-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Platform] YSQL backups with node-to-node TLS encryption enabled hang forever #6965
Comments
@streddy-yb This should be targeted for 2.4.1 |
iSignal
added a commit
that referenced
this issue
Jan 27, 2021
…e TLS enabled universe Summary: ysql_dump needs to contact masters for certain metadata. When node to node TLS is enabled, this means that it needs to be aware of node certificate dirs and enable a TLS conn. This diff sets those flags through yb_backup.py Test Plan: Backup an SQL db on a node to node TLS enabled univ through YW, verify it fails before and succeeds after this change. Tested S3 (backup to, restore from) X (node to node tls, non TLS) universe. Reviewers: arnav, oleg Reviewed By: oleg Subscribers: jenkins-bot, yugaware Differential Revision: https://phabricator.dev.yugabyte.com/D10447
iSignal
added a commit
that referenced
this issue
Feb 4, 2021
…ing up node to node TLS enabled universe Summary: ysql_dump needs to contact masters for certain metadata. When node to node TLS is enabled, this means that it needs to be aware of node certificate dirs and enable a TLS conn. This diff sets those flags through yb_backup.py Original diff: https://phabricator.dev.yugabyte.com/D10447 / 3579c17 Test Plan: 1. run unit tests ybd --cxx-test tools_yb-backup-test_ent && ybd --java-test org.yb.cql.TestYbBackup && ybd --java-test org.yb.pgsql.TestYbBackup 2. Run a manual SQL backup and restore against a local AWS TLS enabled univ Reviewers: arnav, oleg Reviewed By: oleg Subscribers: bogdan, jenkins-bot, yugaware Differential Revision: https://phabricator.dev.yugabyte.com/D10524
polarweasel
pushed a commit
to lizayugabyte/yugabyte-db
that referenced
this issue
Mar 9, 2021
…e to node TLS enabled universe Summary: ysql_dump needs to contact masters for certain metadata. When node to node TLS is enabled, this means that it needs to be aware of node certificate dirs and enable a TLS conn. This diff sets those flags through yb_backup.py Test Plan: Backup an SQL db on a node to node TLS enabled univ through YW, verify it fails before and succeeds after this change. Tested S3 (backup to, restore from) X (node to node tls, non TLS) universe. Reviewers: arnav, oleg Reviewed By: oleg Subscribers: jenkins-bot, yugaware Differential Revision: https://phabricator.dev.yugabyte.com/D10447
Validated on 2.4.2 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
A backup of a YSQL namespace with the Yugaware platform will hang indefinitely. The
yb_backup.py
script callsysql_dump
on a node:Because node_to_node_encryption is enabled, the
ysql_dump
utility is not able to connect to the master server. Theysql_dump
command attempts to connect to the master nodes without TLS encryption, and the master server drops the connection. Becauseysql_dump
never gets a response from the master nodes, it retries the connection indefinitely...ysql_dump
can be forced to use TLS by setting the following environment variables:I believe that the Yugaware platform either needs to set these environment variables when calling
ysql_dump
, or the client itself needs to be made aware of the master's TLS settings.The text was updated successfully, but these errors were encountered: