Skip to content

Commit 8ab8e77

Browse files
authored
Merge pull request #4653 from dcbw/ipsec-full-subject
admin-guide/ipsec: correct instructions for explicit configuration 'rightid' line
2 parents 89bf844 + 8cb379d commit 8ab8e77

File tree

1 file changed

+23
-2
lines changed

1 file changed

+23
-2
lines changed

admin_guide/ipsec.adoc

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,16 @@ IPSec requires 62 bytes. If the cluster is operating on an ethernet network with
5252
an MTU of 1500 then the SDN MTU should be 1388, to allow for the overhead of
5353
IPSec and the SDN encapsulation.
5454

55+
After modifying the MTU in the {product-title} configuration, the SDN must be
56+
made aware of the change by removing the SDN interface and restarting the
57+
{product-title} node process.
58+
+
59+
----
60+
# systemctl stop atomic-openshift-node
61+
# ovs-vsctl del-br br0
62+
# systemctl start atomic-openshift-node
63+
----
64+
5565
[[admin-guide-ipsec-certificates]]
5666
=== Step 2: Certificates
5767
By default, {product-title} secures cluster management communication with
@@ -184,6 +194,17 @@ configuration of every other node in the cluster. Using a configuration
184194
management tool such as Ansible to generate this file on each host is
185195
recommended.
186196

197+
. This configuration also requires the full certificate subject of each node to
198+
be placed into the configuration for every other node. To read this subject from
199+
the node's certificate, use *openssl*:
200+
+
201+
----
202+
# openssl x509 \
203+
-in /path/to/client-certificate -text | \
204+
grep "Subject:" | \
205+
sed 's/[[:blank:]]*Subject: //'
206+
----
207+
187208
. Place the following lines into the *_/etc/ipsec.d/openshift-cluster.conf_* file on each node for every other node in the cluster:
188209
+
189210
====
@@ -194,15 +215,15 @@ conn <other_node_hostname>
194215
leftrsasigkey=%cert
195216
leftcert=<this_node_cert_nickname> <2>
196217
right=<other_node_ip> <3>
197-
rightid="CN=<other_node_cert_nickname>" <4>
218+
rightid="<other_node_cert_full_subject>" <4>
198219
rightrsasigkey=%cert
199220
auto=start
200221
keyingtries=%forever
201222
----
202223
<1> Replace <this_node_ip> with the cluster IP address of this node.
203224
<2> Replace <this_node_cert_nickname> with the node certificate nickname from step one.
204225
<3> Replace <other_node_ip> with the cluster IP address of the other node.
205-
<4> Replace <other_node_cert_nickname> with the other node certificate nickname from step one.
226+
<4> Replace <other_node_cert_full_subject> with the other node's certificate subject from just above. For example: "O=system:nodes,CN=openshift-node-45.example.com".
206227
====
207228

208229
. Place the following in the *_/etc/ipsec.d/openshift-cluster.secrets_* file on each node:

0 commit comments

Comments
 (0)