Github user michaelandersen commented on the pull request:

    https://github.com/apache/cloudstack/pull/933#issuecomment-148337333
  
    the admin stats test fails because of a iptables misconfiguration on the 
ILBVM:
    === Marvin Init Logging Successful===
    Successfully created account: test-TestInternalLb-LBXE9K, id:               
     a8c1784b-2718-4d59-bf28-6e0f3c777fe0
    Starting test_02_internallb_haproxy_stats_on_all_interfaces
    Retrieving haproxy stats settings
    {'username': u'admin1', 'password': u'AdMiN123', 'stats_uri': 
u'/admin?stats', 'visibility': u'global', 'stats_port': u'8081'}
    Created network offering: 549a04f3-f73c-4a0c-abf4-57bc02325d12
    Enabled network offering: 549a04f3-f73c-4a0c-abf4-57bc02325d12
    Created VPC 2d6aa658-b46f-43f6-8fe1-bcef5993e5b9
    Created network deee9fb5-435c-4046-b15f-fe6e8b6b13fe in VPC 
2d6aa658-b46f-43f6-8fe1-bcef5993e5b9
    Deployed VM id: 4b034739-82e1-4440-8037-422cee07fd57 in VPC 
2d6aa658-b46f-43f6-8fe1-bcef5993e5b9
    Associating public IP for network: intlb_test02
    Associated 192.168.23.5 with network deee9fb5-435c-4046-b15f-fe6e8b6b13fe
    Created LB 9e54d08b-fc14-49cb-aea3-19fae5de87b9 in VPC
    Assigning virtual machines to LB: 9e54d08b-fc14-49cb-aea3-19fae5de87b9
    Creating NAT rule in network for vm with public IP
    Adding NetworkACL rules to make NAT rule accessible
    nwacl_nat={'startport': u'22', 'endport': u'22', 'aclid': 
u'38299456-ef52-40db-a6b8-d619d9ab869f', 'fordisplay': True, 'cidrlist': 
u'0.0.0.0/0', 'tags': [], 'number': 1, 'traffictype': u'Ingress', 'state': 
u'Active', 'action': u'Allow', 'protocol': u'tcp', 'id': 
u'9d678e4c-d70f-4cd5-a91b-8fe89cc745ef'}
    ====Trying SSH Connection: Host:192.168.23.5 User:root                      
             Port:22 RetryCnt:4===
    ===SSH to Host 192.168.23.5 port : 22 SUCCESSFUL===
    Trying to connect to the haproxy stats url http://10.1.2.95:8081/admin?stats
    
    
    IP tables config on the internallbvm:
    
    root@b-6-VM:~# iptables -L
    Chain INPUT (policy DROP)
    target     prot opt source               destination
    ACCEPT     all  --  anywhere             anywhere             state 
RELATED,ESTABLISHED
    ACCEPT     all  --  anywhere             anywhere             state 
RELATED,ESTABLISHED
    ACCEPT     icmp --  anywhere             anywhere
    ACCEPT     all  --  anywhere             anywhere
    ACCEPT     tcp  --  anywhere             anywhere             state NEW tcp 
dpt:3922
    ACCEPT     tcp  --  anywhere             10.1.2.95            tcp dpt:90 
state NEW
    
    Chain FORWARD (policy DROP)
    target     prot opt source               destination
    
    Chain OUTPUT (policy ACCEPT)
    target     prot opt source               destination
    root@b-6-VM:~#



---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to