Bug 1317920 - When Salt status is pulled 65 superflous lines for iptables --help print out in the log files
Summary: When Salt status is pulled 65 superflous lines for iptables --help print out ...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat
Component: Calamari
Version: 1.3.2
Hardware: Unspecified
OS: Linux
unspecified
low
Target Milestone: rc
: 1.3.4
Assignee: Christina Meno
QA Contact: ceph-qe-bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-03-15 14:02 UTC by Mike Hackett
Modified: 2019-11-14 07:36 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-04-24 17:43:25 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Mike Hackett 2016-03-15 14:02:45 UTC
Description of problem:

Ceph Calamari
When Salt status is pulled 65 superflous lines for iptables --help print out in the log files thus flooding the log files.

Issue is documented:
https://github.com/saltstack/salt/issues/13507

Red Hat Ceph Storage packages Salt version 2014.1.5-3 so this issue is seen.


Issue:
2016-03-09 07:58:03,048 [salt.state       ][INFO    ] Loading fresh modules for state activity
2016-03-09 07:58:03,090 [salt.modules.cmdmod][INFO    ] Executing command 'iptables --help' in directory '/root'
2016-03-09 07:58:03,094 [salt.modules.cmdmod][INFO    ] output: iptables v1.4.21

Usage: iptables -[ACD] chain rule-specification [options]
       iptables -I chain [rulenum] rule-specification [options]
       iptables -R chain rulenum rule-specification [options]
       iptables -D chain rulenum [options]
       iptables -[LS] [chain [rulenum]] [options]
       iptables -[FZ] [chain] [options]
       iptables -[NX] chain
       iptables -E old-chain-name new-chain-name
       iptables -P chain target [options]
       iptables -h (print this help information)

Commands:
Either long or short options are allowed.
  --append  -A chain            Append to chain
  --check   -C chain            Check for the existence of a rule
  --delete  -D chain            Delete matching rule from chain
  --delete  -D chain rulenum
                                Delete rule rulenum (1 = first) from chain
  --insert  -I chain [rulenum]
                                Insert in chain as rulenum (default 1=first)
  --replace -R chain rulenum
                                Replace rule rulenum (1 = first) in chain
  --list    -L [chain [rulenum]]
                                List the rules in a chain or all chains
  --list-rules -S [chain [rulenum]]
                                Print the rules in a chain or all chains
  --flush   -F [chain]          Delete all rules in  chain or all chains
  --zero    -Z [chain [rulenum]]
                                Zero counters in chain or all chains
  --new     -N chain            Create a new user-defined chain
  --delete-chain
            -X [chain]          Delete a user-defined chain
  --policy  -P chain target
                                Change policy on chain to target
  --rename-chain
            -E old-chain new-chain
                                Change chain name, (moving any references)
Options:
    --ipv4      -4              Nothing (line is ignored by ip6tables-restore)
    --ipv6      -6              Error (line is ignored by iptables-restore)
[!] --protocol  -p proto        protocol: by number or name, eg. `tcp'
[!] --source    -s address[/mask][...]
                                source specification
[!] --destination -d address[/mask][...]
                                destination specification
[!] --in-interface -i input name[+]
                                network interface name ([+] for wildcard)
 --jump -j target
                                target for rule (may load target extension)
  --goto      -g chain
                              jump to chain with no return
  --match       -m match
                                extended match (may load extension)
  --numeric     -n              numeric output of addresses and ports
[!] --out-interface -o output name[+]
                                network interface name ([+] for wildcard)
  --table       -t table        table to manipulate (default: `filter')
  --verbose     -v              verbose mode
  --wait        -w [seconds]    wait for the xtables lock
  --line-numbers                print line numbers when listing
  --exact       -x              expand numbers (display exact values)
[!] --fragment  -f              match second or further fragments only
  --modprobe=<command>          try to insert modules using this command
  --set-counters PKTS BYTES     set the counter during insert/append
[!] --version   -V              print package version.
2016-03-09 07:58:03,164 [salt.state       ][INFO    ] Running state [systemctl enable httpd && systemctl start httpd] at time 07:58:03.164144
2016-03-09 07:58:03,164 [salt.state       ][INFO    ] Executing state cmd.run for systemctl enable httpd && systemctl start httpd
2016-03-09 07:58:03,198 [salt.loaded.int.module.cmdmod][INFO    ] Executing command 'systemctl enable httpd && systemctl start httpd' as user 'root' in directory '/root'
2016-03-09 07:58:03,272 [salt.state       ][INFO    ] {'pid': 26324, 'retcode': 0, 'stderr': '', 'stdout': ''}
2016-03-09 07:58:03,272 [salt.state       ][INFO    ] Completed state [systemctl enable httpd && systemctl start httpd] at time 07:58:03.272167
2016-03-09 07:58:03,272 [salt.state       ][INFO    ] Running state [systemctl enable salt-master && systemctl start salt-master] at time 07:58:03.272347
2016-03-09 07:58:03,273 [salt.state       ][INFO    ] Executing state cmd.run for systemctl enable salt-master && systemctl start salt-master
2016-03-09 07:58:03,306 [salt.loaded.int.module.cmdmod][INFO    ] Executing command 'systemctl enable salt-master && systemctl start salt-master' as user 'root' in directory '/root'
2016-03-09 07:58:03,379 [salt.state       ][INFO    ] {'pid': 26363, 'retcode': 0, 'stderr': '', 'stdout': ''}
2016-03-09 07:58:03,380 [salt.state       ][INFO    ] Completed state [systemctl enable salt-master && systemctl start salt-master] at time 07:58:03.379625
2016-03-09 07:58:03,380 [salt.state       ][INFO    ] Running state [systemctl enable supervisord && systemctl start supervisord] at time 07:58:03.379807
2016-03-09 07:58:03,380 [salt.state       ][INFO    ] Executing state cmd.run for systemctl enable supervisord && systemctl start supervisord
2016-03-09 07:58:03,413 [salt.loaded.int.module.cmdmod][INFO    ] Executing command 'systemctl enable supervisord && systemctl start supervisord' as user 'root' in directory '/root'
2016-03-09 07:58:03,485 [salt.state       ][INFO    ] {'pid': 26401, 'retcode': 0, 'stderr': '', 'stdout': ''}
2016-03-09 07:58:03,485 [salt.state       ][INFO    ] Completed state [systemctl enable supervisord && systemctl start supervisord] at time 07:58:03.485459


Version-Release number of selected component (if applicable):
Red Hat Ceph Storage 1.3.2
Salt 2014.1.5-3

Comment 2 Christina Meno 2016-03-17 19:51:08 UTC
Calamari will not be responsible for salt version in Red Hat ceph 2.0. File another bz under storage console version 2. I will move this bz to 1.3.z for later evaluation.


Note You need to log in before you can comment on or make changes to this bug.