-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] unable to find valid certification path to requested target #16528
Comments
The issue is due to having duplicate security config in opensearch.yml which in turn is probably due to demo configuration script being run by default on Helm charts even if you made changes to the security config. As a consequence, the Security Plugin ends up using the demo certs instead of the ones you've added. To get past this issue you can disable the demo security configuration by setting DISABLE_INSTALL_DEMO_CONFIG to "true" in the extraEnvs section of your values.yaml file.
Here is a similar bug raised in the helm-charts repo: opensearch-project/helm-charts#564 @cwperks is this something that can be fixed on the Security Plugin side? |
@dancristiancecoi This should be resolved in 2.18: opensearch-project/security#4793 |
@dancristiancecoi, thank you for your response. After disabling the demo config, the default cert files that I used for the transport ssl configurations (esnode.pem, esnode-key.pem, etc.) no longer exist, so I had to reference my custom certificates in the transport config as well. @cwperks Do you have an estimation about the release date of v2.18? |
@yanivNaor92 I expect it to be released by November 5: https://opensearch.org/releases.html |
It looks like this was fixed in version 2.18 🎉. I have just updated the versions, and everything works as expected without any configuration updates. (I also updated the opensearch-k8s-operator to the latest version.) |
Thank you for confirming @Nmishin! Closing this issue. |
Describe the bug
I'm installing opensearch in my Kubernetes cluster by using the helm-charts.
After upgrading opensearch from version 2.11 to 2.17.1, I started getting the following error in opensearch-cluster-master pod:
I omitted the stack trace for brevity.
This is my opensearch.yml file:
I already validated the following:
certs/tls.crt
,certs/tls.key
andcerts/ca.crt
files exists in theconfig
folder and contain valid certificate, private key and CA respectively. I manually created them using OpenSSL.clientauth_mode: REQUIRE
). Whenclientauth_mode
is set toNONE
, the communication between opensearch-cluster and opensearch-dashboards works fine.Note: I enabled only TLS 1.2 due to the following issue: opensearch-project/security#3299
Your help is much appreciated.
Related component
Plugins
To Reproduce
Expected behavior
mTLS communication between opensearch-cluster and opensearch-dashboards pods should work without any errors.
The text was updated successfully, but these errors were encountered: