Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

BadRequest: Specifying 'tenant_id' other than authenticated tenant neutron

I am getting this error BadRequest: Specifying 'tenant_id' other than authenticated tenant neutron) when creating instance (juno) on centos 7.

Output of keystone user-list: +----------------------------------+---------+---------+-------------------+ | id | name | enabled | email | +----------------------------------+---------+---------+-------------------+ | 11acab4a34134c48983f67f0b71a7ca8 | admin | True | vtladmin@noaa.gov | | 4863b19205f24801ba6d07fea1911860 | demo | True | vtldemo@noaa.gov | | df6b07fbfe5244a5b063d166fbe4170d | glance | True | | | f7d7a44fbb1148bbb36589eab729072d | neutron | True | | | b999fe55e6064dcca0970209ddd7f69e | nova | True | | +----------------------------------+---------+---------+-------------------+

output of keystone tenant-list:

+----------------------------------+---------+---------+ | id | name | enabled | +----------------------------------+---------+---------+ | 369017fe38824263ab65187748fa0939 | admin | True | | 02179cc1b30f41aab0df1f1819c97af6 | demo | True | | 3886a88ba0dc4996a775a4ff34b7c5ce | service | True | +----------------------------------+---------+---------+

output of keystone role-list: +----------------------------------+----------+ | id | name | +----------------------------------+----------+ | 9fe2ff9ee4384b1894a90878d3e92bab | _member_ | | 842d5520961148879d44dbfce7098d5c | admin | +----------------------------------+----------+

I turned on debugging and get the following in the keystone log:

2015-01-12 11:08:13.370 24013 DEBUG keystone.middleware.core [-] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'df6b07fbfe5244a5b063d166fbe4170d', 'roles': [u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <keystonetoken (audit_id="Mkm4bsbZQJK57vjc3LhnGw," audit_chain_id="Mkm4bsbZQJK57vjc3LhnGw)" at="" 0x4ac9cf0="">, 'project_id': u'3886a88ba0dc4996a775a4ff34b7c5ce', 'trust_id': None} process_request /usr/lib/python2.7/site-packages/keystone/middleware/core.py:280 2015-01-12 11:08:13.400 24013 DEBUG keystone.common.wsgi [-] arg_dict: {} __call__ /usr/lib/python2.7/site-packages/keystone/common/wsgi.py:191 2015-01-12 11:08:13.400 24013 DEBUG keystone.common.controller [-] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:55 2015-01-12 11:08:13.400 24013 DEBUG keystone.common.controller [-] RBAC: using auth context from the request environment _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:60 2015-01-12 11:08:13.403 24013 DEBUG keystone.common.kvs.core [-] KVS lock acquired for: os-revoke-events acquire /usr/lib/python2.7/site-packages/keystone/common/kvs/core.py:380 2015-01-12 11:08:13.404 24013 DEBUG keystone.common.kvs.core [-] KVS lock released for: os-revoke-events release /usr/lib/python2.7/site-packages/keystone/common/kvs/core.py:399 2015-01-12 11:08:13.405 24013 DEBUG keystone.policy.backends.rules [-] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'df6b07fbfe5244a5b063d166fbe4170d', 'roles': [u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <keystonetoken (audit_id="Mkm4bsbZQJK57vjc3LhnGw," audit_chain_id="Mkm4bsbZQJK57vjc3LhnGw)" at="" 0x4ac9cf0="">, 'project_id': u'3886a88ba0dc4996a775a4ff34b7c5ce', 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:100 2015-01-12 11:08:13.408 24013 DEBUG keystone.common.controller [-] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:155 @

I looked at one other post on this issue but I don't know if that solution applies to Juno.

Any help would be appreciated.

BadRequest: Specifying 'tenant_id' other than authenticated tenant neutron

I am getting this error BadRequest: Specifying 'tenant_id' other than authenticated tenant neutron) when creating instance (juno) on centos 7.

Output of keystone user-list: user-list:

+----------------------------------+---------+---------+-------------------+
|                id                |   name  | enabled |       email       |
+----------------------------------+---------+---------+-------------------+
| 11acab4a34134c48983f67f0b71a7ca8 |  admin  |   True  | vtladmin@noaa.gov |
| 4863b19205f24801ba6d07fea1911860 |   demo  |   True  |  vtldemo@noaa.gov |
| df6b07fbfe5244a5b063d166fbe4170d |  glance |   True  |                   |
| f7d7a44fbb1148bbb36589eab729072d | neutron |   True  |                   |
| b999fe55e6064dcca0970209ddd7f69e |   nova  |   True  |                   |
+----------------------------------+---------+---------+-------------------+

+----------------------------------+---------+---------+-------------------+

output of keystone tenant-list:

+----------------------------------+---------+---------+
|                id                |   name  | enabled |
+----------------------------------+---------+---------+
| 369017fe38824263ab65187748fa0939 |  admin  |   True  |
| 02179cc1b30f41aab0df1f1819c97af6 |   demo  |   True  |
| 3886a88ba0dc4996a775a4ff34b7c5ce | service |   True  |
+----------------------------------+---------+---------+

+----------------------------------+---------+---------+

output of keystone role-list: role-list:

+----------------------------------+----------+
|                id                |   name   |
+----------------------------------+----------+
| 9fe2ff9ee4384b1894a90878d3e92bab | _member_ |
| 842d5520961148879d44dbfce7098d5c |  admin   |
+----------------------------------+----------+

+----------------------------------+----------+

I turned on debugging and get the following in the keystone log:

2015-01-12 11:08:13.370 24013 DEBUG keystone.middleware.core [-] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'df6b07fbfe5244a5b063d166fbe4170d', 'roles': [u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <keystonetoken (audit_id="Mkm4bsbZQJK57vjc3LhnGw," audit_chain_id="Mkm4bsbZQJK57vjc3LhnGw)" at="" 0x4ac9cf0="">, <KeystoneToken (audit_id=Mkm4bsbZQJK57vjc3LhnGw, audit_chain_id=Mkm4bsbZQJK57vjc3LhnGw) at 0x4ac9cf0>, 'project_id': u'3886a88ba0dc4996a775a4ff34b7c5ce', 'trust_id': None} process_request /usr/lib/python2.7/site-packages/keystone/middleware/core.py:280
2015-01-12 11:08:13.400 24013 DEBUG keystone.common.wsgi [-] arg_dict: {} __call__ /usr/lib/python2.7/site-packages/keystone/common/wsgi.py:191
2015-01-12 11:08:13.400 24013 DEBUG keystone.common.controller [-] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:55
2015-01-12 11:08:13.400 24013 DEBUG keystone.common.controller [-] RBAC: using auth context from the request environment _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:60
2015-01-12 11:08:13.403 24013 DEBUG keystone.common.kvs.core [-] KVS lock acquired for: os-revoke-events acquire /usr/lib/python2.7/site-packages/keystone/common/kvs/core.py:380
2015-01-12 11:08:13.404 24013 DEBUG keystone.common.kvs.core [-] KVS lock released for: os-revoke-events release /usr/lib/python2.7/site-packages/keystone/common/kvs/core.py:399
2015-01-12 11:08:13.405 24013 DEBUG keystone.policy.backends.rules [-] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'df6b07fbfe5244a5b063d166fbe4170d', 'roles': [u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <keystonetoken (audit_id="Mkm4bsbZQJK57vjc3LhnGw," audit_chain_id="Mkm4bsbZQJK57vjc3LhnGw)" at="" 0x4ac9cf0="">, <KeystoneToken (audit_id=Mkm4bsbZQJK57vjc3LhnGw, audit_chain_id=Mkm4bsbZQJK57vjc3LhnGw) at 0x4ac9cf0>, 'project_id': u'3886a88ba0dc4996a775a4ff34b7c5ce', 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:100
2015-01-12 11:08:13.408 24013 DEBUG keystone.common.controller [-] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:155
@                                                                  

@

I looked at one other post on this issue but I don't know if that solution applies to Juno.

Any help would be appreciated.