Details
-
Bug
-
Resolution: Fixed
-
Major
-
Cheshire-Cat
-
Untriaged
-
1
-
Unknown
Description
7.0.0-4735
Test:
-test tests/integration/cheshirecat/test_cheshirecat_kv_gsi_coll_xdcr_backup_sgw_fts_itemct_txns_eventing_cbas.yml -scope tests/integration/cheshirecat/scope_cheshirecat_with_backup.yml
Scale 2
Iteration 1
task failed with error:
{
|
"task_name": "backup-1",
|
"status": "failed",
|
"start": "2021-03-22T07:00:19.93708485-07:00",
|
"end": "2021-03-22T07:00:42.957713059-07:00",
|
"node_runs": [
|
{
|
"node_id": "ac5e60eb5addb8822bfd7d2dbe1f5142",
|
"status": "failed",
|
"start": "2021-03-22T07:00:20.024422299-07:00",
|
"end": "2021-03-22T07:00:42.90806912-07:00",
|
"error": "exit status 1: failed to execute cluster operations: failed to execute bucket operation for bucket 'bucket5': failed to transfer bucket config for bucket 'bucket5': failed to get bucket configuration for bucket 'bucket5': failed to execute request: Get \"https://172.23.104.15:18091/pools/default/buckets/bucket5\": x509: certificate signed by unknown authority\n\nIf you are using self-signed certificates you can re-run this command with\nthe --no-ssl-verify flag. Note however that disabling ssl verification\nmeans that cbbackupmgr will be vulnerable to man-in-the-middle attacks.\n\nFor the most secure access to Couchbase make sure that you have X.509\ncertificates set up in your cluster and use the --cacert flag to specify\nyour client certificate.",
|
"progress": 0,
|
"stats": {
|
"error": "failed to execute cluster operations: failed to execute bucket operation for bucket 'bucket5': failed to transfer bucket config for bucket 'bucket5': failed to get bucket configuration for bucket 'bucket5': failed to execute request: Get \"https://172.23.104.15:18091/pools/default/buckets/bucket5\": x509: certificate signed by unknown authority\n\nIf you are using self-signed certificates you can re-run this command with\nthe --no-ssl-verify flag. Note however that disabling ssl verification\nmeans that cbbackupmgr will be vulnerable to man-in-the-middle attacks.\n\nFor the most secure access to Couchbase make sure that you have X.509\ncertificates set up in your cluster and use the --cacert flag to specify\nyour client certificate.",
|
"stats": {
|
"started_at": 1616421620468619300,
|
"buckets": {
|
"NEW_ORDER": {
|
"estimated_total_items": 12055132,
|
"total_items": 1251105,
|
"total_vbuckets": 1024,
|
"vbuckets_complete": 1024,
|
"bytes_received": 75010046,
|
"snapshot_markers_received": 1024,
|
"snapshot_ends_received": 1024,
|
"failover_logs_received": 1024,
|
"deletions_received": 1251105,
|
"started_at": 1616421625884473900,
|
"finished_at": 1616421642697747700,
|
"complete": true,
|
"errored": false
|
}
|
},
|
"complete": false
|
}
|
},
|
"error_code": 2
|
}
|
],
|
"error": "exit status 1: failed to execute cluster operations: failed to execute bucket operation for bucket 'bucket5': failed to transfer bucket config for bucket 'bucket5': failed to get bucket configuration for bucket 'bucket5': failed to execute request: Get \"https://172.23.104.15:18091/pools/default/buckets/bucket5\": x509: certificate signed by unknown authority\n\nIf you are using self-signed certificates you can re-run this command with\nthe --no-ssl-verify flag. Note however that disabling ssl verification\nmeans that cbbackupmgr will be vulnerable to man-in-the-middle attacks.\n\nFor the most secure access to Couchbase make sure that you have X.509\ncertificates set up in your cluster and use the --cacert flag to specify\nyour client certificate.",
|
"error_code": 2,
|
"type": "BACKUP",
|
"show": true
|
}
|
backup service log:
2021-03-22T07:00:31.635-0700 INFO (Rebalance) Setting self as leader
|
2021-03-22T07:00:31.636-0700 INFO (Rebalance) Did the failover nodes will do eject node now {"eject nodes": []}
|
2021-03-22T07:00:31.636-0700 INFO (Rebalance) Adding nodes now {"keep nodes": [{"nodeInfo":{"nodeId":"ac5e60eb5addb8822bfd7d2dbe1f5142","priority":2,"opaque":{"grpc_port":9124,"host":"172.23.105.62","http_port":8097}},"recoveryType":"recovery-full"}]}
|
2021-03-22T07:00:31.636-0700 INFO (Rebalance) Keep node {"nodeID": "ac5e60eb5addb8822bfd7d2dbe1f5142"}
|
2021-03-22T07:00:31.636-0700 DEBUG (Rebalance) Added node to MetaKV {"nodeID": "ac5e60eb5addb8822bfd7d2dbe1f5142"}
|
2021-03-22T07:00:31.638-0700 DEBUG (Rebalance) Checking if status match {"expected": "node in", "attempt": 0}
|
2021-03-22T07:00:31.638-0700 INFO (Rebalance) Nodes added
|
2021-03-22T07:00:31.638-0700 INFO (Rebalance) Rebalance done {"err": null, "state": {}, "cancelled": false}
|
2021-03-22T07:00:31.638-0700 INFO (Janitor) Storage access check triggered
|
2021-03-22T07:00:31.638-0700 INFO (Janitor) Running storage access check
|
2021-03-22T07:00:31.706-0700 INFO (Janitor) Running storage access check on state active
|
2021-03-22T07:00:31.719-0700 INFO (GRPC Manager) Global storage location check {"req": "location:\"/data/archive/.cbbs-44be20a03daac45161917171ba4d7886/node-ac5e60eb5addb8822bfd7d2dbe1f5142-1616421631715286467\" sourceNode:\"ac5e60eb5addb8822bfd7d2dbe1f5142\" "}
|
2021-03-22T07:00:31.726-0700 INFO (Janitor) Running storage access check on state archived
|
2021-03-22T07:00:40.042-0700 DEBUG (Leader Manager) Received store event {"eventType": 5}
|
2021-03-22T07:00:40.043-0700 DEBUG (Event Handler) (Node Run) Task updates {"cluster": "self", "repository": "my_repo", "task": "backup-1", "status": "running"}
|
2021-03-22T07:00:42.907-0700 INFO (Worker) Command exited {"err": "exit status 1", "cluster": "self", "repositoryID": "my_repo", "state": "active", "taskName": "backup-1"}
|
2021-03-22T07:00:42.908-0700 WARN (Worker) Task failed {"cluster": "self", "repositoryID": "my_repo", "state": "active", "taskName": "backup-1", "err": "exit status 1", "cbmErr": "exit status 1: failed to execute cluster operations: failed to execute bucket operation for bucket 'bucket5': failed to transfer bucket config for bucket 'bucket5': failed to get bucket configuration for bucket 'bucket5': failed to execute request: Get \"https://172.23.104.15:18091/pools/default/buckets/bucket5\": x509: certificate signed by unknown authority\n\nIf you are using self-signed certificates you can re-run this command with\nthe --no-ssl-verify flag. Note however that disabling ssl verification\nmeans that cbbackupmgr will be vulnerable to man-in-the-middle attacks.\n\nFor the most secure access to Couchbase make sure that you have X.509\ncertificates set up in your cluster and use the --cacert flag to specify\nyour client certificate."}
|
2021-03-22T07:00:42.910-0700 DEBUG (Leader Manager) Received store event {"eventType": 5}
|
2021-03-22T07:00:42.910-0700 DEBUG (Event Handler) (Node Run) Task updates {"cluster": "self", "repository": "my_repo", "task": "backup-1", "status": "failed"}
|
2021-03-22T07:00:42.910-0700 INFO (Event Handler) (Node Run) Task finished {"cluster": "self", "repository": "my_repo", "task": "backup-1", "status": "failed"}
|
2021-03-22T07:00:43.014-0700 DEBUG (Leader Manager) Received store event {"eventType": 3}
|
2021-03-22T07:00:43.014-0700 DEBUG (Leader Manager) Received store event {"eventType": 5}
|
2021-03-22T07:00:43.014-0700 DEBUG (Leader Manager) Received store event {"eventType": 3}
|
2021-03-22T07:04:24.389-0700 INFO (Stats) Start repositories data size collection
|
2021-03-22T07:04:24.439-0700 INFO (Runner) Running command /opt/couchbase/bin/cbbackupmgr info -j -a /data/archive --offset 0 --limit 0 -r a9b731f7-f316-42b7-b449-8f727020a4b1
|
2021-03-22T07:04:24.464-0700 INFO (Stats) Stop repositories data size collection
|
2021-03-22T07:09:19.212-0700 INFO (Node) Change on cluster encryption settings
|
2021-03-22T07:09:19.213-0700 INFO (Node) Cluster en
|
Logs:
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.104.15.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.104.165.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.104.214.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.104.232.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.104.244.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.104.245.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.102.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.109.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.112.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.118.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.164.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.183.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.206.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.210.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.25.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.29.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.61.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.62.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.86.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.90.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.105.93.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.117.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.191.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.207.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.209.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.225.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.232.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.32.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.54.zip
url : https://cb-jira.s3.us-east-2.amazonaws.com/logs/systestmon-1616425509/collectinfo-2021-03-22T150510-ns_1%40172.23.106.70.zip