Support Questions
Find answers, ask questions, and share your expertise
Announcements
Alert: Welcome to the Unified Cloudera Community. Former HCC members be sure to read and learn how to activate your account here.

Cloudbreak Failed to Resize due to missing Security Group

Cloudbreak Failed to Resize due to missing Security Group

New Contributor

cloudbreak_1 | 2018-07-28 14:13:15,975 [reactorDispatcher-15] execute:87 INFO c.s.c.c.f.AbstractAction - [owner:9a45139f-4b96-4103-be58-f47f61fe3197] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Stack: 4, flow state: ADD_INSTANCES_STATE, phase: service, execution time 201 sec cloudbreak_1 | 2018-07-28 14:13:15,981 [reactorDispatcher-15] handleStackUpscaleFailure:168 ERROR c.s.c.c.f.s.u.StackUpscaleService - [owner:9a45139f-4b96-4103-be58-f47f61fe3 197] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Exception during the upscale of stack cloudbreak_1 | com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bc c8dfc2' does not exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.AwsResourceConnector.scheduleStatusChecks(AwsResourceConnector.java:769) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.AwsResourceConnector.upscale(AwsResourceConnector.java:629) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler.accept(UpscaleStackHandler.java:64) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler.accept(UpscaleStackHandler.java:31) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler$FastClassBySpringCGLIB$4d3f5688.invoke(<generated>) cloudbreak_1 | at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) cloudbreak_1 | at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:738) cloudbreak_1 | at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157) cloudbreak_1 | at org.springframework.aop.framework.adapter.MethodBeforeAdviceInterceptor.invoke(MethodBeforeAdviceInterceptor.java:52) cloudbreak_1 | at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:179) cloudbreak_1 | at org.springframework.aop.interceptor.ExposeInvocationInterceptor.invoke(ExposeInvocationInterceptor.java:92) cloudbreak_1 | at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:179) cloudbreak_1 | at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:673) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler$EnhancerBySpringCGLIB$6a28dc9f.accept(<generated>) cloudbreak_1 | at reactor.bus.EventBus$3.accept(EventBus.java:317) cloudbreak_1 | at reactor.bus.EventBus$3.accept(EventBus.java:310) cloudbreak_1 | at reactor.bus.routing.ConsumerFilteringRouter.route(ConsumerFilteringRouter.java:72) cloudbreak_1 | at reactor.bus.routing.TraceableDelegatingRouter.route(TraceableDelegatingRouter.java:51) cloudbreak_1 | at reactor.bus.EventBus.accept(EventBus.java:591) cloudbreak_1 | at reactor.bus.EventBus.accept(EventBus.java:63) cloudbreak_1 | at reactor.core.dispatch.AbstractLifecycleDispatcher.route(AbstractLifecycleDispatcher.java:160) cloudbreak_1 | at reactor.core.dispatch.MultiThreadDispatcher$MultiThreadTask.run(MultiThreadDispatcher.java:74) cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) cloudbreak_1 | at java.lang.Thread.run(Thread.java:748) cloudbreak_1 | Caused by: java.util.concurrent.ExecutionException: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bcc8dfc2' does no t exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | at com.google.common.util.concurrent.AbstractFuture.getDoneValue(AbstractFuture.java:502) cloudbreak_1 | at com.google.common.util.concurrent.AbstractFuture.get(AbstractFuture.java:481) cloudbreak_1 | at com.google.common.util.concurrent.AbstractFuture$TrustedFuture.get(AbstractFuture.java:78) cloudbreak_1 | at com.google.common.util.concurrent.ForwardingFuture.get(ForwardingFuture.java:62) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.scheduler.SyncPollingScheduler.schedule(SyncPollingScheduler.java:41) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.scheduler.SyncPollingScheduler.schedule(SyncPollingScheduler.java:29) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.AwsResourceConnector.scheduleStatusChecks(AwsResourceConnector.java:766) cloudbreak_1 | ... 24 common frames omitted cloudbreak_1 | Caused by: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bcc8dfc2' does not exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.task.ASGroupStatusCheckerTask.checkFailedActivities(ASGroupStatusCheckerTask.java:138) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.task.ASGroupStatusCheckerTask.doCall(ASGroupStatusCheckerTask.java:98) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.task.ASGroupStatusCheckerTask.doCall(ASGroupStatusCheckerTask.java:35) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.task.AbstractPollTask.call(AbstractPollTask.java:33) cloudbreak_1 | at com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:111) cloudbreak_1 | at com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTask.java:58) cloudbreak_1 | at com.google.common.util.concurrent.TrustedListenableFutureTask.run(TrustedListenableFutureTask.java:75) cloudbreak_1 | at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) cloudbreak_1 | at java.util.concurrent.FutureTask.run(FutureTask.java:266) cloudbreak_1 | at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) cloudbreak_1 | at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) cloudbreak_1 | ... 3 common frames omitted cloudbreak_1 | 2018-07-28 14:13:16,047 [reactorDispatcher-15] fireCloudbreakEvent:58 INFO c.s.c.s.e.DefaultCloudbreakEventService - [owner:9a45139f-4b96-4103-be58-f47f61fe31 97] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Firing Cloudbreak event: entityId: 4, type: UPDATE_FAILED, message: Stack update failed. Reason: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bcc8dfc2' does not exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | 2018-07-28 14:13:16,049 [reactorDispatcher-15] sendEvent:126 INFO c.s.c.c.f.AbstractAction - [owner:9a45139f-4b96-4103-be58-f47f61fe3197] [type:STACKVIEW] [id :4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Triggering event: UPSCALEFAILHANDLED, payload: com.sequenceiq.cloudbreak.reactor.api.event.StackE vent@31e815d cloudbreak_1 | 2018-07-28 14:13:16,049 [reactorDispatcher-16] buildLogContextForReactorHandler:69 INFO c.s.c.l.LogContextAspects - [owner:9a45139f-4b96-4103-be58-f47f61fe319 7] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] A Reactor event handler's 'accept' method has been intercepted: execution( CloudbreakEventHandler.accept(..)), MDC logger context is built. cloudbreak_1 | 2018-07-28 14:13:16,062 [reactorDispatcher-17] buildLogContextForReactorHandler:69 INFO c.s.c.l.LogContextAspects - [owner:9a45139f-4b96-4103-be58-f47f61fe319 7] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] A Reactor event handler's 'accept' method has been in

How can i update the security group setting?

1 REPLY 1
Highlighted

Re: Cloudbreak Failed to Resize due to missing Security Group

New Contributor

I have fixed this issue by modifying and create a new auto scaling launch configuration under AWS Console AUTOSCALING. and assigned the corrected configuration under auto scaling group

Thanks

Mar