Support Questions

Find answers, ask questions, and share your expertise

Cloudbreak Failed to Resize due to missing Security Group

Explorer

cloudbreak_1 | 2018-07-28 14:13:15,975 [reactorDispatcher-15] execute:87 INFO c.s.c.c.f.AbstractAction - [owner:9a45139f-4b96-4103-be58-f47f61fe3197] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Stack: 4, flow state: ADD_INSTANCES_STATE, phase: service, execution time 201 sec cloudbreak_1 | 2018-07-28 14:13:15,981 [reactorDispatcher-15] handleStackUpscaleFailure:168 ERROR c.s.c.c.f.s.u.StackUpscaleService - [owner:9a45139f-4b96-4103-be58-f47f61fe3 197] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Exception during the upscale of stack cloudbreak_1 | com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bc c8dfc2' does not exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.AwsResourceConnector.scheduleStatusChecks(AwsResourceConnector.java:769) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.AwsResourceConnector.upscale(AwsResourceConnector.java:629) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler.accept(UpscaleStackHandler.java:64) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler.accept(UpscaleStackHandler.java:31) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler$FastClassBySpringCGLIB$4d3f5688.invoke(<generated>) cloudbreak_1 | at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) cloudbreak_1 | at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:738) cloudbreak_1 | at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157) cloudbreak_1 | at org.springframework.aop.framework.adapter.MethodBeforeAdviceInterceptor.invoke(MethodBeforeAdviceInterceptor.java:52) cloudbreak_1 | at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:179) cloudbreak_1 | at org.springframework.aop.interceptor.ExposeInvocationInterceptor.invoke(ExposeInvocationInterceptor.java:92) cloudbreak_1 | at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:179) cloudbreak_1 | at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:673) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.handler.UpscaleStackHandler$EnhancerBySpringCGLIB$6a28dc9f.accept(<generated>) cloudbreak_1 | at reactor.bus.EventBus$3.accept(EventBus.java:317) cloudbreak_1 | at reactor.bus.EventBus$3.accept(EventBus.java:310) cloudbreak_1 | at reactor.bus.routing.ConsumerFilteringRouter.route(ConsumerFilteringRouter.java:72) cloudbreak_1 | at reactor.bus.routing.TraceableDelegatingRouter.route(TraceableDelegatingRouter.java:51) cloudbreak_1 | at reactor.bus.EventBus.accept(EventBus.java:591) cloudbreak_1 | at reactor.bus.EventBus.accept(EventBus.java:63) cloudbreak_1 | at reactor.core.dispatch.AbstractLifecycleDispatcher.route(AbstractLifecycleDispatcher.java:160) cloudbreak_1 | at reactor.core.dispatch.MultiThreadDispatcher$MultiThreadTask.run(MultiThreadDispatcher.java:74) cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) cloudbreak_1 | at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) cloudbreak_1 | at java.lang.Thread.run(Thread.java:748) cloudbreak_1 | Caused by: java.util.concurrent.ExecutionException: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bcc8dfc2' does no t exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | at com.google.common.util.concurrent.AbstractFuture.getDoneValue(AbstractFuture.java:502) cloudbreak_1 | at com.google.common.util.concurrent.AbstractFuture.get(AbstractFuture.java:481) cloudbreak_1 | at com.google.common.util.concurrent.AbstractFuture$TrustedFuture.get(AbstractFuture.java:78) cloudbreak_1 | at com.google.common.util.concurrent.ForwardingFuture.get(ForwardingFuture.java:62) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.scheduler.SyncPollingScheduler.schedule(SyncPollingScheduler.java:41) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.scheduler.SyncPollingScheduler.schedule(SyncPollingScheduler.java:29) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.AwsResourceConnector.scheduleStatusChecks(AwsResourceConnector.java:766) cloudbreak_1 | ... 24 common frames omitted cloudbreak_1 | Caused by: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bcc8dfc2' does not exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.task.ASGroupStatusCheckerTask.checkFailedActivities(ASGroupStatusCheckerTask.java:138) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.task.ASGroupStatusCheckerTask.doCall(ASGroupStatusCheckerTask.java:98) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.aws.task.ASGroupStatusCheckerTask.doCall(ASGroupStatusCheckerTask.java:35) cloudbreak_1 | at com.sequenceiq.cloudbreak.cloud.task.AbstractPollTask.call(AbstractPollTask.java:33) cloudbreak_1 | at com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:111) cloudbreak_1 | at com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTask.java:58) cloudbreak_1 | at com.google.common.util.concurrent.TrustedListenableFutureTask.run(TrustedListenableFutureTask.java:75) cloudbreak_1 | at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) cloudbreak_1 | at java.util.concurrent.FutureTask.run(FutureTask.java:266) cloudbreak_1 | at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) cloudbreak_1 | at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) cloudbreak_1 | ... 3 common frames omitted cloudbreak_1 | 2018-07-28 14:13:16,047 [reactorDispatcher-15] fireCloudbreakEvent:58 INFO c.s.c.s.e.DefaultCloudbreakEventService - [owner:9a45139f-4b96-4103-be58-f47f61fe31 97] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Firing Cloudbreak event: entityId: 4, type: UPDATE_FAILED, message: Stack update failed. Reason: com.sequenceiq.cloudbreak.cloud.exception.CloudConnectorException: The security group 'sg-bcc8dfc2' does not exist in VPC 'vpc-41bc9f25'. Launching EC2 instance failed. cloudbreak_1 | 2018-07-28 14:13:16,049 [reactorDispatcher-15] sendEvent:126 INFO c.s.c.c.f.AbstractAction - [owner:9a45139f-4b96-4103-be58-f47f61fe3197] [type:STACKVIEW] [id :4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] Triggering event: UPSCALEFAILHANDLED, payload: com.sequenceiq.cloudbreak.reactor.api.event.StackE vent@31e815d cloudbreak_1 | 2018-07-28 14:13:16,049 [reactorDispatcher-16] buildLogContextForReactorHandler:69 INFO c.s.c.l.LogContextAspects - [owner:9a45139f-4b96-4103-be58-f47f61fe319 7] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] A Reactor event handler's 'accept' method has been intercepted: execution( CloudbreakEventHandler.accept(..)), MDC logger context is built. cloudbreak_1 | 2018-07-28 14:13:16,062 [reactorDispatcher-17] buildLogContextForReactorHandler:69 INFO c.s.c.l.LogContextAspects - [owner:9a45139f-4b96-4103-be58-f47f61fe319 7] [type:STACKVIEW] [id:4] [name:ksihdpclstr] [flow:86b7c970-4807-4bc8-97c2-341512cd9ba4] [tracking:] A Reactor event handler's 'accept' method has been in

How can i update the security group setting?

1 REPLY 1

Explorer

I have fixed this issue by modifying and create a new auto scaling launch configuration under AWS Console AUTOSCALING. and assigned the corrected configuration under auto scaling group

Thanks

Mar