*** This bug is a duplicate of bug 1381379 ***
    https://bugs.launchpad.net/bugs/1381379

This is not a tempest bug, neutron is returning a 500 because of an
unhandled exception. If you look in the neutron logs you'll see a
failure in the DB layer around the typing in Postgres. This failure
should be fixed by this backport:
https://review.openstack.org/#/c/137423/

** Changed in: tempest
       Status: New => Invalid

** This bug has been marked a duplicate of bug 1381379
   Using postgresql  and creating a security group rule with protocol value as 
integer getting  DBAPIError exception

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1396356

Title:
  ovs_lilb failing to find interface

Status in OpenStack Neutron (virtual network service):
  New
Status in Tempest:
  Invalid

Bug description:
  This is failing patches in the check-tempest-dsvm-neutron-pg and
  check-tempest-dsvm-neutron-pg-2 gates. Failure example:
  http://logs.openstack.org/03/135903/1/check/check-tempest-dsvm-
  neutron-pg/eb2d9f2/

  Traceback:
  
tempest.api.network.test_security_groups.SecGroupIPv6Test.test_create_security_group_rule_with_protocol_integer_value[gate,smoke]
  2014-11-25 20:47:03.448 | 
---------------------------------------------------------------------------------------------------------------------------------
  2014-11-25 20:47:03.448 | 
  2014-11-25 20:47:03.449 | Captured traceback:
  2014-11-25 20:47:03.449 | ~~~~~~~~~~~~~~~~~~~
  2014-11-25 20:47:03.449 |     Traceback (most recent call last):
  2014-11-25 20:47:03.450 |       File 
"tempest/api/network/test_security_groups.py", line 227, in 
test_create_security_group_rule_with_protocol_integer_value
  2014-11-25 20:47:03.450 |         protocol=protocol
  2014-11-25 20:47:03.450 |       File 
"tempest/services/network/network_client_base.py", line 151, in _create
  2014-11-25 20:47:03.451 |         resp, body = self.post(uri, post_data)
  2014-11-25 20:47:03.451 |       File 
"tempest/services/network/network_client_base.py", line 74, in post
  2014-11-25 20:47:03.451 |         return self.rest_client.post(uri, body, 
headers)
  2014-11-25 20:47:03.452 |       File "tempest/common/rest_client.py", line 
234, in post
  2014-11-25 20:47:03.452 |         return self.request('POST', url, 
extra_headers, headers, body)
  2014-11-25 20:47:03.452 |       File "tempest/common/rest_client.py", line 
454, in request
  2014-11-25 20:47:03.453 |         resp, resp_body)
  2014-11-25 20:47:03.453 |       File "tempest/common/rest_client.py", line 
550, in _error_checker
  2014-11-25 20:47:03.453 |         raise exceptions.ServerFault(message)
  2014-11-25 20:47:03.454 |     ServerFault: Got server fault
  2014-11-25 20:47:03.454 |     Details: {"NeutronError": "Request Failed: 
internal server error while processing your request."}
  2014-11-25 20:47:03.454 |     Traceback (most recent call last):
  2014-11-25 20:47:03.454 |     _StringException: Empty attachments:
  2014-11-25 20:47:03.455 |       stderr
  2014-11-25 20:47:03.455 |       stdout
  2014-11-25 20:47:03.455 |     
  2014-11-25 20:47:03.456 |     pythonlogging:'': {{{
  2014-11-25 20:47:03.456 |     2014-11-25 20:17:07,635 29712 DEBUG    
[tempest.common.rest_client] Request 
(SecGroupIPv6Test:test_create_security_group_rule_with_protocol_integer_value): 
201 POST http://127.0.0.1:9696/v2.0/security-groups 0.029s
  2014-11-25 20:47:03.457 |         Request - Headers: {'Content-Type': 
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
  2014-11-25 20:47:03.457 |             Body: {"security_group": {"name": 
"secgroup--155432828"}}
  2014-11-25 20:47:03.457 |         Response - Headers: {'status': '201', 
'content-length': '829', 'connection': 'close', 'date': 'Tue, 25 Nov 2014 
20:17:07 GMT', 'content-type': 'application/json; charset=UTF-8', 
'x-openstack-request-id': 'req-671af274-78f7-4302-be84-07887880f8f8'}
  2014-11-25 20:47:03.458 |             Body: {"security_group": {"tenant_id": 
"41829285256b4b84a4bcdbf2fccf4435", "description": "", "id": 
"0bf40539-4240-4d69-a72d-3ed477b765a8", "security_group_rules": 
[{"remote_group_id": null, "direction": "egress", "remote_ip_prefix": null, 
"protocol": null, "ethertype": "IPv4", "tenant_id": 
"41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, "port_range_min": 
null, "id": "3ca48175-2821-47f3-93c0-f5b17c752adf", "security_group_id": 
"0bf40539-4240-4d69-a72d-3ed477b765a8"}, {"remote_group_id": null, "direction": 
"egress", "remote_ip_prefix": null, "protocol": null, "ethertype": "IPv6", 
"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, 
"port_range_min": null, "id": "813284c1-a71e-4b18-ab2c-5c2e2b183c44", 
"security_group_id": "0bf40539-4240-4d69-a72d-3ed477b765a8"}], "name": 
"secgroup--155432828"}}
  2014-11-25 20:47:03.458 |     2014-11-25 20:17:07,667 29712 DEBUG    
[tempest.common.rest_client] Request 
(SecGroupIPv6Test:test_create_security_group_rule_with_protocol_integer_value): 
500 POST http://127.0.0.1:9696/v2.0/security-group-rules 0.031s
  2014-11-25 20:47:03.458 |         Request - Headers: {'Content-Type': 
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
  2014-11-25 20:47:03.459 |             Body: {"security_group_rule": 
{"direction": "ingress", "protocol": 17, "security_group_id": 
"0bf40539-4240-4d69-a72d-3ed477b765a8"}}
  2014-11-25 20:47:03.459 |         Response - Headers: {'status': '500', 
'content-length': '88', 'connection': 'close', 'date': 'Tue, 25 Nov 2014 
20:17:07 GMT', 'content-type': 'application/json; charset=UTF-8', 
'x-openstack-request-id': 'req-0f9c179a-3b90-42f7-bbe4-b0bef4bf9390'}
  2014-11-25 20:47:03.459 |             Body: {"NeutronError": "Request Failed: 
internal server error while processing your request."}
  2014-11-25 20:47:03.460 |     2014-11-25 20:17:07,693 29712 DEBUG    
[tempest.common.rest_client] Request (SecGroupIPv6Test:_run_cleanups): 204 
DELETE 
http://127.0.0.1:9696/v2.0/security-groups/0bf40539-4240-4d69-a72d-3ed477b765a8 
0.024s
  2014-11-25 20:47:03.460 |         Request - Headers: {'Content-Type': 
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
  2014-11-25 20:47:03.461 |             Body: None
  2014-11-25 20:47:03.461 |         Response - Headers: {'date': 'Tue, 25 Nov 
2014 20:17:07 GMT', 'status': '204', 'connection': 'close', 'content-length': 
'0', 'x-openstack-request-id': 'req-bd53bf38-a76c-492d-8b13-87bacd0800bb'}
  2014-11-25 20:47:03.461 |             Body: 
  2014-11-25 20:47:03.462 |     2014-11-25 20:17:07,707 29712 DEBUG    
[tempest.common.rest_client] Request (SecGroupIPv6Test:_run_cleanups): 200 GET 
http://127.0.0.1:9696/v2.0/security-groups 0.013s
  2014-11-25 20:47:03.462 |         Request - Headers: {'Content-Type': 
'application/json', 'Accept': 'application/json', 'X-Auth-Token': '<omitted>'}
  2014-11-25 20:47:03.462 |             Body: None
  2014-11-25 20:47:03.463 |         Response - Headers: {'status': '200', 
'content-length': '1535', 'content-location': 
'http://127.0.0.1:9696/v2.0/security-groups', 'connection': 'close', 'date': 
'Tue, 25 Nov 2014 20:17:07 GMT', 'content-type': 'application/json; 
charset=UTF-8', 'x-openstack-request-id': 
'req-4acd67af-a88d-4679-b94d-f7a2286a5dcb'}
  2014-11-25 20:47:03.463 |             Body: {"security_groups": 
[{"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "description": "default", 
"id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9", "security_group_rules": 
[{"remote_group_id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9", "direction": 
"ingress", "remote_ip_prefix": null, "protocol": null, "ethertype": "IPv4", 
"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, 
"port_range_min": null, "id": "394a873c-9e87-4bf7-8276-7b8c44dd5c04", 
"security_group_id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9"}, 
{"remote_group_id": null, "direction": "egress", "remote_ip_prefix": null, 
"protocol": null, "ethertype": "IPv4", "tenant_id": 
"41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, "port_range_min": 
null, "id": "63991ca1-35db-406c-95de-67ed682d9339", "security_group_id": 
"b77f6461-43ba-4db1-94ba-1ae29e384fa9"}, {"remote_group_id": 
"b77f6461-43ba-4db1-94ba-1ae29e384fa9", "direction": "ingress", 
"remote_ip_prefix": null, "
 protocol": null, "ethertype": "IPv6", "tenant_id": 
"41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, "port_range_min": 
null, "id": "2805d411-3f38-40e1-9b50-943369345b83", "security_group_id": 
"b77f6461-43ba-4db1-94ba-1ae29e384fa9"}, {"remote_group_id": null, "direction": 
"egress", "remote_ip_prefix": null, "protocol": null, "ethertype": "IPv6", 
"tenant_id": "41829285256b4b84a4bcdbf2fccf4435", "port_range_max": null, 
"port_range_min": null, "id": "d61e6221-a9e1-402a-81c1-64a47b4bfdf3", 
"security_group_id": "b77f6461-43ba-4db1-94ba-1ae29e384fa9"}], "name": 
"default"}]}
  2014-11-25 20:47:03.463 |     }}}
  2014-11-25 20:47:03.464 |     
  2014-11-25 20:47:03.464 |     Traceback (most recent call last):
  2014-11-25 20:47:03.464 |       File 
"tempest/api/network/test_security_groups.py", line 227, in 
test_create_security_group_rule_with_protocol_integer_value
  2014-11-25 20:47:03.464 |         protocol=protocol
  2014-11-25 20:47:03.465 |       File 
"tempest/services/network/network_client_base.py", line 151, in _create
  2014-11-25 20:47:03.465 |         resp, body = self.post(uri, post_data)
  2014-11-25 20:47:03.465 |       File 
"tempest/services/network/network_client_base.py", line 74, in post
  2014-11-25 20:47:03.466 |         return self.rest_client.post(uri, body, 
headers)
  2014-11-25 20:47:03.466 |       File "tempest/common/rest_client.py", line 
234, in post
  2014-11-25 20:47:03.466 |         return self.request('POST', url, 
extra_headers, headers, body)
  2014-11-25 20:47:03.467 |       File "tempest/common/rest_client.py", line 
454, in request
  2014-11-25 20:47:03.467 |         resp, resp_body)
  2014-11-25 20:47:03.467 |       File "tempest/common/rest_client.py", line 
550, in _error_checker
  2014-11-25 20:47:03.467 |         raise exceptions.ServerFault(message)
  2014-11-25 20:47:03.468 |     ServerFault: Got server fault
  2014-11-25 20:47:03.468 |     Details: {"NeutronError": "Request Failed: 
internal server error while processing your request."}
  2014-11-25 20:47:03.468 |     
  2014-11-25 20:47:03.469 |     Traceback (most recent call last):
  2014-11-25 20:47:03.469 |     _StringException: Empty attachments:
  2014-11-25 20:47:03.469 |       stderr
  2014-11-25 20:47:03.470 |       stdout
  2014-11-25 20:47:03.470 |     


  The errors i see in neutron agent are:

  2014-11-25 20:15:39.455 21778 ERROR neutron.agent.linux.ovs_lib [-] Interface 
tapa7ad1b7c-8f not found.
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Traceback 
(most recent call last):
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib   File 
"/opt/stack/new/neutron/neutron/agent/linux/ovs_lib.py", line 463, in 
get_bridge_for_iface
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib     return 
utils.execute(args, root_helper=root_helper).strip()
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib   File 
"/opt/stack/new/neutron/neutron/agent/linux/utils.py", line 76, in execute
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib     raise 
RuntimeError(m)
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib RuntimeError: 
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Command: 
['sudo', '/usr/local/bin/neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'ovs-vsctl', '--timeout=10', 'iface-to-br', 'tapa7ad1b7c-8f']
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Exit code: 1
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Stdout: ''
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib Stderr: 
'ovs-vsctl: no interface named tapa7ad1b7c-8f\n'
  2014-11-25 20:15:39.455 21778 TRACE neutron.agent.linux.ovs_lib 

  and then multiple:

  014-11-25 20:15:51.629 21778 ERROR neutron.agent.linux.ovs_lib [-] Unable to 
execute ['ovs-vsctl', '--timeout=10', 'get', 'Port', u'tapfa2fdc36-32', 'tag']. 
Exception: 
  Command: ['sudo', '/usr/local/bin/neutron-rootwrap', 
'/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 
'tapfa2fdc36-32', 'tag']
  Exit code: 1
  Stdout: ''
  Stderr: 'ovs-vsctl: no row "tapfa2fdc36-32" in table Port\n'

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1396356/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to