Hi there,
I am attempting to setup a license server on a management cluster. I installed px-central with the license server and exposed the server port 7070 with a loadbalancer. Executing pxctl license setls <ip>:7070/fne/bin/capability
results in the following error:
ERROR: Could not set license server: Error processing license response: FLX-MSG error code:33 (Unable to process request: Server instance PDMQ3BPKGWWD is not ready)
Does anyone have an idea on what I can try to fix it? I am looking into three things:
- Px-central deployment is actually faulty, perhaps the license server needs it somehow?
- ip tables rule for ssh not added correctly (ip tables not running as service on node)
- License server does not have the licenses (these need to be added via the pxcentral frontend?)
Hi, an update on this issue:
I managed to bring the px-central deployment up and am able to access the frontend now. However, the license server is not enabled in px-central.
According to: Add licenses to your clusters using Portworx Central on-premises
I should see a button on the left sidebar for the license server, but I only see a button for adding the cluster.
Does anyone know how can I troubleshoot the license server not being enabled? Is this something that should be handled by the post-install-job?
Hi, in the values.yaml did you enable license server?
---
persistentStorage:
enabled: true
storageClassName: "portworx-sc"
cassandra:
storage: "64Gi"
grafana:
storage: "20Gi"
consul:
storage: "8Gi"
alertManager:
storage: "2Gi"
ingester:
storage: "2Gi"
mysqlVolumeSize: "100Gi"
etcdVolumeSize: "64Gi"
mongodbVolumeSize: "64Gi"
mongoCacheSize: "4"
keycloakThemeVolumeSize: "5Gi"
keycloakBackendVolumeSize: "10Gi"
storkRequired: false
nodeAffinityLabel: ""
podAntiAffinity: false
pxcentralDBPassword: "Password1"
caCertsSecretName: ""
oidc:
centralOIDC:
enabled: true
defaultUsername: "admin"
defaultPassword: "admin"
defaultEmail: "admin@portworx.com"
keyCloakBackendUserName: "keycloak"
keyCloakBackendPassword: "keycloak"
clientId: "pxcentral"
updateAdminProfile: true
externalOIDC:
enabled: false
clientID: ""
clientSecret: ""
endpoint: ""
postInstallJob:
sslEnabled: true
pxbackup:
enabled: true
orgName: "default"
callHome: true
mongoMigration: "complete"
livenessProbeInitialDelay: 1800
pxlicenseserver:
enabled: true
internal:
enabled: true
lsTypeUAT: false
lsTypeAirgapped: false
external:
enabled: false
mainNodeIP: ""
backupNodeIP: ""
adminUserName: "admin"
adminUserPassword: "Adm1n!Ur"
pxmonitor:
enabled: true
pxCentralEndpoint: "central.apps.<Cluster FQDN>.com"
sslEnabled: false
oidcClientID: "pxcentral"
consulBindInterface: ""
cortex:
alertmanager:
advertiseAddress: ""
service:
pxCentralUIServiceType: "LoadBalancer"
pxBackupUIServiceType: "LoadBalancer"
grafanaServiceType: "NodePort"
cortexNginxServiceType: "NodePort"
cassandra:
jvm:
maxHeapSize: ""
newHeapSize: ""
installCRDs: false
clusterDomain: "cluster.local"
cassandraUsername: "cassandra"
cassandraPassword: "cassandra"
operatorToChartUpgrade: false
securityContext:
runAsUser: 1000
fsGroup: 1000
runAsNonRoot: true
images:
pullSecrets:
- "docregistry-secret"
pullPolicy: "Always"
pxcentralApiServerImage:
registry: "docker.io"
repo: "portworx"
imageName: "pxcentral-onprem-api"
tag: "2.4.2"
pxcentralFrontendImage:
registry: "docker.io"
repo: "portworx"
imageName: "pxcentral-onprem-ui-frontend"
tag: "2.4.2"
pxcentralBackendImage:
registry: "docker.io"
repo: "portworx"
imageName: "pxcentral-onprem-ui-backend"
tag: "2.4.2"
pxcentralMiddlewareImage:
registry: "docker.io"
repo: "portworx"
imageName: "pxcentral-onprem-ui-lhbackend"
tag: "2.4.2"
postInstallSetupImage:
registry: "docker.io"
repo: "portworx"
imageName: "pxcentral-onprem-post-setup"
tag: "2.4.2"
keycloakBackendImage:
registry: "docker.io"
repo: "portworx"
imageName: "postgresql"
tag: "11.19.0-debian-11-r1"
keycloakFrontendImage:
registry: "docker.io"
repo: "portworx"
imageName: "keycloak"
tag: "16.1.1"
keycloakLoginThemeImage:
registry: "docker.io"
repo: "portworx"
imageName: "keycloak-login-theme"
tag: "2.2.0"
keycloakInitContainerImage:
registry: "docker.io"
repo: "portworx"
imageName: "busybox"
tag: "1.31"
mysqlImage:
registry: "docker.io"
repo: "portworx"
imageName: "mysql"
tag: "5.7.41"
## Images required for enabling px-backup
pxBackupImage:
registry: "docker.io"
repo: "portworx"
imageName: "px-backup"
tag: "2.4.2"
mongodbImage:
registry: "docker.io"
repo: "portworx"
imageName: "mongodb"
tag: "5.0.14-debian-11-r27"
## Images required for enabling px-license-server
licenseServerImage:
registry: "docker.io"
repo: "portworx"
imageName: "px-els"
tag: "2.3.2"
## Images required for enabling px-monitor
cortexImage:
registry: "docker.io"
repo: "portworx"
imageName: "cortex"
tag: "v1.13.1"
cassandraImage:
registry: "docker.io"
repo: "portworx"
imageName: "cassandra"
tag: "4.0.7-debian-11-r34"
proxyConfigImage:
registry: "docker.io"
repo: "portworx"
imageName: "nginx"
tag: "1.23.3-alpine-slim"
consulImage:
registry: "docker.io"
repo: "portworx"
imageName: "consul"
tag: "1.14.4-debian-11-r4"
dnsmasqImage:
registry: "docker.io"
repo: "portworx"
imageName: "go-dnsmasq"
tag: "release-1.0.7-v3"
grafanaImage:
registry: "docker.io"
repo: "portworx"
imageName: "grafana"
tag: "9.1.3"
prometheusImage:
registry: "docker.io"
repo: "portworx"
imageName: "prometheus"
tag: "v2.35.0"
prometheusConfigReloadrImage:
registry: "docker.io"
repo: "portworx"
imageName: "prometheus-config-reloader"
tag: "v0.56.3"
prometheusOperatorImage:
registry: "docker.io"
repo: "portworx"
imageName: "prometheus-operator"
tag: "v0.56.3"
memcachedMetricsImage:
registry: "docker.io"
repo: "portworx"
imageName: "memcached-exporter"
tag: "v0.10.0"
memcachedIndexImage:
registry: "docker.io"
repo: "portworx"
imageName: "memcached"
tag: "1.6.17-alpine"
memcachedImage:
registry: "docker.io"
repo: "portworx"
imageName: "memcached"
tag: "1.6.17-alpine"