cloudstack-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Rayees Namathponnan (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (CLOUDSTACK-3690) Test case test_netscaler_lb.TestVmWithLb.test_05_reboot_user_vm with Exception "Both request should be served by different instances"
Date Sun, 21 Jul 2013 17:06:48 GMT

     [ https://issues.apache.org/jira/browse/CLOUDSTACK-3690?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Rayees Namathponnan updated CLOUDSTACK-3690:
--------------------------------------------

    Attachment: management-server.rar
                management-server.log.2013-07-20.gz
    
> Test case test_netscaler_lb.TestVmWithLb.test_05_reboot_user_vm with Exception "Both
request should be served by different instances"
> -------------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: CLOUDSTACK-3690
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-3690
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the default.) 
>          Components: Automation
>    Affects Versions: 4.2.0
>         Environment: VMware with netscaler 
> 4.2
>            Reporter: Rayees Namathponnan
>             Fix For: 4.2.0
>
>         Attachments: management-server.log.2013-07-20.gz, management-server.rar
>
>
> this issue observed in vmware setup,  below test case integration.component.test_netscaler_lb.TestVmWithLb.test_05_reboot_user_vm
failed with error 
> "Exception occured during SSH: 10.223.243.42 - Both request should be served by different
instances"
> Stacktrace
>   File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
>     testMethod()
>   File "/data/Repo2/qa/cloudstack/test/integration/component/test_netscaler_lb.py", line
2805, in test_05_reboot_user_vm
>     e))
>   File "/usr/local/lib/python2.7/unittest/case.py", line 393, in fail
>     raise self.failureException(msg)
> Exception occured during SSH: 10.223.243.42 - Both request should be served by different
instances
> -------------------- >> begin captured logging << --------------------
> testclient.testcase.TestVmWithLb: DEBUG: Rebooting VM instance: 9077e27f-e8bb-4a86-865a-bfa92774acf2
> testclient.testcase.TestVmWithLb: DEBUG: Rebooting VM: 9077e27f-e8bb-4a86-865a-bfa92774acf2
> testclient.testcase.TestVmWithLb: DEBUG: Verifying request served by only running instances
> testclient.testcase.TestVmWithLb: DEBUG: Command: hostname
> paramiko.transport: DEBUG: [chan 3] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 3] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 3 opened.
> paramiko.transport: DEBUG: [chan 3] Sesch channel 3 request ok
> paramiko.transport: DEBUG: [chan 3] EOF received (3)
> paramiko.transport: DEBUG: [chan 3] EOF sent (3)
> sshClient: DEBUG: {Cmd: hostname via Host: 10.223.243.42} {returns: ['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']}
> testclient.testcase.TestVmWithLb: DEBUG: Output: ['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']
> paramiko.transport: DEBUG: starting thread (client mode): 0x19eb5fd0L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.243.42: 52804a4b6b4b31a8f0e7d9404dc68234
> paramiko.transport: DEBUG: Trying discovered key d73731e045a189d941928d25f66aa458 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) successful!
> sshClient: DEBUG: SSH connect: root@10.223.243.42 with passwd password
> paramiko.transport: DEBUG: EOF in transport thread
> testclient.testcase.TestVmWithLb: DEBUG: Command: hostname
> paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 1 opened.
> paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
> paramiko.transport: DEBUG: [chan 1] EOF received (1)
> paramiko.transport: DEBUG: [chan 1] EOF sent (1)
> sshClient: DEBUG: {Cmd: hostname via Host: 10.223.243.42} {returns: ['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']}
> testclient.testcase.TestVmWithLb: DEBUG: Output: ['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']
> testclient.testcase.TestVmWithLb: DEBUG: Hostnames: [['59636de1-e0d9-43c3-b15e-49fd2d65d4b6'],
['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']]
> paramiko.transport: DEBUG: starting thread (client mode): 0x19eb5850L
> paramiko.transport: ERROR: Exception: Error reading SSH protocol banner[Errno 104] Connection
reset by peer
> paramiko.transport: ERROR: Traceback (most recent call last):
> paramiko.transport: ERROR:   File "/usr/local/lib/python2.7/site-packages/paramiko/transport.py",
line 1555, in run
> paramiko.transport: ERROR:     self._check_banner()
> paramiko.transport: ERROR:   File "/usr/local/lib/python2.7/site-packages/paramiko/transport.py",
line 1681, in _check_banner
> paramiko.transport: ERROR:     raise SSHException('Error reading SSH protocol banner'
+ str(x))
> paramiko.transport: ERROR: SSHException: Error reading SSH protocol banner[Errno 104]
Connection reset by peer
> paramiko.transport: ERROR: 
> paramiko.transport: DEBUG: starting thread (client mode): 0x19ec29d0L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.243.42: 52804a4b6b4b31a8f0e7d9404dc68234
> paramiko.transport: DEBUG: Trying discovered key d73731e045a189d941928d25f66aa458 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) successful!
> sshClient: DEBUG: SSH connect: root@10.223.243.42 with passwd password
> testclient.testcase.TestVmWithLb: DEBUG: Command: hostname
> paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 1 opened.
> paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
> paramiko.transport: DEBUG: [chan 1] EOF received (1)
> paramiko.transport: DEBUG: [chan 1] EOF sent (1)
> sshClient: DEBUG: {Cmd: hostname via Host: 10.223.243.42} {returns: ['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']}
> testclient.testcase.TestVmWithLb: DEBUG: Output: ['59636de1-e0d9-43c3-b15e-49fd2d65d4b6']
> --------------------- >> end captured logging << ---------------------

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message