Actually with a set of 1 this would not have mattered. I think the problem
is not with the sticky sessions...

On Mon, Apr 27, 2020 at 9:43 PM Ami Goldenberg <[email protected]> wrote:

> Great idea Andy
>
> I reduced the scale to 1 and it is still doing the same redirect loop.
> I guess the load balancer is hitting a different node even if sticky is
> set up? Even if eventually the service does clientAffinity maybe the client
> IP is not taken correctly?
>
> What are your thoughts?
>
> On Mon, Apr 27, 2020 at 9:25 PM Andy LoPresto <[email protected]>
> wrote:
>
>> Can you verify the initial redirect to OIDC and the callback are going to
>> the same node in NiFi? I see your LB configs are set to sticky sessions,
>> but it may be that if the callback is originating from the OIDC IDP server
>> rather than the actual client IP, the session affinity is not being
>> applied. Regardless, the error appears to indicate that the JWT provided in
>> the request to NiFi isn’t able to be validated, which indicates that the
>> key used to sign it isn’t present on that node, which is likely due to the
>> request being sent to a node other than the one that signed it.
>>
>> Quick and easy way to validate this would be to change the stateful set #
>> to 1 node and attempt the same sequence of operations.
>>
>>
>> Andy LoPresto
>> [email protected]
>> *[email protected] <[email protected]>*
>> He/Him
>> PGP Fingerprint: 70EC B3E5 98A6 5A3F D3C4  BACE 3C6E F65B 2F7D EF69
>>
>> On Apr 27, 2020, at 8:12 AM, Ami Goldenberg <[email protected]> wrote:
>>
>> Hi Nathan,
>> Indeed, that's the case
>>
>> On Mon, Apr 27, 2020 at 5:57 PM Nathan Gough <[email protected]> wrote:
>>
>>> Hi Ami,
>>>
>>> Just to confirm, the OAuth Client ID redirect URL in OIDC is set to "
>>> https://${nifi.hostname}:${nifi.port}/nifi-api/access/oidc/callback";
>>> and the NiFi property is set "nifi.security.user.oidc.discovery.url=
>>> https://accounts.google.com/.well-known/openid-configuration";.
>>>
>>> Nathan
>>>
>>> On Mon, Apr 27, 2020 at 12:37 AM Ami Goldenberg <[email protected]>
>>> wrote:
>>>
>>>> Hi,
>>>>
>>>> We are trying to deploy NiFi on kubernetes after successfully using it
>>>> for a while.
>>>> The issue we are having is that every time we enter our nifi URL it
>>>> will redirect us to Google and once we sign in we just get redirected 
>>>> again.
>>>>
>>>> *The error I see on users.log is:*
>>>> o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<JWT token>)
>>>> GET https://XXX.XXX.XXXX/nifi-api/flow/current-user
>>>> <https://xxx.xxx.xxxx/nifi-api/flow/current-user> (source ip:
>>>> 172.32.34.99)
>>>> 2020-04-25T19:48:06.256605759Z 2020-04-25 19:48:05,983 ERROR [NiFi
>>>> Web Server-16] o.a.nifi.web.security.jwt.JwtService There was an error
>>>> validating the JWT
>>>> 2020-04-25T19:48:06.256610178Z 2020-04-25 19:48:05,983 ERROR [NiFi Web
>>>> Server-16] o.a.nifi.web.security.jwt.JwtService Unable to validate
>>>> the access token.
>>>> 2020-04-25T19:48:06.256613727Z Caused by: JWT signature does not
>>>> match locally computed signature. JWT validity cannot be asserted and
>>>> should not be trusted.
>>>> 2020-04-25T19:48:06.256617124Z 2020-04-25 19:48:05,984 WARN [NiFi Web
>>>> Server-16] o.a.n.w.s.NiFiAuthenticationFilter Rejecting access to web
>>>> api:Unable to validate the access token.
>>>>
>>>> *We're trying to follow practices from blogs and pvillard's repo:*
>>>>
>>>>    -
>>>>    
>>>> https://github.com/pvillard31/nifi-gcp-terraform/tree/master/gcp-cluster-secured-nifi-oidc
>>>>    -
>>>>    https://bryanbende.com/development/2017/10/03/apache-nifi-openid-connect
>>>>    -
>>>>    https://medium.com/swlh/operationalising-nifi-on-kubernetes-1a8e0ae16a6c
>>>>
>>>> *Our set up is as such:*
>>>>
>>>>    - OIDC provider is Google
>>>>    - TLS-toolkit running in server mode inside k8s
>>>>    - StatefulSet of 3 replicas
>>>>    - Zookeeper in K8s
>>>>    - Ingress that is set up to create a load balancer in AWS - with
>>>>    sticky sessions (based on cookie)
>>>>    - Service that is set up with sessionAffinity: ClientIP
>>>>
>>>>
>>>> Any idea which direction I should be checking next?anks!
>>>>
>>>
>>

Reply via email to