yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #58173
[Bug 1636950] [NEW] Set network connection timeout on Keystone Identity's LDAP backend to prevent stall on bind
Public bug reported:
In our Mitaka deployment when setting up the Identity driver to use an
external LDAP backend, if the URL of the LDAP server is incorrect or
there is a network connectivity issue, it is seen that the ldap driver
would stall indefinately (or until TCP timeout).
This effects both LDAP connection pools and SimpleLDAP
The LDAP configuration stanza (keystone.conf) provides a
"pool_connection_timeout" option however this is not used anywhere
within the LDAP driver.
We have employed a fix downstream in our deployment which is to use this
pool_connection_timeout value and set it as ldap.OPT_NETWORK_TIMEOUT so
that the LDAP connection times out at the prescribed value without
stalling indefinitely at the LDAP bind.
** Affects: keystone
Importance: Undecided
Assignee: Kam Nasim (knasim-wrs)
Status: New
** Changed in: keystone
Assignee: (unassigned) => Kam Nasim (knasim-wrs)
** Description changed:
- In our deployment when setting up the Identity driver to use an external
- LDAP backend, if the URL of the LDAP server is incorrect or there is a
- network connectivity issue, it is seen that the ldap driver would stall
- indefinately (or until TCP timeout).
+ In our Mitaka deployment when setting up the Identity driver to use an
+ external LDAP backend, if the URL of the LDAP server is incorrect or
+ there is a network connectivity issue, it is seen that the ldap driver
+ would stall indefinately (or until TCP timeout).
This effects both LDAP connection pools and SimpleLDAP
The LDAP configuration stanza (keystone.conf) provides a
"pool_connection_timeout" option however this is not used anywhere
within the LDAP driver.
We have employed a fix downstream in our deployment which is to use this
pool_connection_timeout value and set it as ldap.OPT_NETWORK_TIMEOUT so
that the LDAP connection times out at the prescribed value without
stalling indefinitely at the LDAP bind.
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1636950
Title:
Set network connection timeout on Keystone Identity's LDAP backend to
prevent stall on bind
Status in OpenStack Identity (keystone):
New
Bug description:
In our Mitaka deployment when setting up the Identity driver to use an
external LDAP backend, if the URL of the LDAP server is incorrect or
there is a network connectivity issue, it is seen that the ldap driver
would stall indefinately (or until TCP timeout).
This effects both LDAP connection pools and SimpleLDAP
The LDAP configuration stanza (keystone.conf) provides a
"pool_connection_timeout" option however this is not used anywhere
within the LDAP driver.
We have employed a fix downstream in our deployment which is to use
this pool_connection_timeout value and set it as
ldap.OPT_NETWORK_TIMEOUT so that the LDAP connection times out at the
prescribed value without stalling indefinitely at the LDAP bind.
To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1636950/+subscriptions
Follow ups