Bug 1566816

Summary: Creating a plan using access insights for large number of hosts does not work
Product: Red Hat Satellite Reporter: sbadhwar
Component: RH Cloud - InsightsAssignee: Rex White <rexwhite>
Status: CLOSED CURRENTRELEASE QA Contact: Katello QA List <katello-qa-list>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 6.3.0CC: bkearney, jhutar, lphiri, mmccune, psuriset, sbadhwar
Target Milestone: UnspecifiedKeywords: Performance, Triaged
Target Release: Unused   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: scale_lab
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-11-07 20:39:59 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description sbadhwar 2018-04-13 03:26:43 UTC
Description of problem:
When trying to create a plan for a security vulnerability using Red Hat Access Insights for a large number of hosts(10K), the plan creation doesn't work, with UI not showing any message of a success/failure for the building of plan. 

Version-Release number of selected component (if applicable):


How reproducible:
Always

Steps to Reproduce:
1. Click on the Overview Tab under Red Hat Access Insights Option
2. Click view security issues
3. Select any security vulnerability with Ansible mark highlighted
4. Select all hosts (10K or more)
5. Click on actions -> create a new plan/playbook
6. Fill in the name of the new plan
7. Click save
Actual results:
No action happen, and no plan/playbook is generated


Expected results:
A new plan is added and is visible under the planner


Additional info:
The foreman production log can be found at: http://file.blr.redhat.com/sbadhwar/production-redhat-access.log.zip

Comment 9 Bryan Kearney 2018-11-07 20:39:59 UTC
We believe this is fixd in satellite 6.4. If you are still seeing this issue, please open a new bug.