Github user michaelandersen commented on the pull request:
https://github.com/apache/cloudstack/pull/933#issuecomment-148337333
the admin stats test fails because of a iptables misconfiguration on the
ILBVM:
=== Marvin Init Logging Successful===
Successfully created account: test-TestInternalLb-LBXE9K, id:
a8c1784b-2718-4d59-bf28-6e0f3c777fe0
Starting test_02_internallb_haproxy_stats_on_all_interfaces
Retrieving haproxy stats settings
{'username': u'admin1', 'password': u'AdMiN123', 'stats_uri':
u'/admin?stats', 'visibility': u'global', 'stats_port': u'8081'}
Created network offering: 549a04f3-f73c-4a0c-abf4-57bc02325d12
Enabled network offering: 549a04f3-f73c-4a0c-abf4-57bc02325d12
Created VPC 2d6aa658-b46f-43f6-8fe1-bcef5993e5b9
Created network deee9fb5-435c-4046-b15f-fe6e8b6b13fe in VPC
2d6aa658-b46f-43f6-8fe1-bcef5993e5b9
Deployed VM id: 4b034739-82e1-4440-8037-422cee07fd57 in VPC
2d6aa658-b46f-43f6-8fe1-bcef5993e5b9
Associating public IP for network: intlb_test02
Associated 192.168.23.5 with network deee9fb5-435c-4046-b15f-fe6e8b6b13fe
Created LB 9e54d08b-fc14-49cb-aea3-19fae5de87b9 in VPC
Assigning virtual machines to LB: 9e54d08b-fc14-49cb-aea3-19fae5de87b9
Creating NAT rule in network for vm with public IP
Adding NetworkACL rules to make NAT rule accessible
nwacl_nat={'startport': u'22', 'endport': u'22', 'aclid':
u'38299456-ef52-40db-a6b8-d619d9ab869f', 'fordisplay': True, 'cidrlist':
u'0.0.0.0/0', 'tags': [], 'number': 1, 'traffictype': u'Ingress', 'state':
u'Active', 'action': u'Allow', 'protocol': u'tcp', 'id':
u'9d678e4c-d70f-4cd5-a91b-8fe89cc745ef'}
====Trying SSH Connection: Host:192.168.23.5 User:root
Port:22 RetryCnt:4===
===SSH to Host 192.168.23.5 port : 22 SUCCESSFUL===
Trying to connect to the haproxy stats url http://10.1.2.95:8081/admin?stats
IP tables config on the internallbvm:
root@b-6-VM:~# iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere state
RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere state
RELATED,ESTABLISHED
ACCEPT icmp -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere state NEW tcp
dpt:3922
ACCEPT tcp -- anywhere 10.1.2.95 tcp dpt:90
state NEW
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
root@b-6-VM:~#
---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---