-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error: create backup target: create cluster session: gocql: unable to create session: unable to discover protocol version: dial tcp :0->10.12.11.254:9142: connect: connection refused during backup nemesis #4206
Comments
PackagesScylla version: Kernel Version: Installation detailsCluster size: 4 nodes (Standard_L16s_v3) Scylla Nodes used in this run:
OS / Image: Test: Logs and commands
Logs:
|
I think what's happening in this issue is:
So issue can be fixed by adding On the other hand, it's interesting why scylla-manager tries to use 9142 when it is not set in scylla.yaml? As far as I know, scylla-manager gets configuration parameters from Scylla Rest API, so I suspect ScyllaDB might be returning 9142 port even if it's not listening on it. Note: it's just a theory and needs validation. @Michal-Leszczynski what do you think about this? |
@VAveryanov8 you are right in terms of what happened! There is this really old issue that the Scylla API used for querying the config returns the default value for the unspecified option. So disabling SSL port and setting it to the default value looks the same from SM POV. That's also the sole reason why we needed to add the following flags to the
Enabling SSL and disabling the SSL port is supported by Scylla: # Enabling native transport encryption in client_encryption_options allows you to either use
# encryption for the standard port or to use a dedicated, additional port along with the unencrypted
# standard native_transport_port.
# Enabling client encryption and keeping native_transport_port_ssl disabled will use encryption
# for native_transport_port. Setting native_transport_port_ssl to a different value
# from native_transport_port will use encryption for native_transport_port_ssl while
# keeping native_transport_port unencrypted.
#native_transport_port_ssl: 9142 So we shouldn't force to enable the SSL port in this test, but rather to include the But in general, it would be nice if the original issue gets fixed. |
Reproduced for 2024.1.15 patch release (scylla version |
@Michal-Leszczynski it's all good any nice, but now all of the setup we have that enable CQL TLS, are not working with manager (and they were working just fine in previous releases of manager), I would say this is a regression of manager that we should flush out it forever had a default in scylla (and commented out in the yaml), and we never set it in SCT |
Packages
Scylla version:
2024.2.3-20250108.931ce203dcf5
with build-id8612dedae0090301c8dfd7bd937671874aa68fb3
Scylla Manager version:
3.4.1-0.20250107.48d43ab3e
Kernel Version:
5.15.0-1076-aws
Issue description
Describe your issue in detail and steps it took to produce it.
Looks related to #4079
logs at that trace ID
Impact
Describe the impact this issue causes to the user.
How frequently does it reproduce?
Describe the frequency with how this issue can be reproduced.
Also 3 more times here
https://argus.scylladb.com/tests/scylla-cluster-tests/ee111e7b-a2fc-47bf-bdd0-d12a9fbab3b3
Installation details
Cluster size: 6 nodes (i4i.4xlarge)
Scylla Nodes used in this run:
OS / Image:
ami-08db3369214fc3796
(NO RUNNER: NO RUNNER)Test:
longevity-100gb-4h-test
Test id:
983f1d24-0d5a-4e2d-9c1a-62b04957bfad
Test name:
enterprise-2024.2/longevity/longevity-100gb-4h-test
Test method:
longevity_test.LongevityTest.test_custom_time
Test config file(s):
Logs and commands
$ hydra investigate show-monitor 983f1d24-0d5a-4e2d-9c1a-62b04957bfad
$ hydra investigate show-logs 983f1d24-0d5a-4e2d-9c1a-62b04957bfad
Logs:
Jenkins job URL
Argus
The text was updated successfully, but these errors were encountered: