The usual issues:
Test vms does not have external connectivity (to discovery.etcd.io),
or does not able to reach the configured dns server (8.8.8.8) .
If you have an all-in-one setup the usual trick is.:
ROUTE_TO_INTERNET=$(ip route get 8.8.8.8)
OBOUND_DEV=$(echo ${ROUTE_TO_INTERNET#*dev} | awk '{print $1}')
sudo iptables -t nat -A POSTROUTING -o $OBOUND_DEV -j MASQUERADE
sudo tee /proc/sys/net/ipv4/ip_forward <<<1 >/dev/null
You can find working test images here:
Once I also had to use --tls-disabled at bay model creation.
----- Original Message -----
From: "Fabien Duranti" <fduranti(a)ymail.com>
To: "Edward Ahern" <Edward.Ahern(a)tecnotree.com>
Cc: rdo-list(a)redhat.com
Sent: Monday, May 30, 2016 12:28:00 PM
Subject: Re: [rdo-list] Installing Magnum on mitaka
Hi,
You need to create a domain and a user with the admin role in that domain,
and then populate magnum.conf with the IDs of that domain and user :
[trust]
trustee_domain_id =
trustee_domain_admin_id =
trustee_domain_admin_password =
I don't know for kubernetes but I personally got into more problems down the
road to create swarm bays.. so be prepared for more issues.
--
Fabien
> Le 30 mai 2016 à 11:17, Edward Ahern <Edward.Ahern(a)tecnotree.com> a écrit :
>
> Hi,
>
> I almost have magnum running on mitaka packstack install.
>
> I've created a baymodel with an atomic image and kubernetes.
>
> But I'm getting the following error:
>
>
> [root@shos2 magnum(keystone_admin)]# magnum bay-create --name k8s_bay
> --baymodel kubernetes
>
> Create for bay k8s_bay failed: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None (HTTP 500)
> (Request-ID: req-946c7096-3c75-459f-a003-5271f0acdfbd)
>
> Logs are below. Found a few suggestions via google but not resolved so far.
> Any help would be greatly appreciated. Need to have this ready for a demo
> later in the week.
>
> Regards,
>
> Ed
>
>
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
> [req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Failed to
> create trustee
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone Traceback (most
> recent call last):
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/root/magnum/magnum/common/keystone.py", line 184, in create_trustee
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
> domain=domain_id)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/debtcollector/renames.py", line 45, in
> wrapper
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> f(*args, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/positional/__init__.py", line 94, in
> inner
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> func(*args, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/v3/users.py", line 77,
in
> create
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone log=not
> bool(password))
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/base.py", line 171, in
> _post
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone resp, body =
> self.client.post(url, body=body, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneauth1/adapter.py", line 179, in
> post
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> self.request(url, 'POST', **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneauth1/adapter.py", line 331, in
> request
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone resp =
> super(LegacyJsonAdapter, self).request(*args, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneauth1/adapter.py", line 98, in
> request
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> self.session.request(url, method, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/positional/__init__.py", line 94, in
> inner
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> func(*args, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 320,
in
> request
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone auth_headers
> = self.get_auth_headers(auth)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 638,
in
> get_auth_headers
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> auth.get_headers(self, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/auth/base.py", line 159,
> in get_headers
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone token =
> self.get_token(session)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/base.py",
> line 216, in get_token
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> self.get_access(session).auth_token
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/base.py",
> line 262, in get_access
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
> self.auth_ref = self.get_auth_ref(session)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
>
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v3/base.py",
> line 190, in get_auth_ref
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
> authenticated=False, log=False, **rkwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 520,
in
> post
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> self.request(url, 'POST', **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/positional/__init__.py", line 94, in
> inner
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone return
> func(*args, **kwargs)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone File
> "/usr/lib/python2.7/site-packages/keystoneclient/session.py", line 420,
in
> request
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone raise
> exceptions.from_response(resp, method, url)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone BadRequest:
> Expecting to find id or name in user - the server could not comply with
> the request since it is either malformed or otherwise incorrect. The
> client is assumed to be in error. (HTTP 400) (Request-ID:
> req-dcd222df-5da5-4ee9-a23c-fe163c8e9db4)
> 2016-05-26 15:55:41.884 17399 ERROR magnum.common.keystone
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> [req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Exception
> during message handling: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher Traceback
> (most recent call last):
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
> "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
> 138, in _dispatch_and_reply
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> incoming.message))
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
> "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
> 183, in _dispatch
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> return self._do_dispatch(endpoint, method, ctxt, args)
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
> "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
> 127, in _do_dispatch
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> result = func(ctxt, **new_args)
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
> "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 143, in
> bay_create
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> self._create_trustee_and_trust(osc, bay)
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
> "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 128, in
> _create_trustee_and_trust
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> CONF.trust.trustee_domain_id)
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher File
> "/root/magnum/magnum/common/keystone.py", line 188, in create_trustee
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> domain_id=domain_id)
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> TrusteeCreateFailed: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None
> 2016-05-26 15:55:41.926 17399 ERROR oslo_messaging.rpc.dispatcher
> 2016-05-26 15:55:41.969 17399 ERROR oslo_messaging._drivers.common
> [req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Returning
> exception Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in
> domain None to caller
> 2016-05-26 15:55:41.970 17399 ERROR oslo_messaging._drivers.common
> [req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] ['Traceback
> (most recent call last):\n', ' File
> "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
> 138, in _dispatch_and_reply\n incoming.message))\n', ' File
> "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
> 183, in _dispatch\n return self._do_dispatch(endpoint, method, ctxt,
> args)\n', ' File
> "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line
> 127, in _do_dispatch\n result = func(ctxt, **new_args)\n', ' File
> "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 143, in
> bay_create\n self._create_trustee_and_trust(osc, bay)\n', ' File
> "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line 128, in
> _create_trustee_and_trust\n CONF.trust.trustee_domain_id)\n', ' File
> "/root/magnum/magnum/common/keystone.py", line 188, in create_trustee\n
> domain_id=domain_id)\n', 'TrusteeCreateFailed: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None\n']
>
>
> And
>
>
> 2016-05-26 15:55:42.082 17202 ERROR wsme.api
> [req-6ab855cf-91cf-4159-8d89-d5c40b0dfae6 admin admin - - -] Server-side
> error: "Failed to create trustee e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in
> domain None Traceback (most recent call last):
>
> File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py",
> line 138, in _dispatch_and_reply
> incoming.message))
>
> File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py",
> line 183, in _dispatch
> return self._do_dispatch(endpoint, method, ctxt, args)
>
> File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py",
> line 127, in _do_dispatch
> result = func(ctxt, **new_args)
>
> File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line
143,
> in bay_create
> self._create_trustee_and_trust(osc, bay)
>
> File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line
128,
> in _create_trustee_and_trust
> CONF.trust.trustee_domain_id)
>
> File "/root/magnum/magnum/common/keystone.py", line 188, in
create_trustee
> domain_id=domain_id)
>
> TrusteeCreateFailed: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None ". Detail:
> Traceback (most recent call last):
>
> File "/usr/lib/python2.7/site-packages/wsmeext/pecan.py", line 84, in
> callfunction
> result = f(self, *args, **kwargs)
>
> File "/root/magnum/magnum/api/controllers/v1/bay.py", line 299, in post
> bay.bay_create_timeout)
>
> File "/root/magnum/magnum/conductor/api.py", line 35, in bay_create
> bay_create_timeout=bay_create_timeout)
>
> File "/root/magnum/magnum/common/rpc_service.py", line 110, in _call
> return self._client.call(self._context, method, *args, **kwargs)
>
> File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/client.py",
line
> 413, in call
> return self.prepare().call(ctxt, method, **kwargs)
>
> File "/usr/lib/python2.7/site-packages/oslo_messaging/rpc/client.py",
line
> 158, in call
> retry=self.retry)
>
> File "/usr/lib/python2.7/site-packages/oslo_messaging/transport.py",
line
> 90, in _send
> timeout=timeout, retry=retry)
>
> File
>
"/usr/lib/python2.7/site-packages/oslo_messaging/_drivers/amqpdriver.py",
> line 470, in send
> retry=retry)
>
> File
>
"/usr/lib/python2.7/site-packages/oslo_messaging/_drivers/amqpdriver.py",
> line 461, in _send
> raise result
>
> TrusteeCreateFailed_Remote: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None Traceback (most recent
> call last):
>
> File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py",
> line 138, in _dispatch_and_reply
> incoming.message))
>
> File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py",
> line 183, in _dispatch
> return self._do_dispatch(endpoint, method, ctxt, args)
>
> File
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py",
> line 127, in _do_dispatch
> result = func(ctxt, **new_args)
>
> File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line
143,
> in bay_create
> self._create_trustee_and_trust(osc, bay)
>
> File "/root/magnum/magnum/conductor/handlers/bay_conductor.py", line
128,
> in _create_trustee_and_trust
> CONF.trust.trustee_domain_id)
>
> File "/root/magnum/magnum/common/keystone.py", line 188, in
create_trustee
> domain_id=domain_id)
>
> TrusteeCreateFailed: Failed to create trustee
> e27c0ef0-67e3-4d95-bb93-56a5ef28eba2 in domain None
>
>
> 192.168.50.247 - - [26/May/2016 15:55:42] "POST /v1/bays HTTP/1.1" 500
257
> 192.168.50.247 - - [26/May/2016 15:57:58] "GET /v1/bays/kubernetes
> HTTP/1.1" 404 172
>
>
>
>
> -----Original Message-----
> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
> Sent: 25 May 2016 15:25
> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
> Cc: rdo-list(a)redhat.com
> Subject: Re: [rdo-list] Installing Magnum on mitaka
>
> Hi,
>
> I'd recommend to deploy the environment from the scratch, redeploy OS and
> packstack on top. Note that, if you need to re-run packstack for any
> reason you must use the same answers file. I'm not sure, but that could
> explain the messages you are getting.
>
> Best regards,
>
> Alfredo
>
>
>> On Wed, May 25, 2016 at 4:17 PM, Edward Ahern
<Edward.Ahern(a)tecnotree.com>
>> wrote:
>> Rebooted the vm
>>
>> Got a different error for first attempt
>>
>> [root@shos1 ~(keystone_admin)]# openstack server list Discovering
>> versions from the identity service failed when creating the password
>> plugin. Attempting to determine version from URL.
>> Unable to establish connection to
>>
http://192.168.50.248:5000/v2.0/tokens
>>
>> Above url doesn't exist, from the debug:
>>
>> Making authentication request to
>>
http://192.168.50.248:5000/v2.0/tokens
>> Resetting dropped connection: 192.168.50.248 "POST /v2.0/tokens
>> HTTP/1.1" 401 114 Request returned failure status: 401
>>
>> Can the url be created?
>>
>>
>>
>> Ran it in debug mode, see below
>>
>> [root@shos1 ~(keystone_admin)]# openstack server list --debug START
>> with options: ['server', 'list', '--debug']
>> options: Namespace(access_token_endpoint='', auth_type='',
>> auth_url='http://192.168.50.248:5000/v2.0', cacert='',
client_id='',
>> client_secret='***', cloud='', debug=True,
default_domain='default',
>> deferred_help=False, domain_id='', domain_name='',
endpoint='',
>> identity_provider='', identity_provider_url='', insecure=None,
>> interface='', log_file=None, os_compute_api_version='',
>> os_data_processing_api_version='1.1',
os_data_processing_url='',
>> os_identity_api_version='', os_image_api_version='',
>> os_key_manager_api_version='1', os_network_api_version='',
>> os_object_api_version='', os_orchestration_api_version='1',
>> os_project_id=None, os_project_name=None, os_volume_api_version='',
>> password='***', profile=None, project_domain_id='',
>> project_domain_name='', project_id='',
project_name='admin',
>> protocol='', region_name='RegionOne', scope='',
>> service_provider_endpoint='', timing=False, token='***',
trust_id='',
>> url='', user_domain_id='', user_domain_name='',
user_id='',
>> username='admin', verbose_level=3, verify=None)
>> defaults: {u'auth_type': 'password',
u'compute_api_version': u'2',
>> 'key': None, u'database_api_version': u'1.0',
'api_timeout': None,
>> u'baremetal_api_version': u'1', u'image_api_version':
u'2', 'cacert':
>> None, u'image_api_use_tasks': False, u'floating_ip_source':
>> u'neutron', u'orchestration_api_version': u'1',
u'interface': None,
>> u'network_api_version': u'2', u'image_format':
u'qcow2',
>> u'key_manager_api_version': u'v1',
u'metering_api_version': u'2',
>> 'verify': True, u'identity_api_version': u'2.0',
>> u'volume_api_version': u'2', 'cert': None,
u'secgroup_source':
>> u'neutron', u'container_api_version': u'1',
u'dns_api_version': u'2',
>> u'object_store_api_version': u'1',
u'disable_vendor_agent': {}} cloud
>> cfg: {'auth_type': 'password', u'compute_api_version':
u'2', 'key':
>> None, u'database_api_version': u'1.0',
'data_processing_api_version':
>> '1.1', u'network_api_version': u'2',
u'image_format': u'qcow2',
>> u'image_api_version': u'2', 'verify': True,
u'dns_api_version': u'2',
>> u'object_store_api_version': u'1', 'verbose_level': 3,
'region_name':
>> 'RegionOne', 'api_timeout': None,
u'baremetal_api_version': u'1',
>> 'auth': {'username': 'admin', 'project_name':
'admin', 'password':
>> '***', 'auth_url': 'http://192.168.50.248:5000/v2.0'},
>> 'default_domain': 'default', u'container_api_version':
u'1',
>> u'image_api_use_tasks': False, u'floating_ip_source':
u'neutron',
>> u'orchestration_api_version': '1', 'timing': False,
'cacert': None,
>> u'key_manager_api_version': '1',
u'metering_api_version': u'2',
>> 'deferred_help': False, u'identity_api_version':
u'2.0',
>> u'volume_api_version': u'2', 'cert': None,
u'secgroup_source':
>> u'neutron', 'debug': True, u'interface': None,
>> u'disable_vendor_agent': {}} compute API version 2, cmd group
>> openstack.compute.v2 network API version 2, cmd group
>> openstack.network.v2 image API version 2, cmd group openstack.image.v2
>> volume API version 2, cmd group openstack.volume.v2 identity API
>> version 2.0, cmd group openstack.identity.v2 object_store API version
>> 1, cmd group openstack.object_store.v1 orchestration API version 1,
>> cmd group openstack.orchestration.v1 data_processing API version 1.1,
>> cmd group openstack.data_processing.v1 key_manager API version 1, cmd
>> group openstack.key_manager.v1
>> command: server list -> openstackclient.compute.v2.server.ListServer
>> Auth plugin password selected
>> auth_type: password
>> Using auth plugin: password
>> Using parameters {'username': 'admin', 'password':
'***',
>> 'project_name': 'admin', 'auth_url':
>> 'http://192.168.50.248:5000/v2.0'}
>> Get auth_ref
>> REQ: curl -g -i -X GET
http://192.168.50.248:5000/v2.0 -H "Accept:
>> application/json" -H "User-Agent: python-openstackclient
>> keystoneauth1/2.3.0 python-requests/2.9.1 CPython/2.7.5"
>> Starting new HTTP connection (1): 192.168.50.248 "GET /v2.0 HTTP/1.1"
>> 200 231
>> RESP: [200] Content-Length: 231 Content-Encoding: gzip Vary:
>> X-Auth-Token,Accept-Encoding Server: Apache/2.4.6 (Red Hat Enterprise
>> Linux) Connection: close Date: Wed, 25 May 2016 15:52:52 GMT
>> Content-Type: application/json x-openstack-request-id:
>> req-18d1ce74-e55c-4900-a8d5-f48baf8b75d1
>> RESP BODY: {"version": {"status": "stable",
"updated":
>> "2014-04-17T00:00:00Z", "media-types": [{"base":
"application/json",
>> "type": "application/vnd.openstack.identity-v2.0+json"}],
"id":
>> "v2.0", "links": [{"href":
"http://192.168.50.248:5000/v2.0/", "rel":
>> "self"}, {"href": "http://docs.openstack.org/",
"type": "text/html",
>> "rel": "describedby"}]}}
>>
>> Making authentication request to
>>
http://192.168.50.248:5000/v2.0/tokens
>> Resetting dropped connection: 192.168.50.248 "POST /v2.0/tokens
>> HTTP/1.1" 401 114 Request returned failure status: 401 The request you
>> have made requires authentication. (HTTP 401) (Request-ID:
>> req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
>> Traceback (most recent call last):
>> File "/usr/lib/python2.7/site-packages/cliff/app.py", line 339, in
>> run_subcommand
>> self.prepare_to_run_command(cmd)
>> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py",
line
>> 411, in prepare_to_run_command
>> self.client_manager.auth_ref
>> File
>>
"/usr/lib/python2.7/site-packages/openstackclient/common/clientmanager.py",
>> line 210, in auth_ref
>> self._auth_ref = self.auth.get_auth_ref(self.session)
>> File
>>
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/generic/base.py",
>> line 186, in get_auth_ref
>> return self._plugin.get_auth_ref(session, **kwargs)
>> File
>>
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v2.py",
>> line 89, in get_auth_ref
>> authenticated=False, log=False)
>> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py",
line
>> 572, in post
>> return self.request(url, 'POST', **kwargs)
>> File
>>
"/usr/lib/python2.7/site-packages/openstackclient/common/session.py",
>> line 40, in request
>> resp = super(TimingSession, self).request(url, method, **kwargs)
>> File "/usr/lib/python2.7/site-packages/positional/__init__.py", line
94,
>> in inner
>> return func(*args, **kwargs)
>> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py",
line
>> 467, in request
>> raise exceptions.from_response(resp, method, url)
>> Unauthorized: The request you have made requires authentication. (HTTP
>> 401) (Request-ID: req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
>> clean_up ListServer: The request you have made requires
>> authentication. (HTTP 401) (Request-ID:
>> req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
>> Traceback (most recent call last):
>> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py",
line
>> 118, in run
>> ret_val = super(OpenStackShell, self).run(argv)
>> File "/usr/lib/python2.7/site-packages/cliff/app.py", line 226, in
run
>> result = self.run_subcommand(remainder)
>> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py",
line
>> 153, in run_subcommand
>> ret_value = super(OpenStackShell, self).run_subcommand(argv)
>> File "/usr/lib/python2.7/site-packages/cliff/app.py", line 339, in
>> run_subcommand
>> self.prepare_to_run_command(cmd)
>> File "/usr/lib/python2.7/site-packages/openstackclient/shell.py",
line
>> 411, in prepare_to_run_command
>> self.client_manager.auth_ref
>> File
>>
"/usr/lib/python2.7/site-packages/openstackclient/common/clientmanager.py",
>> line 210, in auth_ref
>> self._auth_ref = self.auth.get_auth_ref(self.session)
>> File
>>
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/generic/base.py",
>> line 186, in get_auth_ref
>> return self._plugin.get_auth_ref(session, **kwargs)
>> File
>>
"/usr/lib/python2.7/site-packages/keystoneclient/auth/identity/v2.py",
>> line 89, in get_auth_ref
>> authenticated=False, log=False)
>> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py",
line
>> 572, in post
>> return self.request(url, 'POST', **kwargs)
>> File
>>
"/usr/lib/python2.7/site-packages/openstackclient/common/session.py",
>> line 40, in request
>> resp = super(TimingSession, self).request(url, method, **kwargs)
>> File "/usr/lib/python2.7/site-packages/positional/__init__.py", line
94,
>> in inner
>> return func(*args, **kwargs)
>> File "/usr/lib/python2.7/site-packages/keystoneauth1/session.py",
line
>> 467, in request
>> raise exceptions.from_response(resp, method, url)
>> Unauthorized: The request you have made requires authentication. (HTTP
>> 401) (Request-ID: req-e7e52f69-f30f-4273-ac1e-9be26a54c18d)
>>
>> END return value: 1
>>
>>
>> -----Original Message-----
>> From: rdo-list-bounces(a)redhat.com [mailto:rdo-list-bounces@redhat.com]
>> On Behalf Of Edward Ahern
>> Sent: 25 May 2016 12:04
>> To: Alfredo Moralejo Alonso <amoralej(a)redhat.com>
>> Cc: rdo-list(a)redhat.com
>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>
>> Just to follow up on the below error and its shooting in the
>> dark.....tailing some logs
>>
>> keystone_wsgi_main_access.log:
>>
>> 192.168.50.248 - - [25/May/2016:12:00:14 +0100] "GET /v2.0 HTTP/1.1"
200
>> 231 "-" "python-openstackclient keystoneauth1/2.3.0
python-requests/2.9.1
>> CPython/2.7.5"
>> 192.168.50.248 - - [25/May/2016:12:00:14 +0100] "POST /v2.0/tokens
>> HTTP/1.1" 401 114 "-" "python-openstackclient
keystoneauth1/2.3.0
>> python-requests/2.9.1 CPython/2.7.5"
>>
>> -----Original Message-----
>> From: rdo-list-bounces(a)redhat.com [mailto:rdo-list-bounces@redhat.com]
>> On Behalf Of Edward Ahern
>> Sent: 25 May 2016 11:40
>> To: Alfredo Moralejo Alonso <amoralej(a)redhat.com>
>> Cc: rdo-list(a)redhat.com
>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>
>>
>> [root@shos1 ~]# source keystonerc_admin
>> [root@shos1 ~(keystone_admin)]# openstack server list The request you
>> have made requires authentication. (HTTP 401) (Request-ID:
>> req-cb5a1775-d6d5-4c99-8495-deb52df55f53)
>> [root@shos1 ~(keystone_admin)]#
>>
>>
>>
>> -----Original Message-----
>> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
>> Sent: 25 May 2016 10:55
>> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
>> Cc: rdo-list(a)redhat.com
>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>
>> The issue seems to be with the admin user credentials or role assignment,
>> could you try a non-admin command as:
>>
>> openstack server list
>>
>>
>>
>>> On Wed, May 25, 2016 at 11:37 AM, Edward Ahern
>>> <Edward.Ahern(a)tecnotree.com> wrote:
>>> Has anyone got further ideas or could point me towards a procedure to
>>> debug the issue?
>>>
>>>
>>> -----Original Message-----
>>> From: rdo-list-bounces(a)redhat.com
>>> [mailto:rdo-list-bounces@redhat.com]
>>> On Behalf Of Edward Ahern
>>> Sent: 23 May 2016 20:28
>>> To: Christopher Brown <cbrown2(a)ocf.co.uk>; amoralej(a)redhat.com
>>> Cc: rdo-list(a)redhat.com
>>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>>
>>> No problem...correct...I have obfuscated the URL...in my keystonerc_admin
>>> file, it's like so:
>>>
>>>
http://192.168.101.20:5000/v2.0
>>>
>>>
>>> -----Original Message-----
>>> From: Christopher Brown [mailto:cbrown2@ocf.co.uk]
>>> Sent: 23 May 2016 19:56
>>> To: amoralej(a)redhat.com; Edward Ahern <Edward.Ahern(a)tecnotree.com>
>>> Cc: rdo-list(a)redhat.com
>>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>>
>>> Forgive me for asking but I have to be absolutely clear that when you
>>> have posted the contents of your keystonerc_admin file, you are
>>> obfuscating the URL when you post to this list?
>>>
>>> ie. the URL is not _actually_ :
>>>
>>> http://<ipaddr>:5000/v2.0
>>>
>>> but is
http://192.0.2.6:5000/v2.0 or whatever is appropriate to your
>>> install.
>>>
>>> I have seen packstack installs generate a bad keystonerc_admin file hence
>>> my reason for asking.
>>>
>>>> On Mon, 2016-05-23 at 17:34 +0100, Edward Ahern wrote:
>>>> Not working unfortunately:
>>>>
>>>> [root@shos1 ~]# source keystonerc_admin
>>>> [root@shos1 ~(keystone_admin)]# openstack user create --password
>>>> temporal magnum The request you have made requires authentication.
>>>> (HTTP 401)
>>>> (Request-ID: req-575696b7-008e-4d86-9ae5-59c963ab8e40)
>>>> [root@shos1 ~(keystone_admin)]#
>>>>
>>>> I get the same response for project list:
>>>> [root@shos1 ~(keystone_admin)]# openstack project list The request
>>>> you have made requires authentication. (HTTP 401)
>>>> (Request-ID: req-7696788c-2d0d-49c8-a654-c7f71c0b3576)
>>>>
>>>>
>>>>
>>>> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
>>>> Sent: 23 May 2016 16:18
>>>> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
>>>> Cc: rdo-list <rdo-list(a)redhat.com>
>>>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>>>
>>>>
>>>> With that keystonerc file, following command should work:
>>>>
>>>> openstack user create --password temporal magnum
>>>>
>>>> Does other commands as "openstack project list" work?
>>>>
>>>>
>>>> On Mon, May 23, 2016 at 5:03 PM, Edward Ahern
>>>> <Edward.Ahern@tecnotree .com> wrote:
>>>> Hi Alfredo,
>>>>
>>>> Yes I am sourcing it
>>>> Details below, ip address removed re URL
>>>>
>>>> Note I’m running the command as root user. The openstack
>>>> installation was completed via packstack, which I wasn’t involved in….
>>>>
>>>> Regards,
>>>>
>>>> Ed
>>>>
>>>> # more keystonerc_admin
>>>> unset OS_SERVICE_TOKEN
>>>> export OS_USERNAME=admin
>>>> export OS_PASSWORD=2d0050bd38df4a0e
>>>> export OS_AUTH_URL=http://<ipaddr>:5000/v2.0
>>>> export PS1='[\u@\h \W(keystone_admin)]\$ '
>>>>
>>>> export OS_TENANT_NAME=admin
>>>> export OS_REGION_NAME=RegionOne
>>>>
>>>> From: Alfredo Moralejo Alonso [mailto:amoralej@redhat.com]
>>>> Sent: 23 May 2016 16:00
>>>> To: Edward Ahern <Edward.Ahern(a)tecnotree.com>
>>>> Cc: rdo-list <rdo-list(a)redhat.com>
>>>> Subject: Re: [rdo-list] Installing Magnum on mitaka
>>>>
>>>>
>>>>
>>>> On Mon, May 23, 2016 at 4:03 PM, Edward Ahern
>>>> <Edward.Ahern@tecnotree .com> wrote:
>>>> Hi,
>>>>
>>>> Is there a proven procedure to install magnum on mitaka?
>>>> I’m trying to work off this procedure which is written for liberty.
>>>> I’m blocked at step “Create Magnum user at keystone”
>>>> I get the following error:
>>>> “# openstack user create --os-username magnum --password temporal --
>>>> os-auth-url http://<ipddr>:35357/v2.0/ Could not determine a
>>>> suitable URL for the plugin”
>>>>
>>>>
>>>> Are you sourcing your keystonerc_admin file?, if so, what variables
>>>> are you declaring on it?
>>>>
>>>>
>>>> # openstack --version
>>>> openstack 2.2.0
>>>>
>>>> Regards,
>>>>
>>>> Ed
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> rdo-list mailing list
>>>> rdo-list(a)redhat.com
>>>>
https://www.redhat.com/mailman/listinfo/rdo-list
>>>>
>>>> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>>> --
>>> Regards,
>>>
>>> Christopher Brown
>>> OpenStack Engineer
>>> OCF plc
>>>
>>> Tel: +44 (0)114 257 2200
>>> Web:
www.ocf.co.uk
>>> Blog: blog.ocf.co.uk
>>> Twitter: @ocfplc
>>>
>>> Please note, any emails relating to an OCF Support request must always be
>>> sent to support(a)ocf.co.uk for a ticket number to be generated or
>>> existing support ticket to be updated. Should this not be done then OCF
>>> cannot be held responsible for requests not dealt with in a timely
>>> manner.
>>>
>>> OCF plc is a company registered in England and Wales. Registered
>>> number 4132533, VAT number GB 780 6803 14. Registered office address:
>>> OCF plc,
>>> 5 Rotunda Business Centre, Thorncliffe Park, Chapeltown, Sheffield S35
>>> 2PG.
>>>
>>> This message is private and confidential. If you have received this
>>> message in error, please notify us immediately and remove it from your
>>> system.
>>>
>>> _______________________________________________
>>> rdo-list mailing list
>>> rdo-list(a)redhat.com
>>>
https://www.redhat.com/mailman/listinfo/rdo-list
>>>
>>> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>>
>> _______________________________________________
>> rdo-list mailing list
>> rdo-list(a)redhat.com
>>
https://www.redhat.com/mailman/listinfo/rdo-list
>>
>> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>>
>> _______________________________________________
>> rdo-list mailing list
>> rdo-list(a)redhat.com
>>
https://www.redhat.com/mailman/listinfo/rdo-list
>>
>> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
>
> _______________________________________________
> rdo-list mailing list
> rdo-list(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/rdo-list
>
> To unsubscribe: rdo-list-unsubscribe(a)redhat.com
_______________________________________________
rdo-list mailing list
rdo-list(a)redhat.com
https://www.redhat.com/mailman/listinfo/rdo-list
To unsubscribe: rdo-list-unsubscribe(a)redhat.com