Hello everyone!
Currently I want to determine what information is included in messages passing from oVirt engine to VDSM on ovirt-node.
I made up a really simple configuration with one VM representing engine, another - node, a managed to successfully launch a single VM on this node. However, I have chosen to configure everything automatically. Currently traffic is encrypted with default certificates.
So, there are three options for me and no one of them really works.
1) Find the format of messages ( what the fields are, session id for example) in docs, but I didn't manage to find it;
2) Use wireshark to decrypt the traffic and the apply maybe a json -dissector to the decrypted data. I have tried many solutions ( thanks god I have rsa private and public keys but there is another session key which is generated every time engine starts to communicate with vdsm, which I cannot get with the help of sslkeylog file or ld_preload technology.
Maybe someone knows the exact methodology how to do this correctly?
3) Turn off ssl in oVirt. It is simple to do that for vdsm, but for engine, according to answers on oVirt site, I should do 2 requests to the database. I was really surprised that psql was not installed by oVirt on my system. How did it then created a default database? ( I have chosen to create all locally and with default configurations).
psql: FATAL: Peer authentication failed for user "engine"
Could you please guide my what method is the best and how should I correct my faults there?