignature, nonRepudiation, keyEncipherment, >>>> dataEncipherment >>>> subjectAltName = @alt_names >>>> [alt_names] >>>> IP.1=fd00:fd00:fd00:9900::81 >>>> >>>> Using these files we create other certificates. >>>> Please check and let me know in case we need anything else. >>>> >>>> >>>> On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe < >>>> vikarnatathe@gmail.com> wrote: >>>> >>>>> Hi Lokendra, >>>>> >>>>> Are you able to access all the tabs in the OpenStack dashboard >>>>> without any error? If not, please retry generating the certificate. Also, >>>>> share the openssl.cnf or server.cnf. >>>>> >>>>> On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < >>>>> lokendrarathour@gmail.com> wrote: >>>>> >>>>>> Hi Team, >>>>>> Any input on this case raised. >>>>>> >>>>>> Thanks, >>>>>> Lokendra >>>>>> >>>>>> >>>>>> On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < >>>>>> lokendrarathour@gmail.com> wrote: >>>>>> >>>>>>> Hi Shephard/Swogat, >>>>>>> I tried changing the setting as suggested and it looks like it >>>>>>> has failed at step 4 with error: >>>>>>> >>>>>>> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | >>>>>>> TIMING | tripleo_keystone_resources : Create identity public endpoint | >>>>>>> undercloud | 0:24:47.736198 | 2.21s >>>>>>> 2022-07-12 21:31:32.185594 | >>>>>>> 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity >>>>>>> internal endpoint >>>>>>> 2022-07-12 21:31:34.468996 | >>>>>>> 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity >>>>>>> internal endpoint | undercloud | error={"changed": false, "extra_data": >>>>>>> {"data": null, "details": "The request you have made requires >>>>>>> authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The >>>>>>> request you have made requires >>>>>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>>>>> services: Client Error for url: >>>>>>> https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The >>>>>>> request you have made requires authentication."} >>>>>>> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >>>>>>> >>>>>>> >>>>>>> Checking further the endpoint list: >>>>>>> I see only one endpoint for keystone is gettin created. >>>>>>> >>>>>>> DeprecationWarning >>>>>>> >>>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>>> | ID | Region | Service Name >>>>>>> | Service Type | Enabled | Interface | URL >>>>>>> | >>>>>>> >>>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>>> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone >>>>>>> | identity | True | admin | >>>>>>> http://30.30.30.173:35357 | >>>>>>> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone >>>>>>> | identity | True | internal | >>>>>>> http://[fd00:fd00:fd00:2000::326]:5000 | >>>>>>> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone >>>>>>> | identity | True | public | >>>>>>> https://[fd00:fd00:fd00:9900::81]:13000 | >>>>>>> >>>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>>> >>>>>>> >>>>>>> it looks like something related to the SSL, we have also >>>>>>> verified that the GUI login screen shows that Certificates are applied. >>>>>>> exploring more in logs, meanwhile any suggestions or know >>>>>>> observation would be of great help. >>>>>>> thanks again for the support. >>>>>>> >>>>>>> Best Regards, >>>>>>> Lokendra >>>>>>> >>>>>>> >>>>>>> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >>>>>>> swogatpradhan22@gmail.com> wrote: >>>>>>> >>>>>>>> I had faced a similar kind of issue, for ip based setup you >>>>>>>> need to specify the domain name as the ip that you are going to use, this >>>>>>>> error is showing up because the ssl is ip based but the fqdns seems to be >>>>>>>> undercloud.com or overcloud.example.com. >>>>>>>> I think for undercloud you can change the undercloud.conf. >>>>>>>> >>>>>>>> And will it work if we specify clouddomain parameter to the >>>>>>>> IP address for overcloud? because it seems he has not specified the >>>>>>>> clouddomain parameter and overcloud.example.com is the >>>>>>>> default domain for overcloud.example.com. >>>>>>>> >>>>>>>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>>>>>>> swogatpradhan22@gmail.com> wrote: >>>>>>>> >>>>>>>>> What is the domain name you have specified in the >>>>>>>>> undercloud.conf file? >>>>>>>>> And what is the fqdn name used for the generation of the SSL >>>>>>>>> cert? >>>>>>>>> >>>>>>>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>>>>>>> lokendrarathour@gmail.com> wrote: >>>>>>>>> >>>>>>>>>> Hi Team, >>>>>>>>>> We were trying to install overcloud with SSL enabled for >>>>>>>>>> which the UC is installed, but OC install is getting failed at step 4: >>>>>>>>>> >>>>>>>>>> ERROR >>>>>>>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): >>>>>>>>>> Max retries exceeded with url: / (Caused by >>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", >>>>>>>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>>>> 2022-07-08 17:03:23.606739 | >>>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>>>>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>>>>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>>>>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>>>>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>>>>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>>>>>>> identity versions when contacting >>>>>>>>>> https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to >>>>>>>>>> parse version from URL.\nTraceback (most recent call last):\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, >>>>>>>>>> in urlopen\n chunked=chunked)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>>>>>>> in _make_request\n self._validate_conn(conn)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>>>>>>> in _validate_conn\n conn.connect()\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>>>>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>>>>>>> server_hostname)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>>>>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>>>>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>>>>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>>>>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>>>>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>>>>>>> (most recent call last):\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>>>>>>> send\n timeout=timeout\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>>>>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>>>>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>>>>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>>> last):\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>>>>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>>>>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>>>>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>>>>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>>>>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>>> last):\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>>>>>>> in get_discovery\n disc = Discover(session, url, >>>>>>>>>> authenticated=authenticated)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>>>>>>> in __init__\n authenticated=authenticated)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>>>>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>>>>>>> authenticated=authenticated)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>>>>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>>>>>>> request\n resp = send(**kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>>>>>>> in _send_request\n raise >>>>>>>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>>>>>>> exception connecting to >>>>>>>>>> https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>>>>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>>>>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>>>>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>>>>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>>>>>>> run_globals)\n File >>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>>> line 185, in <module>\n File >>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>>> line 181, in main\n File >>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>>>>>>> line 407, in __call__\n File >>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>>> line 141, in run\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>>>> 517, in search_services\n services = self.list_services()\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>>>>>>> File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>>>>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>>>>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>>>>>>> max_version='3.latest')\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>>>>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>>>>>>> **kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>>>>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>>>>>>> **kwargs)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>> 271, in get_endpoint_data\n service_catalog = >>>>>>>>>> self.get_access(session).service_catalog\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>>> line 206, in get_auth_ref\n self._plugin = >>>>>>>>>> self._do_create_plugin(session)\n File >>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>>> line 161, in _do_create_plugin\n 'auth_url is correct. >>>>>>>>>> %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not >>>>>>>>>> find versioned identity endpoints when attempting to authenticate. Please >>>>>>>>>> check that your auth_url is correct. SSL exception connecting to >>>>>>>>>> https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": >>>>>>>>>> "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>>>> 2022-07-08 17:03:23.609354 | >>>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>>>>>>> 2022-07-08 17:03:23.611094 | >>>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>>>>>>> >>>>>>>>>> PLAY RECAP >>>>>>>>>> ********************************************************************* >>>>>>>>>> localhost : ok=0 changed=0 >>>>>>>>>> unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 >>>>>>>>>> overcloud-controller-0 : ok=437 changed=104 >>>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>>> overcloud-controller-1 : ok=436 changed=101 >>>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>>> overcloud-controller-2 : ok=431 changed=101 >>>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>>> overcloud-novacompute-0 : ok=345 changed=83 >>>>>>>>>> unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 >>>>>>>>>> undercloud : ok=28 changed=7 >>>>>>>>>> unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 >>>>>>>>>> 2022-07-08 17:03:23.647270 | >>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information >>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>>>> 2022-07-08 17:03:23.647907 | >>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 >>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> in the deploy.sh: >>>>>>>>>> >>>>>>>>>> openstack overcloud deploy --templates \ >>>>>>>>>> -r /home/stack/templates/roles_data.yaml \ >>>>>>>>>> --networks-file >>>>>>>>>> /home/stack/templates/custom_network_data.yaml \ >>>>>>>>>> --vip-file /home/stack/templates/custom_vip_data.yaml \ >>>>>>>>>> --baremetal-deployment >>>>>>>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>>>>>>> --network-config \ >>>>>>>>>> -e /home/stack/templates/environment.yaml \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>>>>>>> \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>>>>>>> \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>>>>>>> \ >>>>>>>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>>>>>>> \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>>>>>>> \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>>>>>>> \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>>>>>>> \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>>>>>>> -e >>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>>>>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>>>>>>> >>>>>>>>>> Addition lines as highlighted in yellow were passed with >>>>>>>>>> modifications: >>>>>>>>>> tls-endpoints-public-ip.yaml: >>>>>>>>>> Passed as is in the defaults. >>>>>>>>>> enable-tls.yaml: >>>>>>>>>> >>>>>>>>>> # >>>>>>>>>> ******************************************************************* >>>>>>>>>> # This file was created automatically by the sample >>>>>>>>>> environment >>>>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>>>> update it. >>>>>>>>>> # Users are recommended to make changes to a copy of the >>>>>>>>>> file instead >>>>>>>>>> # of the original, if any customizations are needed. >>>>>>>>>> # >>>>>>>>>> ******************************************************************* >>>>>>>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>>>>>>> # description: | >>>>>>>>>> # Use this environment to pass in certificates for SSL >>>>>>>>>> deployments. >>>>>>>>>> # For these values to take effect, one of the >>>>>>>>>> tls-endpoints-*.yaml >>>>>>>>>> # environments must also be used. >>>>>>>>>> parameter_defaults: >>>>>>>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in >>>>>>>>>> Horizon >>>>>>>>>> # Type: boolean >>>>>>>>>> HorizonSecureCookies: True >>>>>>>>>> >>>>>>>>>> # Specifies the default CA cert to use if TLS is used for >>>>>>>>>> services in the public network. >>>>>>>>>> # Type: string >>>>>>>>>> PublicTLSCAFile: >>>>>>>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>>>>>>> >>>>>>>>>> # The content of the SSL certificate (without Key) in PEM >>>>>>>>>> format. >>>>>>>>>> # Type: string >>>>>>>>>> SSLRootCertificate: | >>>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>> -----END CERTIFICATE----- >>>>>>>>>> >>>>>>>>>> SSLCertificate: | >>>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>> -----END CERTIFICATE----- >>>>>>>>>> # The content of an SSL intermediate CA certificate in >>>>>>>>>> PEM format. >>>>>>>>>> # Type: string >>>>>>>>>> SSLIntermediateCertificate: '' >>>>>>>>>> >>>>>>>>>> # The content of the SSL Key in PEM format. >>>>>>>>>> # Type: string >>>>>>>>>> SSLKey: | >>>>>>>>>> -----BEGIN PRIVATE KEY----- >>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>> -----END PRIVATE KEY----- >>>>>>>>>> >>>>>>>>>> # ****************************************************** >>>>>>>>>> # Static parameters - these are values that must be >>>>>>>>>> # included in the environment but should not be changed. >>>>>>>>>> # ****************************************************** >>>>>>>>>> # The filepath of the certificate as it will be stored in >>>>>>>>>> the controller. >>>>>>>>>> # Type: string >>>>>>>>>> DeployedSSLCertificatePath: >>>>>>>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>>>>>>> >>>>>>>>>> # ********************* >>>>>>>>>> # End static parameters >>>>>>>>>> # ********************* >>>>>>>>>> >>>>>>>>>> inject-trust-anchor.yaml >>>>>>>>>> >>>>>>>>>> # >>>>>>>>>> ******************************************************************* >>>>>>>>>> # This file was created automatically by the sample >>>>>>>>>> environment >>>>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>>>> update it. >>>>>>>>>> # Users are recommended to make changes to a copy of the >>>>>>>>>> file instead >>>>>>>>>> # of the original, if any customizations are needed. >>>>>>>>>> # >>>>>>>>>> ******************************************************************* >>>>>>>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>>>>>>> # description: | >>>>>>>>>> # When using an SSL certificate signed by a CA that is >>>>>>>>>> not in the default >>>>>>>>>> # list of CAs, this environment allows adding a custom CA >>>>>>>>>> certificate to >>>>>>>>>> # the overcloud nodes. >>>>>>>>>> parameter_defaults: >>>>>>>>>> # The content of a CA's SSL certificate file in PEM >>>>>>>>>> format. This is evaluated on the client side. >>>>>>>>>> # Mandatory. This parameter must be set by the user. >>>>>>>>>> # Type: string >>>>>>>>>> SSLRootCertificate: | >>>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>> -----END CERTIFICATE----- >>>>>>>>>> >>>>>>>>>> resource_registry: >>>>>>>>>> OS::TripleO::NodeTLSCAData: >>>>>>>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> The procedure to create such files was followed using: >>>>>>>>>> Deploying with SSL — TripleO 3.0.0 documentation >>>>>>>>>> (openstack.org) >>>>>>>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>>>>>>> >>>>>>>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>>>>>>> IP-based certificate, without DNS. * >>>>>>>>>> >>>>>>>>>> Any idea around this error would be of great help. >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> skype: lokendrarathour >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>>> -- >>>>>> >>>>> >>>> >>>> -- >>>> ~ Lokendra >>>> skype: lokendrarathour >>>> >>>> >>>> > > -- > ~ Lokendra > skype: lokendrarathour > > >
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
Hi Team, Any lead about this issue raised? On Thu, Jul 28, 2022 at 10:02 AM Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Brendan, Thanks for the advice. bug is reported: https://bugs.launchpad.net/tripleo/+bug/1982996
On Thu, Jul 28, 2022 at 5:34 AM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
It’s probably best that you raise a bug here at this stage: https://bugs.launchpad.net/tripleo
Can you attach all of the templates you’re using to that bug, the overcloud deploy command script that you’re running and also the log files that you have shared here?
I wasn’t able to reproduce your issue, but if you raise a bug we can direct it to the right team who can help out with your keystone errors.
Brendan Shephard Senior Software Engineer Brisbane, Australia
On 28 Jul 2022, at 2:55 am, Lokendra Rathour <lokendrarathour@gmail.com> wrote:
Hi Team, I tried again with DNS enabled, but the error remains the same.
tone_resources : Create identity public endpoint | undercloud | 0:24:59.456181 | 2.31s 2022-07-27 15:20:48.735838 | 5254006e-bbd1-cd20-647c-00000000736c | TASK | Create identity internal endpoint 2022-07-27 15:20:51.227000 | 5254006e-bbd1-cd20-647c-00000000736c | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: https://overcloud-publ ic.myhsc.com:13000/v3/services, The request you have made requires authentication."}
Checking further in the keystone logs in container:
2022-07-27 19:35:37.447 33 WARNING keystone.server.flask.application [req-bb4621d8-73ad-4bad-831f-5c2370e92e71 - - - - -] Authorization failed. The request you have made requires authentication. from fd00:fd00:fd00:9900::29: keystone.exception.Unauthorized: The request you have made requires authentication. 2022-07-27 19:35:37.998 26 WARNING py.warnings [req-54d44e3a-5e34-4e40-b2dc-e8213353ea05 ab5e9670632544f8a8c7e1b3ac175bcd e4185872cadb442aa9a59980b3227941 - default default] /usr/lib/python3.6/site-packages/oslo_policy/policy.py:1065: UserWarning: Policy identity:list_projects failed scope check. The token used to make the request was project scoped but the policy requires ['system', 'domain'] scope. This behavior may change in the future where using the intended scope is required
I am kind of blocked now, any lead would let me understand the problem more and maybe it can solve the issue.
Best Regards, Lokendra
On Mon, Jul 25, 2022 at 3:12 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan, Apologies for this delay, i had to redo the setup to reach this point, and also this time just to eliminate my Doubt i removed SSL for overcloud. Now I am only using DNS Server. In this case also I am getting the same error.
| 0:13:20.198877 | 1.86s 2022-07-25 14:37:29.657118 | 525400a7-0932-2ed1-d313-000000007193 | TASK | Create identity internal endpoint 2022-07-25 14:37:31.995131 | 525400a7-0932-2ed1-d313-000000007193 | FATAL | Create identity internal endpoint | undercloud | error={"changed": false, "extra_data": {"data": null, "details": "The request you have made requires authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The request you have made requires authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list services: Client Error for url: http://[fd00:fd00:fd00:9900::a0]:5000/v3/services, The request you have made requires authentication."}
To answer your question please note:
"OS_CLOUD=overcloud openstack endpoint list"
[root@GGNLABPM4 ~]# ssh stack@10.0.1.29 stack@10.0.1.29's password: Activate the web console with: systemctl enable --now cockpit.socket
Last login: Mon Jul 25 14:38:44 2022 from 10.0.1.4 [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ | 1ecd328b5ea1426bb411d157b8339dd2 | regionOne | keystone | identity | True | public | http://[fd00:fd00:fd00:9900::a0]:5000 | | 518cfa0f2ece43b684710006c9fa5b25 | regionOne | keystone | identity | True | admin | http://30.30.30.181:35357 | | 8cda413052c24718b073578bb497f483 | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::a0]:5000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+---------------------------------------+ [stack@undercloud ~]$
it is giving us only keystone endpoints.
Also note that I am trying to deploy the end to end setup with FQDN only. and in this case as well I am facing the same issue as old.
thanks once again for your inputs.
-Lokendra
On Wed, Jul 20, 2022 at 3:07 PM Brendan Shephard <bshephar@redhat.com> wrote:
Hey,
I think it's weird that you got a response at all when you run the openstack endpoint list, since you said haproxy isn't running. So there should be nothing serving that endpoint.
I noticed you have the stackrc file sourced. Try it again without that file sourced, so: $ su - stack $ OS_CLOUD=overcloud openstack endpoint list
I would suspect that nothing should be responding. It could be the stackrc file causing issues with some of the environment variables. If the above command doesn't return anything, then my suggestion would be to re-run the deployment like this:
$ su - stack $ export OS_CLOUD=undercloud # Then run your deployment script again $ bash overcloud_deploy.sh
The OS_CLOUD variable tells the openstackclient to lookup the details about that cloud from your clouds.yaml file. Which will be located in /home/stack/.config/openstack/clouds.yaml.
This method is preferable to the sourcing of RC files.
Reference:
https://docs.openstack.org/openstacksdk/latest/user/guides/connect_from_conf...
Regarding the HAProxy warnings. I don't think they should be fatal. afaik, HAProxy should still be starting. If it's not, there might be another error that you will need to look for in the log files under /var/log/containers/haproxy/
I wasn't able to reproduce that warning by following the documentation for enabling TLS though. So it seems like an odd error to be getting.
Brendan Shephard Software Engineer
Red Hat APAC <https://www.redhat.com/> 193 N Quay Brisbane City QLD 4000 @RedHat <https://twitter.com/redhat> Red Hat <https://www.linkedin.com/company/red-hat> Red Hat <https://www.facebook.com/RedHatInc> <https://red.ht/sig> <https://redhat.com/summit>
On Wed, Jul 20, 2022 at 7:02 PM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan / Team, Any lead for the issue raised?
-Lokendra
On Tue, Jul 19, 2022 at 11:46 AM Lokendra Rathour < lokendrarathour@gmail.com> wrote:
Hi Brendan,, Thanks for the inputs. when i run the command as you suggested I get this:
(undercloud) [stack@undercloud ~]$ OS_CLOUD=overcloud openstack endpoint list
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ | 1bfe43c9cf174bd8a01a3a681538766a | regionOne | keystone | identity | True | internal | http://[fd00:fd00:fd00:2000::326]:5000 | | 707e92fc11df4a74bceb5e48f2561357 | regionOne | keystone | identity | True | admin | http://30.30.30.173:35357 | | fab4e66170c8402f899c5f43fd4c39fe | regionOne | keystone | identity | True | public | https://overcloud-hsc.com:13000 |
+----------------------------------+-----------+--------------+--------------+---------+-----------+----------------------------------------+ (undercloud) [stack@undercloud ~]$
On the other note that i notices was as below:
- HAproxy container is not running. - [root@overcloud-controller-2 stdouts]# podman ps -a | grep haproxy e91dbde042db undercloud.ctlplane.localdomain:8787/tripleowallaby/openstack-haproxy:current-tripleo 24 hours ago Exited (1) Less than a second ago container-puppet-haproxy\ - Checking logs: - 2022-07-19T08:47:00.496212294+05:30 stderr F + ARGS= 2022-07-19T08:47:00.496300242+05:30 stderr F + [[ ! -n '' ]] 2022-07-19T08:47:00.496323705+05:30 stderr F + . kolla_extend_start 2022-07-19T08:47:00.496578173+05:30 stderr F + echo 'Running command: '\''bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi'\''' 2022-07-19T08:47:00.496605469+05:30 stdout F Running command: 'bash -c $* -- eval if [ -f /usr/sbin/haproxy-systemd-wrapper ]; then exec /usr/sbin/haproxy-systemd-wrapper -f /etc/haproxy/haproxy.cfg; else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg -Ws; fi' 2022-07-19T08:47:00.496895618+05:30 stderr F + exec bash -c '$*' -- eval if '[' -f /usr/sbin/haproxy-systemd-wrapper '];' then exec /usr/sbin/haproxy-systemd-wrapper -f '/etc/haproxy/haproxy.cfg;' else exec /usr/sbin/haproxy -f /etc/haproxy/haproxy.cfg '-Ws;' fi 2022-07-19T08:47:00.513182490+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:28] : 'bind fd00:fd00:fd00:9900::81:13776' : 2022-07-19T08:47:00.513182490+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513182490+05:30 stderr F , SSL library will use an automatically generated DH parameter. automatically2022-07-19T08:47:00.513967576+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:45] : 'bind fd00:fd00:fd00:9900::81:13292' : 2022-07-19T08:47:00.513967576+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.513967576+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.514736662+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:69] : 'bind fd00:fd00:fd00:9900::81:13004' : 2022-07-19T08:47:00.514736662+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.514736662+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.515461787+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:89] : 'bind fd00:fd00:fd00:9900::81:13005' : 2022-07-19T08:47:00.515461787+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.515461787+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.516167406+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:108] : 'bind fd00:fd00:fd00:2000::326:443' : - 2022-07-19T08:47:00.517937930+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.518534123+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:172] : 'bind fd00:fd00:fd00:9900::81:13000' : 2022-07-19T08:47:00.518534123+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.518534123+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519127743+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:201] : 'bind fd00:fd00:fd00:9900::81:13696' : 2022-07-19T08:47:00.519127743+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519127743+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.519734281+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:233] : 'bind fd00:fd00:fd00:9900::81:13080' : 2022-07-19T08:47:00.519734281+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.519734281+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520285158+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:250] : 'bind fd00:fd00:fd00:9900::81:13774' : 2022-07-19T08:47:00.520285158+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520285158+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.520830405+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:266] : 'bind fd00:fd00:fd00:9900::81:13778' : 2022-07-19T08:47:00.520830405+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.520830405+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.521517271+05:30 stderr F [WARNING] 199/084700 (7) : parsing [/etc/haproxy/haproxy.cfg:281] : 'bind fd00:fd00:fd00:9900::81:13808' : 2022-07-19T08:47:00.521517271+05:30 stderr F unable to load default 1024 bits DH parameter for certificate '/etc/pki/tls/private/overcloud_endpoint.pem'. 2022-07-19T08:47:00.521517271+05:30 stderr F , SSL library will use an automatically generated DH parameter. 2022-07-19T08:47:00.524065508+05:30 stderr F [WARNING] 199/084700 (7) : Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear. - pcs status also show that proxy is down for the controller with VIP: - Failed Resource Actions: * haproxy-bundle-podman-2_start_0 on overcloud-controller-2 'error' (1): call=139, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 15:14:34 2022', queued=0ms, exec=1222ms * haproxy-bundle-podman-1_start_0 on overcloud-controller-1 'error' (1): call=191, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:17 2022', queued=0ms, exec=1171ms * haproxy-bundle-podman-2_start_0 on overcloud-controller-1 'error' (1): call=193, status='complete', exitreason='podman failed to launch container (rc: 1)', last-rc-change='Mon Jul 18 23:54:20 2022', queued=0ms, exec=1256ms
do let me know in case we need anything more around it. thanks once again for the support. -Lokendra
On Tue, Jul 19, 2022 at 11:07 AM Brendan Shephard < bshephar@redhat.com> wrote:
> Hey, > > Doesn't look like there is anything wrong with the certificate > there. You would be getting a TLS error if that was the problem. > > What does your clouds.yaml file look like now? What happens if you > run this command from the Undercloud node: > $ OS_CLOUD=overcloud openstack endpoint list > > Do you get the same error? > > Brendan Shephard > Software Engineer > > Red Hat APAC <https://www.redhat.com/> > 193 N Quay > Brisbane City QLD 4000 > @RedHat <https://twitter.com/redhat> Red Hat > <https://www.linkedin.com/company/red-hat> Red Hat > <https://www.facebook.com/RedHatInc> > <https://red.ht/sig> > <https://redhat.com/summit> > > > On Tue, Jul 19, 2022 at 1:28 PM Lokendra Rathour < > lokendrarathour@gmail.com> wrote: > >> Hi Swogat and Vikarna, >> We have tried adding the DNS entry for the overcloud domain. we are >> getting the same error: >> >> 022-07-19 00:09:41.491498 | 525400ae-089b-c832-8e34-00000000704f | >> TIMING | tripleo_keystone_resources : Create identity public endpoint | >> undercloud | 0:11:18.785769 | 2.16s >> 2022-07-19 00:09:41.507319 | 525400ae-089b-c832-8e34-000000007050 | >> TASK | Create identity internal endpoint >> 2022-07-19 00:09:43.778910 | 525400ae-089b-c832-8e34-000000007050 | >> FATAL | Create identity internal endpoint | undercloud | >> error={"changed": false, "extra_data": {"data": null, "details": "The >> request you have made requires authentication.", "response": >> "{\"error\":{\"code\":401,\"message\":\"The request you have made requires >> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >> services: Client Error for url: >> https://overcloud-hsc.com:13000/v3/services, The request you have >> made requires authentication."} >> 2022-07-19 00:09:43.780306 | 525400ae-089b-c832-8e34-000000007050 | >> TIMING | tripleo_keystone_resources : Create identity internal endpoint >> | undercloud | 0:11:21.074605 | 2. >> >> >> Certificate configs: >> >> [stack@undercloud oc-domain-name]$ cat server.csr.cnf >> [req] >> default_bits = 2048 >> prompt = no >> default_md = sha256 >> distinguished_name = dn >> [dn] >> C=IN >> ST=UTTAR PRADESH >> L=NOIDA >> O=HSC >> OU=HSC >> emailAddress=demo@demo.com >> CN=overcloud-hsc.com >> [stack@undercloud oc-domain-name]$ cat v3.ext >> authorityKeyIdentifier=keyid,issuer >> basicConstraints=CA:FALSE >> keyUsage = digitalSignature, nonRepudiation, keyEncipherment, >> dataEncipherment >> subjectAltName = @alt_names >> [alt_names] >> DNS.1=overcloud-hsc.com >> [stack@undercloud oc-domain-name]$ >> >> the difference we see from others is that we are using self-signed >> certificates. >> >> please let me know in case we need to check something else. Somehow >> this issue remains stuck. >> >> >> On Fri, Jul 15, 2022 at 2:17 AM Swogat Pradhan < >> swogatpradhan22@gmail.com> wrote: >> >>> I was facing a similar kind of issue. >>> https://bugzilla.redhat.com/show_bug.cgi?id=2089442 >>> Here is the solution that helped me fix it. >>> Also make sure the cn that you will use is reachable from >>> undercloud (maybe) script should take care of it. >>> >>> Also please follow Mr. Tathe's mail to add the cn first. >>> >>> With regards >>> Swogat Pradhan >>> >>> On Thu, Jul 14, 2022 at 8:49 AM Vikarna Tathe < >>> vikarnatathe@gmail.com> wrote: >>> >>>> Hi Lokendra, >>>> >>>> The CN field is missing. Can you add that and generate the >>>> certificate again. >>>> >>>> CN=ipaddress >>>> >>>> Also add dns.1=ipaddress under alt_names for precaution. >>>> >>>> Vikarna >>>> >>>> On Wed, 13 Jul, 2022, 23:02 Lokendra Rathour, < >>>> lokendrarathour@gmail.com> wrote: >>>> >>>>> HI Vikarna, >>>>> Thanks for the inputs. >>>>> I am note able to access any tabs in GUI. >>>>> <image.png> >>>>> >>>>> to re-state, we are failing at the time of deployment at step4 : >>>>> >>>>> >>>>> PLAY [External deployment step 4] >>>>> ********************************************** >>>>> 2022-07-13 21:35:22.505148 | >>>>> 525400ae-089b-870a-fab6-0000000000d7 | TASK | External deployment >>>>> step 4 >>>>> 2022-07-13 21:35:22.534899 | >>>>> 525400ae-089b-870a-fab6-0000000000d7 | OK | External deployment >>>>> step 4 | undercloud -> localhost | result={ >>>>> "changed": false, >>>>> "msg": "Use --start-at-task 'External deployment step 4' to >>>>> resume from this task" >>>>> } >>>>> [WARNING]: ('undercloud -> localhost', >>>>> '525400ae-089b-870a-fab6-0000000000d7') >>>>> missing from stats >>>>> 2022-07-13 21:35:22.591268 | >>>>> 525400ae-089b-870a-fab6-0000000000d8 | TIMING | include_tasks | >>>>> undercloud | 0:11:21.683453 | 0.04s >>>>> 2022-07-13 21:35:22.605901 | >>>>> f29c4b58-75a5-4993-97b8-3921a49d79d7 | INCLUDED | >>>>> /home/stack/overcloud-deploy/overcloud/config-download/overcloud/external_deploy_steps_tasks_step4.yaml >>>>> | undercloud >>>>> 2022-07-13 21:35:22.627112 | >>>>> 525400ae-089b-870a-fab6-000000007239 | TASK | Clean up legacy Cinder >>>>> keystone catalog entries >>>>> 2022-07-13 21:35:25.110635 | >>>>> 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv2', >>>>> 'service_type': 'volumev2'} >>>>> 2022-07-13 21:35:25.112368 | >>>>> 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | 0:11:24.204562 | 2.48s >>>>> 2022-07-13 21:35:27.029270 | >>>>> 525400ae-089b-870a-fab6-000000007239 | OK | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>> 'service_type': 'volume'} >>>>> 2022-07-13 21:35:27.030383 | >>>>> 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | 0:11:26.122584 | 4.40s >>>>> 2022-07-13 21:35:27.032091 | >>>>> 525400ae-089b-870a-fab6-000000007239 | TIMING | Clean up legacy Cinder >>>>> keystone catalog entries | undercloud | 0:11:26.124296 | 4.40s >>>>> 2022-07-13 21:35:27.047913 | >>>>> 525400ae-089b-870a-fab6-00000000723c | TASK | Manage Keystone >>>>> resources for OpenStack services >>>>> 2022-07-13 21:35:27.077672 | >>>>> 525400ae-089b-870a-fab6-00000000723c | TIMING | Manage Keystone >>>>> resources for OpenStack services | undercloud | 0:11:26.169842 | 0.03s >>>>> 2022-07-13 21:35:27.120270 | >>>>> 525400ae-089b-870a-fab6-00000000726b | TASK | Gather variables for >>>>> each operating system >>>>> 2022-07-13 21:35:27.161225 | >>>>> 525400ae-089b-870a-fab6-00000000726b | TIMING | >>>>> tripleo_keystone_resources : Gather variables for each operating system | >>>>> undercloud | 0:11:26.253383 | 0.04s >>>>> 2022-07-13 21:35:27.177798 | >>>>> 525400ae-089b-870a-fab6-00000000726c | TASK | Create Keystone Admin >>>>> resources >>>>> 2022-07-13 21:35:27.207430 | >>>>> 525400ae-089b-870a-fab6-00000000726c | TIMING | >>>>> tripleo_keystone_resources : Create Keystone Admin resources | undercloud | >>>>> 0:11:26.299608 | 0.03s >>>>> 2022-07-13 21:35:27.230985 | >>>>> 46e05e2d-2e9c-467b-ac4f-c5f0bc7286b3 | INCLUDED | >>>>> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/admin.yml | >>>>> undercloud >>>>> 2022-07-13 21:35:27.256076 | >>>>> 525400ae-089b-870a-fab6-0000000072ad | TASK | Create default domain >>>>> 2022-07-13 21:35:29.343399 | >>>>> 525400ae-089b-870a-fab6-0000000072ad | OK | Create default domain | >>>>> undercloud >>>>> 2022-07-13 21:35:29.345172 | >>>>> 525400ae-089b-870a-fab6-0000000072ad | TIMING | >>>>> tripleo_keystone_resources : Create default domain | undercloud | >>>>> 0:11:28.437360 | 2.09s >>>>> 2022-07-13 21:35:29.361643 | >>>>> 525400ae-089b-870a-fab6-0000000072ae | TASK | Create admin and >>>>> service projects >>>>> 2022-07-13 21:35:29.391295 | >>>>> 525400ae-089b-870a-fab6-0000000072ae | TIMING | >>>>> tripleo_keystone_resources : Create admin and service projects | undercloud >>>>> | 0:11:28.483468 | 0.03s >>>>> 2022-07-13 21:35:29.402539 | >>>>> af7a4a76-4998-4679-ac6f-58acc0867554 | INCLUDED | >>>>> /usr/share/ansible/roles/tripleo_keystone_resources/tasks/projects.yml | >>>>> undercloud >>>>> 2022-07-13 21:35:29.428918 | >>>>> 525400ae-089b-870a-fab6-000000007304 | TASK | Async creation of >>>>> Keystone project >>>>> 2022-07-13 21:35:30.144295 | >>>>> 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of >>>>> Keystone project | undercloud | item=admin >>>>> 2022-07-13 21:35:30.145884 | >>>>> 525400ae-089b-870a-fab6-000000007304 | TIMING | >>>>> tripleo_keystone_resources : Async creation of Keystone project | >>>>> undercloud | 0:11:29.238078 | 0.72s >>>>> 2022-07-13 21:35:30.493458 | >>>>> 525400ae-089b-870a-fab6-000000007304 | CHANGED | Async creation of >>>>> Keystone project | undercloud | item=service >>>>> 2022-07-13 21:35:30.494386 | >>>>> 525400ae-089b-870a-fab6-000000007304 | TIMING | >>>>> tripleo_keystone_resources : Async creation of Keystone project | >>>>> undercloud | 0:11:29.586587 | 1.06s >>>>> 2022-07-13 21:35:30.495729 | >>>>> 525400ae-089b-870a-fab6-000000007304 | TIMING | >>>>> tripleo_keystone_resources : Async creation of Keystone project | >>>>> undercloud | 0:11:29.587916 | 1.07s >>>>> 2022-07-13 21:35:30.511748 | >>>>> 525400ae-089b-870a-fab6-000000007306 | TASK | Check Keystone project >>>>> status >>>>> 2022-07-13 21:35:30.908189 | >>>>> 525400ae-089b-870a-fab6-000000007306 | WAITING | Check Keystone project >>>>> status | undercloud | 30 retries left >>>>> 2022-07-13 21:35:36.166541 | >>>>> 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project >>>>> status | undercloud | item=admin >>>>> 2022-07-13 21:35:36.168506 | >>>>> 525400ae-089b-870a-fab6-000000007306 | TIMING | >>>>> tripleo_keystone_resources : Check Keystone project status | undercloud | >>>>> 0:11:35.260666 | 5.66s >>>>> 2022-07-13 21:35:36.400914 | >>>>> 525400ae-089b-870a-fab6-000000007306 | OK | Check Keystone project >>>>> status | undercloud | item=service >>>>> 2022-07-13 21:35:36.402534 | >>>>> 525400ae-089b-870a-fab6-000000007306 | TIMING | >>>>> tripleo_keystone_resources : Check Keystone project status | undercloud | >>>>> 0:11:35.494729 | 5.89s >>>>> 2022-07-13 21:35:36.406576 | >>>>> 525400ae-089b-870a-fab6-000000007306 | TIMING | >>>>> tripleo_keystone_resources : Check Keystone project status | undercloud | >>>>> 0:11:35.498771 | 5.89s >>>>> 2022-07-13 21:35:36.427719 | >>>>> 525400ae-089b-870a-fab6-0000000072af | TASK | Create admin role >>>>> 2022-07-13 21:35:38.632266 | >>>>> 525400ae-089b-870a-fab6-0000000072af | OK | Create admin role | >>>>> undercloud >>>>> 2022-07-13 21:35:38.633754 | >>>>> 525400ae-089b-870a-fab6-0000000072af | TIMING | >>>>> tripleo_keystone_resources : Create admin role | undercloud | >>>>> 0:11:37.725949 | 2.20s >>>>> 2022-07-13 21:35:38.649721 | >>>>> 525400ae-089b-870a-fab6-0000000072b0 | TASK | Create _member_ role >>>>> 2022-07-13 21:35:38.689773 | >>>>> 525400ae-089b-870a-fab6-0000000072b0 | SKIPPED | Create _member_ role | >>>>> undercloud >>>>> 2022-07-13 21:35:38.691172 | >>>>> 525400ae-089b-870a-fab6-0000000072b0 | TIMING | >>>>> tripleo_keystone_resources : Create _member_ role | undercloud | >>>>> 0:11:37.783369 | 0.04s >>>>> 2022-07-13 21:35:38.706920 | >>>>> 525400ae-089b-870a-fab6-0000000072b1 | TASK | Create admin user >>>>> 2022-07-13 21:35:42.051623 | >>>>> 525400ae-089b-870a-fab6-0000000072b1 | CHANGED | Create admin user | >>>>> undercloud >>>>> 2022-07-13 21:35:42.053285 | >>>>> 525400ae-089b-870a-fab6-0000000072b1 | TIMING | >>>>> tripleo_keystone_resources : Create admin user | undercloud | >>>>> 0:11:41.145472 | 3.34s >>>>> 2022-07-13 21:35:42.069370 | >>>>> 525400ae-089b-870a-fab6-0000000072b2 | TASK | Assign admin role to >>>>> admin project for admin user >>>>> 2022-07-13 21:35:45.194891 | >>>>> 525400ae-089b-870a-fab6-0000000072b2 | OK | Assign admin role to >>>>> admin project for admin user | undercloud >>>>> 2022-07-13 21:35:45.196669 | >>>>> 525400ae-089b-870a-fab6-0000000072b2 | TIMING | >>>>> tripleo_keystone_resources : Assign admin role to admin project for admin >>>>> user | undercloud | 0:11:44.288848 | 3.13s >>>>> 2022-07-13 21:35:45.212674 | >>>>> 525400ae-089b-870a-fab6-0000000072b3 | TASK | Assign _member_ role to >>>>> admin project for admin user >>>>> 2022-07-13 21:35:45.252884 | >>>>> 525400ae-089b-870a-fab6-0000000072b3 | SKIPPED | Assign _member_ role to >>>>> admin project for admin user | undercloud >>>>> 2022-07-13 21:35:45.254283 | >>>>> 525400ae-089b-870a-fab6-0000000072b3 | TIMING | >>>>> tripleo_keystone_resources : Assign _member_ role to admin project for >>>>> admin user | undercloud | 0:11:44.346479 | 0.04s >>>>> 2022-07-13 21:35:45.270310 | >>>>> 525400ae-089b-870a-fab6-0000000072b4 | TASK | Create identity service >>>>> 2022-07-13 21:35:46.928715 | >>>>> 525400ae-089b-870a-fab6-0000000072b4 | OK | Create identity service >>>>> | undercloud >>>>> 2022-07-13 21:35:46.930167 | >>>>> 525400ae-089b-870a-fab6-0000000072b4 | TIMING | >>>>> tripleo_keystone_resources : Create identity service | undercloud | >>>>> 0:11:46.022362 | 1.66s >>>>> 2022-07-13 21:35:46.946797 | >>>>> 525400ae-089b-870a-fab6-0000000072b5 | TASK | Create identity public >>>>> endpoint >>>>> 2022-07-13 21:35:49.139298 | >>>>> 525400ae-089b-870a-fab6-0000000072b5 | OK | Create identity public >>>>> endpoint | undercloud >>>>> 2022-07-13 21:35:49.141158 | >>>>> 525400ae-089b-870a-fab6-0000000072b5 | TIMING | >>>>> tripleo_keystone_resources : Create identity public endpoint | undercloud | >>>>> 0:11:48.233349 | 2.19s >>>>> 2022-07-13 21:35:49.157768 | >>>>> 525400ae-089b-870a-fab6-0000000072b6 | TASK | Create identity >>>>> internal endpoint >>>>> 2022-07-13 21:35:51.566826 | >>>>> 525400ae-089b-870a-fab6-0000000072b6 | FATAL | Create identity >>>>> internal endpoint | undercloud | error={"changed": false, "extra_data": >>>>> {"data": null, "details": "The request you have made requires >>>>> authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The >>>>> request you have made requires >>>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>>> services: Client Error for url: >>>>> https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The >>>>> request you have made requires authentication."} >>>>> 2022-07-13 21:35:51.568473 | >>>>> 525400ae-089b-870a-fab6-0000000072b6 | TIMING | >>>>> tripleo_keystone_resources : Create identity internal endpoint | undercloud >>>>> | 0:11:50.660654 | 2.41s >>>>> >>>>> PLAY RECAP >>>>> ********************************************************************* >>>>> localhost : ok=1 changed=0 unreachable=0 >>>>> failed=0 skipped=2 rescued=0 ignored=0 >>>>> overcloud-controller-0 : ok=437 changed=103 unreachable=0 >>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>> overcloud-controller-1 : ok=435 changed=101 unreachable=0 >>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>> overcloud-controller-2 : ok=432 changed=101 unreachable=0 >>>>> failed=0 skipped=214 rescued=0 ignored=0 >>>>> overcloud-novacompute-0 : ok=345 changed=82 unreachable=0 >>>>> failed=0 skipped=198 rescued=0 ignored=0 >>>>> undercloud : ok=39 changed=7 unreachable=0 >>>>> failed=1 skipped=6 rescued=0 ignored=0 >>>>> >>>>> Also : >>>>> (undercloud) [stack@undercloud oc-cert]$ cat server.csr.cnf >>>>> [req] >>>>> default_bits = 2048 >>>>> prompt = no >>>>> default_md = sha256 >>>>> distinguished_name = dn >>>>> [dn] >>>>> C=IN >>>>> ST=UTTAR PRADESH >>>>> L=NOIDA >>>>> O=HSC >>>>> OU=HSC >>>>> emailAddress=demo@demo.com >>>>> >>>>> v3.ext: >>>>> (undercloud) [stack@undercloud oc-cert]$ cat v3.ext >>>>> authorityKeyIdentifier=keyid,issuer >>>>> basicConstraints=CA:FALSE >>>>> keyUsage = digitalSignature, nonRepudiation, keyEncipherment, >>>>> dataEncipherment >>>>> subjectAltName = @alt_names >>>>> [alt_names] >>>>> IP.1=fd00:fd00:fd00:9900::81 >>>>> >>>>> Using these files we create other certificates. >>>>> Please check and let me know in case we need anything else. >>>>> >>>>> >>>>> On Wed, Jul 13, 2022 at 10:00 PM Vikarna Tathe < >>>>> vikarnatathe@gmail.com> wrote: >>>>> >>>>>> Hi Lokendra, >>>>>> >>>>>> Are you able to access all the tabs in the OpenStack dashboard >>>>>> without any error? If not, please retry generating the certificate. Also, >>>>>> share the openssl.cnf or server.cnf. >>>>>> >>>>>> On Wed, 13 Jul 2022 at 18:18, Lokendra Rathour < >>>>>> lokendrarathour@gmail.com> wrote: >>>>>> >>>>>>> Hi Team, >>>>>>> Any input on this case raised. >>>>>>> >>>>>>> Thanks, >>>>>>> Lokendra >>>>>>> >>>>>>> >>>>>>> On Tue, Jul 12, 2022 at 10:18 PM Lokendra Rathour < >>>>>>> lokendrarathour@gmail.com> wrote: >>>>>>> >>>>>>>> Hi Shephard/Swogat, >>>>>>>> I tried changing the setting as suggested and it looks like >>>>>>>> it has failed at step 4 with error: >>>>>>>> >>>>>>>> :31:32.169420 | 525400ae-089b-fb79-67ac-0000000072ce | >>>>>>>> TIMING | tripleo_keystone_resources : Create identity public endpoint | >>>>>>>> undercloud | 0:24:47.736198 | 2.21s >>>>>>>> 2022-07-12 21:31:32.185594 | >>>>>>>> 525400ae-089b-fb79-67ac-0000000072cf | TASK | Create identity >>>>>>>> internal endpoint >>>>>>>> 2022-07-12 21:31:34.468996 | >>>>>>>> 525400ae-089b-fb79-67ac-0000000072cf | FATAL | Create identity >>>>>>>> internal endpoint | undercloud | error={"changed": false, "extra_data": >>>>>>>> {"data": null, "details": "The request you have made requires >>>>>>>> authentication.", "response": "{\"error\":{\"code\":401,\"message\":\"The >>>>>>>> request you have made requires >>>>>>>> authentication.\",\"title\":\"Unauthorized\"}}\n"}, "msg": "Failed to list >>>>>>>> services: Client Error for url: >>>>>>>> https://[fd00:fd00:fd00:9900::81]:13000/v3/services, The >>>>>>>> request you have made requires authentication."} >>>>>>>> 2022-07-12 21:31:34.470415 | 525400ae-089b-fb79-67ac-000000 >>>>>>>> >>>>>>>> >>>>>>>> Checking further the endpoint list: >>>>>>>> I see only one endpoint for keystone is gettin created. >>>>>>>> >>>>>>>> DeprecationWarning >>>>>>>> >>>>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>>>> | ID | Region | Service Name >>>>>>>> | Service Type | Enabled | Interface | URL >>>>>>>> | >>>>>>>> >>>>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>>>> | 4378dc0a4d8847ee87771699fc7b995e | regionOne | keystone >>>>>>>> | identity | True | admin | >>>>>>>> http://30.30.30.173:35357 | >>>>>>>> | 67c829e126944431a06ed0c2b97a295f | regionOne | keystone >>>>>>>> | identity | True | internal | >>>>>>>> http://[fd00:fd00:fd00:2000::326]:5000 | >>>>>>>> | 8a9a3de4993c4ff7903caf95b8ae40fa | regionOne | keystone >>>>>>>> | identity | True | public | >>>>>>>> https://[fd00:fd00:fd00:9900::81]:13000 | >>>>>>>> >>>>>>>> +----------------------------------+-----------+--------------+--------------+---------+-----------+-----------------------------------------+ >>>>>>>> >>>>>>>> >>>>>>>> it looks like something related to the SSL, we have also >>>>>>>> verified that the GUI login screen shows that Certificates are applied. >>>>>>>> exploring more in logs, meanwhile any suggestions or know >>>>>>>> observation would be of great help. >>>>>>>> thanks again for the support. >>>>>>>> >>>>>>>> Best Regards, >>>>>>>> Lokendra >>>>>>>> >>>>>>>> >>>>>>>> On Sat, Jul 9, 2022 at 11:24 AM Swogat Pradhan < >>>>>>>> swogatpradhan22@gmail.com> wrote: >>>>>>>> >>>>>>>>> I had faced a similar kind of issue, for ip based setup you >>>>>>>>> need to specify the domain name as the ip that you are going to use, this >>>>>>>>> error is showing up because the ssl is ip based but the fqdns seems to be >>>>>>>>> undercloud.com or overcloud.example.com. >>>>>>>>> I think for undercloud you can change the undercloud.conf. >>>>>>>>> >>>>>>>>> And will it work if we specify clouddomain parameter to the >>>>>>>>> IP address for overcloud? because it seems he has not specified the >>>>>>>>> clouddomain parameter and overcloud.example.com is the >>>>>>>>> default domain for overcloud.example.com. >>>>>>>>> >>>>>>>>> On Fri, 8 Jul 2022, 6:01 pm Swogat Pradhan, < >>>>>>>>> swogatpradhan22@gmail.com> wrote: >>>>>>>>> >>>>>>>>>> What is the domain name you have specified in the >>>>>>>>>> undercloud.conf file? >>>>>>>>>> And what is the fqdn name used for the generation of the >>>>>>>>>> SSL cert? >>>>>>>>>> >>>>>>>>>> On Fri, 8 Jul 2022, 5:38 pm Lokendra Rathour, < >>>>>>>>>> lokendrarathour@gmail.com> wrote: >>>>>>>>>> >>>>>>>>>>> Hi Team, >>>>>>>>>>> We were trying to install overcloud with SSL enabled for >>>>>>>>>>> which the UC is installed, but OC install is getting failed at step 4: >>>>>>>>>>> >>>>>>>>>>> ERROR >>>>>>>>>>> :nectionPool(host='fd00:fd00:fd00:9900::2ef', >>>>>>>>>>> port=13000): Max retries exceeded with url: / (Caused by >>>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>>> match 'undercloud.com'\",),))\n", "module_stdout": "", >>>>>>>>>>> "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>>>>> 2022-07-08 17:03:23.606739 | >>>>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | FATAL | Clean up legacy Cinder >>>>>>>>>>> keystone catalog entries | undercloud | item={'service_name': 'cinderv3', >>>>>>>>>>> 'service_type': 'volume'} | error={"ansible_index_var": >>>>>>>>>>> "cinder_api_service", "ansible_loop_var": "item", "changed": false, >>>>>>>>>>> "cinder_api_service": 1, "item": {"service_name": "cinderv3", >>>>>>>>>>> "service_type": "volume"}, "module_stderr": "Failed to discover available >>>>>>>>>>> identity versions when contacting >>>>>>>>>>> https://[fd00:fd00:fd00:9900::2ef]:13000. Attempting to >>>>>>>>>>> parse version from URL.\nTraceback (most recent call last):\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 600, >>>>>>>>>>> in urlopen\n chunked=chunked)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 343, >>>>>>>>>>> in _make_request\n self._validate_conn(conn)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 839, >>>>>>>>>>> in _validate_conn\n conn.connect()\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 378, in >>>>>>>>>>> connect\n _match_hostname(cert, self.assert_hostname or >>>>>>>>>>> server_hostname)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connection.py\", line 388, in >>>>>>>>>>> _match_hostname\n match_hostname(cert, asserted_hostname)\n File >>>>>>>>>>> \"/usr/lib64/python3.6/ssl.py\", line 291, in match_hostname\n % >>>>>>>>>>> (hostname, dnsnames[0]))\nssl.CertificateError: hostname >>>>>>>>>>> 'fd00:fd00:fd00:9900::2ef' doesn't match 'undercloud.com'\n\nDuring >>>>>>>>>>> handling of the above exception, another exception occurred:\n\nTraceback >>>>>>>>>>> (most recent call last):\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 449, in >>>>>>>>>>> send\n timeout=timeout\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/connectionpool.py\", line 638, >>>>>>>>>>> in urlopen\n _stacktrace=sys.exc_info()[2])\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/urllib3/util/retry.py\", line 399, in >>>>>>>>>>> increment\n raise MaxRetryError(_pool, url, error or >>>>>>>>>>> ResponseError(cause))\nurllib3.exceptions.MaxRetryError: >>>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>>>> last):\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1022, >>>>>>>>>>> in _send_request\n resp = self.session.request(method, url, **kwargs)\n >>>>>>>>>>> File \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 533, >>>>>>>>>>> in request\n resp = self.send(prep, **send_kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/sessions.py\", line 646, in >>>>>>>>>>> send\n r = adapter.send(request, **kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/requests/adapters.py\", line 514, in >>>>>>>>>>> send\n raise SSLError(e, request=request)\nrequests.exceptions.SSLError: >>>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>>>> last):\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>>>> line 138, in _do_create_plugin\n authenticated=False)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>>> 610, in get_discovery\n authenticated=authenticated)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 1452, >>>>>>>>>>> in get_discovery\n disc = Discover(session, url, >>>>>>>>>>> authenticated=authenticated)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 536, >>>>>>>>>>> in __init__\n authenticated=authenticated)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/discover.py\", line 102, >>>>>>>>>>> in get_version_data\n resp = session.get(url, headers=headers, >>>>>>>>>>> authenticated=authenticated)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1141, >>>>>>>>>>> in get\n return self.request(url, 'GET', **kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 931, in >>>>>>>>>>> request\n resp = send(**kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1026, >>>>>>>>>>> in _send_request\n raise >>>>>>>>>>> exceptions.SSLError(msg)\nkeystoneauth1.exceptions.connection.SSLError: SSL >>>>>>>>>>> exception connecting to >>>>>>>>>>> https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>>> match 'undercloud.com'\",),))\n\nDuring handling of the >>>>>>>>>>> above exception, another exception occurred:\n\nTraceback (most recent call >>>>>>>>>>> last):\n File \"<stdin>\", line 102, in <module>\n File \"<stdin>\", line >>>>>>>>>>> 94, in _ansiballz_main\n File \"<stdin>\", line 40, in invoke_module\n >>>>>>>>>>> File \"/usr/lib64/python3.6/runpy.py\", line 205, in run_module\n >>>>>>>>>>> return _run_module_code(code, init_globals, run_name, mod_spec)\n File >>>>>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 96, in _run_module_code\n >>>>>>>>>>> mod_name, mod_spec, pkg_name, script_name)\n File >>>>>>>>>>> \"/usr/lib64/python3.6/runpy.py\", line 85, in _run_code\n exec(code, >>>>>>>>>>> run_globals)\n File >>>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>>>> line 185, in <module>\n File >>>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>>>> line 181, in main\n File >>>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/module_utils/openstack.py\", >>>>>>>>>>> line 407, in __call__\n File >>>>>>>>>>> \"/tmp/ansible_openstack.cloud.catalog_service_payload_7ikyjf7t/ansible_openstack.cloud.catalog_service_payload.zip/ansible_collections/openstack/cloud/plugins/modules/catalog_service.py\", >>>>>>>>>>> line 141, in run\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>>>>> 517, in search_services\n services = self.list_services()\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", line >>>>>>>>>>> 492, in list_services\n if self._is_client_version('identity', 2):\n >>>>>>>>>>> File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>>>>> line 460, in _is_client_version\n client = getattr(self, client_name)\n >>>>>>>>>>> File \"/usr/lib/python3.6/site-packages/openstack/cloud/_identity.py\", >>>>>>>>>>> line 32, in _identity_client\n 'identity', min_version=2, >>>>>>>>>>> max_version='3.latest')\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/openstack/cloud/openstackcloud.py\", >>>>>>>>>>> line 407, in _get_versioned_client\n if adapter.get_endpoint():\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/adapter.py\", line 291, in >>>>>>>>>>> get_endpoint\n return self.session.get_endpoint(auth or self.auth, >>>>>>>>>>> **kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/session.py\", line 1243, >>>>>>>>>>> in get_endpoint\n return auth.get_endpoint(self, **kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>>> 380, in get_endpoint\n allow_version_hack=allow_version_hack, >>>>>>>>>>> **kwargs)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>>> 271, in get_endpoint_data\n service_catalog = >>>>>>>>>>> self.get_access(session).service_catalog\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/base.py\", line >>>>>>>>>>> 134, in get_access\n self.auth_ref = self.get_auth_ref(session)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>>>> line 206, in get_auth_ref\n self._plugin = >>>>>>>>>>> self._do_create_plugin(session)\n File >>>>>>>>>>> \"/usr/lib/python3.6/site-packages/keystoneauth1/identity/generic/base.py\", >>>>>>>>>>> line 161, in _do_create_plugin\n 'auth_url is correct. >>>>>>>>>>> %s' % e)\nkeystoneauth1.exceptions.discovery.DiscoveryFailure: Could not >>>>>>>>>>> find versioned identity endpoints when attempting to authenticate. Please >>>>>>>>>>> check that your auth_url is correct. SSL exception connecting to >>>>>>>>>>> https://[fd00:fd00:fd00:9900::2ef]:13000: >>>>>>>>>>> HTTPSConnectionPool(host='fd00:fd00:fd00:9900::2ef', port=13000): Max >>>>>>>>>>> retries exceeded with url: / (Caused by >>>>>>>>>>> SSLError(CertificateError(\"hostname 'fd00:fd00:fd00:9900::2ef' doesn't >>>>>>>>>>> match 'overcloud.example.com'\",),))\n", "module_stdout": >>>>>>>>>>> "", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} >>>>>>>>>>> 2022-07-08 17:03:23.609354 | >>>>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>>>>> keystone catalog entries | undercloud | 0:11:01.271914 | 2.47s >>>>>>>>>>> 2022-07-08 17:03:23.611094 | >>>>>>>>>>> 5254009a-6a3c-adb1-f96f-0000000072ac | TIMING | Clean up legacy Cinder >>>>>>>>>>> keystone catalog entries | undercloud | 0:11:01.273659 | 2.47s >>>>>>>>>>> >>>>>>>>>>> PLAY RECAP >>>>>>>>>>> ********************************************************************* >>>>>>>>>>> localhost : ok=0 changed=0 >>>>>>>>>>> unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 >>>>>>>>>>> overcloud-controller-0 : ok=437 changed=104 >>>>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>>>> overcloud-controller-1 : ok=436 changed=101 >>>>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>>>> overcloud-controller-2 : ok=431 changed=101 >>>>>>>>>>> unreachable=0 failed=0 skipped=214 rescued=0 ignored=0 >>>>>>>>>>> overcloud-novacompute-0 : ok=345 changed=83 >>>>>>>>>>> unreachable=0 failed=0 skipped=198 rescued=0 ignored=0 >>>>>>>>>>> undercloud : ok=28 changed=7 >>>>>>>>>>> unreachable=0 failed=1 skipped=3 rescued=0 ignored=0 >>>>>>>>>>> 2022-07-08 17:03:23.647270 | >>>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Summary Information >>>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>>>>> 2022-07-08 17:03:23.647907 | >>>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Total Tasks: 1373 >>>>>>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> in the deploy.sh: >>>>>>>>>>> >>>>>>>>>>> openstack overcloud deploy --templates \ >>>>>>>>>>> -r /home/stack/templates/roles_data.yaml \ >>>>>>>>>>> --networks-file >>>>>>>>>>> /home/stack/templates/custom_network_data.yaml \ >>>>>>>>>>> --vip-file /home/stack/templates/custom_vip_data.yaml >>>>>>>>>>> \ >>>>>>>>>>> --baremetal-deployment >>>>>>>>>>> /home/stack/templates/overcloud-baremetal-deploy.yaml \ >>>>>>>>>>> --network-config \ >>>>>>>>>>> -e /home/stack/templates/environment.yaml \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-conductor.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-overcloud.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e /home/stack/templates/ironic-config.yaml \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/external-ceph.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/services/ptp.yaml \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/enable-tls.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/ssl/inject-trust-anchor.yaml >>>>>>>>>>> \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/docker-ha.yaml \ >>>>>>>>>>> -e >>>>>>>>>>> /usr/share/openstack-tripleo-heat-templates/environments/podman.yaml \ >>>>>>>>>>> -e /home/stack/containers-prepare-parameter.yaml >>>>>>>>>>> >>>>>>>>>>> Addition lines as highlighted in yellow were passed with >>>>>>>>>>> modifications: >>>>>>>>>>> tls-endpoints-public-ip.yaml: >>>>>>>>>>> Passed as is in the defaults. >>>>>>>>>>> enable-tls.yaml: >>>>>>>>>>> >>>>>>>>>>> # >>>>>>>>>>> ******************************************************************* >>>>>>>>>>> # This file was created automatically by the sample >>>>>>>>>>> environment >>>>>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>>>>> update it. >>>>>>>>>>> # Users are recommended to make changes to a copy of the >>>>>>>>>>> file instead >>>>>>>>>>> # of the original, if any customizations are needed. >>>>>>>>>>> # >>>>>>>>>>> ******************************************************************* >>>>>>>>>>> # title: Enable SSL on OpenStack Public Endpoints >>>>>>>>>>> # description: | >>>>>>>>>>> # Use this environment to pass in certificates for SSL >>>>>>>>>>> deployments. >>>>>>>>>>> # For these values to take effect, one of the >>>>>>>>>>> tls-endpoints-*.yaml >>>>>>>>>>> # environments must also be used. >>>>>>>>>>> parameter_defaults: >>>>>>>>>>> # Set CSRF_COOKIE_SECURE / SESSION_COOKIE_SECURE in >>>>>>>>>>> Horizon >>>>>>>>>>> # Type: boolean >>>>>>>>>>> HorizonSecureCookies: True >>>>>>>>>>> >>>>>>>>>>> # Specifies the default CA cert to use if TLS is used >>>>>>>>>>> for services in the public network. >>>>>>>>>>> # Type: string >>>>>>>>>>> PublicTLSCAFile: >>>>>>>>>>> '/etc/pki/ca-trust/source/anchors/overcloud-cacert.pem' >>>>>>>>>>> >>>>>>>>>>> # The content of the SSL certificate (without Key) in >>>>>>>>>>> PEM format. >>>>>>>>>>> # Type: string >>>>>>>>>>> SSLRootCertificate: | >>>>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>>> -----END CERTIFICATE----- >>>>>>>>>>> >>>>>>>>>>> SSLCertificate: | >>>>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>>> -----END CERTIFICATE----- >>>>>>>>>>> # The content of an SSL intermediate CA certificate in >>>>>>>>>>> PEM format. >>>>>>>>>>> # Type: string >>>>>>>>>>> SSLIntermediateCertificate: '' >>>>>>>>>>> >>>>>>>>>>> # The content of the SSL Key in PEM format. >>>>>>>>>>> # Type: string >>>>>>>>>>> SSLKey: | >>>>>>>>>>> -----BEGIN PRIVATE KEY----- >>>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>>> -----END PRIVATE KEY----- >>>>>>>>>>> >>>>>>>>>>> # ****************************************************** >>>>>>>>>>> # Static parameters - these are values that must be >>>>>>>>>>> # included in the environment but should not be changed. >>>>>>>>>>> # ****************************************************** >>>>>>>>>>> # The filepath of the certificate as it will be stored >>>>>>>>>>> in the controller. >>>>>>>>>>> # Type: string >>>>>>>>>>> DeployedSSLCertificatePath: >>>>>>>>>>> /etc/pki/tls/private/overcloud_endpoint.pem >>>>>>>>>>> >>>>>>>>>>> # ********************* >>>>>>>>>>> # End static parameters >>>>>>>>>>> # ********************* >>>>>>>>>>> >>>>>>>>>>> inject-trust-anchor.yaml >>>>>>>>>>> >>>>>>>>>>> # >>>>>>>>>>> ******************************************************************* >>>>>>>>>>> # This file was created automatically by the sample >>>>>>>>>>> environment >>>>>>>>>>> # generator. Developers should use `tox -e genconfig` to >>>>>>>>>>> update it. >>>>>>>>>>> # Users are recommended to make changes to a copy of the >>>>>>>>>>> file instead >>>>>>>>>>> # of the original, if any customizations are needed. >>>>>>>>>>> # >>>>>>>>>>> ******************************************************************* >>>>>>>>>>> # title: Inject SSL Trust Anchor on Overcloud Nodes >>>>>>>>>>> # description: | >>>>>>>>>>> # When using an SSL certificate signed by a CA that is >>>>>>>>>>> not in the default >>>>>>>>>>> # list of CAs, this environment allows adding a custom >>>>>>>>>>> CA certificate to >>>>>>>>>>> # the overcloud nodes. >>>>>>>>>>> parameter_defaults: >>>>>>>>>>> # The content of a CA's SSL certificate file in PEM >>>>>>>>>>> format. This is evaluated on the client side. >>>>>>>>>>> # Mandatory. This parameter must be set by the user. >>>>>>>>>>> # Type: string >>>>>>>>>>> SSLRootCertificate: | >>>>>>>>>>> -----BEGIN CERTIFICATE----- >>>>>>>>>>> ----*** CERTICATELINES TRIMMED ** >>>>>>>>>>> -----END CERTIFICATE----- >>>>>>>>>>> >>>>>>>>>>> resource_registry: >>>>>>>>>>> OS::TripleO::NodeTLSCAData: >>>>>>>>>>> ../../puppet/extraconfig/tls/ca-inject.yaml >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> The procedure to create such files was followed using: >>>>>>>>>>> Deploying with SSL — TripleO 3.0.0 documentation >>>>>>>>>>> (openstack.org) >>>>>>>>>>> <https://docs.openstack.org/project-deploy-guide/tripleo-docs/latest/features/ssl.html> >>>>>>>>>>> >>>>>>>>>>> Idea is to deploy overcloud with SSL enabled i.e* Self-signed >>>>>>>>>>> IP-based certificate, without DNS. * >>>>>>>>>>> >>>>>>>>>>> Any idea around this error would be of great help. >>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>>> skype: lokendrarathour >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> -- >>>>>>> >>>>>> >>>>> >>>>> -- >>>>> ~ Lokendra >>>>> skype: lokendrarathour >>>>> >>>>> >>>>> >> >> -- >> ~ Lokendra >> skype: lokendrarathour >> >> >>
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
-- ~ Lokendra skype: lokendrarathour
participants (4)
-
Brendan Shephard
-
Lokendra Rathour
-
Swogat Pradhan
-
Vikarna Tathe