-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Jw/nexus update cloud config #2892
Jw/nexus update cloud config #2892
Conversation
What does it mean? I don't think we've seen this before nor if it's even possible. Other rules we create just before needing them work fine... |
@JaimieWi thank you for putting this together :) did you try deploying with only the azure archive package added - i.e. without repo.almalinux.org? Curious whether that's actually needed |
We have seen this before unfortunately (PR #2811 was supposed to add a workaround but as Jaimie has found it seems it was missing these two packages) - essentially the pipeline has to run main first to generate the required terraform outputs, and then run the firewall step. Because the cloud-init bootstrapping can vary in the time it takes, sometimes when that's kicked off, the firewall step has chance to complete, and sometimes it doesn't. For getting Nexus running reliably in the short term I don't think we've got much choice in adding these extra repositories to the core subnet whitelist. It is indeed a single app however most TRE installations require it as it's needed for Guacamole URs. I opened up an issue for the original bug to modify the pipeline logic so we can get terraform outputs required by the firewall step without having to run main first (#2816), this is a bigger change but will allow us to remove the application rule once it's in. @marrobi thoughts here? |
@jjgriff93 Looking at the firewall logs there is nothing to say I had added it as I had seen it next to azure.archive.ubuntu in the previous deployment error logs but it seems it's not needed. |
Perfect, thanks for checking @JaimieWi - in that case I don't see any additional security concern as the |
/test |
🤖 pr-bot 🤖
(in response to this comment from @jjgriff93) |
/test 620101a |
🤖 pr-bot 🤖 🏃 Running tests: https://github.com/microsoft/AzureTRE/actions/runs/3497296534 (with refid (in response to this comment from @jjgriff93) |
I'm good with this, as @jjgriff93 says discussed previously, and is more of a case of a rule being missed and we have a "better" solution tracked. |
Resolves #2877
What is being addressed
Nexus failed to deploy correctly. The runcmd script within the cloud-config.yaml for nexus was failing to run due to the packages not being installed.
The error in the cloud-init.logs of the Nexus VM showed a 470 error for [IP: 51.132.212.186 80]. This is the
azure.archive.ubuntu.com
url.This had been added to the nexus firewall rule but, on deployment of nexus was being denied. Likely as the rule had not taken effect quick enough.
Therefore, I have added
azure.archive.ubuntu.com
andrepo.almalinux.org
to the Firewall shared service. Specifically, to the list of Target FQDNs within the nexus-bootstrap application rule collection. These were taken from the list ofnexus_allowed_fqdns
.How is this addressed
Within the Firewall shared service
firewall.tf
file, add"azure.archive.ubuntu.com", "repo.almalinux.org"
to the nexus-bootstrap application rule. This was done to ensure access during the deployment of Nexus.Add
package_update: true
to the cloud-config.yaml file to update packages on deployment. DocumentationI have not updated the CHANGELOG.md as I'm not sure it's needed. Happy to add that if it is.