First thing first, CONGRATULATIONS on getting to 1.0 milestone! Kudos to the entire team! Really happy to see that.
I have the current openziti set up in AWS in non HA mode. I am thinking to deploy a new controller in HA mode in EKS and then make current controller as a member of the HA config. Would that work?
How would I move the existing bolt db to HA config?
How does the DB part work if controller is deployed in EKS?
First thing first, CONGRATULATIONS on getting to 1.0 milestone! Kudos to the entire team! Really happy to see that.
Thanks! Appreciate you coming along on the journey
I have the current openziti set up in AWS in non HA mode. I am thinking to deploy a new controller in HA mode in EKS and then make current controller as a member of the HA config. Would that work?
How would I move the existing bolt db to HA config?
We've got the start of an upgrade guide here There are also a few temporary feature flags you'll need to set in the router and Go SDK, which are documented in the developer setup.
I would recommend converting your existing controller to run in HA mode. The upgrade will show you how to initialize the cluster using your existing bolt DB.
How does the DB part work if controller is deployed in EKS?
Let me know if that makes sense, or if we can clarify anything. Doc still needs some cleanup and needs to be pushed to the official doc site before official release.
Keep in mind the open issues noted in the 1.1.0 release notes for HA alpha2. We're working on fixing those last couple of things and should have a beta1 release out next week. After that, we'll be testing, polishing, etc.
Is the remaining part of the quickstart pki OK?
Does the root CA already have the "trust-domain" part, or the --explict spiffe-id makes it superfluous?
After restarting my controller with the raft part and the update server certificate, I should have a running one node cluster. That's right?
How do I add the second node?
I presume the command 'ziti agent cluster add' does require an already deployed controller.
How should I deploy the new controller? Migrating the configuration, pki included, changing the controller name and creating appropriate server certificate?
Sorry for the long and quite confused post, but I'm trying to figure out the whole process.
We are working on finalizing this doc still. So you're catching us right in the middle of getting that doc out. Paul merged some doc JUST TODAY you can find at Operating a Controller Cluster | OpenZiti
Let's start there and move on once you have a look at my reply
Thank you very much Clint!
I was hoping to see one of yours scripts
I have a daily scheduled backup (using tar over sshfs and the router itself as terminator) so I should be pretty safe.
I will try to understand and then apply your instructions ASAP.
I will give a feedback when ready
I believe you mean the spiffed id? I believe those should unique, yes but in the same trust domain. see Controller Certificates | OpenZiti. This example relies on the trust domain being discovered in the root/intermediate (which you don't have setup) so ensure you use the full spiffed id: spiffe://$EXTERNAL_DNS/controller/ctrl1|2|3 <--1, 2, 3, whatever
The cluster is started and everything seems OK. I can use services and I can use commands like "ziti fabric list circuits"
Routers are online with non config modification.
But I cannot use agent commands.as non privileged user
~$ ziti agent list
āāāāāāā¬āāāāāāāāāāāāā¬āāāāāāāāā¬āāāāāāāāāāāāāā¬āāāāāāāāāāā¬āāāāāāāāāāāāāā¬āāāāāāāāāāāā®
ā PID ā EXECUTABLE ā APP ID ā UNIX SOCKET ā APP TYPE ā APP VERSION ā APP ALIAS ā
āāāāāāā¼āāāāāāāāāāāāā¼āāāāāāāāā¼āāāāāāāāāāāāāā¼āāāāāāāāāāā¼āāāāāāāāāāāāāā¼āāāāāāāāāāāā¤
ā°āāāāāā“āāāāāāāāāāāāā“āāāāāāāāā“āāāāāāāāāāāāāā“āāāāāāāāāāā“āāāāāāāāāāāāāā“āāāāāāāāāāāāÆ
# ziti agent list
āāāāāāāāāāā¬āāāāāāāāāāāāā¬āāāāāāāāāāāā¬āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā¬āāāāāāāāāāāāā¬āāāāāāāāāāāāāā¬āāāāāāāāāāāā®
ā PID ā EXECUTABLE ā APP ID ā UNIX SOCKET ā APP TYPE ā APP VERSION ā APP ALIAS ā
āāāāāāāāāāā¼āāāāāāāāāāāāā¼āāāāāāāāāāāā¼āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā¼āāāāāāāāāāāāā¼āāāāāāāāāāāāāā¼āāāāāāāāāāāā¤
ā 3753058 ā ziti ā CgSdT-w9Z ā /tmp/gops-agent.3753058.sock ā router ā v1.2.2 ā ā
ā 3759557 ā ziti ā oci ā /tmp/gops-agent.3759557.sock ā controller ā v1.2.2 ā ā
ā°āāāāāāāāāā“āāāāāāāāāāāāā“āāāāāāāāāāāā“āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā“āāāāāāāāāāāāā“āāāāāāāāāāāāāā“āāāāāāāāāāāāÆ
# ziti agent cluster list -p 3759557
āāāāāāā¬āāāāāāāāāāāāāāāāāāāāāāāāāā¬āāāāāāāā¬āāāāāāāāā¬āāāāāāāāāā¬āāāāāāāāāāāā®
ā ID ā ADDRESS ā VOTER ā LEADER ā VERSION ā CONNECTED ā
āāāāāāā¼āāāāāāāāāāāāāāāāāāāāāāāāāā¼āāāāāāāā¼āāāāāāāāā¼āāāāāāāāāā¼āāāāāāāāāāāā¤
ā oci ā tls:ziti.xxxxxx.xx:8440 ā true ā true ā v1.2.2 ā true ā
ā°āāāāāā“āāāāāāāāāāāāāāāāāāāāāāāāāā“āāāāāāāā“āāāāāāāāā“āāāāāāāāāā“āāāāāāāāāāāāÆ
This is by design. The ipc socket will be owned by whatever user started the server. If you run as root, it's owned by root and you'll need to be root to access the socket.
I don't think there's a way to set the ownership of the socket to a group. I'll ask around or point someone here to comment if there's a way to somehow encourage the ownership to be assigned to a group as well.
I wasn't aware that the quickstart was running as root
I changed the systemd unit file to run as ziti and I added the CAP_NET_BIND_SERVICE capability to open reserved ports.
Now everything work like a charm
Is ziti edge db snapshot still working to do backups?
I would expect it to, I'd suspect permission issues after modifying systemd. If it's not, it's probably good to put this one issue to bed and start up a new thread.