Open Sanketbhandare opened 1 month ago
It looks like there is an encryption failure, so IAM cannot read anything. It looks like something is wrong with your KES configuration or back-end. Which KES provider are you using? If you store KES keys on ephemeral storage, then this is to be expected when you recreate the pod...
@ramondeklein As mentioned earlier in the issue, we're using Hashicorp vault as KES provider to store keys. KES keys are stored vault and are accessible. In one of our test environment, we've tried restarting tenant pod couple of times, and observed no issues.
If you refer the tenant logs mentioned above, it seems that something wrong in the Tenant backend, for IAM user / policy. Unable to understand the root cause for this issue.
Error: Unable to initialize config, some features may be missing:
decryption failed: ciphertext is not authentic (*fmt.wrapError)
Error: IAM sub-system is partially initialized, unable to write the IAM format:
decryption failed: ciphertext is not authentic (*fmt.wrapError)
When decryption fails, then it is typically a key failure. Did you rotate the key in Hashicorp Vault?
@ramondeklein Nope, we don't rotate key in Hashicorp vault.
@Sanketbhandare Which KES version are you using. Have you updated the KES image or updated the KES config secret? Are the KES image versions identical across all pods and did you downgrade KES from a newer to an older version at any point in time.
Which KES version are you using ? -> kes:2024-04-12T13-50-00Z Have you updated the KES image or updated the KES config secret? -> We haven't updated KES image, but KES config secret is updated due to Vault migration in our env. Secret which was updated was kes-configuration and we've replaced the the value of approle id & secret from vault.
We have other environments as well, but no migration is done in those env, but still we are observing this issue. We are unable to see default policies.
Expected Behavior
All existing users & policies should be visible on Tenant Console UI
Current Behavior
Unable to see any existing users & policies on Tenant Console UI
Possible Solution
Creation of user & policy via mc CLI command and attach / detach of policy to user based on user role & requirement.
Steps to Reproduce (for bugs)
Context
Not sure on how to reproduce this issue. Out of 3 env, 2 env are facing this issue. We've haven't performed any major activity on those cluster. We're using Longhorn as backend storage for Minio and Hashicorp Vault as KES Server secret store.
Below error logs observed in Tenant Pod:
Regression
Your Environment
minio-operator
): v5.0.15bash-5.1$ mc --version mc version RELEASE.2024-04-29T09-56-05Z (commit-id=5b7b2223717a32ff01d63d57c2d040a719ca581e) Runtime: go1.21.9 linux/amd64 Copyright (c) 2015-2024 MinIO, Inc. License GNU AGPLv3 https://www.gnu.org/licenses/agpl-3.0.html
Operating System and version (
uname -a
): Linux devk8swkr1 4.18.0-425.10.1.el8_7.x86_64 #1 SMP Thu Jan 12 10:05:00 EST 2023 x86_64 x86_64 x86_64 GNU/LinuxLink to your deployment file: