Hi,
You need to create a domain and a user with the admin role in that domain, and then
populate magnum.conf with the IDs of that domain and user :
[trust]
trustee_domain_id =
trustee_domain_admin_id =
trustee_domain_admin_password =
I don't know for kubernetes but I personally got into more problems down the road to
create swarm bays.. so be prepared for more issues.
--
Fabien
Le 30 mai 2016 à 11:17, Edward Ahern
<Edward.Ahern(a)tecnotree.com> a écrit :
Hi,
I almost have magnum running on mitaka packstack install.
I've created a baymodel with an atomic image and kubernetes.
But I'm getting the following error:
[root@shos2 magnum(keystone_admin)]# magnum bay-create --name k8s_bay --baymodel
kubernetes
Create for bay k8s_bay failed: Failed to create trustee
e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None (HTTP 500) (Request-ID:
req-946c7096-3c75-459f-a003-5271f0acdfbd)
Logs are below. Found a few suggestions via google but not resolved so far. Any help
would be greatly appreciated. Need to have this ready for a demo later in the week.
Regards,
Ed
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
[req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Failed to create trustee
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone Traceback (most recent call
last):
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/root/magnum/magnum/common/keystone.py", line 184, in create_trustee
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone domain=domain_id)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/debtcollector/renames.py", line 45, in
wrapper
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return f(*args, **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/positional/__init__.py", line 94, in inner
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return func(*args,
**kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/v3/users.py", line 77, in
create
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone log=not bool(password))
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/base.py", line 171, in _post
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone resp, body =
self.client.post(url, body=body, **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneauth1/adapter.py", line 179, in post
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return self.request(url,
'POST', **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneauth1/adapter.py", line 331, in
request
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone resp =
super(LegacyJsonAdapter, self).request(*args, **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneauth1/adapter.py", line 98, in
request
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
self.session.request(url, method, **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/positional/__init__.py", line 94, in inner
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return func(*args,
**kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 320, in
request
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone auth_headers =
self.get_auth_headers(auth)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 638, in
get_auth_headers
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
auth.get_headers(self, **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/base.py", line 159, in
get_headers
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone token =
self.get_token(session)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/base.py", line
216, in get_token
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
self.get_access(session).auth_token
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/base.py", line
262, in get_access
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone self.auth_ref =
self.get_auth_ref(session)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v3/base.py", line
190, in get_auth_ref
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone authenticated=False,
log=False, **rkwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 520, in post
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return self.request(url,
'POST', **kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/positional/__init__.py", line 94, in inner
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return func(*args,
**kwargs)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
"/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 420, in
request
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone raise
exceptions.from_response(resp, method, url)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone BadRequest: Expecting to find
id or name in user - the server could not comply with the request since it is either
malformed or otherwise incorrect. The client is assumed to be in error. (HTTP 400)
(Request-ID: req-dcd222df-5da5-4ee9-a23c-fe163c8e9db4)
2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
[req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Exception during message
handling: Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher Traceback (most recent
call last):
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 138,
in _dispatch_and_reply
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher incoming.message))
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 183,
in _dispatch
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher return
self._do_dispatch(endpoint, method, ctxt, args)
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 127,
in _do_dispatch
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher result = func(ctxt,
**new_args)
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
"/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 143, in
bay_create
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
self._create_trustee_and_trust(osc, bay)
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
"/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 128, in
_create_trustee_and_trust
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
CONF.trust.trustee_domain_id)
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
"/root/magnum/magnum/common/keystone.py", line 188, in create_trustee
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
domain_id=domain_id)
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher TrusteeCreateFailed:
Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None
2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
2016-05-26 15:55:41.969 17399 ERROR oslo_messaging._drivers.common
[req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Returning exception Failed to
create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None to caller
2016-05-26 15:55:41.970 17399 ERROR oslo_messaging._drivers.common
[req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] ['Traceback (most recent
call last):\n', ' File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 138,
in _dispatch_and_reply\n incoming.message))\n', ' File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 183,
in _dispatch\n return self._do_dispatch(endpoint, method, ctxt, args)\n', '
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
127, in _do_dispatch\n result = func(ctxt, **new_args)\n', ' File
"/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 143, in
bay_create\n self._create_trustee_and_trust(osc, bay)\n', ' File
"/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 128, in
_create_trustee_and_trust\n CONF.trust.trustee_domain_id)\n', ' File
"/root/magnum/magnum/common/keystone.py", line 188, in create_trustee\n
domain_id=domain_id)\n', 'TrusteeCreateFailed: Failed to create trustee
e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None\n']
And
2016-05-26 15:55:42.082 17202 ERROR wsme.api [req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6
admin admin - - -] Server-side error: "Failed to create trustee
e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
138, in _dispatch_and_reply
incoming.message))
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
183, in _dispatch
return self._do_dispatch(endpoint, method, ctxt, args)
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
127, in _do_dispatch
result = func(ctxt, **new_args)
File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 143, in
bay_create
self._create_trustee_and_trust(osc, bay)
File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 128, in
_create_trustee_and_trust
CONF.trust.trustee_domain_id)
File "/root/magnum/magnum/common/keystone.py", line 188, in create_trustee
domain_id=domain_id)
TrusteeCreateFailed: Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in
domain None ". Detail:
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/wsmeext/pecan.py", line 84, in
callfunction
result = f(self, *args, **kwargs)
File "/root/magnum/magnum/api/controllers/v1/bay.py", line 299, in post
bay.bay_create_timeout)
File "/root/magnum/magnum/conductor/api.py", line 35, in bay_create
bay_create_timeout=bay_create_timeout)
File "/root/magnum/magnum/common/rpc_service.py", line 110, in _call
return self._client.call(self._context, method, *args, **kwargs)
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/client.py", line
413, in call
return self.prepare().call(ctxt, method, **kwargs)
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/client.py", line
158, in call
retry=self.retry)
File "/usr/lib/python2.7/site-packages/oslo_messaging/transport.py", line 90,
in _send
timeout=timeout, retry=retry)
File "/usr/lib/python2.7/site-packages/oslo_messaging/_drivers/amqpdriver.py",
line 470, in send
retry=retry)
File "/usr/lib/python2.7/site-packages/oslo_messaging/_drivers/amqpdriver.py",
line 461, in _send
raise result
TrusteeCreateFailed_Remote: Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2
in domain None Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
138, in _dispatch_and_reply
incoming.message))
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
183, in _dispatch
return self._do_dispatch(endpoint, method, ctxt, args)
File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
127, in _do_dispatch
result = func(ctxt, **new_args)
File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 143, in
bay_create
self._create_trustee_and_trust(osc, bay)
File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 128, in
_create_trustee_and_trust
CONF.trust.trustee_domain_id)
File "/root/magnum/magnum/common/keystone.py", line 188, in create_trustee
domain_id=domain_id)
TrusteeCreateFailed: Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in
domain None
192.168.50.247 - - [26/May/2016 15:55:42] "POST /v1/bays HTTP/1.1" 500 257
192.168.50.247 - - [26/May/2016 15:57:58] "GET /v1/bays/kubernetes HTTP/1.1"
404 172
-----Original Message-----
From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
Sent: 25 May 2016 15:25
To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
Cc: rdo-list(a)redhat.com
Subject: Re: [rdo-list] Installing Magnum on mitaka
Hi,
I'd recommend to deploy the environment from the scratch, redeploy OS and packstack
on top. Note that, if you need to re-run packstack for any reason you must use the same
answers file. I'm not sure, but that could explain the messages you are getting.
Best regards,
Alfredo
> On Wed, May 25, 2016 at 4:17 PM, Edward Ahern <Edward.Ahern(a)tecnotree.com>
wrote:
> Rebooted the vm
>
> Got a different error for first attempt
>
> [root@shos1 ~(keystone_admin)]# openstack server list Discovering
> versions from the identity service failed when creating the password plugin.
Attempting to determine version from URL.
> Unable to establish connection to
>
http://192.168.50.248:5000/v2.0/tokens
>
> Above url doesn't exist, from the debug:
>
> Making authentication request to
>
http://192.168.50.248:5000/v2.0/tokens
> Resetting dropped connection: 192.168.50.248 "POST /v2.0/tokens
> HTTP/1.1" 401 114 Request returned failure status: 401
>
> Can the url be created?
>
>
>
> Ran it in debug mode, see below
>
> [root@shos1 ~(keystone_admin)]# openstack server list --debug START
> with options: ['server', 'list', '--debug']
> options: Namespace(access_token_endpoint='', auth_type='',
> auth_url='http://192.168.50.248:5000/v2.0', cacert='',
client_id='',
> client_secret='***', cloud='', debug=True,
default_domain='default',
> deferred_help=False, domain_id='', domain_name='',
endpoint='',
> identity_provider='', identity_provider_url='', insecure=None,
> interface='', log_file=None, os_compute_api_version='',
> os_data_processing_api_version='1.1', os_data_processing_url='',
> os_identity_api_version='', os_image_api_version='',
> os_key_manager_api_version='1', os_network_api_version='',
> os_object_api_version='', os_orchestration_api_version='1',
> os_project_id=None, os_project_name=None, os_volume_api_version='',
> password='***', profile=None, project_domain_id='',
> project_domain_name='', project_id='', project_name='admin',
> protocol='', region_name='RegionOne', scope='',
> service_provider_endpoint='', timing=False, token='***',
trust_id='',
> url='', user_domain_id='', user_domain_name='',
user_id='',
> username='admin', verbose_level=3, verify=None)
> defaults: {u'auth_type': 'password', u'compute_api_version':
u'2',
> 'key': None, u'database_api_version': u'1.0',
'api_timeout': None,
> u'baremetal_api_version': u'1', u'image_api_version':
u'2', 'cacert':
> None, u'image_api_use_tasks': False, u'floating_ip_source':
> u'neutron', u'orchestration_api_version': u'1',
u'interface': None,
> u'network_api_version': u'2', u'image_format':
u'qcow2',
> u'key_manager_api_version': u'v1', u'metering_api_version':
u'2',
> 'verify': True, u'identity_api_version': u'2.0',
> u'volume_api_version': u'2', 'cert': None,
u'secgroup_source':
> u'neutron', u'container_api_version': u'1',
u'dns_api_version': u'2',
> u'object_store_api_version': u'1', u'disable_vendor_agent':
{}} cloud
> cfg: {'auth_type': 'password', u'compute_api_version':
u'2', 'key':
> None, u'database_api_version': u'1.0',
'data_processing_api_version':
> '1.1', u'network_api_version': u'2', u'image_format':
u'qcow2',
> u'image_api_version': u'2', 'verify': True,
u'dns_api_version': u'2',
> u'object_store_api_version': u'1', 'verbose_level': 3,
'region_name':
> 'RegionOne', 'api_timeout': None, u'baremetal_api_version':
u'1',
> 'auth': {'username': 'admin', 'project_name':
'admin', 'password':
> '***', 'auth_url': 'http://192.168.50.248:5000/v2.0'},
> 'default_domain': 'default', u'container_api_version':
u'1',
> u'image_api_use_tasks': False, u'floating_ip_source':
u'neutron',
> u'orchestration_api_version': '1', 'timing': False,
'cacert': None,
> u'key_manager_api_version': '1', u'metering_api_version':
u'2',
> 'deferred_help': False, u'identity_api_version': u'2.0',
> u'volume_api_version': u'2', 'cert': None,
u'secgroup_source':
> u'neutron', 'debug': True, u'interface': None,
> u'disable_vendor_agent': {}} compute API version 2, cmd group
> openstack.compute.v2 network API version 2, cmd group
> openstack.network.v2 image API version 2, cmd group openstack.image.v2
> volume API version 2, cmd group openstack.volume.v2 identity API
> version 2.0, cmd group openstack.identity.v2 object_store API version
> 1, cmd group openstack.object_store.v1 orchestration API version 1,
> cmd group openstack.orchestration.v1 data_processing API version 1.1,
> cmd group openstack.data_processing.v1 key_manager API version 1, cmd
> group openstack.key_manager.v1
> command: server list -> openstackclient.compute.v2.server.ListServer
> Auth plugin password selected
> auth_type: password
> Using auth plugin: password
> Using parameters {'username': 'admin', 'password':
'***',
> 'project_name': 'admin', 'auth_url':
> 'http://192.168.50.248:5000/v2.0'}
> Get auth_ref
> REQ: curl -g -i -X GET
http://192.168.50.248:5000/v2.0 -H "Accept:
application/json" -H "User-Agent: python-openstackclient keystoneauth1/2.3.0
python-requests/2.9.1 CPython/2.7.5"
> Starting new HTTP connection (1): 192.168.50.248 "GET /v2.0 HTTP/1.1"
> 200 231
> RESP: [200] Content-Length: 231 Content-Encoding: gzip Vary:
> X-Auth-Token,Accept-Encoding Server: Apache/2.4.6 (Red Hat Enterprise
> Linux) Connection: close Date: Wed, 25 May 2016 15:52:52 GMT
> Content-Type: application/json x-openstack-request-id:
> req-18d1ce74-e55c-4900-a8d5-f48baf8b75d1
> RESP BODY: {"version": {"status": "stable",
"updated":
> "2014-04-17T00:00:00Z", "media-types": [{"base":
"application/json",
> "type": "application/vnd.openstack.identity-v2.0+json"}],
"id":
> "v2.0", "links": [{"href":
"http://192.168.50.248:5000/v2.0/", "rel":
> "self"}, {"href": "http://docs.openstack.org/",
"type": "text/html",
> "rel": "describedby"}]}}
>
> Making authentication request to
>
http://192.168.50.248:5000/v2.0/tokens
> Resetting dropped connection: 192.168.50.248 "POST /v2.0/tokens
> HTTP/1.1" 401 114 Request returned failure status: 401 The request you
> have made requires authentication. (HTTP 401) (Request-ID:
> req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
> Traceback (most recent call last):
> File "/usr/lib/python2.7/site-packages/cliff/app.py", line 339, in
run_subcommand
> self.prepare_to_run_command(cmd)
> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py", line
411, in prepare_to_run_command
> self.client_manager.auth_ref
> File
"/usr/lib/python2.7/site-packages/openstackclient/common/clientmanager.py", line
210, in auth_ref
> self._auth_ref = self.auth.get_auth_ref(self.session)
> File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/generic/base.py",
line 186, in get_auth_ref
> return self._plugin.get_auth_ref(session, **kwargs)
> File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v2.py", line 89,
in get_auth_ref
> authenticated=False, log=False)
> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py", line
572, in post
> return self.request(url, 'POST', **kwargs)
> File "/usr/lib/python2.7/site-packages/openstackclient/common/session.py",
line 40, in request
> resp = super(TimingSession, self).request(url, method, **kwargs)
> File "/usr/lib/python2.7/site-packages/positional/__init__.py", line 94,
in inner
> return func(*args, **kwargs)
> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py", line
467, in request
> raise exceptions.from_response(resp, method, url)
> Unauthorized: The request you have made requires authentication. (HTTP
> 401) (Request-ID: req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
> clean_up ListServer: The request you have made requires
> authentication. (HTTP 401) (Request-ID:
> req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
> Traceback (most recent call last):
> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py", line
118, in run
> ret_val = super(OpenStackShell, self).run(argv)
> File "/usr/lib/python2.7/site-packages/cliff/app.py", line 226, in run
> result = self.run_subcommand(remainder)
> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py", line
153, in run_subcommand
> ret_value = super(OpenStackShell, self).run_subcommand(argv)
> File "/usr/lib/python2.7/site-packages/cliff/app.py", line 339, in
run_subcommand
> self.prepare_to_run_command(cmd)
> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py", line
411, in prepare_to_run_command
> self.client_manager.auth_ref
> File
"/usr/lib/python2.7/site-packages/openstackclient/common/clientmanager.py", line
210, in auth_ref
> self._auth_ref = self.auth.get_auth_ref(self.session)
> File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/generic/base.py",
line 186, in get_auth_ref
> return self._plugin.get_auth_ref(session, **kwargs)
> File
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v2.py", line 89,
in get_auth_ref
> authenticated=False, log=False)
> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py", line
572, in post
> return self.request(url, 'POST', **kwargs)
> File "/usr/lib/python2.7/site-packages/openstackclient/common/session.py",
line 40, in request
> resp = super(TimingSession, self).request(url, method, **kwargs)
> File "/usr/lib/python2.7/site-packages/positional/__init__.py", line 94,
in inner
> return func(*args, **kwargs)
> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py", line
467, in request
> raise exceptions.from_response(resp, method, url)
> Unauthorized: The request you have made requires authentication. (HTTP
> 401) (Request-ID: req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
>
> END return value: 1
>
>
> -----Original Message-----
> From: rdo-list-bounces(a)redhat.com [mailto:rdo-list-bounces@redhat.com]
> On Behalf Of Edward Ahern
> Sent: 25 May 2016 12:04
> To: Alfredo Moralejo Alonso <amoralej(a)redhat.com>
> Cc: rdo-list(a)redhat.com
> Subject: Re: [rdo-list] Installing Magnum on mitaka
>
> Just to follow up on the below error and its shooting in the
> dark.....tailing some logs
>
> keystone_wsgi_main_access.log:
>
> 192.168.50.248 - - [25/May/2016:12:00:14 +0100] "GET /v2.0 HTTP/1.1" 200
231 "-" "python-openstackclient keystoneauth1/2.3.0 python-requests/2.9.1
CPython/2.7.5"
> 192.168.50.248 - - [25/May/2016:12:00:14 +0100] "POST /v2.0/tokens
HTTP/1.1" 401 114 "-" "python-openstackclient keystoneauth1/2.3.0
python-requests/2.9.1 CPython/2.7.5"
>
> -----Original Message-----
> From: rdo-list-bounces(a)redhat.com [mailto:rdo-list-bounces@redhat.com]
> On Behalf Of Edward Ahern
> Sent: 25 May 2016 11:40
> To: Alfredo Moralejo Alonso <amoralej(a)redhat.com>
> Cc: rdo-list(a)redhat.com
> Subject: Re: [rdo-list] Installing Magnum on mitaka
>
>
> [root@shos1 ~]# source keystonerc_admin
> [root@shos1 ~(keystone_admin)]# openstack server list The request you
> have made requires authentication. (HTTP 401) (Request-ID:
> req-cb5a1775-d6d5-4c99-8495-deb52df55f53)
> [root@shos1 ~(keystone_admin)]#
>
>
>
> -----Original Message-----
> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
> Sent: 25 May 2016 10:55
> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
> Cc: rdo-list(a)redhat.com
> Subject: Re: [rdo-list] Installing Magnum on mitaka
>
> The issue seems to be with the admin user credentials or role assignment, could you
try a non-admin command as:
>
> openstack server list
>
>
>
>> On Wed, May 25, 2016 at 11:37 AM, Edward Ahern <Edward.Ahern(a)tecnotree.com>
wrote:
>> Has anyone got further ideas or could point me towards a procedure to debug the
issue?
>>
>>
>> -----Original Message-----
>> From: rdo-list-bounces(a)redhat.com
>> [mailto:rdo-list-bounces@redhat.com]
>> On Behalf Of Edward Ahern
>> Sent: 23 May 2016 20:28
>> To: Christopher Brown <cbrown2(a)ocf.co.uk>; amoralej(a)redhat.com
>> Cc: rdo-list(a)redhat.com
>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>
>> No problem...correct...I have obfuscated the URL...in my keystonerc_admin file,
it's like so:
>>
>>
http://192.168.101.20:5000/v2.0
>>
>>
>> -----Original Message-----
>> From: Christopher Brown [mailto:cbrown2@ocf.co.uk]
>> Sent: 23 May 2016 19:56
>> To: amoralej(a)redhat.com; Edward Ahern <Edward.Ahern(a)tecnotree.com>
>> Cc: rdo-list(a)redhat.com
>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>
>> Forgive me for asking but I have to be absolutely clear that when you have posted
the contents of your keystonerc_admin file, you are obfuscating the URL when you post to
this list?
>>
>> ie. the URL is not _actually_ :
>>
>> http://<ipaddr>:5000/v2.0
>>
>> but is
http://192.0.2.6:5000/v2.0 or whatever is appropriate to your install.
>>
>> I have seen packstack installs generate a bad keystonerc_admin file hence my
reason for asking.
>>
>>> On Mon, 2016-05-23 at 17:34 +0100, Edward Ahern wrote:
>>> Not working unfortunately:
>>>
>>> [root@shos1 ~]# source keystonerc_admin
>>> [root@shos1 ~(keystone_admin)]# openstack user create --password
>>> temporal magnum The request you have made requires authentication.
>>> (HTTP 401)
>>> (Request-ID: req-575696b7-008e-4d86-9ae5-59c963ab8e40)
>>> [root@shos1 ~(keystone_admin)]#
>>>
>>> I get the same response for project list:
>>> [root@shos1 ~(keystone_admin)]# openstack project list The request
>>> you have made requires authentication. (HTTP 401)
>>> (Request-ID: req-7696788c-2d0d-49c8-a654-c7f71c0b3576)
>>>
>>>
>>>
>>> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
>>> Sent: 23 May 2016 16:18
>>> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
>>> Cc: rdo-list <rdo-list(a)redhat.com>
>>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>>
>>>
>>> With that keystonerc file, following command should work:
>>>
>>> openstack user create --password temporal magnum
>>>
>>> Does other commands as "openstack project list" work?
>>>
>>>
>>> On Mon, May 23, 2016 at 5:03 PM, Edward Ahern
>>> <Edward.Ahern@tecnotree .com> wrote:
>>> Hi Alfredo,
>>>
>>> Yes I am sourcing it
>>> Details below, ip address removed re URL
>>>
>>> Note I’m running the command as root user. The openstack
>>> installation was completed via packstack, which I wasn’t involved in….
>>>
>>> Regards,
>>>
>>> Ed
>>>
>>> # more keystonerc_admin
>>> unset OS_SERVICE_TOKEN
>>> export OS_USERNAME=admin
>>> export OS_PASSWORD=2d0050bd38df4a0e
>>> export OS_AUTH_URL=http://<ipaddr>:5000/v2.0
>>> export PS1='[\u@\h \W(keystone_admin)]\$ '
>>>
>>> export OS_TENANT_NAME=admin
>>> export OS_REGION_NAME=RegionOne
>>>
>>> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
>>> Sent: 23 May 2016 16:00
>>> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
>>> Cc: rdo-list <rdo-list(a)redhat.com>
>>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>>
>>>
>>>
>>> On Mon, May 23, 2016 at 4:03 PM, Edward Ahern
>>> <Edward.Ahern@tecnotree .com> wrote:
>>> Hi,
>>>
>>> Is there a proven procedure to install magnum on mitaka?
>>> I’m trying to work off this procedure which is written for liberty.
>>> I’m blocked at step “Create Magnum user at keystone”
>>> I get the following error:
>>> “# openstack user create --os-username magnum --password temporal --
>>> os-auth-url http://<ipddr>:35357/v2.0/ Could not determine a
>>> suitable URL for the plugin”
>>>
>>>
>>> Are you sourcing your keystonerc_admin file?, if so, what variables
>>> are you declaring on it?
>>>
>>>
>>> # openstack --version
>>> openstack 2.2.0
>>>
>>> Regards,
>>>
>>> Ed
>>>
>>>
>>>
>>> _______________________________________________
>>> rdo-list mailing list
>>> rdo-list(a)redhat.com
>>>
https://www.redhat.com/mailman/listinfo/rdo-list
>>>
>>> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>> --
>> Regards,
>>
>> Christopher Brown
>> OpenStack Engineer
>> OCF plc
>>
>> Tel: +44 (0)114 257 2200
>> Web:
www.ocf.co.uk
>> Blog: blog.ocf.co.uk
>> Twitter: @ocfplc
>>
>> Please note, any emails relating to an OCF Support request must always be sent to
support(a)ocf.co.uk for a ticket number to be generated or existing support ticket to be
updated. Should this not be done then OCF cannot be held responsible for requests not
dealt with in a timely manner.
>>
>> OCF plc is a company registered in England and Wales. Registered
>> number 4132533, VAT number GB 780 6803 14. Registered office address:
>> OCF plc,
>> 5 Rotunda Business Centre, Thorncliffe Park, Chapeltown, Sheffield S35 2PG.
>>
>> This message is private and confidential. If you have received this message in
error, please notify us immediately and remove it from your system.
>>
>> _______________________________________________
>> rdo-list mailing list
>> rdo-list(a)redhat.com
>>
https://www.redhat.com/mailman/listinfo/rdo-list
>>
>> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>
> _______________________________________________
> rdo-list mailing list
> rdo-list(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/rdo-list
>
> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>
> _______________________________________________
> rdo-list mailing list
> rdo-list(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/rdo-list
>
> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
_______________________________________________
rdo-list mailing list
rdo-list(a)redhat.com
https://www.redhat.com/mailman/listinfo/rdo-list
To unsubscribe: rdo-list-unsubscribe(a)redhat.com