Skip to content

Instantly share code, notes, and snippets.

View guilhermesteinmuller's full-sized avatar

Guilherme Steinmüller guilhermesteinmuller

  • VEXXHOST, Inc.
  • Campina Grande - PB - Brazil
View GitHub Profile
0225c72 - - -] Running command: ['sudo', '/openstack/venvs/neutron-18.0.0/bin/neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip', 'netns', 'exec', 'qdhcp-0048fce6-c715-4106-a810-473620326cb0', 'ip', 'addr', 'show', 'tap89d88fe7-85'] create_process /openstack/venvs/neutron-18.0.0/lib/python2.7/site-packages/neutron/agent/linux/utils.py:92
2019-02-26 18:14:48.921 4556 DEBUG neutron.agent.linux.utils [req-631d56e0-bf85-4c0a-93a5-2b6a0f00bbc8 de81838458254d87a9ef66cc89e22308 86bbbcfa8ad043109d2d7af530225c72 - - -] Running command: ['sudo', '/openstack/venvs/neutron-18.0.0/bin/neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'kill', '-HUP', '6158'] create_process /openstack/venvs/neutron-18.0.0/lib/python2.7/site-packages/neutron/agent/linux/utils.py:92
2019-02-26 18:15:05.117 4556 DEBUG oslo_concurrency.lockutils [-] Lock "_check_child_processes" acquired by "neutron.agent.linux.external_process._check_child_processes" :: waited 0.000s inner /openstack/venvs/neutron-18.0.0/lib/python2.7/site-packages/oslo_conc
[root@ctl1-sjc1 ~]# tcpdump -i any port 67 or port 68 -e -n
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
19:30:29.982255 B fa:16:3e:e8:71:ed ethertype 802.1Q (0x8100), length 348: vlan 101, p 0, ethertype IPv4, 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:e8:71:ed, length 300
19:30:29.994838 B fa:16:3e:e8:71:ed ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:e8:71:ed, length 300
19:30:31.396110 B fa:16:3e:f1:43:06 ethertype 802.1Q (0x8100), length 348: vlan 101, p 0, ethertype IPv4, 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:f1:43:06, length 300
19:30:31.396110 B fa:16:3e:f1:43:06 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:f1:43:06, length 300
19:30:32.741649 B fa:16:3e:e8:71:ed ethertype 802.1Q (0x
[root@ctl1-sjc1 ~]# ip netns exec qdhcp-0048fce6-c715-4106-a810-473620326cb0 tcpdump -i any port 67 or port 68 -e -n
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
19:33:43.319834 B ec:f4:bb:c3:ac:d0 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from ec:f4:bb:c3:ac:d0, length 300
19:33:43.633731 B fa:16:3e:76:46:51 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:76:46:51, length 300
19:33:44.335812 B fa:16:3e:5d:76:89 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:5d:76:89, length 300
19:33:44.694224 B fa:16:3e:f7:0d:76 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:f7:0d:76, length 300
19:33:49.644811 B fa:16:3e:b6:6f:0a ethertype IPv4 (0x0800), leng
19:37:16.677836 B fa:16:3e:5d:76:89 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:5d:76:89, length 300
19:37:16.678230 Out fa:16:3e:b7:7e:0c ethertype IPv4 (0x0800), length 362: 38.108.68.7.bootps > 38.108.68.86.bootpc: BOOTP/DHCP, Reply, length 318
19:37:16.679307 B fa:16:3e:5d:76:89 ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:5d:76:89, length 300
19:37:16.680221 Out fa:16:3e:b7:7e:0c ethertype IPv4 (0x0800), length 362: 38.108.68.7.bootps > 38.108.68.86.bootpc: BOOTP/DHCP, Reply, length 318
19:37:17.394333 B fa:16:3e:88:66:be ethertype IPv4 (0x0800), length 344: 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from fa:16:3e:88:66:be, length 300
19:37:17.394620 Out fa:16:3e:b7:7e:0c ethertype IPv4 (0x0800), length 350: 38.108.68.7.bootps > 38.108.68.121.bootpc: BOOTP/DHCP, Reply, length 306
19:37:17.395223 B fa:16:3e:88:66:be ethertype IPv4 (0x0800), length
[root@ctl1-sjc1 ~]# tailf /var/log/neutron/neutron-dhcp-agent.log
2019-02-26 19:56:46.680 33766 DEBUG oslo_concurrency.lockutils [req-11bb2881-81e6-4e30-9c4d-fc885f863abc de81838458254d87a9ef66cc89e22308 86bbbcfa8ad043109d2d7af530225c72 - - -] Releasing semaphore "dhcp-agent-network-lock-0048fce6-c715-4106-a810-473620326cb0" lock /openstack/venvs/neutron-18.0.0/lib/python2.7/site-packages/oslo_concurrency/lockutils.py:228
2019-02-26 19:56:46.681 33766 DEBUG oslo_concurrency.lockutils [req-c2018c13-f35e-4ce6-9320-234baa3149d0 de81838458254d87a9ef66cc89e22308 86bbbcfa8ad043109d2d7af530225c72 - - -] Acquired semaphore "dhcp-agent-network-lock-0048fce6-c715-4106-a810-473620326cb0" lock /openstack/venvs/neutron-18.0.0/lib/python2.7/site-packages/oslo_concurrency/lockutils.py:212
2019-02-26 19:56:46.682 33766 DEBUG oslo_concurrency.lockutils [req-c2018c13-f35e-4ce6-9320-234baa3149d0 de81838458254d87a9ef66cc89e22308 86bbbcfa8ad043109d2d7af530225c72 - - -] Releasing semaphore "dhcp-agent-network-lock-0048fce6-c715-4
[root@ctl1-sjc1 ~]#
[root@ctl1-sjc1 ~]# tailf /var/log/neutron/neutron-dhcp-agent.log | grep ERROR
2019-02-26 21:37:41.803 19062 ERROR neutron.agent.linux.utils [req-3f8c7998-57cc-40f3-a47e-32ab9276d76d 6a75e5d16bda4ff587df2b857467328a 0409ebdbae6045ebb924a64589653e64 - - -] Exit code: -15; Stdin: ; Stdout: ; Stderr:
2019-02-26 21:37:41.805 19062 ERROR neutron.agent.dhcp.agent [req-3f8c7998-57cc-40f3-a47e-32ab9276d76d 6a75e5d16bda4ff587df2b857467328a 0409ebdbae6045ebb924a64589653e64 - - -] Unable to reload_allocations dhcp for 0048fce6-c715-4106-a810-473620326cb0.: ProcessExecutionError: Exit code: -15; Stdin: ; Stdout: ; Stderr:
2019-02-26 21:37:41.805 19062 ERROR neutron.agent.dhcp.agent Traceback (most recent call last):
2019-02-26 21:37:41.805 19062 ERROR neutron.agent.dhcp.agent File "/openstack/venvs/neutron-18.0.0/lib/python2.7/site-packages/neutron/agent/dhcp/agent.py", line 144, in call_driver
2019-02-26 21:37:41.805 19062 ERROR neutron.agent.dhcp.agent getattr(driver, action)(**action_kwargs
```
[root@ctl1-sjc1 ~]# journalctl -f
-- Logs begin at Tue 2019-02-26 00:33:54 UTC. --
Feb 27 14:39:26 ctl1-sjc1.vexxhost.us kernel: device ha-74ec6ad0-ff left promiscuous mode
Feb 27 14:39:26 ctl1-sjc1.vexxhost.us systemd-udevd[1119]: Could not generate persistent MAC address for ha-74ec6ad0-ff: No such file or directory
Feb 27 14:39:26 ctl1-sjc1.vexxhost.us kernel: device ha-74ec6ad0-ff entered promiscuous mode
Feb 27 14:39:26 ctl1-sjc1.vexxhost.us kernel: device ha-25328511-4a left promiscuous mode
Feb 27 14:39:26 ctl1-sjc1.vexxhost.us systemd-udevd[1119]: Could not generate persistent MAC address for ha-25328511-4a: No such file or directory
Feb 27 14:39:26 ctl1-sjc1.vexxhost.us kernel: device ha-25328511-4a entered promiscuous mode