Public bug reported: Configured lbaasv2 healhmonitor to send ping request. it sends HTTP requests.
neutron lbaas-healthmonitor-create --delay 1 --max-retries 3 --timeout 3 --type PING --pool 10240065-efc0-4390-abd8-28266ccbaa37 [root@puma07 ~(keystone_redhat]# ip netns qlbaas-43072366-21e9-4d78-8a75-ff3152cbfc70 qrouter-40aacb08-eceb-459c-9f99-d585793df812 qdhcp-6939cdc0-078c-41e5-9f91-301400af464a [root@puma07 ~(keystone_redhat]# ip netns exec qlbaas-43072366-21e9-4d78-8a75-ff3152cbfc70 No command specified [root@puma07 ~(keystone_redhat]# ifconfig lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 0 (Local Loopback) RX packets 1171 bytes 89156 (87.0 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1171 bytes 89156 (87.0 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 tapd6c6f4d7-47: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.10 netmask 255.255.255.0 broadcast 192.168.1.255 inet6 fe80::f816:3eff:fe77:c357 prefixlen 64 scopeid 0x20<link> ether fa:16:3e:77:c3:57 txqueuelen 0 (Ethernet) RX packets 683386 bytes 50012943 (47.6 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1346240 bytes 93670853 (89.3 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 [root@puma07 ~(keystone_redhat]# tcpdump -i tapd6c6f4d7-47 tcp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on tapd6c6f4d7-47, link-type EN10MB (Ethernet), capture size 65535 bytes 15:25:23.483803 IP puma07.scl.lab.tlv.redhat.com.34860 > 192.168.1.7.http: Flags [S], seq 3945578266, win 14600, options [mss 1460,sackOK,TS val 187127554 ecr 0,nop,wscale 7], length 0 15:25:23.483854 IP puma07.scl.lab.tlv.redhat.com.55473 > 192.168.1.9.http: Flags [S], seq 3472828468, win 14600, options [mss 1460,sackOK,TS val 187127554 ecr 0,nop,wscale 7], length 0 15:25:23.483909 IP puma07.scl.lab.tlv.redhat.com.45636 > 192.168.1.8.http: Flags [S], seq 3334280218, win 14600, options [mss 1460,sackOK,TS val 187127554 ecr 0,nop,wscale 7], length 0 15:25:23.484181 IP 192.168.1.8.http > puma07.scl.lab.tlv.redhat.com.45636: Flags [S.], seq 1218837381, ack 3334280219, win 13480, options [mss 1360,sackOK,TS val 86951874 ecr 187127554,nop,wscale 7], length 0 15:25:23.484237 IP 192.168.1.9.http > puma07.scl.lab.tlv.redhat.com.55473: Flags [S.], seq 1626993153, ack 3472828469, win 13480, options [mss 1360,sackOK,TS val 86951510 ecr 187127554,nop,wscale 7], length 0 15:25:23.484285 IP puma07.scl.lab.tlv.redhat.com.45636 > 192.168.1.8.http: Flags [R.], seq 1, ack 1, win 115, options [nop,nop,TS val 187127555 ecr 86951874], length 0 15:25:23.484319 IP 192.168.1.7.http > puma07.scl.lab.tlv.redhat.com.34860: Flags [S.], seq 1919638368, ack 3945578267, win 13480, options [mss 1360,sackOK,TS val 86951619 ecr 187127554,nop,wscale 7], length 0 15:25:23.484357 IP puma07.scl.lab.tlv.redhat.com.55473 > 192.168.1.9.http: Flags [R.], seq 1, ack 1, win 115, options [nop,nop,TS val 187127555 ecr 86951510], length 0 python-neutron-2015.1.0-1.el7ost.noarch openstack-neutron-openvswitch-2015.1.0-1.el7ost.noarch python-neutronclient-2.4.0-1.el7ost.noarch openstack-neutron-2015.1.0-1.el7ost.noarch openstack-neutron-ml2-2015.1.0-1.el7ost.noarch openstack-neutron-lbaas-2015.1.0-3.el7ost.noarch openstack-neutron-fwaas-2015.1.0-3.el7ost.noarch openstack-neutron-common-2015.1.0-1.el7ost.noarch python-neutron-lbaas-2015.1.0-3.el7ost.noarch python-neutron-fwaas-2015.1.0-3.el7ost.noarch ** Affects: neutron Importance: Undecided Status: New ** Tags: lbaas lbaasv2 -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1463816 Title: Healthmonitor misconfiguration - Lbaasv2 Status in OpenStack Neutron (virtual network service): New Bug description: Configured lbaasv2 healhmonitor to send ping request. it sends HTTP requests. neutron lbaas-healthmonitor-create --delay 1 --max-retries 3 --timeout 3 --type PING --pool 10240065-efc0-4390-abd8-28266ccbaa37 [root@puma07 ~(keystone_redhat]# ip netns qlbaas-43072366-21e9-4d78-8a75-ff3152cbfc70 qrouter-40aacb08-eceb-459c-9f99-d585793df812 qdhcp-6939cdc0-078c-41e5-9f91-301400af464a [root@puma07 ~(keystone_redhat]# ip netns exec qlbaas-43072366-21e9-4d78-8a75-ff3152cbfc70 No command specified [root@puma07 ~(keystone_redhat]# ifconfig lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 0 (Local Loopback) RX packets 1171 bytes 89156 (87.0 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1171 bytes 89156 (87.0 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 tapd6c6f4d7-47: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.10 netmask 255.255.255.0 broadcast 192.168.1.255 inet6 fe80::f816:3eff:fe77:c357 prefixlen 64 scopeid 0x20<link> ether fa:16:3e:77:c3:57 txqueuelen 0 (Ethernet) RX packets 683386 bytes 50012943 (47.6 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1346240 bytes 93670853 (89.3 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 [root@puma07 ~(keystone_redhat]# tcpdump -i tapd6c6f4d7-47 tcp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on tapd6c6f4d7-47, link-type EN10MB (Ethernet), capture size 65535 bytes 15:25:23.483803 IP puma07.scl.lab.tlv.redhat.com.34860 > 192.168.1.7.http: Flags [S], seq 3945578266, win 14600, options [mss 1460,sackOK,TS val 187127554 ecr 0,nop,wscale 7], length 0 15:25:23.483854 IP puma07.scl.lab.tlv.redhat.com.55473 > 192.168.1.9.http: Flags [S], seq 3472828468, win 14600, options [mss 1460,sackOK,TS val 187127554 ecr 0,nop,wscale 7], length 0 15:25:23.483909 IP puma07.scl.lab.tlv.redhat.com.45636 > 192.168.1.8.http: Flags [S], seq 3334280218, win 14600, options [mss 1460,sackOK,TS val 187127554 ecr 0,nop,wscale 7], length 0 15:25:23.484181 IP 192.168.1.8.http > puma07.scl.lab.tlv.redhat.com.45636: Flags [S.], seq 1218837381, ack 3334280219, win 13480, options [mss 1360,sackOK,TS val 86951874 ecr 187127554,nop,wscale 7], length 0 15:25:23.484237 IP 192.168.1.9.http > puma07.scl.lab.tlv.redhat.com.55473: Flags [S.], seq 1626993153, ack 3472828469, win 13480, options [mss 1360,sackOK,TS val 86951510 ecr 187127554,nop,wscale 7], length 0 15:25:23.484285 IP puma07.scl.lab.tlv.redhat.com.45636 > 192.168.1.8.http: Flags [R.], seq 1, ack 1, win 115, options [nop,nop,TS val 187127555 ecr 86951874], length 0 15:25:23.484319 IP 192.168.1.7.http > puma07.scl.lab.tlv.redhat.com.34860: Flags [S.], seq 1919638368, ack 3945578267, win 13480, options [mss 1360,sackOK,TS val 86951619 ecr 187127554,nop,wscale 7], length 0 15:25:23.484357 IP puma07.scl.lab.tlv.redhat.com.55473 > 192.168.1.9.http: Flags [R.], seq 1, ack 1, win 115, options [nop,nop,TS val 187127555 ecr 86951510], length 0 python-neutron-2015.1.0-1.el7ost.noarch openstack-neutron-openvswitch-2015.1.0-1.el7ost.noarch python-neutronclient-2.4.0-1.el7ost.noarch openstack-neutron-2015.1.0-1.el7ost.noarch openstack-neutron-ml2-2015.1.0-1.el7ost.noarch openstack-neutron-lbaas-2015.1.0-3.el7ost.noarch openstack-neutron-fwaas-2015.1.0-3.el7ost.noarch openstack-neutron-common-2015.1.0-1.el7ost.noarch python-neutron-lbaas-2015.1.0-3.el7ost.noarch python-neutron-fwaas-2015.1.0-3.el7ost.noarch To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1463816/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp