Original Message:
Sent: Mon December 09, 2019 11:21 AM
From: TOMASZ HANUSIAK
Subject: errors in CP4D
Hi,
Can you please share with us the following?:
oc logs $(oc get po -l name=cpd-install-operator --no-headers -o custom-columns=:metadata.name ) | grep ibmProd
oc exec -it $(oc get po -l name=cpd-install-operator --no-headers -o custom-columns=:metadata.name ) -- helm ls --tls
Thanks
------------------------------
TOMASZ HANUSIAK
Original Message:
Sent: Mon December 09, 2019 09:55 AM
From: TOMASZ HANUSIAK
Subject: errors in CP4D
Hi,
I will follow up with the responsible team to better understand the root cause.
Thanks
------------------------------
TOMASZ HANUSIAK
Original Message:
Sent: Mon December 09, 2019 09:41 AM
From: Joris Weijters
Subject: errors in CP4D
Hi Tomasz,
This seems to solve my problem. Do you know where it has been originated?
Thanks for your support.
------------------------------
Joris Weijters
Original Message:
Sent: Mon December 09, 2019 08:28 AM
From: TOMASZ HANUSIAK
Subject: errors in CP4D
Hi,
Do you see this section:
location /v2/nav {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_common_api:443;
}
in the second file?
This is causing the issue.
My suggestion would be to remove this section, and then restart all nginx pods.
oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- bash
bash-4.2$ cd /user-home/_global_/nginx-conf.d/
bash-4.2$ vi ws-base-routes.conf
Thanks
------------------------------
TOMASZ HANUSIAK
Original Message:
Sent: Mon December 09, 2019 06:43 AM
From: Joris Weijters
Subject: errors in CP4D
Hi,
Hereby the output of the config files
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- cat /user-home/_global_/nginx-conf.d/icp4data-nav.conf
location /internal-nav-files {
root /user-home/_global_/config/zen/nginx/;
try_files $uri =404;
}
location = /v2/nav/js/nav.min.js {
content_by_lua_block {
local cjson = require "cjson"
local addonsSubquery = ngx.location.capture("/zen-data/v1/addons");
local addonsResponse = addonsSubquery.body;
local addonsObj = cjson.decode(addonsResponse);
local addonsCommaList = addonsObj.requestObj;
local addonsList = "if (!window.addons ) {\n window.addons = {}\n}\n";
for k, v in ipairs(addonsCommaList) do
local addonObjString = v.Type:gsub("% ", "_");
addonObjString = addonObjString:gsub("%-", "_");
addonsList = addonsList .. "window.addons." .. addonObjString .. " = true;\n";
end
local timeout = ngx.location.capture("/internal-nav-files/timeout.js");
local nav = ngx.location.capture("/internal-nav-files/nav.min.js");
ngx.say(addonsList .. timeout.body .. nav.body);
}
}
location /v2/nav {
proxy_set_header Host $host;
proxy_pass https://zen-core-svc:3443;
}
[root@rhocp-master ~]#
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- cat /user-home/_global_/nginx-conf.d/icp4data-nav.conf
location /internal-nav-files {
root /user-home/_global_/config/zen/nginx/;
try_files $uri =404;
}
location = /v2/nav/js/nav.min.js {
content_by_lua_block {
local cjson = require "cjson"
local addonsSubquery = ngx.location.capture("/zen-data/v1/addons");
local addonsResponse = addonsSubquery.body;
local addonsObj = cjson.decode(addonsResponse);
local addonsCommaList = addonsObj.requestObj;
local addonsList = "if (!window.addons ) {\n window.addons = {}\n}\n";
for k, v in ipairs(addonsCommaList) do
local addonObjString = v.Type:gsub("% ", "_");
addonObjString = addonObjString:gsub("%-", "_");
addonsList = addonsList .. "window.addons." .. addonObjString .. " = true;\n";
end
local timeout = ngx.location.capture("/internal-nav-files/timeout.js");
local nav = ngx.location.capture("/internal-nav-files/nav.min.js");
ngx.say(addonsList .. timeout.body .. nav.body);
}
}
location /v2/nav {
proxy_set_header Host $host;
proxy_pass https://zen-core-svc:3443;
}
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- cat /user-home/_global_/nginx-conf.d/ws-base-routes.conf
set_by_lua $nsdomain 'return os.getenv("NS_DOMAIN")';
location / {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /home {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /auth {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /postauth {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /settings {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /projects {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /dashboards {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_dashboards portal-dashboards.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_dashboards:443;
}
location /notifications {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /common-error-page {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /connections {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /analytics/rstudio {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /spaces {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location ~ ^/api/(?!(v.*)) {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /css {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /js {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /fonts {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /graphics {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /events {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /socket.io {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location ^~ /ap-components.min {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location ^~ /react-mde {
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;
set $portal_main portal-main.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_main:443;
}
location /transactional/v2/projects {
proxy_set_header Host $host;
proxy_read_timeout 180s;
set $portal_main portal-main.$nsdomain;
proxy_pass https://$portal_main:443;
}
location /v2/projects {
proxy_set_header Host $host;
set $ngp_projects_api ngp-projects-api.$nsdomain;
proxy_pass https://$ngp_projects_api:443;
}
location /v2/user_profiles {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
proxy_pass https://$portal_common_api:443;
}
location /job-manager {
proxy_set_header Host $host;
set $portal_job_manager portal-job-manager.$nsdomain;
proxy_pass https://$portal_job_manager:443;
}
location /v1/nav {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
proxy_pass https://$portal_common_api:443;
}
location /v1/community_content {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
proxy_pass https://$portal_common_api:443;
}
location /v1/accounts {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
proxy_pass https://$portal_common_api:443;
}
location /v2/entitlements {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
proxy_pass https://$portal_common_api:443;
}
location /v2/nav {
proxy_set_header Host $host;
set $portal_common_api portal-common-api.$nsdomain;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self' data: 'unsafe-inline'; connect-src 'self' wss://$host;";
add_header X-Content-Type-Options "nosniff";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
proxy_pass https://$portal_common_api:443;
}
location /v1/notifications {
proxy_set_header Host $host;
set $portal_notifications portal-notifications.$nsdomain;
proxy_pass https://$portal_notifications:443;
}
location /v2/asset_files {
proxy_set_header Host $host;
keepalive_timeout 650;
send_timeout 600;
proxy_connect_timeout 600;
proxy_send_timeout 600;
proxy_read_timeout 600;
set $asset_files_api asset-files-api.$nsdomain;
proxy_pass https://$asset_files_api:443;
}
location /v2/dashboards {
proxy_set_header Host $host;
set $dap_dashboards_api dap-dashboards-api.$nsdomain;
proxy_pass https://$dap_dashboards_api:443;
}
[root@rhocp-master ~]#
------------------------------
Joris Weijters
Original Message:
Sent: Mon December 09, 2019 06:29 AM
From: TOMASZ HANUSIAK
Subject: errors in CP4D
Hi,
This is a defect. Can you please show me the content of these 2 files?:
ws-base-routes.conf
icp4data-nav.conf
oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- cat /user-home/_global_/nginx-conf.d/icp4data-nav.conf
oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- cat /user-home/_global_/nginx-conf.d/ws-base-routes.conf
Thanks
------------------------------
TOMASZ HANUSIAK
Original Message:
Sent: Mon December 09, 2019 05:56 AM
From: Joris Weijters
Subject: errors in CP4D
Hi,
This didn't do the trick:
here the outcome of the commands.
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- nginx -T | grep proj -b5
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- ls /user-home/_global_/nginx-conf.d
ax-proxy-routes.conf shaper-configmap.conf
cognos-ibm-cde-prod-zen-module-config.conf spawner-configmap.conf
env-api-ui-routes.conf volumes-service.conf
icp4d-open-api-configmap.conf wkc-base-routes.conf
icp4data-nav.conf wml-base-routes.conf
model-viewer-routes.conf wml-main-routes.conf
portal-ml-dl-routes.conf ws-job-scheduler-configmap.conf
root.conf zen-admin.conf
runtime-addon-py36.conf zen-ui.conf
shaper-base-configmap.conf zen.conf
[root@rhocp-master ~]# oc delete po -l component=zen-watcher
pod "zen-watcher-b56ddf9b6-6kpj4" deleted
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- nginx -T | grep proj -b5
command terminated with exit code 1
[root@rhocp-master ~]# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- ls /user-home/_global_/nginx-conf.d
ax-proxy-routes.conf spawner-configmap.conf
cognos-ibm-cde-prod-zen-module-config.conf volumes-service.conf
env-api-ui-routes.conf wkc-base-routes.conf
icp4d-open-api-configmap.conf wml-base-routes.conf
icp4data-nav.conf wml-main-routes.conf
model-viewer-routes.conf ws-base-routes.conf
portal-ml-dl-routes.conf ws-job-scheduler-configmap.conf
root.conf zen-admin.conf
runtime-addon-py36.conf zen-ui.conf
shaper-base-configmap.conf zen.conf
shaper-configmap.conf
[root@rhocp-master ~]#
Also when I look at the log of the zen-watcher, I see the folowing errors:
2019/12/09 10:46:27 [emerg] 114#114: duplicate location "/v2/nav" in /user-home/_global_/nginx-conf.d/ws-base-routes.conf:295
nginx: [emerg] duplicate location "/v2/nav" in /user-home/_global_/nginx-conf.d/ws-base-routes.conf:295
nginx: configuration file /usr/local/openresty/nginx/conf/nginx.conf test failed
time="2019-12-09 10:46:27" level=error msg=reload-nginx message=err pod_name=ibm-nginx-8448b4d449-8tnv4
time="2019-12-09 10:46:27" level=info msg=processConfigData event="failed reloading nginx config file. Retrying. " reason="command terminated with exit code 1" retry_count=5
reloading nginx conf
setting up ssl
using default-ssl certs
2019/12/09 10:49:30 [emerg] 157#157: duplicate location "/v2/nav" in /user-home/_global_/nginx-conf.d/ws-base-routes.conf:295
nginx: [emerg] duplicate location "/v2/nav" in /user-home/_global_/nginx-conf.d/ws-base-routes.conf:295
nginx: configuration file /usr/local/openresty/nginx/conf/nginx.conf test failed
time="2019-12-09 10:49:30" level=error msg=reload-nginx message=err pod_name=ibm-nginx-8448b4d449-8tnv4
time="2019-12-09 10:49:30" level=info msg=processConfigData event="failed reloading nginx config file. Retrying. " reason="command terminated with exit code 1" retry_count=6
Ans lokking further into the nginx container:
# oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) /bin/bash
bash-4.2$ ps -ef
UID PID PPID C STIME TTY TIME CMD
1000321+ 1 0 0 Dec06 ? 00:00:00 /bin/sh /scripts/startup.sh
1000321+ 20 1 0 Dec06 ? 00:00:00 nginx: master process nginx -g daemon off;
1000321+ 21 20 0 Dec06 ? 00:01:10 nginx: worker process
1000321+ 22 20 0 Dec06 ? 00:00:01 nginx: cache manager process
1000321+ 180 0 1 10:57 ? 00:00:00 /bin/bash
1000321+ 187 180 0 10:57 ? 00:00:00 ps -ef
bash-4.2$ nginx -T
2019/12/09 10:57:29 [emerg] 188#188: duplicate location "/v2/nav" in /user-home/_global_/nginx-conf.d/ws-base-routes.conf:295
nginx: [emerg] duplicate location "/v2/nav" in /user-home/_global_/nginx-conf.d/ws-base-routes.conf:295
nginx: configuration file /usr/local/openresty/nginx/conf/nginx.conf test failed
bash-4.2$
------------------------------
Joris Weijters
Original Message:
Sent: Mon December 09, 2019 04:29 AM
From: TOMASZ HANUSIAK
Subject: errors in CP4D
Hi,
Restarting the nginx is not enough.
1) Please run:
oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- nginx -T | grep proj -b5
2) Please run:
oc exec -it $(oc get po -l component=ibm-nginx --no-headers -o custom-columns=:metadata.name | head -n 1) -- ls /user-home/_global_/nginx-conf.d
3) Please restart the watcher pod:
oc delete po -l component=zen-watcher
and then repeat steps 1& 2.
Thanks
------------------------------
TOMASZ HANUSIAK
Original Message:
Sent: Mon December 09, 2019 01:00 AM
From: Joris Weijters
Subject: errors in CP4D
HI,
restarting the nginx pods didn't help
------------------------------
Joris Weijters
Original Message:
Sent: Fri December 06, 2019 11:35 AM
From: Sidrah Junaid
Subject: errors in CP4D
Hi Joris,
Can you please restart the ibm-nginx pod and see if it resolves that issue
------------------------------
Sidrah Junaid
Original Message:
Sent: Fri December 06, 2019 06:02 AM
From: Joris Weijters
Subject: errors in CP4D
Hi,
I finally installed Cloud Pak for data successfully at my own OpenShift environment.
I also installed several services. the installation seemed to go fine.
However, I can't use them, nor can I create a new project.
I get a very strange error:"
404 Not Found
openresty
"
I do get this error at a lot of places within my ICP4D environment.
I've been digging into where this comes from, and it seems the ibm-nginx container gives a lot of errors
like:
2019/12/06 08:07:11 [error] 60#60: *871 open() "/usr/local/openresty/nginx/html/projects/new-project" failed (2: No such file or directory), client: 10.128.0.1, server: localhost, request: "GET /projects/new-project?context=icp4data HTTP/1.1", host: "icp4d-cpd-icp4d.rhocp.sltncloud.nl", referrer: "https://icp4d-cpd-icp4d.rhocp.sltncloud.nl/zen/"
I created a support file, and attached it to this post.
can you please help me?
Kind regards,
Joris Weijters
------------------------------
Joris Weijters
------------------------------
#CloudPakforDataGroup