Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
Hi, From the beginning I had kolla_verify_tls_backend: "no" in globals.yml The weird thing is that the openstack cli works fine. I even created a new user with admin role, I get the same behavior. Horizon does not connect, the cli works. I activated the debug mode on keystone [root@rscdeployer ~]# cat /etc/yogakolla/config/keystone.conf [DEFAULT] debug = True insecure_debug= True But nothing in the log file, when I try to login via horizon, I don't get anything on keystone.log. I tested with a wrong password to see the behavior of the platform, and this is what I got on keystone.log : - Openstack CLI with wrong pass, I got : 2023-10-22 13:51:02.344 43 WARNING keystone.server.flask.application [req-73100d88-8357-42ce-8865-e36c34a9bfa9 - - - - -] Authorization failed. The request you have made requires authentication. from 10.10.3.16: keystone.exception.Unauthorized: The request you have made requires authentication. - Openstack Horizon with wrong pass, I got : Nothing How can I follow up this, how can I be sure that it's not a horizon problem or something else? Regards. <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2> Le mer. 18 oct. 2023 à 13:17, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hi wodel, nice to hear that the patch helps you.
With the keystone problem i can't help, but i think the certs are correct. Two thoughts about that.
- If you have in the respective configurations of the OpenStack Services the IP address instead of any DNS Name configured (here is this the case) then the certificates don't need the dns name in it. - Could you please look for any error Messages in the keystone logs and also check if you can establish a connection to the keystone on the mentioned port with openssl s_client. If so, it could be possible that you have to disable the certificate verification in the deployment.
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Mittwoch, 18. Oktober 2023 11:55 *An:* Kaster, Jörn <Joern.Kaster@epg.com> *Cc:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Betreff:* Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Thanks Jörn, it worked for cloudkitty, after applying the patch the deployment went well. But :
- I still can't access the web console : An error occurred authenticating. Please try again later.
- in cloudkitty-processor.log I am still having : 2023-10-18 10:46:25.271 8106 WARNING keystoneauth.identity.generic.base [-] Failed to discover available identity versions when contacting https://dinternal.cloud.domain.tld:35357. Attempting to parse version from URL.: keystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https:// dinternal.cloud.domain.tld :35357: HTTPSConnectionPool(host=' dinternal.cloud.domain.tld ', port=35357): Max retries exceeded with url: / (Caused by SSLError(SSLError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)'),))
When generating the self-signed certificate, I noticed that the process had generated : - two haproxy certificates, one for the internet with the external FQDN and the second for internal communication with the local internal FQDN.
- It also generated a backend certificate, that contains only the IP addresses of the 03 controllers as Subject Alternate Names without any mention of the domain I am using, is this correct?
[root@rscdeployer ~]# openssl x509 -noout -text -in /etc/yogakolla/certificates/backend-cert.pem Certificate: Data: Version: 3 (0x2) Serial Number: 1c:66:7e:37:85:cf:ca:1c:da:42:f6:f1:1f:dc:1e:97..... Signature Algorithm: sha256WithRSAEncryption Issuer: CN = KollaTestCA Validity Not Before: Oct 17 15:04:26 2023 GMT Not After : Oct 15 15:04:26 2025 GMT Subject: C = US, ST = NC, L = RTP, OU = kolla Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: ..... ..... e6:23:a4:7f:30:74:ac:0c:2d:22:00:95:b6:ab:20: 98:6b Exponent: 65537 (0x10001) X509v3 extensions:
*X509v3 Subject Alternative Name: IP Address:10.10.3.5, IP Address:10.10.3.9, IP Address:10.10.3.13* Signature Algorithm: sha256WithRSAEncryption 36:86:cb:b4:9a:fe:33:0d:ff:af:87:5e:00:9d:69:4e:32:21:
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-6993449584919071302_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Le mer. 18 oct. 2023 à 07:12, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hello wodel, the problem with cloudkitty deployment with self signed certs could resolve to the following bugreport [1].
[1] https://bugs.launchpad.net/kolla-ansible/+bug/1998831 Bug #1998831 “CloudKitty bootstrap fails when using internal TLS...” : Bugs : kolla-ansible <https://bugs.launchpad.net/kolla-ansible/+bug/1998831> When InfluxDB is behind HAProxy's internal TLS, CloudKitty fails to bootstrap its InfluxDB database with the following error: TASK [cloudkitty : Creating Cloudkitty influxdb database] *************************************************************************************************************************** fatal: [controller01 -> controller01]: FAILED! => changed=false action: influxdb_database msg: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response... bugs.launchpad.net
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Mittwoch, 18. Oktober 2023 01:33 *An:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Betreff:* [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Hi,
Our ssl certificate expired a couple of days ago, and we started experiencing failed login, to workaround the problem rapidly we decided to deploy the self-signed certificates generated by kolla.
We generated the certificates then we did a reconfigure, but still the problem remains : An error occurred authenticating. Please try again later.
on horizon.log we have : [Wed Oct 18 00:25:55.379383 2023] [wsgi:error] [pid 103:tid 140182314505984] [remote 10.10.3.5:40848] Login failed for user "admin" using domain "default", remote address 10.10.3.5
The openstack command line works fine.
How can we debug this?
The second problem we have is with cloudkitty that refuses to reconfigure with the generated self-signed certificate, we had to ignore it from the reconfiguration process by putting the cloudkitty variable to no before restarting the reconfigure process.
How can we debug this?
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-6993449584919071302_x_m_9147058937014271290_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Hi wodel, looks tricky. now the place is reached where i was totally out of my comfort zone. Every information should be double checked. Please check the configuration differences between the cli and horizon. is horizon on the same node as keystone? Looks like there is a connection problem between horizon/keystone. See also the horizon log for any connection errors. Hopefully anyone on the list can instruct for more/deeper debugging. ________________________________ Von: wodel youchi <wodel.youchi@gmail.com> Gesendet: Sonntag, 22. Oktober 2023 15:03 An: OpenStack Discuss <openstack-discuss@lists.openstack.org> Cc: Kaster, Jörn <joern.kaster@epg.com> Betreff: Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert OUTSIDE-EPG! Hi, From the beginning I had kolla_verify_tls_backend: "no" in globals.yml The weird thing is that the openstack cli works fine. I even created a new user with admin role, I get the same behavior. Horizon does not connect, the cli works. I activated the debug mode on keystone [root@rscdeployer ~]# cat /etc/yogakolla/config/keystone.conf [DEFAULT] debug = True insecure_debug= True But nothing in the log file, when I try to login via horizon, I don't get anything on keystone.log. I tested with a wrong password to see the behavior of the platform, and this is what I got on keystone.log : - Openstack CLI with wrong pass, I got : 2023-10-22 13:51:02.344 43 WARNING keystone.server.flask.application [req-73100d88-8357-42ce-8865-e36c34a9bfa9 - - - - -] Authorization failed. The request you have made requires authentication. from 10.10.3.16<http://10.10.3.16/>: keystone.exception.Unauthorized: The request you have made requires authentication. - Openstack Horizon with wrong pass, I got : Nothing How can I follow up this, how can I be sure that it's not a horizon problem or something else? Regards. [https://s-install.avcdn.net/ipm/preview/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif]<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Le mer. 18 oct. 2023 à 13:17, Kaster, Jörn <Joern.Kaster@epg.com<mailto:Joern.Kaster@epg.com>> a écrit : Hi wodel, nice to hear that the patch helps you. With the keystone problem i can't help, but i think the certs are correct. Two thoughts about that. * If you have in the respective configurations of the OpenStack Services the IP address instead of any DNS Name configured (here is this the case) then the certificates don't need the dns name in it. * Could you please look for any error Messages in the keystone logs and also check if you can establish a connection to the keystone on the mentioned port with openssl s_client. If so, it could be possible that you have to disable the certificate verification in the deployment. ________________________________ Von: wodel youchi <wodel.youchi@gmail.com<mailto:wodel.youchi@gmail.com>> Gesendet: Mittwoch, 18. Oktober 2023 11:55 An: Kaster, Jörn <Joern.Kaster@epg.com<mailto:Joern.Kaster@epg.com>> Cc: OpenStack Discuss <openstack-discuss@lists.openstack.org<mailto:openstack-discuss@lists.openstack.org>> Betreff: Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert OUTSIDE-EPG! Thanks Jörn, it worked for cloudkitty, after applying the patch the deployment went well. But : - I still can't access the web console : An error occurred authenticating. Please try again later. - in cloudkitty-processor.log I am still having : 2023-10-18 10:46:25.271 8106 WARNING keystoneauth.identity.generic.base [-] Failed to discover available identity versions when contacting https://dinternal.cloud.domain.tld:35357<https://dinternal.cloud.domain.tld:35357/>. Attempting to parse version from URL.: keystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https:// dinternal.cloud.domain.tld :35357: HTTPSConnectionPool(host=' dinternal.cloud.domain.tld ', port=35357): Max retries exceeded with url: / (Caused by SSLError(SSLError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)'),)) When generating the self-signed certificate, I noticed that the process had generated : - two haproxy certificates, one for the internet with the external FQDN and the second for internal communication with the local internal FQDN. - It also generated a backend certificate, that contains only the IP addresses of the 03 controllers as Subject Alternate Names without any mention of the domain I am using, is this correct? [root@rscdeployer ~]# openssl x509 -noout -text -in /etc/yogakolla/certificates/backend-cert.pem Certificate: Data: Version: 3 (0x2) Serial Number: 1c:66:7e:37:85:cf:ca:1c:da:42:f6:f1:1f:dc:1e:97..... Signature Algorithm: sha256WithRSAEncryption Issuer: CN = KollaTestCA Validity Not Before: Oct 17 15:04:26 2023 GMT Not After : Oct 15 15:04:26 2025 GMT Subject: C = US, ST = NC, L = RTP, OU = kolla Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: ..... ..... e6:23:a4:7f:30:74:ac:0c:2d:22:00:95:b6:ab:20: 98:6b Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Alternative Name: IP Address:10.10.3.5, IP Address:10.10.3.9, IP Address:10.10.3.13 Signature Algorithm: sha256WithRSAEncryption 36:86:cb:b4:9a:fe:33:0d:ff:af:87:5e:00:9d:69:4e:32:21: Regards. [https://s-install.avcdn.net/ipm/preview/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif]<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Le mer. 18 oct. 2023 à 07:12, Kaster, Jörn <Joern.Kaster@epg.com<mailto:Joern.Kaster@epg.com>> a écrit : Hello wodel, the problem with cloudkitty deployment with self signed certs could resolve to the following bugreport [1]. [1] https://bugs.launchpad.net/kolla-ansible/+bug/1998831 Bug #1998831 “CloudKitty bootstrap fails when using internal TLS...” : Bugs : kolla-ansible<https://bugs.launchpad.net/kolla-ansible/+bug/1998831> When InfluxDB is behind HAProxy's internal TLS, CloudKitty fails to bootstrap its InfluxDB database with the following error: TASK [cloudkitty : Creating Cloudkitty influxdb database] *************************************************************************************************************************** fatal: [controller01 -> controller01]: FAILED! => changed=false action: influxdb_database msg: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response... bugs.launchpad.net<http://bugs.launchpad.net/> ________________________________ Von: wodel youchi <wodel.youchi@gmail.com<mailto:wodel.youchi@gmail.com>> Gesendet: Mittwoch, 18. Oktober 2023 01:33 An: OpenStack Discuss <openstack-discuss@lists.openstack.org<mailto:openstack-discuss@lists.openstack.org>> Betreff: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert OUTSIDE-EPG! Hi, Our ssl certificate expired a couple of days ago, and we started experiencing failed login, to workaround the problem rapidly we decided to deploy the self-signed certificates generated by kolla. We generated the certificates then we did a reconfigure, but still the problem remains : An error occurred authenticating. Please try again later. on horizon.log we have : [Wed Oct 18 00:25:55.379383 2023] [wsgi:error] [pid 103:tid 140182314505984] [remote 10.10.3.5:40848<http://10.10.3.5:40848/>] Login failed for user "admin" using domain "default", remote address 10.10.3.5 The openstack command line works fine. How can we debug this? The second problem we have is with cloudkitty that refuses to reconfigure with the generated self-signed certificate, we had to ignore it from the reconfiguration process by putting the cloudkitty variable to no before restarting the reconfigure process. How can we debug this? Regards. [https://s-install.avcdn.net/ipm/preview/icons/icon-envelope-tick-round-orange-animated-no-repeat-v1.gif]<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail>
Hi Jörn, and thanks for your help. And yes horizon and keystone share the nodes, I have an HCI deployment with 3 controllers. Horizon and keyston with other services are collocated on the 03 controllers. About the configuration I don't know how to check that horizon is really trying to connect to keystone? Regards. Le lun. 23 oct. 2023 à 08:56, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hi wodel, looks tricky. now the place is reached where i was totally out of my comfort zone. Every information should be double checked.
Please check the configuration differences between the cli and horizon. is horizon on the same node as keystone? Looks like there is a connection problem between horizon/keystone. See also the horizon log for any connection errors.
Hopefully anyone on the list can instruct for more/deeper debugging.
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Sonntag, 22. Oktober 2023 15:03 *An:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Cc:* Kaster, Jörn <joern.kaster@epg.com> *Betreff:* Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Hi,
From the beginning I had kolla_verify_tls_backend: "no" in globals.yml
The weird thing is that the openstack cli works fine. I even created a new user with admin role, I get the same behavior. Horizon does not connect, the cli works.
I activated the debug mode on keystone [root@rscdeployer ~]# cat /etc/yogakolla/config/keystone.conf [DEFAULT] debug = True insecure_debug= True
But nothing in the log file, when I try to login via horizon, I don't get anything on keystone.log.
I tested with a wrong password to see the behavior of the platform, and this is what I got on keystone.log :
- Openstack CLI with wrong pass, I got : 2023-10-22 13:51:02.344 43 WARNING keystone.server.flask.application [req-73100d88-8357-42ce-8865-e36c34a9bfa9 - - - - -] Authorization failed. The request you have made requires authentication. from 10.10.3.16: keystone.exception.Unauthorized: The request you have made requires authentication.
- Openstack Horizon with wrong pass, I got : Nothing
How can I follow up this, how can I be sure that it's not a horizon problem or something else?
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-3897292657564185354_m_8910317904582327697_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Le mer. 18 oct. 2023 à 13:17, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hi wodel, nice to hear that the patch helps you.
With the keystone problem i can't help, but i think the certs are correct. Two thoughts about that.
- If you have in the respective configurations of the OpenStack Services the IP address instead of any DNS Name configured (here is this the case) then the certificates don't need the dns name in it. - Could you please look for any error Messages in the keystone logs and also check if you can establish a connection to the keystone on the mentioned port with openssl s_client. If so, it could be possible that you have to disable the certificate verification in the deployment.
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Mittwoch, 18. Oktober 2023 11:55 *An:* Kaster, Jörn <Joern.Kaster@epg.com> *Cc:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Betreff:* Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Thanks Jörn, it worked for cloudkitty, after applying the patch the deployment went well. But :
- I still can't access the web console : An error occurred authenticating. Please try again later.
- in cloudkitty-processor.log I am still having : 2023-10-18 10:46:25.271 8106 WARNING keystoneauth.identity.generic.base [-] Failed to discover available identity versions when contacting https://dinternal.cloud.domain.tld:35357. Attempting to parse version from URL.: keystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https:// dinternal.cloud.domain.tld :35357: HTTPSConnectionPool(host=' dinternal.cloud.domain.tld ', port=35357): Max retries exceeded with url: / (Caused by SSLError(SSLError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)'),))
When generating the self-signed certificate, I noticed that the process had generated : - two haproxy certificates, one for the internet with the external FQDN and the second for internal communication with the local internal FQDN.
- It also generated a backend certificate, that contains only the IP addresses of the 03 controllers as Subject Alternate Names without any mention of the domain I am using, is this correct?
[root@rscdeployer ~]# openssl x509 -noout -text -in /etc/yogakolla/certificates/backend-cert.pem Certificate: Data: Version: 3 (0x2) Serial Number: 1c:66:7e:37:85:cf:ca:1c:da:42:f6:f1:1f:dc:1e:97..... Signature Algorithm: sha256WithRSAEncryption Issuer: CN = KollaTestCA Validity Not Before: Oct 17 15:04:26 2023 GMT Not After : Oct 15 15:04:26 2025 GMT Subject: C = US, ST = NC, L = RTP, OU = kolla Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: ..... ..... e6:23:a4:7f:30:74:ac:0c:2d:22:00:95:b6:ab:20: 98:6b Exponent: 65537 (0x10001) X509v3 extensions:
*X509v3 Subject Alternative Name: IP Address:10.10.3.5, IP Address:10.10.3.9, IP Address:10.10.3.13* Signature Algorithm: sha256WithRSAEncryption 36:86:cb:b4:9a:fe:33:0d:ff:af:87:5e:00:9d:69:4e:32:21:
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-3897292657564185354_m_8910317904582327697_x_m_-6993449584919071302_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Le mer. 18 oct. 2023 à 07:12, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hello wodel, the problem with cloudkitty deployment with self signed certs could resolve to the following bugreport [1].
[1] https://bugs.launchpad.net/kolla-ansible/+bug/1998831 Bug #1998831 “CloudKitty bootstrap fails when using internal TLS...” : Bugs : kolla-ansible <https://bugs.launchpad.net/kolla-ansible/+bug/1998831> When InfluxDB is behind HAProxy's internal TLS, CloudKitty fails to bootstrap its InfluxDB database with the following error: TASK [cloudkitty : Creating Cloudkitty influxdb database] *************************************************************************************************************************** fatal: [controller01 -> controller01]: FAILED! => changed=false action: influxdb_database msg: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response... bugs.launchpad.net
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Mittwoch, 18. Oktober 2023 01:33 *An:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Betreff:* [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Hi,
Our ssl certificate expired a couple of days ago, and we started experiencing failed login, to workaround the problem rapidly we decided to deploy the self-signed certificates generated by kolla.
We generated the certificates then we did a reconfigure, but still the problem remains : An error occurred authenticating. Please try again later.
on horizon.log we have : [Wed Oct 18 00:25:55.379383 2023] [wsgi:error] [pid 103:tid 140182314505984] [remote 10.10.3.5:40848] Login failed for user "admin" using domain "default", remote address 10.10.3.5
The openstack command line works fine.
How can we debug this?
The second problem we have is with cloudkitty that refuses to reconfigure with the generated self-signed certificate, we had to ignore it from the reconfiguration process by putting the cloudkitty variable to no before restarting the reconfigure process.
How can we debug this?
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-3897292657564185354_m_8910317904582327697_x_m_-6993449584919071302_x_m_9147058937014271290_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Hi, I tried this command* inside the horizon container* curl -i \ -H "Content-Type: application/json" \ -d ' { "auth": { "identity": { "methods": ["password"], "password": { "user": { "name": "admin", "domain": { "id": "default" }, "password": "adminpass" } } }, "scope": { "project": { "name": "admin", "domain": { "id": "default" } } } } }' \ "https://dashint.domain.tld:5000/v3/auth/tokens" ; echo And it worked I got : {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a3f2478e334473e85527102b76f7a2e", "name": "admin", "password_expires_at": null}, "audit_ids": ["t_ndMsekQbSiB6znKPG8cw"], "expires_at": "2023-10-25T10:31:42.000000Z", "issued_at": "2023-10-24T10:31:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "31bfb5bcf7b7413da269d7a35a2fe69a", "name": "admin"}, "is_domain": false, "roles": [{"id": "10bf547658d6401fa303d92544bb8c83", "name": "reader"}, {"id": "eaf015da2ca74d91aaf57c0806d15151", "name": "admin"}, {"id": "8e581e69aeff43e688d9a4117ea70198", "name": "member"}, {"id": "bcf2e17361644483b3ddbd9eb3b2dc41", "name": "heat_stack_owner"}], "catalog": [{"endpoints": [{"id": "89dd35ee102a4a80ab462c9b482074ff", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:9292", "region": "RegionOne"}, {"id": "febd23ba5bb94ae29439914e156285c1", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9292", "region": "RegionOne"}], "id": "00b59273811446b7a674b7f173edc280", "type": "image", "name": "glance"}, {"endpoints": [{"id": "59303782e16c41de96acb1244ece18df", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8004/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "5dd9d9f65e6445c49a06043014766061", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:8004/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "0707c8272f3b462b9315cb31b4c72863", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "086120be51dd4455b8a319ade13b307c", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9890", "region": "RegionOne"}, {"id": "913c52f4a2ee4835b723db7a72b4ce36", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9890", "region": "RegionOne"}], "id": "0d22dc35910849199656570ad21dcd9a", "type": "nfv-orchestration", "name": "tacker"}, {"endpoints": [{"id": "4528875d386c4ca7965670f0fc931d8e", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:8774/v2/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "d6b6da385fe648588d3a4c2e8e97f961", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8774/v2/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "27fcd296e0ab470cb7002e832363b095", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "30fafe409351446e89663eeb7200fb15", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8041", "region": "RegionOne"}, {"id": "d16210c96e3c44d8808c8bb65585cb7c", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8041", "region": "RegionOne"}], "id": "2bf42fe7ca254dab8fbb42ac3f2ae575", "type": "metric", "name": "gnocchi"}, {"endpoints": [{"id": "1d0c81a7921841769d57ce5f1b53beb4", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8889", "region": "RegionOne"}, {"id": "7b148e8cd20243f2851e41e5ee54860b", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8889", "region": "RegionOne"}], "id": "3d24aa7c9156422c877d600e0d042357", "type": "rating", "name": "cloudkitty"}, {"endpoints": [{"id": "58f5aeee902d4f7492425f6fdeaa5221", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8000/v1", "region": "RegionOne"}, {"id": "8a89b08176a54c98badfc55d1cb1430e", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8000/v1", "region": "RegionOne"}], "id": "423b444c0f6c476abb19545b0ceef5d7", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "1d8389d4284e44f4ba597b6abb9f0fd8", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:9876", "region": "RegionOne"}, {"id": "cc6476207fa04170b590443730addd94", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9876", "region": "RegionOne"}], "id": "616d54816a044484a1dbae25e6e89b78", "type": "load-balancer", "name": "octavia"}, {"endpoints": [{"id": "7012c8db491f4541bc50011267299e78", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9696", "region": "RegionOne"}, {"id": "e1fe54cb73c942f2bf20880ec5a70fa5", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9696", "region": "RegionOne"}], "id": "6e1564d795ec4748a355d261427edcba", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "98e763c5120a4987be57ae2ae3d746bc", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8776/v3/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "a30c349e8f4b435499bba484824ec397", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:8776/v3/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "6ee8c79da66a4743903f67001cfbd82c", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "bda1a84a96a44222bd6c1b328dcab5c0", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:8786/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "edb5d20012a04855b0009015216bf12f", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8786/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "80a9305d3d284d7ca123f167dbdc70d9", "type": "share", "name": "manila"}, {"endpoints": [{"id": "256ed0618c274e4295c957c31dee15b1", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8774/v2.1", "region": "RegionOne"}, {"id": "da894907ac3244e8b16b174689a43da4", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:8774/v2.1", "region": "RegionOne"}], "id": "872c20ecf45e4b179aca9a3fb38b1ca7", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "2e2e4141529748f09597c6a552fec2cf", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:8779/v1.0/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "32ea3ab6df0e40ff9dce5743a4b8f461", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8779/v1.0/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "9b58a03aa82f40f68d887c841a66c494", "type": "database", "name": "trove"}, {"endpoints": [{"id": "58886fe342324c7693a19a838e58b271", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8042", "region": "RegionOne"}, {"id": "5a490942fa444702bee8ea8e8b93f8c2", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8042", "region": "RegionOne"}], "id": "a3f2f54e9ba5479e92d1877e888ce343", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "4dd22ad3679944cdb0bf58dfb079e06e", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8780", "region": "RegionOne"}, {"id": "ef58b4d1fa96450dad34a970c8b861a6", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8780", "region": "RegionOne"}], "id": "a4ece7cf2ed9489eb0c1b17a6d246167", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "16ddc15846394e8ab6b1dc929fbd16df", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:6780/swift/v1/AUTH_31bfb5bcf7b7413da269d7a35a2fe6...", "region": "RegionOne"}, {"id": "e4a87b4e611a4489a578e2682a5427a3", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:6780/swift/v1/AUTH_31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "a675a0dd4e4249c5b02e20ce1189d25b", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "16a2a506033b4283bd137807972def4e", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:15868", "region": "RegionOne"}, {"id": "78dfbffe50ba443fa774afc84d0ef498", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:15868", "region": "RegionOne"}], "id": "bab1002564014db69141fc35604e5015", "type": "instance-ha", "name": "masakari"}, {"endpoints": [{"id": "45df7b40319c44dc9ec4f128e74fbcf5", "interface": "public", "region_id": "RegionOne", "url": " https://dash.domain.tld:9001", "region": "RegionOne"}, {"id": "df5d79741eb34e4d9cf6fa8d96b8f5f7", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9001", "region": "RegionOne"}], "id": "ca383788f8ab45aea613673517e0b0cb", "type": "dns", "name": "designate"}, {"endpoints": [{"id": "a20540bca7bf42c09335fb65d6d99700", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8786/v2", "region": "RegionOne"}, {"id": "f0f972e7a0994eedbef4399b993e96e1", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:8786/v2", "region": "RegionOne"}], "id": "d255d199347f4fbbb628989ba0fddcea", "type": "sharev2", "name": "manilav2"}, {"endpoints": [{"id": "2d89b452111c429d992f9d8565e3f32a", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:5000", "region": "RegionOne"}, {"id": "e5e97690706f4bfb9c346adf14dd80ca", "interface": "internal", "region_id": "RegionOne", "url": " https://dashint.domain.tld:5000", "region": "RegionOne"}, {"id": "f1572f47fe6f410aa9e131b347c297a0", "interface": "admin", "region_id": "RegionOne", "url": "https://dashint.domain.tld:35357", "region": "RegionOne"}], "id": "d43c2c87207e47718ac08635206c5fea", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4838f6d83ebe447a873f87b737d68db9", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9311", "region": "RegionOne"}, {"id": "6f741041fad94a8b81f36786e6bada4f", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9311", "region": "RegionOne"}], "id": "e2a1ff6fb7e347df9ec0e206f45b4d63", "type": "key-manager", "name": "barbican"}, {"endpoints": [{"id": "54b76e573ad643ba81cf2dcbf013cd3a", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9511/v1", "region": "RegionOne"}, {"id": "6cbe70ba478943798f8e075867111bf6", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9511/v1", "region": "RegionOne"}], "id": "e2dee8f8ca9f4d1093d4ccaab310fcf0", "type": "container-infra", "name": "magnum"}, {"endpoints": [{"id": "4375983c66104c3a85f42af1ea29bebc", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8989/v2", "region": "RegionOne"}, {"id": "d0558e0eb8ce4081bc3df793aba63ad4", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8989/v2", "region": "RegionOne"}], "id": "ebc28b05d3984ab0bf90e7e0354d04ea", "type": "workflowv2", "name": "mistral"}, {"endpoints": [{"id": "74f5f5abb4694fc982875119336206a7", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9090", "region": "RegionOne"}, {"id": "7dcd9944240d4158b373119081e114ae", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9090", "region": "RegionOne"}], "id": "f1ba410f251048e7b53ce5d483c13520", "type": "backup", "name": "freezer"}]}} How can I debug the connection between horizon and keystone???? Regards. Le lun. 23 oct. 2023 à 10:33, wodel youchi <wodel.youchi@gmail.com> a écrit :
Hi Jörn, and thanks for your help.
And yes horizon and keystone share the nodes, I have an HCI deployment with 3 controllers. Horizon and keyston with other services are collocated on the 03 controllers.
About the configuration I don't know how to check that horizon is really trying to connect to keystone?
Regards.
Le lun. 23 oct. 2023 à 08:56, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hi wodel, looks tricky. now the place is reached where i was totally out of my comfort zone. Every information should be double checked.
Please check the configuration differences between the cli and horizon. is horizon on the same node as keystone? Looks like there is a connection problem between horizon/keystone. See also the horizon log for any connection errors.
Hopefully anyone on the list can instruct for more/deeper debugging.
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Sonntag, 22. Oktober 2023 15:03 *An:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Cc:* Kaster, Jörn <joern.kaster@epg.com> *Betreff:* Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Hi,
From the beginning I had kolla_verify_tls_backend: "no" in globals.yml
The weird thing is that the openstack cli works fine. I even created a new user with admin role, I get the same behavior. Horizon does not connect, the cli works.
I activated the debug mode on keystone [root@rscdeployer ~]# cat /etc/yogakolla/config/keystone.conf [DEFAULT] debug = True insecure_debug= True
But nothing in the log file, when I try to login via horizon, I don't get anything on keystone.log.
I tested with a wrong password to see the behavior of the platform, and this is what I got on keystone.log :
- Openstack CLI with wrong pass, I got : 2023-10-22 13:51:02.344 43 WARNING keystone.server.flask.application [req-73100d88-8357-42ce-8865-e36c34a9bfa9 - - - - -] Authorization failed. The request you have made requires authentication. from 10.10.3.16: keystone.exception.Unauthorized: The request you have made requires authentication.
- Openstack Horizon with wrong pass, I got : Nothing
How can I follow up this, how can I be sure that it's not a horizon problem or something else?
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-4527370644492657947_m_-3897292657564185354_m_8910317904582327697_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Le mer. 18 oct. 2023 à 13:17, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hi wodel, nice to hear that the patch helps you.
With the keystone problem i can't help, but i think the certs are correct. Two thoughts about that.
- If you have in the respective configurations of the OpenStack Services the IP address instead of any DNS Name configured (here is this the case) then the certificates don't need the dns name in it. - Could you please look for any error Messages in the keystone logs and also check if you can establish a connection to the keystone on the mentioned port with openssl s_client. If so, it could be possible that you have to disable the certificate verification in the deployment.
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Mittwoch, 18. Oktober 2023 11:55 *An:* Kaster, Jörn <Joern.Kaster@epg.com> *Cc:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Betreff:* Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Thanks Jörn, it worked for cloudkitty, after applying the patch the deployment went well. But :
- I still can't access the web console : An error occurred authenticating. Please try again later.
- in cloudkitty-processor.log I am still having : 2023-10-18 10:46:25.271 8106 WARNING keystoneauth.identity.generic.base [-] Failed to discover available identity versions when contacting https://dinternal.cloud.domain.tld:35357. Attempting to parse version from URL.: keystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https:// dinternal.cloud.domain.tld :35357: HTTPSConnectionPool(host=' dinternal.cloud.domain.tld ', port=35357): Max retries exceeded with url: / (Caused by SSLError(SSLError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)'),))
When generating the self-signed certificate, I noticed that the process had generated : - two haproxy certificates, one for the internet with the external FQDN and the second for internal communication with the local internal FQDN.
- It also generated a backend certificate, that contains only the IP addresses of the 03 controllers as Subject Alternate Names without any mention of the domain I am using, is this correct?
[root@rscdeployer ~]# openssl x509 -noout -text -in /etc/yogakolla/certificates/backend-cert.pem Certificate: Data: Version: 3 (0x2) Serial Number: 1c:66:7e:37:85:cf:ca:1c:da:42:f6:f1:1f:dc:1e:97..... Signature Algorithm: sha256WithRSAEncryption Issuer: CN = KollaTestCA Validity Not Before: Oct 17 15:04:26 2023 GMT Not After : Oct 15 15:04:26 2025 GMT Subject: C = US, ST = NC, L = RTP, OU = kolla Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: ..... ..... e6:23:a4:7f:30:74:ac:0c:2d:22:00:95:b6:ab:20: 98:6b Exponent: 65537 (0x10001) X509v3 extensions:
*X509v3 Subject Alternative Name: IP Address:10.10.3.5, IP Address:10.10.3.9, IP Address:10.10.3.13* Signature Algorithm: sha256WithRSAEncryption 36:86:cb:b4:9a:fe:33:0d:ff:af:87:5e:00:9d:69:4e:32:21:
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-4527370644492657947_m_-3897292657564185354_m_8910317904582327697_x_m_-6993449584919071302_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Le mer. 18 oct. 2023 à 07:12, Kaster, Jörn <Joern.Kaster@epg.com> a écrit :
Hello wodel, the problem with cloudkitty deployment with self signed certs could resolve to the following bugreport [1].
[1] https://bugs.launchpad.net/kolla-ansible/+bug/1998831 Bug #1998831 “CloudKitty bootstrap fails when using internal TLS...” : Bugs : kolla-ansible <https://bugs.launchpad.net/kolla-ansible/+bug/1998831> When InfluxDB is behind HAProxy's internal TLS, CloudKitty fails to bootstrap its InfluxDB database with the following error: TASK [cloudkitty : Creating Cloudkitty influxdb database] *************************************************************************************************************************** fatal: [controller01 -> controller01]: FAILED! => changed=false action: influxdb_database msg: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response... bugs.launchpad.net
------------------------------ *Von:* wodel youchi <wodel.youchi@gmail.com> *Gesendet:* Mittwoch, 18. Oktober 2023 01:33 *An:* OpenStack Discuss <openstack-discuss@lists.openstack.org> *Betreff:* [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert
OUTSIDE-EPG!
Hi,
Our ssl certificate expired a couple of days ago, and we started experiencing failed login, to workaround the problem rapidly we decided to deploy the self-signed certificates generated by kolla.
We generated the certificates then we did a reconfigure, but still the problem remains : An error occurred authenticating. Please try again later.
on horizon.log we have : [Wed Oct 18 00:25:55.379383 2023] [wsgi:error] [pid 103:tid 140182314505984] [remote 10.10.3.5:40848] Login failed for user "admin" using domain "default", remote address 10.10.3.5
The openstack command line works fine.
How can we debug this?
The second problem we have is with cloudkitty that refuses to reconfigure with the generated self-signed certificate, we had to ignore it from the reconfiguration process by putting the cloudkitty variable to no before restarting the reconfigure process.
How can we debug this?
Regards.
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> Virus-free.www.avast.com <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail> <#m_-4527370644492657947_m_-3897292657564185354_m_8910317904582327697_x_m_-6993449584919071302_x_m_9147058937014271290_x_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Hi wodel, probably you can just hang on the interface of horizon with tcpdump and look what the container send over the line. not the packet insides, but for first debugging the dns requests and the dns names that where contacted. greets Jörn ________________________________ Von: wodel youchi <wodel.youchi@gmail.com> Gesendet: Dienstag, 24. Oktober 2023 13:04 An: Kaster, Jörn <Joern.Kaster@epg.com> Cc: OpenStack Discuss <openstack-discuss@lists.openstack.org> Betreff: Re: [kolla-ansible][yoga] Cannot authenticate to openstack after deploying self-signed cert OUTSIDE-EPG! Hi, I tried this command inside the horizon container curl -i \ -H "Content-Type: application/json" \ -d ' { "auth": { "identity": { "methods": ["password"], "password": { "user": { "name": "admin", "domain": { "id": "default" }, "password": "adminpass" } } }, "scope": { "project": { "name": "admin", "domain": { "id": "default" } } } } }' \ "https://dashint.domain.tld:5000/v3/auth/tokens" ; echo And it worked I got : {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a3f2478e334473e85527102b76f7a2e", "name": "admin", "password_expires_at": null}, "audit_ids": ["t_ndMsekQbSiB6znKPG8cw"], "expires_at": "2023-10-25T10:31:42.000000Z", "issued_at": "2023-10-24T10:31:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "31bfb5bcf7b7413da269d7a35a2fe69a", "name": "admin"}, "is_domain": false, "roles": [{"id": "10bf547658d6401fa303d92544bb8c83", "name": "reader"}, {"id": "eaf015da2ca74d91aaf57c0806d15151", "name": "admin"}, {"id": "8e581e69aeff43e688d9a4117ea70198", "name": "member"}, {"id": "bcf2e17361644483b3ddbd9eb3b2dc41", "name": "heat_stack_owner"}], "catalog": [{"endpoints": [{"id": "89dd35ee102a4a80ab462c9b482074ff", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9292<https://dash.domain.tld:9292/>", "region": "RegionOne"}, {"id": "febd23ba5bb94ae29439914e156285c1", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9292<https://dashint.domain.tld:9292/>", "region": "RegionOne"}], "id": "00b59273811446b7a674b7f173edc280", "type": "image", "name": "glance"}, {"endpoints": [{"id": "59303782e16c41de96acb1244ece18df", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8004/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "5dd9d9f65e6445c49a06043014766061", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8004/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "0707c8272f3b462b9315cb31b4c72863", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "086120be51dd4455b8a319ade13b307c", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9890<https://dash.domain.tld:9890/>", "region": "RegionOne"}, {"id": "913c52f4a2ee4835b723db7a72b4ce36", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9890<https://dashint.domain.tld:9890/>", "region": "RegionOne"}], "id": "0d22dc35910849199656570ad21dcd9a", "type": "nfv-orchestration", "name": "tacker"}, {"endpoints": [{"id": "4528875d386c4ca7965670f0fc931d8e", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8774/v2/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "d6b6da385fe648588d3a4c2e8e97f961", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8774/v2/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "27fcd296e0ab470cb7002e832363b095", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "30fafe409351446e89663eeb7200fb15", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8041<https://dashint.domain.tld:8041/>", "region": "RegionOne"}, {"id": "d16210c96e3c44d8808c8bb65585cb7c", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8041<https://dash.domain.tld:8041/>", "region": "RegionOne"}], "id": "2bf42fe7ca254dab8fbb42ac3f2ae575", "type": "metric", "name": "gnocchi"}, {"endpoints": [{"id": "1d0c81a7921841769d57ce5f1b53beb4", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8889<https://dashint.domain.tld:8889/>", "region": "RegionOne"}, {"id": "7b148e8cd20243f2851e41e5ee54860b", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8889<https://dash.domain.tld:8889/>", "region": "RegionOne"}], "id": "3d24aa7c9156422c877d600e0d042357", "type": "rating", "name": "cloudkitty"}, {"endpoints": [{"id": "58f5aeee902d4f7492425f6fdeaa5221", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8000/v1", "region": "RegionOne"}, {"id": "8a89b08176a54c98badfc55d1cb1430e", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8000/v1", "region": "RegionOne"}], "id": "423b444c0f6c476abb19545b0ceef5d7", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "1d8389d4284e44f4ba597b6abb9f0fd8", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9876<https://dash.domain.tld:9876/>", "region": "RegionOne"}, {"id": "cc6476207fa04170b590443730addd94", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9876<https://dashint.domain.tld:9876/>", "region": "RegionOne"}], "id": "616d54816a044484a1dbae25e6e89b78", "type": "load-balancer", "name": "octavia"}, {"endpoints": [{"id": "7012c8db491f4541bc50011267299e78", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9696<https://dashint.domain.tld:9696/>", "region": "RegionOne"}, {"id": "e1fe54cb73c942f2bf20880ec5a70fa5", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9696<https://dash.domain.tld:9696/>", "region": "RegionOne"}], "id": "6e1564d795ec4748a355d261427edcba", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "98e763c5120a4987be57ae2ae3d746bc", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8776/v3/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "a30c349e8f4b435499bba484824ec397", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8776/v3/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "6ee8c79da66a4743903f67001cfbd82c", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "bda1a84a96a44222bd6c1b328dcab5c0", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8786/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "edb5d20012a04855b0009015216bf12f", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8786/v1/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "80a9305d3d284d7ca123f167dbdc70d9", "type": "share", "name": "manila"}, {"endpoints": [{"id": "256ed0618c274e4295c957c31dee15b1", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8774/v2.1", "region": "RegionOne"}, {"id": "da894907ac3244e8b16b174689a43da4", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8774/v2.1", "region": "RegionOne"}], "id": "872c20ecf45e4b179aca9a3fb38b1ca7", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "2e2e4141529748f09597c6a552fec2cf", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8779/v1.0/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}, {"id": "32ea3ab6df0e40ff9dce5743a4b8f461", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8779/v1.0/31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "9b58a03aa82f40f68d887c841a66c494", "type": "database", "name": "trove"}, {"endpoints": [{"id": "58886fe342324c7693a19a838e58b271", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8042<https://dashint.domain.tld:8042/>", "region": "RegionOne"}, {"id": "5a490942fa444702bee8ea8e8b93f8c2", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8042<https://dash.domain.tld:8042/>", "region": "RegionOne"}], "id": "a3f2f54e9ba5479e92d1877e888ce343", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "4dd22ad3679944cdb0bf58dfb079e06e", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8780<https://dash.domain.tld:8780/>", "region": "RegionOne"}, {"id": "ef58b4d1fa96450dad34a970c8b861a6", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8780<https://dashint.domain.tld:8780/>", "region": "RegionOne"}], "id": "a4ece7cf2ed9489eb0c1b17a6d246167", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "16ddc15846394e8ab6b1dc929fbd16df", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:6780/swift/v1/AUTH_31bfb5bcf7b7413da269d7a35a2fe6...", "region": "RegionOne"}, {"id": "e4a87b4e611a4489a578e2682a5427a3", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:6780/swift/v1/AUTH_31bfb5bcf7b7413da269d7a35a2fe69a", "region": "RegionOne"}], "id": "a675a0dd4e4249c5b02e20ce1189d25b", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "16a2a506033b4283bd137807972def4e", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:15868<https://dash.domain.tld:15868/>", "region": "RegionOne"}, {"id": "78dfbffe50ba443fa774afc84d0ef498", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:15868<https://dashint.domain.tld:15868/>", "region": "RegionOne"}], "id": "bab1002564014db69141fc35604e5015", "type": "instance-ha", "name": "masakari"}, {"endpoints": [{"id": "45df7b40319c44dc9ec4f128e74fbcf5", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9001<https://dash.domain.tld:9001/>", "region": "RegionOne"}, {"id": "df5d79741eb34e4d9cf6fa8d96b8f5f7", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9001<https://dashint.domain.tld:9001/>", "region": "RegionOne"}], "id": "ca383788f8ab45aea613673517e0b0cb", "type": "dns", "name": "designate"}, {"endpoints": [{"id": "a20540bca7bf42c09335fb65d6d99700", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8786/v2", "region": "RegionOne"}, {"id": "f0f972e7a0994eedbef4399b993e96e1", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8786/v2", "region": "RegionOne"}], "id": "d255d199347f4fbbb628989ba0fddcea", "type": "sharev2", "name": "manilav2"}, {"endpoints": [{"id": "2d89b452111c429d992f9d8565e3f32a", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:5000<https://dash.domain.tld:5000/>", "region": "RegionOne"}, {"id": "e5e97690706f4bfb9c346adf14dd80ca", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:5000<https://dashint.domain.tld:5000/>", "region": "RegionOne"}, {"id": "f1572f47fe6f410aa9e131b347c297a0", "interface": "admin", "region_id": "RegionOne", "url": "https://dashint.domain.tld:35357<https://dashint.domain.tld:35357/>", "region": "RegionOne"}], "id": "d43c2c87207e47718ac08635206c5fea", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "4838f6d83ebe447a873f87b737d68db9", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9311<https://dashint.domain.tld:9311/>", "region": "RegionOne"}, {"id": "6f741041fad94a8b81f36786e6bada4f", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9311<https://dash.domain.tld:9311/>", "region": "RegionOne"}], "id": "e2a1ff6fb7e347df9ec0e206f45b4d63", "type": "key-manager", "name": "barbican"}, {"endpoints": [{"id": "54b76e573ad643ba81cf2dcbf013cd3a", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9511/v1", "region": "RegionOne"}, {"id": "6cbe70ba478943798f8e075867111bf6", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9511/v1", "region": "RegionOne"}], "id": "e2dee8f8ca9f4d1093d4ccaab310fcf0", "type": "container-infra", "name": "magnum"}, {"endpoints": [{"id": "4375983c66104c3a85f42af1ea29bebc", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:8989/v2", "region": "RegionOne"}, {"id": "d0558e0eb8ce4081bc3df793aba63ad4", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:8989/v2", "region": "RegionOne"}], "id": "ebc28b05d3984ab0bf90e7e0354d04ea", "type": "workflowv2", "name": "mistral"}, {"endpoints": [{"id": "74f5f5abb4694fc982875119336206a7", "interface": "public", "region_id": "RegionOne", "url": "https://dash.domain.tld:9090<https://dash.domain.tld:9090/>", "region": "RegionOne"}, {"id": "7dcd9944240d4158b373119081e114ae", "interface": "internal", "region_id": "RegionOne", "url": "https://dashint.domain.tld:9090<https://dashint.domain.tld:9090/>", "region": "RegionOne"}], "id": "f1ba410f251048e7b53ce5d483c13520", "type": "backup", "name": "freezer"}]}} How can I debug the connection between horizon and keystone????
participants (2)
-
Kaster, Jörn
-
wodel youchi