*** This bug is a duplicate of bug 1381379 ***
https://bugs.launchpad.net/bugs/1381379
This is not a tempest bug, neutron is returning a 500 because of an
unhandled exception. If you look in the neutron logs you'll see a
failure in the DB layer around the typing in Postgres. This failure
should be fixed by this backport:
https://review.openstack.org/#/c/137423/
** Changed in: tempest
Status: New => Invalid
** This bug has been marked a duplicate of bug 1381379
Using postgresql and creating a security group rule with protocol value as
integer getting DBAPIError exception
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1396356
Title:
ovs_lilb failing to find interface
Status in OpenStack Neutron (virtual network service):
New
Status in Tempest:
Invalid
Bug description:
This is failing patches in the check-tempest-dsvm-neutron-pg and
check-tempest-dsvm-neutron-pg-2 gates. Failure example:
http://logs.openstack.org/03/135903/1/check/check-tempest-dsvm-
neutron-pg/eb2d9f2/
Traceback:
tempest.api.network.test_security_groups.SecGroupIPv6Test.test_create_security_group_rule_with_protocol_integer_value[gate,smoke]
2014-11-25 20:47:03.448 |
---------------------------------------------------------------------------------------------------------------------------------
2014-11-25 20:47:03.448 |
2014-11-25 20:47:03.449 | Captured traceback:
2014-11-25 20:47:03.449 | ~~~~~~~~~~~~~~~~~~~
2014-11-25 20:47:03.449 | Traceback (most recent call last):
2014-11-25 20:47:03.450 | File
"tempest/api/network/test_security_groups.py", line 227, in
test_create_security_group_rule_with_protocol_integer_value
2014-11-25 20:47:03.450 | protocol=protocol
2014-11-25 20:47:03.450 | File
"tempest/services/network/network_client_base.py", line 151, in _create
2014-11-25 20:47:03.451 | resp, body = self.post(uri, post_data)
2014-11-25 20:47:03.451 | File
"tempest/services/network/network_client_base.py", line 74, in post
2014-11-25 20:47:03.451 | return self.rest_client.post(uri, body,
headers)
2014-11-25 20:47:03.452 | File "tempest/common/rest_client.py", line
234, in post
2014-11-25 20:47:03.452 | return self.request('POST', url,
extra_headers, headers, body)
2014-11-25 20:47:03.452 | File "tempest/common/rest_client.py", line
454, in request
2014-11-25 20:47:03.453 | resp, resp_body)
2014-11-25 20:47:03.453 | File "tempest/common/rest_client.py", line
550, in _error_checker
2014-11-25 20:47:03.453 | raise exceptions.ServerFault(message)
2014-11-25 20:47:03.454 | ServerFault: Got server fault
2014-11-25 20:47:03.454 | Details: {"NeutronError": "Request Failed:
internal server error while processing your request."}
2014-11-25 20:47:03.454 | Traceback (most recent call last):
2014-11-25 20:47:03.454 | _StringException: Empty attachments:
2014-11-25 20:47:03.455 | stderr
2014-11-25 20:47:03.455 | stdout
2014-11-25 20:47:03.455 |
2014-11-25 20:47:03.456 | pythonlogging:'': {{{
2014-11-25 20:47:03.456 | 2014-11-25 20:17:07,635 29712 DEBUG
[tempest.common.rest_client] Request
(SecGroupIPv6Test:test_create_security_group_rule_with_protocol_integer_value):
201 POST http://127.0.0.1:9696/v2.0/security-groups 0.029s
2014-11-25 20:47:03.457 | Request - Headers: {'Content-Type':
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
2014-11-25 20:47:03.457 | Body: {"security_group": {"name":
"secgroup--155432828"}}
2014-11-25 20:47:03.457 | Response - Headers: {'status': '201',
'content-length': '829', 'connection': 'close', 'date': 'Tue, 25 Nov 2014
20:17:07 GMT', 'content-type': 'application/json; charset=UTF-8',
'x-openstack-request-id': 'req-671af274-78f7-4302-be84-07887880f8f8'}
2014-11-25 20:47:03.458 | Body: {"security_group": {"tenant_id":
"41829285256b4b84a4bcdbf2fccf4435", "description": "", "id":
"0bf40539-4240-4d69-a72d-3ed477b765a8", "security_group_rules":
[{"remote_group_id": null, "direction": "egress", "remote_ip_prefix": null,
"protocol": null, "ethertype": "IPv4", "tenant_id":
"41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, "port_range_min":
null, "id": "3ca48175-2821-47f3-93c0-f5b17c752adf", "security_group_id":
"0bf40539-4240-4d69-a72d-3ed477b765a8"}, {"remote_group_id": null, "direction":
"egress", "remote_ip_prefix": null, "protocol": null, "ethertype": "IPv6",
"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null,
"port_range_min": null, "id": "813284c1-a71e-4b18-ab2c-5c2e2b183c44",
"security_group_id": "0bf40539-4240-4d69-a72d-3ed477b765a8"}], "name":
"secgroup--155432828"}}
2014-11-25 20:47:03.458 | 2014-11-25 20:17:07,667 29712 DEBUG
[tempest.common.rest_client] Request
(SecGroupIPv6Test:test_create_security_group_rule_with_protocol_integer_value):
500 POST http://127.0.0.1:9696/v2.0/security-group-rules 0.031s
2014-11-25 20:47:03.458 | Request - Headers: {'Content-Type':
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
2014-11-25 20:47:03.459 | Body: {"security_group_rule":
{"direction": "ingress", "protocol": 17, "security_group_id":
"0bf40539-4240-4d69-a72d-3ed477b765a8"}}
2014-11-25 20:47:03.459 | Response - Headers: {'status': '500',
'content-length': '88', 'connection': 'close', 'date': 'Tue, 25 Nov 2014
20:17:07 GMT', 'content-type': 'application/json; charset=UTF-8',
'x-openstack-request-id': 'req-0f9c179a-3b90-42f7-bbe4-b0bef4bf9390'}
2014-11-25 20:47:03.459 | Body: {"NeutronError": "Request Failed:
internal server error while processing your request."}
2014-11-25 20:47:03.460 | 2014-11-25 20:17:07,693 29712 DEBUG
[tempest.common.rest_client] Request (SecGroupIPv6Test:_run_cleanups): 204
DELETE
http://127.0.0.1:9696/v2.0/security-groups/0bf40539-4240-4d69-a72d-3ed477b765a8
0.024s
2014-11-25 20:47:03.460 | Request - Headers: {'Content-Type':
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
2014-11-25 20:47:03.461 | Body: None
2014-11-25 20:47:03.461 | Response - Headers: {'date': 'Tue, 25 Nov
2014 20:17:07 GMT', 'status': '204', 'connection': 'close', 'content-length':
'0', 'x-openstack-request-id': 'req-bd53bf38-a76c-492d-8b13-87bacd0800bb'}
2014-11-25 20:47:03.461 | Body:
2014-11-25 20:47:03.462 | 2014-11-25 20:17:07,707 29712 DEBUG
[tempest.common.rest_client] Request (SecGroupIPv6Test:_run_cleanups): 200 GET
http://127.0.0.1:9696/v2.0/security-groups 0.013s
2014-11-25 20:47:03.462 | Request - Headers: {'Content-Type':
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
2014-11-25 20:47:03.462 | Body: None
2014-11-25 20:47:03.463 | Response - Headers: {'status': '200',
'content-length': '1535', 'content-location':
'http://127.0.0.1:9696/v2.0/security-groups', 'connection': 'close', 'date':
'Tue, 25 Nov 2014 20:17:07 GMT', 'content-type': 'application/json;
charset=UTF-8', 'x-openstack-request-id':
'req-4acd67af-a88d-4679-b94d-f7a2286a5dcb'}
2014-11-25 20:47:03.463 | Body: {"security_groups":
[{"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "description": "default",
"id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9", "security_group_rules":
[{"remote_group_id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9", "direction":
"ingress", "remote_ip_prefix": null, "protocol": null, "ethertype": "IPv4",
"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null,
"port_range_min": null, "id": "394a873c-9e87-4bf7-8276-7b8c44dd5c04",
"security_group_id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9"},
{"remote_group_id": null, "direction": "egress", "remote_ip_prefix": null,
"protocol": null, "ethertype": "IPv4", "tenant_id":
"41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, "port_range_min":
null, "id": "63991ca1-35db-406c-95de-67ed682d9339", "security_group_id":
"b77f6461-43ba-4db1-94ba-1ae29e384fa9"}, {"remote_group_id":
"b77f6461-43ba-4db1-94ba-1ae29e384fa9", "direction": "ingress",
"remote_ip_prefix": null, "
protocol": null, "ethertype": "IPv6", "tenant_id":
"41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, "port_range_min":
null, "id": "2805d411-3f38-40e1-9b50-943369345b83", "security_group_id":
"b77f6461-43ba-4db1-94ba-1ae29e384fa9"}, {"remote_group_id": null, "direction":
"egress", "remote_ip_prefix": null, "protocol": null, "ethertype": "IPv6",
"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null,
"port_range_min": null, "id": "d61e6221-a9e1-402a-81c1-64a47b4bfdf3",
"security_group_id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9"}], "name":
"default"}]}
2014-11-25 20:47:03.463 | }}}
2014-11-25 20:47:03.464 |
2014-11-25 20:47:03.464 | Traceback (most recent call last):
2014-11-25 20:47:03.464 | File
"tempest/api/network/test_security_groups.py", line 227, in
test_create_security_group_rule_with_protocol_integer_value
2014-11-25 20:47:03.464 | protocol=protocol
2014-11-25 20:47:03.465 | File
"tempest/services/network/network_client_base.py", line 151, in _create
2014-11-25 20:47:03.465 | resp, body = self.post(uri, post_data)
2014-11-25 20:47:03.465 | File
"tempest/services/network/network_client_base.py", line 74, in post
2014-11-25 20:47:03.466 | return self.rest_client.post(uri, body,
headers)
2014-11-25 20:47:03.466 | File "tempest/common/rest_client.py", line
234, in post
2014-11-25 20:47:03.466 | return self.request('POST', url,
extra_headers, headers, body)
2014-11-25 20:47:03.467 | File "tempest/common/rest_client.py", line
454, in request
2014-11-25 20:47:03.467 | resp, resp_body)
2014-11-25 20:47:03.467 | File "tempest/common/rest_client.py", line
550, in _error_checker
2014-11-25 20:47:03.467 | raise exceptions.ServerFault(message)
2014-11-25 20:47:03.468 | ServerFault: Got server fault
2014-11-25 20:47:03.468 | Details: {"NeutronError": "Request Failed:
internal server error while processing your request."}
2014-11-25 20:47:03.468 |
2014-11-25 20:47:03.469 | Traceback (most recent call last):
2014-11-25 20:47:03.469 | _StringException: Empty attachments:
2014-11-25 20:47:03.469 | stderr
2014-11-25 20:47:03.470 | stdout
2014-11-25 20:47:03.470 |
The errors i see in neutron agent are:
2014-11-25 20:15:39.455 21778 ERROR neutron.agent.linux.ovs_lib [-] Interface
tapa7ad1b7c-8f not found.
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Traceback
(most recent call last):
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib File
"/opt/stack/new/neutron/neutron/agent/linux/ovs_lib.py", line 463, in
get_bridge_for_iface
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib return
utils.execute(args, root_helper=root_helper).strip()
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib File
"/opt/stack/new/neutron/neutron/agent/linux/utils.py", line 76, in execute
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib raise
RuntimeError(m)
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib RuntimeError:
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Command:
['sudo', '/usr/local/bin/neutron-rootwrap', '/etc/neutron/rootwrap.conf',
'ovs-vsctl', '--timeout=10', 'iface-to-br', 'tapa7ad1b7c-8f']
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Exit code: 1
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Stdout: ''
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Stderr:
'ovs-vsctl: no interface named tapa7ad1b7c-8f\n'
2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib
and then multiple:
014-11-25 20:15:51.629 21778 ERROR neutron.agent.linux.ovs_lib [-] Unable to
execute ['ovs-vsctl', '--timeout=10', 'get', 'Port', u'tapfa2fdc36-32', 'tag'].
Exception:
Command: ['sudo', '/usr/local/bin/neutron-rootwrap',
'/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port',
'tapfa2fdc36-32', 'tag']
Exit code: 1
Stdout: ''
Stderr: 'ovs-vsctl: no row "tapfa2fdc36-32" in table Port\n'
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1396356/+subscriptions
--
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help : https://help.launchpad.net/ListHelp