Bug 1473832 - CF unable to refresh after the restore of the overcloud database
Summary: CF unable to refresh after the restore of the overcloud database
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat CloudForms Management Engine
Classification: Red Hat
Component: Providers
Version: 5.7.0
Hardware: All
OS: All
unspecified
urgent
Target Milestone: GA
: 5.6.5
Assignee: Tzu-Mainn Chen
QA Contact: Ola Pavlenko
URL:
Whiteboard: openstack
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-07-21 19:59 UTC by Josh Carter
Modified: 2020-09-10 11:00 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-08-01 20:36:52 UTC
Category: ---
Cloudforms Team: Openstack
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Josh Carter 2017-07-21 19:59:54 UTC
Description of problem:

CF unable to refresh after the restore of the overcloud database

Overcloud database had to be restored to an earlier date along with a change of ips for the overcloud. 

Debug fog output shows that cloudforms is receiving 500 errors from openstack when requesting data from the stack api's  

Version-Release number of selected component (if applicable): 5.7.*


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 6 Felix Dewaleyne 2017-07-21 22:52:26 UTC
all attempts to pull data meet an invailid token error.

the token cloudforms tries to use to use /ressources is always the same.

Comment 7 Felix Dewaleyne 2017-07-22 00:28:40 UTC
this is 5.6.3.3 - the error turns out to be a part of an openstack error which can be reproduced when you try to access the ressource info for the stack

Comment 8 Felix Dewaleyne 2017-07-22 01:45:00 UTC
issue resolved but the way messages from the openstack 9 environment were passed were seriously misleading. 

the problem was that the tokens couldn't be decrypted from the openstack database making it output "invalid token". we had no way to know if that is the token passed for the api request or something else.


Note You need to log in before you can comment on or make changes to this bug.