mariadb 2025-01-10 12:43:37 0 [Note] WSREP: async IST sender starting to serve ssl://10.244.0.19:4568 send
|
ing 6-6, preload starts from 6
|
mariadb WSREP_SST: [INFO] new ssl configuration options (ssl-ca[path], ssl-cert and ssl-key) are ignored b
|
y SST due to presence of the tca[path], tcert and/or tkey in the [sst] section (20250110 12:43:37.536)
|
mariadb WSREP_SST: [INFO] SSL configuration: CA='/etc/pki/ca.crt', CAPATH='', CERT='/etc/pki/client.crt',
|
KEY='/etc/pki/client.key', MODE='DISABLED', encrypt='3' (20250110 12:43:37.540)
|
mariadb WSREP_SST: [INFO] Using openssl based encryption with socat: with key and crt (20250110 12:43:37.6
|
76)
|
mariadb WSREP_SST: [INFO] Evaluating '/usr//bin/mbstream' -c 'mariadb_backup_galera_info' 'donor_galera_in
|
fo' | socat -u stdio openssl-connect:10.244.0.19:4444,no-sni=1,cert='/etc/pki/client.crt',key='/etc/pki/cl
|
ient.key',cafile='/etc/pki/ca.crt',commonname='10.244.0.19'; RC=( ${PIPESTATUS[@]} ) (20250110 12:43:37.76
|
4)
|
mariadb 2025/01/10 12:43:37 socat[923] W OpenSSL: Warning: this implementation does not check CRLs
|
mariadb 2025-01-10 12:43:38 0 [Note] WSREP: forgetting 821b0db3-a24b (ssl://10.244.0.19:4567)
|
mariadb 2025-01-10 12:43:38 0 [Note] WSREP: forgetting 821b0db3-a24b (ssl://10.244.0.19:4567)
|
mariadb 2025-01-10 12:43:39 0 [Note] WSREP: (622e7688-b998, 'ssl://0.0.0.0:4567') turning message relay re
|
questing off
|
mariadb 2025-01-10 12:43:43 0 [Note] WSREP: cleaning up 821b0db3-a24b (ssl://10.244.0.19:4567)
|
mariadb 2025-01-10 12:44:04 0 [Note] WSREP: (622e7688-b998, 'ssl://0.0.0.0:4567') connection established t
|
o 936276b2-8d30 ssl://10.244.0.19:4567
|
mariadb 2025-01-10 12:44:05 0 [Note] WSREP: declaring 936276b2-8d30 at ssl://10.244.0.19:4567 stable
|
mariadb 2025-01-10 12:44:06 0 [Note] WSREP: async IST sender starting to serve ssl://10.244.0.19:4568 send
|
ing 8-8, preload starts from 8
|
mariadb WSREP_SST: [INFO] new ssl configuration options (ssl-ca[path], ssl-cert and ssl-key) are ignored b
|
y SST due to presence of the tca[path], tcert and/or tkey in the [sst] section (20250110 12:44:06.470)
|
mariadb WSREP_SST: [INFO] SSL configuration: CA='/etc/pki/ca.crt', CAPATH='', CERT='/etc/pki/client.crt',
|
KEY='/etc/pki/client.key', MODE='DISABLED', encrypt='3' (20250110 12:44:06.473)
|
mariadb WSREP_SST: [INFO] Using openssl based encryption with socat: with key and crt (20250110 12:44:06.6
|
11)
|
mariadb WSREP_SST: [INFO] Evaluating '/usr//bin/mbstream' -c 'mariadb_backup_galera_info' 'donor_galera_in
|
fo' | socat -u stdio openssl-connect:10.244.0.19:4444,no-sni=1,cert='/etc/pki/client.crt',key='/etc/pki/cl
|
ient.key',cafile='/etc/pki/ca.crt',commonname='10.244.0.19'; RC=( ${PIPESTATUS[@]} ) (20250110 12:44:06.71
|
4)
|
mariadb 2025/01/10 12:44:06 socat[1216] W OpenSSL: Warning: this implementation does not check CRLs
|
mariadb 2025-01-10 12:44:07 0 [Note] WSREP: forgetting 936276b2-8d30 (ssl://10.244.0.19:4567)
|
mariadb 2025-01-10 12:44:07 0 [Note] WSREP: forgetting 936276b2-8d30 (ssl://10.244.0.19:4567)
|
mariadb 2025-01-10 12:44:08 0 [Note] WSREP: (622e7688-b998, 'ssl://0.0.0.0:4567') turning message relay re
|
questing off
|
mariadb 2025-01-10 12:44:12 0
|
I have enabled encryption for the SST:
[sst]
tca=/etc/pki/ca.crt
tcert=/etc/pki/client.crt
tkey=/etc/pki/client.key
Resulting in the following logs in the donor:
questing off
questing off
The crash still happens in the donor with the same error:
mariadb
mariadb
mariadb diagnose the problem, but since we have already crashed,
mariadb
mariadb It is possible that mysqld could use up to
mariadb
mariadb WSREP: Suppressing further logging
mariadb WSREP: Shutting down network communications
mariadb
mariadb Attempting backtrace. You can use the following information to find out
mariadb terribly wrong...
I see that we are passing the container IP as `commonname='10.244.0.19';` , whereas the certificate is not valid for the container IP, as IPs are ephemeral in Kubernetes. Could this be related? In any case, it shouldn't be causing a crash I'm guessing?