Stack update with blacklisted servers fails with: ERROR openstack [ admin] Timed out waiting for port 22 from 192.168.24.112

Bug #1797572 reported by James Slagle
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tripleo
Fix Released
High
James Slagle

Bug Description

Description of problem:
Stack update with blacklisted servers fails with: ERROR openstack [ admin] Timed out waiting for port 22 from 192.168.24.112

192.168.24.112 is a blacklisted server with the SSH server disabled

Version-Release number of selected component (if applicable):
python-tripleoclient-10.5.1-0.20180906012845.el7ost.noarch

How reproducible:
100%

Steps to Reproduce:
1. Deploy overcloud
2. Disable SSH service on one of the compute nodes
3. Re-run overcloud deploy with the node in step 2 blacklisted

Actual results:
Stack update fails

Expected results:
Stack update should complete without errors.

Additional info:

Changed in tripleo:
status: New → In Progress
importance: Undecided → High
assignee: nobody → James Slagle (james-slagle)
milestone: none → stein-1
tags: added: rocky-backport-potential
tags: added: config-download
removed: rocky-backport-potential
tags: added: rocky-backport-potential
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to python-tripleoclient (master)

Fix proposed to branch: master
Review: https://review.openstack.org/610104

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to python-tripleoclient (master)

Reviewed: https://review.openstack.org/610104
Committed: https://git.openstack.org/cgit/openstack/python-tripleoclient/commit/?id=7cef36bc9bf9ab23643116ae3bcea588882f5f26
Submitter: Zuul
Branch: master

commit 7cef36bc9bf9ab23643116ae3bcea588882f5f26
Author: James Slagle <email address hidden>
Date: Fri Oct 12 10:21:43 2018 -0400

    Honor blacklist during temp key injection

    The server blacklist also needs to be honored when getting the list
    of hosts that we use to check for the ssh port being available, and
    injecting the temporary ssh key.

    Change-Id: I7ea9201f39af17bb43b7a1b8a9d8d1064e365c14
    Closes-Bug: #1797572

Changed in tripleo:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to python-tripleoclient (stable/rocky)

Fix proposed to branch: stable/rocky
Review: https://review.openstack.org/611855

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to python-tripleoclient (stable/rocky)

Reviewed: https://review.openstack.org/611855
Committed: https://git.openstack.org/cgit/openstack/python-tripleoclient/commit/?id=c6dbdd0c5f29e4e7c4a282028e04353f98beb77a
Submitter: Zuul
Branch: stable/rocky

commit c6dbdd0c5f29e4e7c4a282028e04353f98beb77a
Author: James Slagle <email address hidden>
Date: Fri Oct 12 10:21:43 2018 -0400

    Honor blacklist during temp key injection

    The server blacklist also needs to be honored when getting the list
    of hosts that we use to check for the ssh port being available, and
    injecting the temporary ssh key.

    Change-Id: I7ea9201f39af17bb43b7a1b8a9d8d1064e365c14
    Closes-Bug: #1797572
    (cherry picked from commit 7cef36bc9bf9ab23643116ae3bcea588882f5f26)

tags: added: in-stable-rocky
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/python-tripleoclient 11.1.0

This issue was fixed in the openstack/python-tripleoclient 11.1.0 release.

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/python-tripleoclient 10.6.1

This issue was fixed in the openstack/python-tripleoclient 10.6.1 release.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.