Bug 1083620
Summary: | nova network disassociate and nova delete leads to VM in ERROR state | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Jaroslav Henner <jhenner> | ||||
Component: | openstack-nova | Assignee: | Brent Eagles <beagles> | ||||
Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Jaroslav Henner <jhenner> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | 4.0 | CC: | jhenner, ndipanov, rhallise, sgordon, yeylon | ||||
Target Milestone: | --- | Keywords: | ZStream | ||||
Target Release: | 6.0 (Juno) | ||||||
Hardware: | x86_64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2015-04-15 16:15:01 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 1076100 | ||||||
Attachments: |
|
Description
Jaroslav Henner
2014-04-02 15:11:22 UTC
I believe this was discovered on RHOS 4.0, so setting the field accordingly. This BZ would be better served split into multiple parts. Addressing the issues: 1. There is an upstream endeavor on this. As you might imagine, having the components coordinate reliability on a keystone action is complicated, must consider transient communication issues and timeouts and essentially behave as a system wide transaction with the tenant being the final element actually removed. In other words, this isn't going to be resolved any time soon. 2. I think it is outside of nova's scope to call the other services that might have tenant info to "scrub". Having each component have an API that can be used to recover from an out-of-order operation like deleting a tenant without cleaning up the other services is more within reach. Once that is achieved than orchestration or admin tools can do that particular work. 3. Deleting the default security group isn't really allowed. Either the API needs to filter that group out or the implementation needs to allow it. However, it cannot really be deleted until all of the nova elements that might need it on behalf of that tenant go away - or at least depend on the static nature of a default security group ID relative to that tenant. I recommend reducing the scope of this bz to 1. as it has the relevant trackers in place. 2. is in the realm of 1. in-so-far that it is likely out of nova's scope and the problems and complexities of 1. would apply in 2. in any case - putting it out of reach for the forseeable future. 3. is arguably an independent bug and has a fairly well defined scope and should be filed separately, preferably upstream. If this this is acceptable to you, please reply to the NEEDINFO and I will make the changes. |