2019-12-26T21:23:17.02-0500 [APP/PROC/WEB/1] ERR Unable to interpolate credhub refs: Unable to interpolate credhub references: Post https://credhub.service.cf.internal:8844/api/v1/interpolate: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
gorouter.stdout.log: {"log_level":3,"timestamp":1574145601.6562595,"message":"backend-endpoint-failed","source":"vcap.gorouter","data":{"route-endpoint":{"ApplicationId,"Addr":"192.168.130.20:61001","Tags":{"component":"route-emitter"},"RouteServiceUrl":""},"error":"dial tcp 192.168.130.20:61001: i/o timeout","attempt":1,"vcap_reques15b"}}
1. Identify the Diego cell which hosts app container.
2019-12-26T21:23:17.02-0500 [APP/PROC/WEB/1] ERR Unable to interpolate credhub refs: Unable to interpolate credhub references: Post https://credhub.service.cf.internal:8844/api/v1/interpolate: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) 2019-12-26T21:23:17.02-0500 [CELL/SSHD/1] OUT Exit status 0 2019-12-26T21:23:22.29-0500 [CELL/1] OUT Cell 4c969dfe-cb81-4e13-90ce-bfa7071c57a1 stopping instance 5771f24f-d674-4fe3-72d2-3736
access.log: <app-route> - [2019-11-19T06:39:56.655+0000] "GET /boxcare/api/initial-admin-job-codes HTTP/1.1" 502 0 67 "https://edepot.portn0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36" "100.64.0.5:34362" "192.168.130.20:61001" x_forwarded_for:"10x_forwarded_proto:"https" vcap_request_id:"8f7ce4be-fb2f-4187-5ba8-aae5e007e15b" response_time:15.002142646 app_id:"ad5a084a-30b0-427d-b062-a09904eb3342" app_index:"1" anid:"5256615e503bddfb" x_b3_parentspanid:"-" b3:"5256615e503bddfb-5256615e503bddfb"
gorouter.stdout.log: {"log_level":3,"timestamp":1574145601.6562595,"message":"backend-endpoint-failed","source":"vcap.gorouter","data":{"route-endpoint":{"ApplicationId":"ad5a084a-30b0-427d-b062-a09904eb3342", "Addr":"192.168.130.20:61001","Tags":{"component":"route-emitter"},"RouteServiceUrl":""},"error":"dial tcp 192.168.130.20:61001: i/o timeout","attempt":1,"vcap_reques15b"}}
bosh ssh diego_cell/0 # ssh to an arbitrary cell
cfdot actual-lrp-groups | jq '. | select(.instance.process_guid | startswith("app_GUID"))' | egrep '"(address|instance_address)'
cfdot actual-lrps | jq '. | select(.process_guid | startswith("app_GUID"))'
$ cfdot actual-lrps | jq '. | select(.process_guid | startswith("ad5a084a-30b0-427d-b062-a09904eb3342"))' | egrep '"(address|instance_address)' "address": "10.193.71.40", "instance_address": "192.168.130.20", "address": "10.193.71.41", "instance_address": "192.168.130.22",2. Get VM-CID based on the diego cell IP or GUID.
bosh vms | grep "<cell_IP/GUID>"Search VM-CID in vCenter to identify the ESXi host.
[root@gtdc-az2esx-25:~] net-vdr -C -l Host locale Id: 00000000-0000-0000-0000-000000000000 Connection Information: ----------------------- DvsName VdrPort NumLifs DRvmac ------- ------- ------- ------- NVDS-Overlay vdrPort 344 02:50:56:56:44:52 Teaming Policy: Default Teaming Uplink : uplink-1(67108866): 00:50:56:fc:33:9a(Non-team member) Uplink : uplink-2(67108868): 00:50:56:ea:37:32(Non-team member)Use the VNI obtained in step 3 to verify if T1 router’s ARP entries are missing or not. Review the example diagram of a problematic NSX-T topology introduced in previous section. The blue T1 router (downlink VNI 73903) has no ARP entries.
[root@gtdc-az2esx-25:~] net-vdl2 -M ip -s NVDS-Overlay -n 73903 IP entry count: 0 [root@gtdc-az2esx-25:~] net-vdl2 -M arp -s NVDS-Overlay -n 73903 Legend: [V:Valid], [U:in Use], Legend: [N:Unknown - Not known by control plane], Legend: [S:Seen - learnt or extended during the last ageing period], Legend: [A:Aged - not updated in during the last ageing period] ARP Entry Count: 0The blue T1 router ARP entries are missing due to this host's local v-switch has been populated with a PROTECTED ARP entry associated with the red T1 router (downlink VNI 73796).
[root@gtdc-az2esx-25:~] net-vdl2 -M ip -s NVDS-Overlay -n 73796 IP entry count: 7 ... IP: 10.255.18.1 MAC: 02:50:56:56:44:52 Flags: 1(PROTECTED) vxlanID: 73796
For each pair of affected T1 routers (e.g., the blue and red T1 routers in our example), perform the workaround as follows:
1. In NSX-T Manager UI Navigate to: Advanced network and security > Routers > Select the checkbox of T1 router > Configuration > Router port
2. Select the checkbox of the Downlink router port (e..g, the blue T1 router downlink port has subnet 10.255.18.1/24). Click EDIT.
3. In the pop-up window, change the gateway IP to 10.255.18.254.
Note: Make sure to choose a free IP, not yet occupied by any container or by any other T1 router gateway.
Note: Please contact NSX-T support if the above workaround does not help.