Public bug reported:

=== Problem Description ===================================
#===========================================================

After enabling security groups in Trove, ICMP traffic is being blocked.

A patch to enable ICMP traffic in the Trove security group configuration
was merged into Master about 7 months ago.

Linux zs93kg 4.4.0-64-generic #85-Ubuntu SMP Mon Feb 20 11:55:38 UTC 2017 s390x 
s390x s390x GNU/Linux
 
Machine Type = s390x

Userspace tool common name: trove

#=== Steps to Reproduce ====================================
#===========================================================
1. Edit /etc/trove/trove-taskmanager.conf and enable security groups:
[DEFAULT]
...
trove_security_groups_support = True
trove_security_group_rule_cidr = 0.0.0.0/0

2. In the same config file, add some ports to the target datastores, for
example:

[db2]
icmp = True
tcp_ports = 22, 50000
volume_support = True

[postgresql]
icmp = True
tcp_ports = 22, 5432
volume_support = True
 
3. Deploy a new instance of the indicated datastore, and try to ping it. This 
will fail. Looking at the assigned security group for the instance:

[vmorris@zs93kg USER:vmorris PROJ:tenant1 ~]$ openstack server show 
vem-tenant1-trove-postgres | grep security_groups
| security_groups                      | [{u'name': 
u'SecGroup_801648ae-8a1f-4388-be38-01f3e9f1c743'}] |
[vmorris@zs93kg USER:vmorris PROJ:tenant1 ~]$ openstack security group show 
SecGroup_801648ae-8a1f-4388-be38-01f3e9f1c743
+-------------+------------------------------------------------------------------------------------------------------------+
| Field       | Value                                                           
                                           |
+-------------+------------------------------------------------------------------------------------------------------------+
| description | Security Group for 801648ae-8a1f-4388-be38-01f3e9f1c743         
                                           |
| id          | 61a58f17-10b4-4d94-a677-9831f7eda2d7                            
                                           |
| name        | SecGroup_801648ae-8a1f-4388-be38-01f3e9f1c743                   
                                           |
| project_id  | 68eba9de5c3b49b6b6e4199faf1053f7                                
                                           |
| rules       | id='2874bf94-c2e9-4046-b2a6-a08f791152b9', ip_protocol='tcp', 
ip_range='0.0.0.0/0', port_range='22:22'     |
|             | id='e7c3fcad-2c7f-4cef-8f6c-7418f2c6bde6', ip_protocol='tcp', 
ip_range='0.0.0.0/0', port_range='5432:5432' |
+-------------+------------------------------------------------------------------------------------------------------------+

#=== Additional Info ====================================
#===========================================================

Please see the following change in Trove master:

https://review.openstack.org/#/c/214056/

 Change 214056 - Merged
Introduce "icmp" option for security group rule

This change introduces new datastore option "icmp" to
configure whether to permit ICMP. It helps users to
check DB instance health in different way from access
DB ports.

** Affects: openstack-trove (Ubuntu)
     Importance: Undecided
     Assignee: Skipper Bug Screeners (skipper-screen-team)
         Status: New


** Tags: architecture-s39031.64 bugnameltc-152315 severity-high 
targetmilestone-inin16042

** Tags added: architecture-s39031.64 bugnameltc-152315 severity-high
targetmilestone-inin16042

** Changed in: ubuntu
     Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => openstack-trove (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1670766

Title:
  Mitaka Trove security groups do not have an ICMP option - patch
  available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openstack-trove/+bug/1670766/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to