Closed mike00151 closed 9 years ago
Ok, so here is the fix: Put this into your Profile
export DOCKER_TAG_CLOUDBREAK=0.4.14
Then the same process as before:
cbd generate
cbd pull
cbd start && cbd logs
Thanks for the reply.
The previous ERROR fixed
But there comes the next error.
My openstack IP is http://10.5.0.11
And the API Endpoints of identity is http://10.5.0.11:5000/v2.0
But no mater I use http://10.5.0.11
or http://10.5.0.11:5000/v2.0
as credential endpoint
It appears error log
Endpoint with http://10.5.0.11
cloudbreak_1 | 2015-05-04 16:33:19,324 [http-nio-8080-exec-8] create:69 DEBUG c.s.c.s.c.SimpleCredentialService - [owner:undefined] [type:OPENSTACKCREDENTIAL] [id:undefined] [name:undefined] Creating credential: [User: 'admin@example.com', Account: 'seq1234567']
cloudbreak_1 | 2015-05-04 16:33:19,348 [http-nio-8080-exec-8] validateCredential:80 ERROR c.s.c.s.c.o.OpenStackCredentialHandler - [owner:undefined] [type:OPENSTACKCREDENTIAL] [id:undefined] [name:undefined] Failed to authenticate with OpenStack on endpoint: http://10.5.0.11
cloudbreak_1 | java.lang.NullPointerException: null
cloudbreak_1 | at org.openstack4j.openstack.internal.OSAuthenticator.authenticateV2(OSAuthenticator.java:78) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.internal.OSAuthenticator.invoke(OSAuthenticator.java:41) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.client.OSClientBuilder$ClientV2.authenticate(OSClientBuilder.java:84) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.client.OSClientBuilder$ClientV2.authenticate(OSClientBuilder.java:65) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.stack.connector.openstack.OpenStackUtil.createOSClient(OpenStackUtil.java:31) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.validateCredential(OpenStackCredentialHandler.java:74) [cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.init(OpenStackCredentialHandler.java:40) [cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.init(OpenStackCredentialHandler.java:20) [cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.SimpleCredentialService.create(SimpleCredentialService.java:70) [cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.controller.CredentialController.createCredential(CredentialController.java:157) [cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.controller.CredentialController.savePrivateCredential(CredentialController.java:55) [cloudbreak.jar!/:na]
cloudbreak_1 | at sun.reflect.GeneratedMethodAccessor88.invoke(Unknown Source) ~[na:na]
cloudbreak_1 | at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[na:1.7.0_75]
cloudbreak_1 | at java.lang.reflect.Method.invoke(Method.java:606) ~[na:1.7.0_75]
cloudbreak_1 | at org.springframework.web.method.support.InvocableHandlerMethod.invoke(InvocableHandlerMethod.java:215) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:132) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:104) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandleMethod(RequestMappingHandlerAdapter.java:749) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:689) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:83) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:938) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:870) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:961) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:863) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at javax.servlet.http.HttpServlet.service(HttpServlet.java:646) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:837) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilter(WebRequestTraceFilter.java:115) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextFilterConfiguration$1.doFilterInternal(EndpointWebMvcAutoConfiguration.java:137) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:118) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:84) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:113) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:103) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:154) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:45) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at com.sequenceiq.cloudbreak.conf.SecurityConfig$ScimAccountGroupReaderFilter.doFilterInternal(SecurityConfig.java:152) [cloudbreak.jar!/:na]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.oauth2.provider.authentication.OAuth2AuthenticationProcessingFilter.doFilter(OAuth2AuthenticationProcessingFilter.java:140) [spring-security-oauth2-2.0.3.RELEASE.jar!/:na]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:110) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:57) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:87) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:50) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:192) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:160) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.autoconfigure.MetricFilterAutoConfiguration$MetricsFilter.doFilterInternal(MetricFilterAutoConfiguration.java:85) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:501) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:683) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:98) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:408) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1040) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:607) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1721) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1679) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) [na:1.7.0_75]
cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) [na:1.7.0_75]
cloudbreak_1 | at java.lang.Thread.run(Thread.java:745) [na:1.7.0_75]
cloudbreak_1 | 2015-05-04 16:33:19,366 [http-nio-8080-exec-8] badRequest:42 ERROR c.s.c.c.ExceptionControllerAdvice - [owner:cloudbreak] [type:cloudbreakLog] [id:undefined] [name:cb] Failed to authenticate with OpenStack on endpoint: http://10.5.0.11
cloudbreak_1 | com.sequenceiq.cloudbreak.controller.BadRequestException: Failed to authenticate with OpenStack on endpoint: http://10.5.0.11
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.validateCredential(OpenStackCredentialHandler.java:81) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.init(OpenStackCredentialHandler.java:40) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.init(OpenStackCredentialHandler.java:20) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.SimpleCredentialService.create(SimpleCredentialService.java:70) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.controller.CredentialController.createCredential(CredentialController.java:157) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.controller.CredentialController.savePrivateCredential(CredentialController.java:55) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at sun.reflect.GeneratedMethodAccessor88.invoke(Unknown Source) ~[na:na]
cloudbreak_1 | at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[na:1.7.0_75]
cloudbreak_1 | at java.lang.reflect.Method.invoke(Method.java:606) ~[na:1.7.0_75]
cloudbreak_1 | at org.springframework.web.method.support.InvocableHandlerMethod.invoke(InvocableHandlerMethod.java:215) ~[spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:132) ~[spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:104) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandleMethod(RequestMappingHandlerAdapter.java:749) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:689) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:83) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:938) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:870) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:961) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:863) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at javax.servlet.http.HttpServlet.service(HttpServlet.java:646) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:837) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilter(WebRequestTraceFilter.java:115) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextFilterConfiguration$1.doFilterInternal(EndpointWebMvcAutoConfiguration.java:137) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:118) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:84) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:113) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:103) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:154) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:45) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at com.sequenceiq.cloudbreak.conf.SecurityConfig$ScimAccountGroupReaderFilter.doFilterInternal(SecurityConfig.java:152) [cloudbreak.jar!/:na]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.oauth2.provider.authentication.OAuth2AuthenticationProcessingFilter.doFilter(OAuth2AuthenticationProcessingFilter.java:140) [spring-security-oauth2-2.0.3.RELEASE.jar!/:na]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:110) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:57) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:87) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:50) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:192) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:160) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.autoconfigure.MetricFilterAutoConfiguration$MetricsFilter.doFilterInternal(MetricFilterAutoConfiguration.java:85) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:501) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:683) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:98) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:408) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1040) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:607) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1721) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1679) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) [na:1.7.0_75]
cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) [na:1.7.0_75]
cloudbreak_1 | at java.lang.Thread.run(Thread.java:745) [na:1.7.0_75]
cloudbreak_1 | Caused by: java.lang.NullPointerException: null
cloudbreak_1 | at org.openstack4j.openstack.internal.OSAuthenticator.authenticateV2(OSAuthenticator.java:78) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.internal.OSAuthenticator.invoke(OSAuthenticator.java:41) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.client.OSClientBuilder$ClientV2.authenticate(OSClientBuilder.java:84) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.client.OSClientBuilder$ClientV2.authenticate(OSClientBuilder.java:65) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.stack.connector.openstack.OpenStackUtil.createOSClient(OpenStackUtil.java:31) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.validateCredential(OpenStackCredentialHandler.java:74) ~[cloudbreak.jar!/:na]
cloudbreak_1 | ... 87 common frames omitted
uluwatu_1 | POST /user/credentials 400 244.098 ms - 81
Endpoint with http://10.5.0.11:5000/v2.0
cloudbreak_1 | 2015-05-04 16:35:20,820 [http-nio-8080-exec-7] create:69 DEBUG c.s.c.s.c.SimpleCredentialService - [owner:undefined] [type:OPENSTACKCREDENTIAL] [id:undefined] [name:undefined] Creating credential: [User: 'admin@example.com', Account: 'seq1234567']
cloudbreak_1 | 2015-05-04 16:35:21,252 [http-nio-8080-exec-7] serverError:93 ERROR c.s.c.c.ExceptionControllerAdvice - [owner:cloudbreak] [type:cloudbreakLog] [id:undefined] [name:cb] java.net.UnknownHostException: controller
cloudbreak_1 | org.openstack4j.api.exceptions.ConnectionException: java.net.UnknownHostException: controller
cloudbreak_1 | at org.openstack4j.connectors.jersey2.HttpExecutorServiceImpl.invoke(HttpExecutorServiceImpl.java:58) ~[openstack4j-jersey2-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.connectors.jersey2.HttpExecutorServiceImpl.execute(HttpExecutorServiceImpl.java:33) ~[openstack4j-jersey2-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.core.transport.internal.HttpExecutor.execute(HttpExecutor.java:51) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.internal.BaseOpenStackService$Invocation.execute(BaseOpenStackService.java:159) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.internal.BaseOpenStackService$Invocation.execute(BaseOpenStackService.java:154) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.openstack.compute.internal.KeypairServiceImpl.list(KeypairServiceImpl.java:27) ~[openstack4j-2.0.0.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.createCredentialIfAbsent(OpenStackCredentialHandler.java:58) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.init(OpenStackCredentialHandler.java:41) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.openstack.OpenStackCredentialHandler.init(OpenStackCredentialHandler.java:20) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.service.credential.SimpleCredentialService.create(SimpleCredentialService.java:70) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.controller.CredentialController.createCredential(CredentialController.java:157) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at com.sequenceiq.cloudbreak.controller.CredentialController.savePrivateCredential(CredentialController.java:55) ~[cloudbreak.jar!/:na]
cloudbreak_1 | at sun.reflect.GeneratedMethodAccessor88.invoke(Unknown Source) ~[na:na]
cloudbreak_1 | at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[na:1.7.0_75]
cloudbreak_1 | at java.lang.reflect.Method.invoke(Method.java:606) ~[na:1.7.0_75]
cloudbreak_1 | at org.springframework.web.method.support.InvocableHandlerMethod.invoke(InvocableHandlerMethod.java:215) ~[spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:132) ~[spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:104) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandleMethod(RequestMappingHandlerAdapter.java:749) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:689) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:83) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:938) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:870) ~[spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:961) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:863) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at javax.servlet.http.HttpServlet.service(HttpServlet.java:646) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:837) [spring-webmvc-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilter(WebRequestTraceFilter.java:115) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextFilterConfiguration$1.doFilterInternal(EndpointWebMvcAutoConfiguration.java:137) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:118) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:84) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:113) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:103) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:154) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:45) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at com.sequenceiq.cloudbreak.conf.SecurityConfig$ScimAccountGroupReaderFilter.doFilterInternal(SecurityConfig.java:152) [cloudbreak.jar!/:na]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.oauth2.provider.authentication.OAuth2AuthenticationProcessingFilter.doFilter(OAuth2AuthenticationProcessingFilter.java:140) [spring-security-oauth2-2.0.3.RELEASE.jar!/:na]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:110) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:57) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:87) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:50) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:192) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:160) [spring-security-web-3.2.3.RELEASE.jar!/:3.2.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.springframework.boot.actuate.autoconfigure.MetricFilterAutoConfiguration$MetricsFilter.doFilterInternal(MetricFilterAutoConfiguration.java:85) [spring-boot-actuator-1.0.2.RELEASE.jar!/:1.0.2.RELEASE]
cloudbreak_1 | at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:108) [spring-web-4.0.3.RELEASE.jar!/:4.0.3.RELEASE]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:501) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:683) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:98) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:408) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1040) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:607) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1721) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1679) [tomcat-embed-core-7.0.52.jar!/:7.0.52]
cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) [na:1.7.0_75]
cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) [na:1.7.0_75]
cloudbreak_1 | at java.lang.Thread.run(Thread.java:745) [na:1.7.0_75]
cloudbreak_1 | Caused by: javax.ws.rs.ProcessingException: java.net.UnknownHostException: controller
cloudbreak_1 | at org.glassfish.jersey.client.HttpUrlConnector.apply(HttpUrlConnector.java:229) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.client.ClientRuntime.invoke(ClientRuntime.java:224) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.client.JerseyInvocation$1.call(JerseyInvocation.java:656) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.client.JerseyInvocation$1.call(JerseyInvocation.java:653) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.internal.Errors.process(Errors.java:315) ~[jersey-common-2.11.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.internal.Errors.process(Errors.java:297) ~[jersey-common-2.11.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.internal.Errors.process(Errors.java:228) ~[jersey-common-2.11.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.process.internal.RequestScope.runInScope(RequestScope.java:424) ~[jersey-common-2.11.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.client.JerseyInvocation.invoke(JerseyInvocation.java:653) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.client.JerseyInvocation$Builder.method(JerseyInvocation.java:388) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.openstack4j.connectors.jersey2.HttpCommand.execute(HttpCommand.java:86) ~[openstack4j-jersey2-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.connectors.jersey2.HttpExecutorServiceImpl.invokeRequest(HttpExecutorServiceImpl.java:65) ~[openstack4j-jersey2-2.0.0.jar!/:na]
cloudbreak_1 | at org.openstack4j.connectors.jersey2.HttpExecutorServiceImpl.invoke(HttpExecutorServiceImpl.java:56) ~[openstack4j-jersey2-2.0.0.jar!/:na]
cloudbreak_1 | ... 93 common frames omitted
cloudbreak_1 | Caused by: java.net.UnknownHostException: controller
cloudbreak_1 | at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:178) ~[na:1.7.0_75]
cloudbreak_1 | at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392) ~[na:1.7.0_75]
cloudbreak_1 | at java.net.Socket.connect(Socket.java:579) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.NetworkClient.doConnect(NetworkClient.java:175) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.http.HttpClient.openServer(HttpClient.java:432) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.http.HttpClient.openServer(HttpClient.java:527) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.http.HttpClient.<init>(HttpClient.java:211) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.http.HttpClient.New(HttpClient.java:308) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.http.HttpClient.New(HttpClient.java:326) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.protocol.http.HttpURLConnection.getNewHttpClient(HttpURLConnection.java:997) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.protocol.http.HttpURLConnection.plainConnect(HttpURLConnection.java:933) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.protocol.http.HttpURLConnection.connect(HttpURLConnection.java:851) ~[na:1.7.0_75]
cloudbreak_1 | at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1301) ~[na:1.7.0_75]
cloudbreak_1 | at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:468) ~[na:1.7.0_75]
cloudbreak_1 | at org.glassfish.jersey.client.HttpUrlConnector._apply(HttpUrlConnector.java:321) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | at org.glassfish.jersey.client.HttpUrlConnector.apply(HttpUrlConnector.java:227) ~[jersey-client-2.10.1.jar!/:na]
cloudbreak_1 | ... 105 common frames omitted
uluwatu_1 | POST /user/credentials 500 603.545 ms - 35
It seem that it is an issue in the openstack4j library. We've seen this issue maybe @akanto can elaborate on this.
Hi,
Form your log it seems that you got a UnknownHostException for the host name 'controller'.
cloudbreak_1 | 2015-05-04 16:35:21,252 [http-nio-8080-exec-7] serverError:93 ERROR c.s.c.c.ExceptionControllerAdvice - [owner:cloudbreak] [type:cloudbreakLog] [id:undefined] [name:cb] java.net.UnknownHostException: controller
This is most probably because you have registered your service into keystone with the 'controller' hostname and not with IP address.
The quick workaround is that you add the '10.5.0.11 controller' to the /etc/hosts file where the cloudbreak is running.
It seems that the openstack4j library does not really handles such cases correctly and it throws just an NPE.
Attila
Thanks for the reply.
After I add the 10.5.0.11 controller
to the /etc/hosts in cloudbreak container, the problem solved.
Then it comes next exception
cloudbreak_1 | 2015-05-06 02:30:42,802 [http-nio-8080-exec-10] badRequest:42 ERROR c.s.c.c.ExceptionControllerAdvice - [owner:cloudbreak] [type:cloudbreakLog] [id:undefined] [name:cb] OpenStack image: packer-cloudbreak-centos-2015-03-11 not found
Where can I download the image?
You can download the image from here: https://s3-eu-west-1.amazonaws.com/cb-openstack-images/packer-cloudbreak-centos-2015-03-11.img
Please import it as QCOW.
Thank you @akanto .
I will download the image.
And by the way.
When I create the cluster, the only Region
I can choose is local
(Im not sure it is a bug)
And the created heat template will failed with
Create_Failed: Resource CREATE failed: NotFound: Volume type not found. (HTTP 404) (Request-ID: req-a0820d20-4902-4318-9e9b-563b6b26d0a9)
Here is the created template
description: 'Heat OpenStack-native for Ambari
'
heat_template_version: '2014-10-16'
outputs:
instance_uuid_cbgateway_0:
value:
get_attr: [ambari_cbgateway_0, show, id]
instance_uuid_master_0:
value:
get_attr: [ambari_master_0, show, id]
instance_uuid_slave1_0:
value:
get_attr: [ambari_slave1_0, show, id]
instance_uuid_slave2_0:
value:
get_attr: [ambari_slave2_0, show, id]
parameters:
app_net_cidr: {default: 10.0.0.0/16, description: app network address (CIDR notation),
type: string}
app_net_gateway: {default: 10.0.0.1, description: app network gateway address, type: string}
app_net_pool_end: {default: 10.0.255.254, description: End of app network IP address
allocation pool, type: string}
app_net_pool_start: {default: 10.0.0.4, description: Start of app network IP address
allocation pool, type: string}
image_id: {default: Ubuntu 14.04 LTS amd64, description: ID of the image, type: string}
key_name: {description: Name of a KeyPair to enable SSH access to the instance,
type: string}
public_net_id: {description: The ID of the public network. You will need to replace
it with your DevStack public network ID, type: string}
tenant_id: {description: ID of the tenant, type: string}
resources:
ambari_app_port_cbgateway_0:
properties:
fixed_ips:
- subnet_id: {get_resource: app_subnet}
network_id: {get_resource: app_network}
replacement_policy: AUTO
security_groups:
- {get_resource: server_security_group}
type: OS::Neutron::Port
ambari_app_port_master_0:
properties:
fixed_ips:
- subnet_id: {get_resource: app_subnet}
network_id: {get_resource: app_network}
replacement_policy: AUTO
security_groups:
- {get_resource: server_security_group}
type: OS::Neutron::Port
ambari_app_port_slave1_0:
properties:
fixed_ips:
- subnet_id: {get_resource: app_subnet}
network_id: {get_resource: app_network}
replacement_policy: AUTO
security_groups:
- {get_resource: server_security_group}
type: OS::Neutron::Port
ambari_app_port_slave2_0:
properties:
fixed_ips:
- subnet_id: {get_resource: app_subnet}
network_id: {get_resource: app_network}
replacement_policy: AUTO
security_groups:
- {get_resource: server_security_group}
type: OS::Neutron::Port
ambari_cbgateway_0:
properties:
flavor: m1.small
image: {get_param: image_id}
key_name: {get_param: key_name}
metadata: {cb_instance_group_name: cbgateway, cb_instance_private_id: '0'}
networks:
- port: {get_resource: ambari_app_port_cbgateway_0}
user_data:
str_replace:
params:
public_net_id: {get_param: public_net_id}
template: "#!/bin/bash\nMETADATA_HASH=6ec3be550a3a3ff6534086618db816bf\n\
CONSUL_SERVER_COUNT=3\nAMBARI_DOCKER_TAG=1.7.0-consul\nMETADATA_ADDRESS=\n\
\n: ${CONSUL_IMAGE:=sequenceiq/consul:v0.4.1.ptr}\n: ${CONSUL_WATCH_IMAGE:=sequenceiq/docker-consul-watch-plugn:1.7.0-consul}\n\
\nset -x\n\nget_ip() {\n ifconfig eth0 | awk '/inet addr/{print substr($2,6)}'\n\
}\n\nfix_hostname() {\n if grep -q $(get_ip) /etc/hosts ;then\n sed\
\ -i \"/$(get_ip)/d\" /etc/hosts\n else\n echo OK\n fi\n}\n\nget_vpc_peers()\
\ {\n if [ -z \"$METADATA_RESULT\" ]; then\n METADATA_STATUS=204\n\
\ while [ $METADATA_STATUS -ne 200 ]; do\n METADATA_STATUS=$(curl\
\ -sk -m 10 -o /tmp/metadata_result -w \"%{http_code}\" -X GET -H Content-Type:application/json\
\ $METADATA_ADDRESS/stacks/metadata/$METADATA_HASH);\n [ $METADATA_STATUS\
\ -ne 200 ] && sleep 5;\n done\n\n [ $METADATA_STATUS -ne 200 ]\
\ && exit 1;\n fi\n\n METADATA_RESULT=$(cat /tmp/metadata_result)\n\
\ echo $METADATA_RESULT | jq .[].privateIp -r\n}\n\nmeta_order() {\n\
\ get_vpc_peers | xargs -n 1 | sort | cat -n | sed 's/ *//;s/\\t/ /'\n\
}\n\nmy_order() {\n local myip=$(get_ip)\n meta_order | grep \"\\b${myip}$\"\
\ | cut -d\" \" -f 1\n}\n\nconsul_join_ip() {\n meta_order | head -1\
\ | cut -d\" \" -f 2\n}\n\nstart_consul() {\n get_consul_opts\n docker\
\ rm -f consul &> /dev/null\n docker run -d --name consul --net=host\
\ --restart=always $CONSUL_IMAGE $CONSUL_OPTIONS\n}\n\nget_consul_opts()\
\ {\n CONSUL_OPTIONS=\"-advertise $(get_ip)\"\n\n if does_cluster_exist;\
\ then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS -retry-join $leader\"\n \
\ else\n if [ $(my_order) -gt 1 ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -retry-join $(consul_join_ip)\"\n fi\n\n if [ $(my_order) -le\
\ \"$CONSUL_SERVER_COUNT\" ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -server -bootstrap-expect $CONSUL_SERVER_COUNT\"\n fi\n fi\n}\n\n\
start_consul_watch() {\n docker rm -f consul-watch &> /dev/null\n docker\
\ run -d --name consul-watch --privileged --net=host --restart=always\
\ -e TRACE=1 -e BRIDGE_IP=$(get_ip) -v /var/run/docker.sock:/var/run/docker.sock\
\ $CONSUL_WATCH_IMAGE\n}\n\ndoes_cluster_exist() {\n ip_arr=($(get_vpc_peers))\n\
\ for ip in \"${ip_arr[@]}\"; do\n leader=$(curl -s -m 2 ${ip}:8500/v1/status/leader|jq\
\ . -r)\n if [ -n \"$leader\" ]; then\n leader=${leader%:*}\n\
\ return 0\n fi\n done\n return 1\n}\n\nconsul_leader() {\n\
\ local leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq . -r)\n \
\ while [ -z \"$leader\" ]; do\n sleep 1\n leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq\
\ . -r)\n done\n echo ${leader%:*}\n}\n\ncon() {\n declare path=\"\
$1\"\n shift\n local consul_ip=127.0.0.1\n\n curl ${consul_ip}:8500/v1/${path}\
\ \"$@\"\n}\n\nregister_ambari() {\n JSON=$(cat <<ENDOFJSON\n {\n \
\ \"ID\":\"$(hostname -i):ambari:8080\",\n \"Name\":\"ambari-8080\"\
,\n \"Port\":8080,\n \"Check\":null\n }\nENDOFJSON\n )\n\n \
\ con agent/service/register -X PUT -d @- <<<\"$JSON\"\n}\n\nstart_ambari_server()\
\ {\n docker rm -f ambari-server &>/dev/null\n docker run -d --name=ambari_db\
\ --privileged --restart=always -v /data/ambari-server/pgsql/data:/var/lib/postgresql/data\
\ -e POSTGRES_PASSWORD=bigdata -e POSTGRES_USER=ambari postgres:9.4.1\n\
\ docker run -d --name=ambari-server --privileged --net=host --restart=always\
\ -e POSTGRES_DB=$(docker inspect -f \"{{.NetworkSettings.IPAddress}}\"\
\ ambari_db) -e BRIDGE_IP=$(get_ip) sequenceiq/ambari:$AMBARI_DOCKER_TAG\
\ /start-server\n register_ambari\n}\n\nset_disk_as_volumes() {\n for\
\ fn in `ls /hadoopfs/ | grep fs`; do\n VOLUMES=\"$VOLUMES -v /hadoopfs/$fn:/hadoopfs/$fn\"\
\n done\n}\n\nformat_disks() {\n /usr/local/disk_mount.sh\n}\n\nmain()\
\ {\n if [[ \"$1\" == \"::\" ]]; then\n shift\n eval \"$@\"\n \
\ else\n format_disks\n fix_hostname\n start_consul\n consul_leader\n\
\ start_ambari_server\n start_consul_watch\n fi\n}\n\n[[ \"$0\"\
\ == \"$BASH_SOURCE\" ]] && main \"$@\"\n"
user_data_format: RAW
type: OS::Nova::Server
ambari_master_0:
properties:
flavor: m1.small
image: {get_param: image_id}
key_name: {get_param: key_name}
metadata: {cb_instance_group_name: master, cb_instance_private_id: '0'}
networks:
- port: {get_resource: ambari_app_port_master_0}
user_data:
str_replace:
params:
public_net_id: {get_param: public_net_id}
template: "#!/bin/bash\nMETADATA_HASH=6ec3be550a3a3ff6534086618db816bf\n\
CONSUL_SERVER_COUNT=3\nAMBARI_DOCKER_TAG=1.7.0-consul\nMETADATA_ADDRESS=\n\
\n: ${CONSUL_IMAGE:=sequenceiq/consul:v0.4.1.ptr}\n: ${CONSUL_WATCH_IMAGE:=sequenceiq/docker-consul-watch-plugn:1.7.0-consul}\n\
\nset -x\n\nget_ip() {\n ifconfig eth0 | awk '/inet addr/{print substr($2,6)}'\n\
}\n\nfix_hostname() {\n if grep -q $(get_ip) /etc/hosts ;then\n sed\
\ -i \"/$(get_ip)/d\" /etc/hosts\n else\n echo OK\n fi\n}\n\nget_vpc_peers()\
\ {\n if [ -z \"$METADATA_RESULT\" ]; then\n METADATA_STATUS=204\n\
\ while [ $METADATA_STATUS -ne 200 ]; do\n METADATA_STATUS=$(curl\
\ -sk -m 10 -o /tmp/metadata_result -w \"%{http_code}\" -X GET -H Content-Type:application/json\
\ $METADATA_ADDRESS/stacks/metadata/$METADATA_HASH);\n [ $METADATA_STATUS\
\ -ne 200 ] && sleep 5;\n done\n\n [ $METADATA_STATUS -ne 200 ]\
\ && exit 1;\n fi\n\n METADATA_RESULT=$(cat /tmp/metadata_result)\n\
\ echo $METADATA_RESULT | jq .[].privateIp -r\n}\n\nmeta_order() {\n\
\ get_vpc_peers | xargs -n 1 | sort | cat -n | sed 's/ *//;s/\\t/ /'\n\
}\n\nmy_order() {\n local myip=$(get_ip)\n meta_order | grep \"\\b${myip}$\"\
\ | cut -d\" \" -f 1\n}\n\nconsul_join_ip() {\n meta_order | head -1\
\ | cut -d\" \" -f 2\n}\n\nstart_consul() {\n get_consul_opts\n docker\
\ rm -f consul &> /dev/null\n docker run -d --name consul --net=host\
\ --restart=always $CONSUL_IMAGE $CONSUL_OPTIONS\n}\n\nget_consul_opts()\
\ {\n CONSUL_OPTIONS=\"-advertise $(get_ip)\"\n\n if does_cluster_exist;\
\ then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS -retry-join $leader\"\n \
\ else\n if [ $(my_order) -gt 1 ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -retry-join $(consul_join_ip)\"\n fi\n\n if [ $(my_order) -le\
\ \"$CONSUL_SERVER_COUNT\" ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -server -bootstrap-expect $CONSUL_SERVER_COUNT\"\n fi\n fi\n}\n\n\
start_consul_watch() {\n docker rm -f consul-watch &> /dev/null\n docker\
\ run -d --name consul-watch --privileged --net=host --restart=always\
\ -e TRACE=1 -e BRIDGE_IP=$(get_ip) -v /var/run/docker.sock:/var/run/docker.sock\
\ $CONSUL_WATCH_IMAGE\n}\n\ndoes_cluster_exist() {\n ip_arr=($(get_vpc_peers))\n\
\ for ip in \"${ip_arr[@]}\"; do\n leader=$(curl -s -m 2 ${ip}:8500/v1/status/leader|jq\
\ . -r)\n if [ -n \"$leader\" ]; then\n leader=${leader%:*}\n\
\ return 0\n fi\n done\n return 1\n}\n\nconsul_leader() {\n\
\ local leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq . -r)\n \
\ while [ -z \"$leader\" ]; do\n sleep 1\n leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq\
\ . -r)\n done\n echo ${leader%:*}\n}\n\ncon() {\n declare path=\"\
$1\"\n shift\n local consul_ip=127.0.0.1\n\n curl ${consul_ip}:8500/v1/${path}\
\ \"$@\"\n}\n\nstart_ambari_agent() {\n set_public_host_script\n set_disk_as_volumes\n\
\ docker run -d --name=ambari-agent --privileged --net=host --restart=always\
\ -e BRIDGE_IP=$(get_ip) -e HADOOP_CLASSPATH=/data/jars/*:/usr/lib/hadoop/lib/*\
\ -v /data/jars:/data/jars $VOLUMES sequenceiq/ambari:$AMBARI_DOCKER_TAG\
\ /start-agent\n}\n\nset_disk_as_volumes() {\n for fn in `ls /hadoopfs/\
\ | grep fs`; do\n VOLUMES=\"$VOLUMES -v /hadoopfs/$fn:/hadoopfs/$fn\"\
\n done\n}\n\nset_public_host_script() {\n VOLUMES=\"$VOLUMES -v /usr/local/public_host_script.sh:/etc/ambari-agent/conf/public-hostname.sh\"\
\n}\n\nformat_disks() {\n /usr/local/disk_mount.sh\n}\n\nmain() {\n \
\ if [[ \"$1\" == \"::\" ]]; then\n shift\n eval \"$@\"\n else\n\
\ format_disks\n fix_hostname\n start_consul\n consul_leader\n\
\ start_ambari_agent\n start_consul_watch\n fi\n}\n\n[[ \"$0\"\
\ == \"$BASH_SOURCE\" ]] && main \"$@\"\n"
user_data_format: RAW
type: OS::Nova::Server
ambari_server_floatingip_cbgateway_0:
properties:
floating_network_id: {get_param: public_net_id}
port_id: {get_resource: ambari_app_port_cbgateway_0}
type: OS::Neutron::FloatingIP
ambari_server_floatingip_master_0:
properties:
floating_network_id: {get_param: public_net_id}
port_id: {get_resource: ambari_app_port_master_0}
type: OS::Neutron::FloatingIP
ambari_server_floatingip_slave1_0:
properties:
floating_network_id: {get_param: public_net_id}
port_id: {get_resource: ambari_app_port_slave1_0}
type: OS::Neutron::FloatingIP
ambari_server_floatingip_slave2_0:
properties:
floating_network_id: {get_param: public_net_id}
port_id: {get_resource: ambari_app_port_slave2_0}
type: OS::Neutron::FloatingIP
ambari_slave1_0:
properties:
flavor: m1.small
image: {get_param: image_id}
key_name: {get_param: key_name}
metadata: {cb_instance_group_name: slave_1, cb_instance_private_id: '0'}
networks:
- port: {get_resource: ambari_app_port_slave1_0}
user_data:
str_replace:
params:
public_net_id: {get_param: public_net_id}
template: "#!/bin/bash\nMETADATA_HASH=6ec3be550a3a3ff6534086618db816bf\n\
CONSUL_SERVER_COUNT=3\nAMBARI_DOCKER_TAG=1.7.0-consul\nMETADATA_ADDRESS=\n\
\n: ${CONSUL_IMAGE:=sequenceiq/consul:v0.4.1.ptr}\n: ${CONSUL_WATCH_IMAGE:=sequenceiq/docker-consul-watch-plugn:1.7.0-consul}\n\
\nset -x\n\nget_ip() {\n ifconfig eth0 | awk '/inet addr/{print substr($2,6)}'\n\
}\n\nfix_hostname() {\n if grep -q $(get_ip) /etc/hosts ;then\n sed\
\ -i \"/$(get_ip)/d\" /etc/hosts\n else\n echo OK\n fi\n}\n\nget_vpc_peers()\
\ {\n if [ -z \"$METADATA_RESULT\" ]; then\n METADATA_STATUS=204\n\
\ while [ $METADATA_STATUS -ne 200 ]; do\n METADATA_STATUS=$(curl\
\ -sk -m 10 -o /tmp/metadata_result -w \"%{http_code}\" -X GET -H Content-Type:application/json\
\ $METADATA_ADDRESS/stacks/metadata/$METADATA_HASH);\n [ $METADATA_STATUS\
\ -ne 200 ] && sleep 5;\n done\n\n [ $METADATA_STATUS -ne 200 ]\
\ && exit 1;\n fi\n\n METADATA_RESULT=$(cat /tmp/metadata_result)\n\
\ echo $METADATA_RESULT | jq .[].privateIp -r\n}\n\nmeta_order() {\n\
\ get_vpc_peers | xargs -n 1 | sort | cat -n | sed 's/ *//;s/\\t/ /'\n\
}\n\nmy_order() {\n local myip=$(get_ip)\n meta_order | grep \"\\b${myip}$\"\
\ | cut -d\" \" -f 1\n}\n\nconsul_join_ip() {\n meta_order | head -1\
\ | cut -d\" \" -f 2\n}\n\nstart_consul() {\n get_consul_opts\n docker\
\ rm -f consul &> /dev/null\n docker run -d --name consul --net=host\
\ --restart=always $CONSUL_IMAGE $CONSUL_OPTIONS\n}\n\nget_consul_opts()\
\ {\n CONSUL_OPTIONS=\"-advertise $(get_ip)\"\n\n if does_cluster_exist;\
\ then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS -retry-join $leader\"\n \
\ else\n if [ $(my_order) -gt 1 ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -retry-join $(consul_join_ip)\"\n fi\n\n if [ $(my_order) -le\
\ \"$CONSUL_SERVER_COUNT\" ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -server -bootstrap-expect $CONSUL_SERVER_COUNT\"\n fi\n fi\n}\n\n\
start_consul_watch() {\n docker rm -f consul-watch &> /dev/null\n docker\
\ run -d --name consul-watch --privileged --net=host --restart=always\
\ -e TRACE=1 -e BRIDGE_IP=$(get_ip) -v /var/run/docker.sock:/var/run/docker.sock\
\ $CONSUL_WATCH_IMAGE\n}\n\ndoes_cluster_exist() {\n ip_arr=($(get_vpc_peers))\n\
\ for ip in \"${ip_arr[@]}\"; do\n leader=$(curl -s -m 2 ${ip}:8500/v1/status/leader|jq\
\ . -r)\n if [ -n \"$leader\" ]; then\n leader=${leader%:*}\n\
\ return 0\n fi\n done\n return 1\n}\n\nconsul_leader() {\n\
\ local leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq . -r)\n \
\ while [ -z \"$leader\" ]; do\n sleep 1\n leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq\
\ . -r)\n done\n echo ${leader%:*}\n}\n\ncon() {\n declare path=\"\
$1\"\n shift\n local consul_ip=127.0.0.1\n\n curl ${consul_ip}:8500/v1/${path}\
\ \"$@\"\n}\n\nstart_ambari_agent() {\n set_public_host_script\n set_disk_as_volumes\n\
\ docker run -d --name=ambari-agent --privileged --net=host --restart=always\
\ -e BRIDGE_IP=$(get_ip) -e HADOOP_CLASSPATH=/data/jars/*:/usr/lib/hadoop/lib/*\
\ -v /data/jars:/data/jars $VOLUMES sequenceiq/ambari:$AMBARI_DOCKER_TAG\
\ /start-agent\n}\n\nset_disk_as_volumes() {\n for fn in `ls /hadoopfs/\
\ | grep fs`; do\n VOLUMES=\"$VOLUMES -v /hadoopfs/$fn:/hadoopfs/$fn\"\
\n done\n}\n\nset_public_host_script() {\n VOLUMES=\"$VOLUMES -v /usr/local/public_host_script.sh:/etc/ambari-agent/conf/public-hostname.sh\"\
\n}\n\nformat_disks() {\n /usr/local/disk_mount.sh\n}\n\nmain() {\n \
\ if [[ \"$1\" == \"::\" ]]; then\n shift\n eval \"$@\"\n else\n\
\ format_disks\n fix_hostname\n start_consul\n consul_leader\n\
\ start_ambari_agent\n start_consul_watch\n fi\n}\n\n[[ \"$0\"\
\ == \"$BASH_SOURCE\" ]] && main \"$@\"\n"
user_data_format: RAW
type: OS::Nova::Server
ambari_slave2_0:
properties:
flavor: m1.small
image: {get_param: image_id}
key_name: {get_param: key_name}
metadata: {cb_instance_group_name: slave_2, cb_instance_private_id: '0'}
networks:
- port: {get_resource: ambari_app_port_slave2_0}
user_data:
str_replace:
params:
public_net_id: {get_param: public_net_id}
template: "#!/bin/bash\nMETADATA_HASH=6ec3be550a3a3ff6534086618db816bf\n\
CONSUL_SERVER_COUNT=3\nAMBARI_DOCKER_TAG=1.7.0-consul\nMETADATA_ADDRESS=\n\
\n: ${CONSUL_IMAGE:=sequenceiq/consul:v0.4.1.ptr}\n: ${CONSUL_WATCH_IMAGE:=sequenceiq/docker-consul-watch-plugn:1.7.0-consul}\n\
\nset -x\n\nget_ip() {\n ifconfig eth0 | awk '/inet addr/{print substr($2,6)}'\n\
}\n\nfix_hostname() {\n if grep -q $(get_ip) /etc/hosts ;then\n sed\
\ -i \"/$(get_ip)/d\" /etc/hosts\n else\n echo OK\n fi\n}\n\nget_vpc_peers()\
\ {\n if [ -z \"$METADATA_RESULT\" ]; then\n METADATA_STATUS=204\n\
\ while [ $METADATA_STATUS -ne 200 ]; do\n METADATA_STATUS=$(curl\
\ -sk -m 10 -o /tmp/metadata_result -w \"%{http_code}\" -X GET -H Content-Type:application/json\
\ $METADATA_ADDRESS/stacks/metadata/$METADATA_HASH);\n [ $METADATA_STATUS\
\ -ne 200 ] && sleep 5;\n done\n\n [ $METADATA_STATUS -ne 200 ]\
\ && exit 1;\n fi\n\n METADATA_RESULT=$(cat /tmp/metadata_result)\n\
\ echo $METADATA_RESULT | jq .[].privateIp -r\n}\n\nmeta_order() {\n\
\ get_vpc_peers | xargs -n 1 | sort | cat -n | sed 's/ *//;s/\\t/ /'\n\
}\n\nmy_order() {\n local myip=$(get_ip)\n meta_order | grep \"\\b${myip}$\"\
\ | cut -d\" \" -f 1\n}\n\nconsul_join_ip() {\n meta_order | head -1\
\ | cut -d\" \" -f 2\n}\n\nstart_consul() {\n get_consul_opts\n docker\
\ rm -f consul &> /dev/null\n docker run -d --name consul --net=host\
\ --restart=always $CONSUL_IMAGE $CONSUL_OPTIONS\n}\n\nget_consul_opts()\
\ {\n CONSUL_OPTIONS=\"-advertise $(get_ip)\"\n\n if does_cluster_exist;\
\ then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS -retry-join $leader\"\n \
\ else\n if [ $(my_order) -gt 1 ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -retry-join $(consul_join_ip)\"\n fi\n\n if [ $(my_order) -le\
\ \"$CONSUL_SERVER_COUNT\" ]; then\n CONSUL_OPTIONS=\"$CONSUL_OPTIONS\
\ -server -bootstrap-expect $CONSUL_SERVER_COUNT\"\n fi\n fi\n}\n\n\
start_consul_watch() {\n docker rm -f consul-watch &> /dev/null\n docker\
\ run -d --name consul-watch --privileged --net=host --restart=always\
\ -e TRACE=1 -e BRIDGE_IP=$(get_ip) -v /var/run/docker.sock:/var/run/docker.sock\
\ $CONSUL_WATCH_IMAGE\n}\n\ndoes_cluster_exist() {\n ip_arr=($(get_vpc_peers))\n\
\ for ip in \"${ip_arr[@]}\"; do\n leader=$(curl -s -m 2 ${ip}:8500/v1/status/leader|jq\
\ . -r)\n if [ -n \"$leader\" ]; then\n leader=${leader%:*}\n\
\ return 0\n fi\n done\n return 1\n}\n\nconsul_leader() {\n\
\ local leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq . -r)\n \
\ while [ -z \"$leader\" ]; do\n sleep 1\n leader=$(curl -s 127.0.0.1:8500/v1/status/leader|jq\
\ . -r)\n done\n echo ${leader%:*}\n}\n\ncon() {\n declare path=\"\
$1\"\n shift\n local consul_ip=127.0.0.1\n\n curl ${consul_ip}:8500/v1/${path}\
\ \"$@\"\n}\n\nstart_ambari_agent() {\n set_public_host_script\n set_disk_as_volumes\n\
\ docker run -d --name=ambari-agent --privileged --net=host --restart=always\
\ -e BRIDGE_IP=$(get_ip) -e HADOOP_CLASSPATH=/data/jars/*:/usr/lib/hadoop/lib/*\
\ -v /data/jars:/data/jars $VOLUMES sequenceiq/ambari:$AMBARI_DOCKER_TAG\
\ /start-agent\n}\n\nset_disk_as_volumes() {\n for fn in `ls /hadoopfs/\
\ | grep fs`; do\n VOLUMES=\"$VOLUMES -v /hadoopfs/$fn:/hadoopfs/$fn\"\
\n done\n}\n\nset_public_host_script() {\n VOLUMES=\"$VOLUMES -v /usr/local/public_host_script.sh:/etc/ambari-agent/conf/public-hostname.sh\"\
\n}\n\nformat_disks() {\n /usr/local/disk_mount.sh\n}\n\nmain() {\n \
\ if [[ \"$1\" == \"::\" ]]; then\n shift\n eval \"$@\"\n else\n\
\ format_disks\n fix_hostname\n start_consul\n consul_leader\n\
\ start_ambari_agent\n start_consul_watch\n fi\n}\n\n[[ \"$0\"\
\ == \"$BASH_SOURCE\" ]] && main \"$@\"\n"
user_data_format: RAW
type: OS::Nova::Server
ambari_volume_attach_cbgateway_0_0:
properties:
instance_uuid: {get_resource: ambari_cbgateway_0}
mountpoint: /dev/vdb
volume_id: {get_resource: ambari_volume_cbgateway_0_0}
type: OS::Cinder::VolumeAttachment
ambari_volume_attach_master_0_0:
properties:
instance_uuid: {get_resource: ambari_master_0}
mountpoint: /dev/vdb
volume_id: {get_resource: ambari_volume_master_0_0}
type: OS::Cinder::VolumeAttachment
ambari_volume_attach_slave1_0_0:
properties:
instance_uuid: {get_resource: ambari_slave1_0}
mountpoint: /dev/vdb
volume_id: {get_resource: ambari_volume_slave1_0_0}
type: OS::Cinder::VolumeAttachment
ambari_volume_attach_slave2_0_0:
properties:
instance_uuid: {get_resource: ambari_slave2_0}
mountpoint: /dev/vdb
volume_id: {get_resource: ambari_volume_slave2_0_0}
type: OS::Cinder::VolumeAttachment
ambari_volume_cbgateway_0_0:
properties: {name: hdfs-volume, size: 100, volume_type: lvmdriver-1}
type: OS::Cinder::Volume
ambari_volume_master_0_0:
properties: {name: hdfs-volume, size: 100, volume_type: lvmdriver-1}
type: OS::Cinder::Volume
ambari_volume_slave1_0_0:
properties: {name: hdfs-volume, size: 100, volume_type: lvmdriver-1}
type: OS::Cinder::Volume
ambari_volume_slave2_0_0:
properties: {name: hdfs-volume, size: 100, volume_type: lvmdriver-1}
type: OS::Cinder::Volume
app_network:
properties:
admin_state_up: true
name: app_network
shared: true
tenant_id: {get_param: tenant_id}
type: OS::Neutron::Net
app_subnet:
properties:
allocation_pools:
- end: {get_param: app_net_pool_end}
start: {get_param: app_net_pool_start}
cidr: {get_param: app_net_cidr}
gateway_ip: {get_param: app_net_gateway}
network_id: {get_resource: app_network}
type: OS::Neutron::Subnet
router: {type: 'OS::Neutron::Router'}
router_gateway:
properties:
network_id: {get_param: public_net_id}
router_id: {get_resource: router}
type: OS::Neutron::RouterGateway
router_interface:
properties:
router_id: {get_resource: router}
subnet_id: {get_resource: app_subnet}
type: OS::Neutron::RouterInterface
server_security_group:
properties:
description: Cloudbreak security group
name: cb-sec-group
rules:
- {port_range_max: 22, port_range_min: 22, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8080, port_range_min: 8080, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8500, port_range_min: 8500, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 50070, port_range_min: 50070, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8088, port_range_min: 8088, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8030, port_range_min: 8030, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8050, port_range_min: 8050, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 19888, port_range_min: 19888, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 60010, port_range_min: 60010, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 15000, port_range_min: 15000, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8744, port_range_min: 8744, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 11000, port_range_min: 11000, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 8042, port_range_min: 8042, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 9999, port_range_min: 9999, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 9998, port_range_min: 9998, protocol: tcp, remote_ip_prefix: 0.0.0.0/0}
- {port_range_max: 65535, port_range_min: 1, protocol: tcp, remote_ip_prefix: 10.0.0.0/16}
- {port_range_max: 65535, port_range_min: 1, protocol: udp, remote_ip_prefix: 10.0.0.0/16}
- {protocol: icmp, remote_ip_prefix: 10.0.0.0/16}
type: OS::Neutron::SecurityGroup
Thanks. The 'local' region is a bug but it means that the CB is using the default region and you are not able to select even if you have multiple regions. We will fix it.
Regarding the error: we are attaching Cinder Volumes to store the HDFS data on it. The type of Volume is defaulted to lvmdriver-1 and it seems that your installation does not have such type.
{code} properties: {name: hdfs-volume, size: 100, volume_type: lvmdriver-1} type: OS::Cinder::Volume {code}
We definitely need to make it configurable on Cloudbreak UI, but at the moment as a workaround you need to set up the lvmdriver-1 on your OpenStack.
Hello
I already download the image and create cinder type lvmdriver-1.
The heat template and the VMs create successfully.
But all the VM shows the log repeatedly
++ awk '/inet addr/{print substr($2,6)}'
++ ifconfig eth0
+ CONSUL_OPTIONS='-advertise 10.0.0.7'
+ does_cluster_exist
+ ip_arr=($(get_vpc_peers))
++ get_vpc_peers
++ '[' -z '' ']'
++ METADATA_STATUS=204
++ '[' 204 -ne 200 ']'
+++ curl -sk -m 10 -o /tmp/metadata_result -w '%{http_code}' -X GET -H Content-Type:application/json http://2cfca73c.ngrok.com/stacks/metadata/652ad65df8b02f84b1a84715d28a8a2b
++ METADATA_STATUS=000
++ '[' 000 -ne 200 ']'
++ sleep 5
++ '[' 000 -ne 200 ']'
+++ curl -sk -m 10 -o /tmp/metadata_result -w '%{http_code}' -X GET -H Content-Type:application/json http://2cfca73c.ngrok.com/stacks/metadata/652ad65df8b02f84b1a84715d28a8a2b
++ METADATA_STATUS=000
++ '[' 000 -ne 200 ']'
++ sleep 5
++ '[' 000 -ne 200 ']'
+++ curl -sk -m 10 -o /tmp/metadata_result -w '%{http_code}' -X GET -H Content-Type:application/json http://2cfca73c.ngrok.com/stacks/metadata/652ad65df8b02f84b1a84715d28a8a2b
++ METADATA_STATUS=000
++ '[' 000 -ne 200 ']'
++ sleep 5
++ '[' 000 -ne 200 ']'
+++ curl -sk -m 10 -o /tmp/metadata_result -w '%{http_code}' -X GET -H Content-Type:application/json http://2cfca73c.ngrok.com/stacks/metadata/652ad65df8b02f84b1a84715d28a8a2b
++ METADATA_STATUS=000
++ '[' 000 -ne 200 ']'
++ sleep 5
++ '[' 000 -ne 200 ']'
+++ curl -sk -m 10 -o /tmp/metadata_result -w '%{http_code}' -X GET -H Content-Type:application/json http://2cfca73c.ngrok.com/stacks/metadata/652ad65df8b02f84b1a84715d28a8a2b
++ METADATA_STATUS=000
++ '[' 000 -ne 200 ']'
++ sleep 5
++ '[' 000 -ne 200 ']'
+++ curl -sk -m 10 -o /tmp/metadata_result -w '%{http_code}' -X GET -H Content-Type:application/json http://2cfca73c.ngrok.com/stacks/metadata/652ad65df8b02f84b1a84715d28a8a2b
++ METADATA_STATUS=000
++ '[' 000 -ne 200 ']'
++ sleep 5
And finally, the cluster create fail with timeout
ambassador_1 | 2015/05/08 07:40:03 172.17.0.3:37412 -> node1.node.dc1.consul.:32768
cloudbreak_1 | 2015-05-08 07:40:07,967 [thread-pool-executor-dispatcher-83] pollWithTimeout:32 INFO c.s.c.s.PollingService - [owner:6968f238-670b-4b4b-88cc-a275213c00c7] [type:STACK] [id:104] [name:cluster6] Polling attempt 35.
cloudbreak_1 | 2015-05-08 07:40:07,969 [thread-pool-executor-dispatcher-83] checkStatus:26 INFO c.s.c.s.s.c.o.OpenStackHeatStackStatusCheckerTask - [owner:6968f238-670b-4b4b-88cc-a275213c00c7] [type:STACK] [id:104] [name:cluster6] Checking OpenStack Heat stack status of: cluster6 to reach: DELETE_COMPLETE
cloudbreak_1 | 2015-05-08 07:40:13,066 [thread-pool-executor-dispatcher-83] pollWithTimeout:32 INFO c.s.c.s.PollingService - [owner:6968f238-670b-4b4b-88cc-a275213c00c7] [type:STACK] [id:104] [name:cluster6] Polling attempt 36.
cloudbreak_1 | 2015-05-08 07:40:13,067 [thread-pool-executor-dispatcher-83] checkStatus:26 INFO c.s.c.s.s.c.o.OpenStackHeatStackStatusCheckerTask - [owner:6968f238-670b-4b4b-88cc-a275213c00c7] [type:STACK] [id:104] [name:cluster6] Checking OpenStack Heat stack status of: cluster6 to reach: DELETE_COMPLETE
cloudbreak_1 | 2015-05-08 07:40:18,167 [thread-pool-executor-dispatcher-83] pollWithTimeout:32 INFO c.s.c.s.PollingService - [owner:6968f238-670b-4b4b-88cc-a275213c00c7] [type:STACK] [id:104] [name:cluster6] Polling attempt 37.
Is there something I can do with this issue ?
Hi,
Thanks for reporting this issue. It has been fixed and we have released the 0.5.0 version of cbd where the metadata callback have been eliminated and the VMs are correctly provisioned.
In order to update to latest cbd version please use cbd update (please remove the docker tags from your Profile file and re-generate the yml files)
Attila
Actually 0.5.0 is not yet released, (will be later today). But you still can test it from master:
cbd update master
rm *.yml
cbd start
It will take a couple of minutes (depending on your network) as it will download new images.
Hello
Here is my deploy step
curl https://raw.githubusercontent.com/sequenceiq/cloudbreak-deployer/master/install | sh
cbd update
cbd generate
cbd start
And I failed to credential my private openstack.
It appears "Openstack credential create failed : Internal server error" on UI
Here is the logs from cdb logs commands
Here is the generated
docker-compose.yml
fileAnd here is the generated
uaa.yml
fileHere is my docker version
And cbd with version command