Questo contenuto non è disponibile nella lingua selezionata.
Chapter 25. Troubleshooting director errors
Errors can occur at certain stages of the director processes. This section contains some information about diagnosing common problems.
25.1. Troubleshooting node registration Copia collegamentoCollegamento copiato negli appunti!
Issues with node registration usually occur due to issues with incorrect node details. In these situations, validate the template file containing your node details and correct the imported node details.
Procedure
Source the
stackrcfile:$ source ~/stackrcRun the node import command with the
--validate-onlyoption. This option validates your node template without performing an import:(undercloud) $ openstack overcloud node import --validate-only ~/nodes.json Waiting for messages on queue 'tripleo' with no timeout. Successfully validated environment fileTo fix incorrect details with imported nodes, run the
openstack baremetalcommands to update node details. The following example shows how to change networking details:Identify the assigned port UUID for the imported node:
$ source ~/stackrc (undercloud) $ openstack baremetal port list --node [NODE UUID]Update the MAC address:
(undercloud) $ openstack baremetal port set --address=[NEW MAC] [PORT UUID]Configure a new IPMI address on the node:
(undercloud) $ openstack baremetal node set --driver-info ipmi_address=[NEW IPMI ADDRESS] [NODE UUID]
25.2. Troubleshooting hardware introspection Copia collegamentoCollegamento copiato negli appunti!
You must run the introspection process to completion. However, ironic-inspector times out after a default one hour period if the inspection ramdisk does not respond. Sometimes this indicates a bug in the inspection ramdisk but usually this time-out occurs due to an environment misconfiguration, particularly BIOS boot settings.
To diagnose and resolve common environment misconfiguration issues, complete the following steps:
Procedure
Source the
stackrcfile:$ source ~/stackrcDirector uses OpenStack Object Storage (swift) to save the hardware data that it obtains during the introspection process. If this service is not running, the introspection can fail. Check all services related to OpenStack Object Storage to ensure that the service is running:
(undercloud) $ sudo systemctl list-units tripleo_swift*Ensure that your nodes are in a
manageablestate. The introspection does not inspect nodes in anavailablestate, which is meant for deployment. If you want to inspect nodes that are in anavailablestate, change the node status tomanageablestate before introspection:(undercloud) $ openstack baremetal node manage [NODE UUID]Configure temporary access to the introspection ramdisk. You can provide either a temporary password or an SSH key to access the node during introspection debugging. Complete the following procedure to configure ramdisk access:
Run the
openssl passwd -1command with a temporary password to generate an MD5 hash:(undercloud) $ openssl passwd -1 mytestpassword $1$enjRSyIw$/fYUpJwr6abFy/d.koRgQ/Edit the
/var/lib/ironic/httpboot/inspector.ipxefile, find the line starting withkernel, and append therootpwdparameter and the MD5 hash:kernel http://192.2.0.1:8088/agent.kernel ipa-inspection-callback-url=http://192.168.0.1:5050/v1/continue ipa-inspection-collectors=default,extra-hardware,logs systemd.journald.forward_to_console=yes BOOTIF=${mac} ipa-debug=1 ipa-inspection-benchmarks=cpu,mem,disk rootpwd="$1$enjRSyIw$/fYUpJwr6abFy/d.koRgQ/" selinux=0Alternatively, append your public SSH key to the
sshkeyparameter.NoteInclude quotation marks for both the
rootpwdandsshkeyparameters.
Run the introspection on the node:
(undercloud) $ openstack overcloud node introspect [NODE UUID] --provideUse the
--provideoption to change the node state toavailableafter the introspection completes.Identify the IP address of the node from the
dnsmasqlogs:(undercloud) $ sudo tail -f /var/log/containers/ironic-inspector/dnsmasq.logIf an error occurs, access the node using the root user and temporary access details:
$ ssh root@192.168.24.105Access the node during introspection to run diagnostic commands and troubleshoot the introspection failure.
To stop the introspection process, run the following command:
(undercloud) $ openstack baremetal introspection abort [NODE UUID]You can also wait until the process times out.
NoteRed Hat OpenStack Platform director retries introspection three times after the initial abort. Run the
openstack baremetal introspection abortcommand at each attempt to abort the introspection completely.
25.3. Troubleshooting workflows and executions Copia collegamentoCollegamento copiato negli appunti!
The OpenStack Workflow (mistral) service groups multiple OpenStack tasks into workflows. Red Hat OpenStack Platform uses a set of these workflows to perform common functions across the director, including bare metal node control, validations, plan management, and overcloud deployment.
For example, when you run the openstack overcloud deploy command, the OpenStack Workflow service executes two workflows. The first workflow uploads the deployment plan:
Removing the current plan files
Uploading new plan files
Started Mistral Workflow. Execution ID: aef1e8c6-a862-42de-8bce-073744ed5e6b
Plan updated
The second workflow starts the overcloud deployment:
Deploying templates in the directory /tmp/tripleoclient-LhRlHX/tripleo-heat-templates
Started Mistral Workflow. Execution ID: 97b64abe-d8fc-414a-837a-1380631c764d
2016-11-28 06:29:26Z [overcloud]: CREATE_IN_PROGRESS Stack CREATE started
2016-11-28 06:29:26Z [overcloud.Networks]: CREATE_IN_PROGRESS state changed
2016-11-28 06:29:26Z [overcloud.HeatAuthEncryptionKey]: CREATE_IN_PROGRESS state changed
2016-11-28 06:29:26Z [overcloud.ServiceNetMap]: CREATE_IN_PROGRESS state changed
...
The OpenStack Workflow service uses the following objects to track the workflow:
- Actions
- A particular instruction that OpenStack performs when an associated task runs. Examples include running shell scripts or performing HTTP requests. Some OpenStack components have in-built actions that OpenStack Workflow uses.
- Tasks
- Defines the action to run and the result of running the action. These tasks usually have actions or other workflows associated with them. When a task completes, the workflow directs to another task, usually depending on whether the task succeeded or failed.
- Workflows
- A set of tasks grouped together and executed in a specific order.
- Executions
- Defines a particular action, task, or workflow running.
OpenStack Workflow also provides robust logging of executions, which helps to identify issues with certain command failures. For example, if a workflow execution fails, you can identify the point of failure.
Procedure
Source the
stackrcfile:$ source ~/stackrcList the workflow executions that have the failed state
ERROR:(undercloud) $ openstack workflow execution list | grep "ERROR"Get the UUID of the failed workflow execution (for example,
dffa96b0-f679-4cd2-a490-4769a3825262) and view the execution and output:(undercloud) $ openstack workflow execution show dffa96b0-f679-4cd2-a490-4769a3825262 (undercloud) $ openstack workflow execution output show dffa96b0-f679-4cd2-a490-4769a3825262These commands return information about the failed task in the execution. The
openstack workflow execution showcommand also displays the workflow that was used for the execution (for example,tripleo.plan_management.v1.publish_ui_logs_to_swift). You can view the full workflow definition with the following command:(undercloud) $ openstack workflow definition show tripleo.plan_management.v1.publish_ui_logs_to_swiftThis is useful for identifying where in the workflow a particular task occurs.
View action executions and their results using a similar command syntax:
(undercloud) $ openstack action execution list (undercloud) $ openstack action execution show 8a68eba3-0fec-4b2a-adc9-5561b007e886 (undercloud) $ openstack action execution output show 8a68eba3-0fec-4b2a-adc9-5561b007e886This is useful for identifying a specific action that causes issues.
25.4. Troubleshooting overcloud creation and deployment Copia collegamentoCollegamento copiato negli appunti!
The initial creation of the overcloud occurs with the OpenStack Orchestration (heat) service. If an overcloud deployment fails, use the OpenStack clients and service log files to diagnose the failed deployment.
Procedure
Source the
stackrcfile:$ source ~/stackrcRun the deployment failures command:
$ openstack overcloud failuresRun the following command to display the details of the failure:
(undercloud) $ openstack stack failures list <OVERCLOUD_NAME> --longReplace
<OVERCLOUD_NAME>with the name of your overcloud.Run the following command to identify the stacks that failed:
(undercloud) $ openstack stack list --nested --property status=FAILED
25.5. Troubleshooting node provisioning Copia collegamentoCollegamento copiato negli appunti!
The OpenStack Orchestration (heat) service controls the provisioning process. If node provisioning fails, use the OpenStack clients and service log files to diagnose the issues.
Procedure
Source the
stackrcfile:$ source ~/stackrcCheck the bare metal service to see all registered nodes and their current status:
(undercloud) $ openstack baremetal node list +----------+------+---------------+-------------+-----------------+-------------+ | UUID | Name | Instance UUID | Power State | Provision State | Maintenance | +----------+------+---------------+-------------+-----------------+-------------+ | f1e261...| None | None | power off | available | False | | f0b8c1...| None | None | power off | available | False | +----------+------+---------------+-------------+-----------------+-------------+All nodes available for provisioning should have the following states set:
-
Maintenance set to
False. -
Provision State set to
availablebefore provisioning.
The following table outlines some common provisioning failure scenarios.
-
Maintenance set to
| Problem | Cause | Solution |
|---|---|---|
|
Maintenance sets itself to | The director cannot access the power management for the nodes. | Check the credentials for node power management. |
|
Provision State is set to | The problem occurred before bare metal deployment started. | Check the node details including the profile and flavor mapping. Check that the node hardware details are within the requirements for the flavor. |
|
Provision State is set to | The node provisioning process has not yet finished for this node. | Wait until this status changes. Otherwise, connect to the virtual console of the node and check the output. |
|
Provision State is | The node provisioning has finished successfully and there is a problem during the post-deployment configuration step. | Diagnose the node configuration process. Connect to the virtual console of the node and check the output. |
|
Provision State is | Node provisioning has failed. |
View the bare metal node details with the |
25.6. Troubleshooting IP address conflicts during provisioning Copia collegamentoCollegamento copiato negli appunti!
Introspection and deployment tasks fail if the destination hosts are allocated an IP address that is already in use. To prevent these failures, you can perform a port scan of the Provisioning network to determine whether the discovery IP range and host IP range are free.
Procedure
Install
nmap:$ sudo dnf install nmapUse
nmapto scan the IP address range for active addresses. This example scans the 192.168.24.0/24 range, replace this with the IP subnet of the Provisioning network (using CIDR bitmask notation):$ sudo nmap -sn 192.168.24.0/24Review the output of the
nmapscan. For example, you should see the IP address of the undercloud, and any other hosts that are present on the subnet:$ sudo nmap -sn 192.168.24.0/24 Starting Nmap 6.40 ( http://nmap.org ) at 2015-10-02 15:14 EDT Nmap scan report for 192.168.24.1 Host is up (0.00057s latency). Nmap scan report for 192.168.24.2 Host is up (0.00048s latency). Nmap scan report for 192.168.24.3 Host is up (0.00045s latency). Nmap scan report for 192.168.24.5 Host is up (0.00040s latency). Nmap scan report for 192.168.24.9 Host is up (0.00019s latency). Nmap done: 256 IP addresses (5 hosts up) scanned in 2.45 secondsIf any of the active IP addresses conflict with the IP ranges in undercloud.conf, you must either change the IP address ranges or release the IP addresses before you introspect or deploy the overcloud nodes.
25.7. Troubleshooting "No Valid Host Found" errors Copia collegamentoCollegamento copiato negli appunti!
Sometimes the /var/log/nova/nova-conductor.log contains the following error:
NoValidHost: No valid host was found. There are not enough hosts available.
This error occurs when the Compute Scheduler cannot find a bare metal node that is suitable for booting the new instance. This usually means that there is a mismatch between resources that the Compute service expects to find and resources that the Bare Metal service advertised to Compute. To check that there is a mismatch error, complete the following steps:
Procedure
Source the
stackrcfile:$ source ~/stackrcCheck that the introspection succeeded on the node. If the introspection fails, check that each node contains the required ironic node properties:
(undercloud) $ openstack baremetal node show [NODE UUID]Check that the
propertiesJSON field has valid values for keyscpus,cpu_arch,memory_mbandlocal_gb.Ensure that the Compute flavor that is mapped to the node does not exceed the node properties for the required number of nodes:
(undercloud) $ openstack flavor show [FLAVOR NAME]-
Run the
openstack baremetal node listcommand to ensure that there are sufficient nodes in the available state. Nodes inmanageablestate usually signify a failed introspection. Run the
openstack baremetal node listcommand and ensure that the nodes are not in maintenance mode. If a node changes to maintenance mode automatically, the likely cause is an issue with incorrect power management credentials. Check the power management credentials and then remove maintenance mode:(undercloud) $ openstack baremetal node maintenance unset [NODE UUID]-
If you are using automatic profile tagging, check that you have enough nodes that correspond to each flavor and profile. Run the
openstack baremetal node showcommand on a node and check thecapabilitieskey in thepropertiesfield. For example, a node tagged for the Compute role contains theprofile:computevalue. You must wait for node information to propagate from Bare Metal to Compute after introspection. However, if you performed some steps manually, there might be a short period of time when nodes are not available to the Compute service (nova). Use the following command to check the total resources in your system:
(undercloud) $ openstack hypervisor stats show
25.8. Troubleshooting overcloud configuration Copia collegamentoCollegamento copiato negli appunti!
OpenStack Platform director uses Ansible to configure the overcloud. Complete the following steps to diagnose Ansible playbook errors (config-download) on the overcloud.
Procedure
Ensure that the
stackuser has access to the files in the/var/lib/mistraldirectory on theundercloud:$ sudo setfacl -R -m u:stack:rwx /var/lib/mistralThis command retains
mistraluser access to the directory.Change to the working directory for the
config-downloadfiles. This is usually/var/lib/mistral/overcloud/.$ cd /var/lib/mistral/overcloud/Search the
ansible.logfile for the point of failure.$ less ansible.logMake a note of the step that failed.
-
Find the step that failed in the
config-downloadplaybooks within the working directory to identify the action that ocurred.
25.9. Troubleshooting container configuration Copia collegamentoCollegamento copiato negli appunti!
OpenStack Platform director uses paunch to launch containers, podman to manage containers, and puppet to create container configuration. This procedure shows how to diagnose a container when errors occur.
Accessing the host
Source the
stackrcfile:$ source ~/stackrcGet the IP address of the node with the container failure.
(undercloud) $ openstack server listLog in to the node:
(undercloud) $ ssh heat-admin@192.168.24.60Change to the root user:
$ sudo -i
Identifying failed containers
View all containers:
$ podman ps --allIdentify the failed container. The failed container usually exits with a non-zero status.
Checking container logs
Each container retains standard output from its main process. Use this output as a log to help determine what actually occurs during a container run. For example, to view the log for the
keystonecontainer, run the following command:$ sudo podman logs keystoneIn most cases, this log contains information about the cause of a container failure.
The host also retains the
stdoutlog for the failed service. You can find thestdoutlogs in/var/log/containers/stdouts/. For example, to view the log for a failedkeystonecontainer, run the following command:$ cat /var/log/containers/stdouts/keystone.log
Inspecting containers
In some situations, you might need to verify information about a container. For example, use the following command to view keystone container data:
$ sudo podman inspect keystone
This command returns a JSON object containing low-level configuration data. You can pipe the output to the jq command to parse specific data. For example, to view the container mounts for the keystone container, run the following command:
$ sudo podman inspect keystone | jq .[0].Mounts
You can also use the --format option to parse data to a single line, which is useful for running commands against sets of container data. For example, to recreate the options used to run the keystone container, use the following inspect command with the --format option:
$ sudo podman inspect --format='{{range .Config.Env}} -e "{{.}}" {{end}} {{range .Mounts}} -v {{.Source}}:{{.Destination}}:{{ join .Options "," }}{{end}} -ti {{.Config.Image}}' keystone
The --format option uses Go syntax to create queries.
Use these options in conjunction with the podman run command to recreate the container for troubleshooting purposes:
$ OPTIONS=$( sudo podman inspect --format='{{range .Config.Env}} -e "{{.}}" {{end}} {{range .Mounts}} -v {{.Source}}:{{.Destination}}{{if .Mode}}:{{.Mode}}{{end}}{{end}} -ti {{.Config.Image}}' keystone )
$ sudo podman run --rm $OPTIONS /bin/bash
Running commands in a container
In some cases, you might need to obtain information from within a container through a specific Bash command. In this situation, use the following podman command to execute commands within a running container. For example, run the podman exec command to run a command inside the keystone container:
$ sudo podman exec -ti keystone <COMMAND>
The -ti options run the command through an interactive pseudoterminal.
Replace <COMMAND> with the command you want to run. For example, each container has a health check script to verify the service connection. You can run the health check script for keystone with the following command:
$ sudo podman exec -ti keystone /openstack/healthcheck
To access the container shell, run podman exec using /bin/bash as the command you want to run inside the container:
$ sudo podman exec -ti keystone /bin/bash
Viewing a container filesystem
To view the file system for the failed container, run the
podman mountcommand. For example, to view the file system for a failedkeystonecontainer, run the following command:$ podman mount keystoneThis provides a mounted location to view the filesystem contents:
/var/lib/containers/storage/overlay/78946a109085aeb8b3a350fc20bd8049a08918d74f573396d7358270e711c610/mergedThis is useful for viewing the Puppet reports within the container. You can find these reports in the
var/lib/puppet/directory within the container mount.
Exporting a container
When a container fails, you might need to investigate the full contents of the file. In this case, you can export the full file system of a container as a tar archive. For example, to export the keystone container file system, run the following command:
$ sudo podman export keystone -o keystone.tar
This command creates the keystone.tar archive, which you can extract and explore.
25.10. Troubleshooting Compute node failures Copia collegamentoCollegamento copiato negli appunti!
Compute nodes use the Compute service to perform hypervisor-based operations. This means the main diagnosis for Compute nodes revolves around this service.
Procedure
Source the
stackrcfile:$ source ~/stackrcGet the IP address of the Compute node that contains the failure:
(undercloud) $ openstack server listLog in to the node:
(undercloud) $ ssh heat-admin@192.168.24.60Change to the root user:
$ sudo -iView the status of the container:
$ sudo podman ps -f name=nova_compute-
The primary log file for Compute nodes is
/var/log/containers/nova/nova-compute.log. If issues occur with Compute node communication, use this file to begin the diagnosis. - If you perform maintenance on the Compute node, migrate the existing instances from the host to an operational Compute node, then disable the node.
25.11. Creating an sosreport Copia collegamentoCollegamento copiato negli appunti!
If you need to contact Red Hat for support with Red Hat OpenStack Platform, you might need to generate an sosreport. For more information about creating an sosreport, see:
25.12. Log locations Copia collegamentoCollegamento copiato negli appunti!
Use the following logs to gather information about the undercloud and overcloud when you troubleshoot issues.
| Information | Log location |
|---|---|
| Containerized service logs |
|
| Standard output from containerized services |
|
| Ansible configuration logs |
|
| Information | Log location |
|---|---|
|
Command history for |
|
| Undercloud installation log |
|
| Information | Log location |
|---|---|
| Cloud-Init Log |
|
| High availability log |
|