Advertisement
Guest User

ceph debug

a guest
Feb 13th, 2013
21
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.49 KB | None | 0 0
  1. The internal IP has been redacted, at a glance I think there are only sesion keys? (It has changed whenever I alter permissions anyway)
  2.  
  3. 2013-02-13 19:17:31.785076 7f6eee410780 1 -- :/0 messenger.start
  4. 2013-02-13 19:17:31.785178 7f6eee410780 5 adding auth protocol: cephx
  5. 2013-02-13 19:17:31.785416 7f6eee410780 2 auth: KeyRing::load: loaded key file /etc/ceph/ceph.keyring
  6. 2013-02-13 19:17:31.785601 7f6eee410780 1 -- :/1004220 --> 10.x.y.z:6789/0 -- auth(proto 0 32 bytes epoch 0) v1 -- ?+0 0x2cb7640 con 0x2cb7250
  7. 2013-02-13 19:17:31.785938 7f6eee408700 1 -- 10.x.y.z:0/1004220 learned my addr 10.x.y.z:0/1004220
  8. 2013-02-13 19:17:31.786515 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 1 ==== mon_map v1 ==== 191+0+0 (203010237 0 0) 0x7f6ee00009f0 con 0x2cb7250
  9. 2013-02-13 19:17:31.786643 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 2 ==== auth_reply(proto 2 0 Success) v1 ==== 33+0+0 (1375940091 0 0) 0x7f6ee0000d90 con 0x2cb7250
  10. 2013-02-13 19:17:31.786681 7f6eea271700 10 cephx: set_have_need_key no handler for service mon
  11. 2013-02-13 19:17:31.786685 7f6eea271700 10 cephx: set_have_need_key no handler for service osd
  12. 2013-02-13 19:17:31.786686 7f6eea271700 10 cephx: set_have_need_key no handler for service auth
  13. 2013-02-13 19:17:31.786687 7f6eea271700 10 cephx: validate_tickets want 37 have 0 need 37
  14. 2013-02-13 19:17:31.786695 7f6eea271700 10 cephx client: handle_response ret = 0
  15. 2013-02-13 19:17:31.786697 7f6eea271700 10 cephx client: got initial server challenge 5767908292611322475
  16. 2013-02-13 19:17:31.786702 7f6eea271700 10 cephx client: build_request
  17. 2013-02-13 19:17:31.786703 7f6eea271700 10 cephx client: validate_tickets: want=37 need=37 have=0
  18. 2013-02-13 19:17:31.786704 7f6eea271700 10 cephx: set_have_need_key no handler for service mon
  19. 2013-02-13 19:17:31.786705 7f6eea271700 10 cephx: set_have_need_key no handler for service osd
  20. 2013-02-13 19:17:31.786706 7f6eea271700 10 cephx: set_have_need_key no handler for service auth
  21. 2013-02-13 19:17:31.786707 7f6eea271700 10 cephx: validate_tickets want 37 have 0 need 37
  22. 2013-02-13 19:17:31.786709 7f6eea271700 10 cephx client: want=37 need=37 have=0
  23. 2013-02-13 19:17:31.786895 7f6eea271700 10 cephx client: get auth session key: client_challenge 9272929875830896935
  24. 2013-02-13 19:17:31.786901 7f6eea271700 1 -- 10.x.y.z:0/1004220 --> 10.x.y.z:6789/0 -- auth(proto 2 32 bytes epoch 0) v1 -- ?+0 0x7f6ed40017a0 con 0x2cb7250
  25. 2013-02-13 19:17:31.787198 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 3 ==== auth_reply(proto 2 0 Success) v1 ==== 222+0+0 (1734992483 0 0) 0x7f6ee0000d90 con 0x2cb7250
  26. 2013-02-13 19:17:31.787219 7f6eea271700 10 cephx client: handle_response ret = 0
  27. 2013-02-13 19:17:31.787222 7f6eea271700 10 cephx client: get_auth_session_key
  28. 2013-02-13 19:17:31.787228 7f6eea271700 10 cephx: verify_service_ticket_reply got 1 keys
  29. 2013-02-13 19:17:31.787230 7f6eea271700 10 cephx: got key for service_id auth
  30. 2013-02-13 19:17:31.787278 7f6eea271700 10 cephx: ticket.secret_id=2
  31. 2013-02-13 19:17:31.787281 7f6eea271700 10 cephx: verify_service_ticket_reply service auth secret_id 2 session_key AQBLVxxR6MfpLhAAbQX4TK2u7eFiIT5rbBzm0A== validity=43200.000000
  32. 2013-02-13 19:17:31.787294 7f6eea271700 10 cephx: ticket expires=2013-02-14 07:17:31.787294 renew_after=2013-02-14 04:17:31.787294
  33. 2013-02-13 19:17:31.787302 7f6eea271700 10 cephx client: want=37 need=37 have=0
  34. 2013-02-13 19:17:31.787305 7f6eea271700 10 cephx: set_have_need_key no handler for service mon
  35. 2013-02-13 19:17:31.787306 7f6eea271700 10 cephx: set_have_need_key no handler for service osd
  36. 2013-02-13 19:17:31.787310 7f6eea271700 10 cephx: validate_tickets want 37 have 32 need 5
  37. 2013-02-13 19:17:31.787313 7f6eea271700 10 cephx client: build_request
  38. 2013-02-13 19:17:31.787314 7f6eea271700 10 cephx client: validate_tickets: want=37 need=5 have=32
  39. 2013-02-13 19:17:31.787316 7f6eea271700 10 cephx: set_have_need_key no handler for service mon
  40. 2013-02-13 19:17:31.787317 7f6eea271700 10 cephx: set_have_need_key no handler for service osd
  41. 2013-02-13 19:17:31.787318 7f6eea271700 10 cephx: validate_tickets want 37 have 32 need 5
  42. 2013-02-13 19:17:31.787319 7f6eea271700 10 cephx client: want=37 need=5 have=32
  43. 2013-02-13 19:17:31.787320 7f6eea271700 10 cephx client: get service keys: want=37 need=5 have=32
  44. 2013-02-13 19:17:31.787360 7f6eea271700 1 -- 10.x.y.z:0/1004220 --> 10.x.y.z:6789/0 -- auth(proto 2 181 bytes epoch 0) v1 -- ?+0 0x7f6ed4003db0 con 0x2cb7250
  45. 2013-02-13 19:17:31.787674 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 4 ==== auth_reply(proto 2 0 Success) v1 ==== 489+0+0 (3748097864 0 0) 0x7f6ee0000fc0 con 0x2cb7250
  46. 2013-02-13 19:17:31.787698 7f6eea271700 10 cephx client: handle_response ret = 0
  47. 2013-02-13 19:17:31.787701 7f6eea271700 10 cephx client: get_principal_session_key session_key AQBLVxxR6MfpLhAAbQX4TK2u7eFiIT5rbBzm0A==
  48. 2013-02-13 19:17:31.787713 7f6eea271700 10 cephx: verify_service_ticket_reply got 2 keys
  49. 2013-02-13 19:17:31.787715 7f6eea271700 10 cephx: got key for service_id mon
  50. 2013-02-13 19:17:31.787738 7f6eea271700 10 cephx: ticket.secret_id=24
  51. 2013-02-13 19:17:31.787740 7f6eea271700 10 cephx: verify_service_ticket_reply service mon secret_id 24 session_key AQBLVxxRIGvwLhAAIQ7FnmlfI35b4YDEu8RJnQ== validity=3600.000000
  52. 2013-02-13 19:17:31.787750 7f6eea271700 10 cephx: ticket expires=2013-02-13 20:17:31.787749 renew_after=2013-02-13 20:02:31.787749
  53. 2013-02-13 19:17:31.787756 7f6eea271700 10 cephx: got key for service_id osd
  54. 2013-02-13 19:17:31.787771 7f6eea271700 10 cephx: ticket.secret_id=24
  55. 2013-02-13 19:17:31.787773 7f6eea271700 10 cephx: verify_service_ticket_reply service osd secret_id 24 session_key AQBLVxxRYIrwLhAAgXsbD3Md8d8RfWtl2VMMLA== validity=3600.000000
  56. 2013-02-13 19:17:31.787781 7f6eea271700 10 cephx: ticket expires=2013-02-13 20:17:31.787781 renew_after=2013-02-13 20:02:31.787781
  57. 2013-02-13 19:17:31.787788 7f6eea271700 10 cephx: validate_tickets want 37 have 37 need 0
  58. 2013-02-13 19:17:31.787795 7f6eea271700 1 -- 10.x.y.z:0/1004220 --> 10.x.y.z:6789/0 -- mon_subscribe({monmap=0+}) v2 -- ?+0 0x2cb7b60 con 0x2cb7250
  59. 2013-02-13 19:17:31.787819 7f6eea271700 10 cephx: validate_tickets want 37 have 37 need 0
  60. 2013-02-13 19:17:31.787822 7f6eea271700 20 cephx client: need_tickets: want=37 need=0 have=37
  61. 2013-02-13 19:17:31.788047 7f6eee410780 1 -- 10.x.y.z:0/1004220 --> 10.x.y.z:6789/0 -- mon_subscribe({monmap=2+,osdmap=0}) v2 -- ?+0 0x2cb87c0 con 0x2cb7250
  62. 2013-02-13 19:17:31.788066 7f6eee410780 1 -- 10.x.y.z:0/1004220 --> 10.x.y.z:6789/0 -- mon_subscribe({monmap=2+,osdmap=0}) v2 -- ?+0 0x2cb8d30 con 0x2cb7250
  63. 2013-02-13 19:17:31.788084 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 5 ==== mon_map v1 ==== 191+0+0 (203010237 0 0) 0x7f6ee00011c0 con 0x2cb7250
  64. 2013-02-13 19:17:31.788122 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 6 ==== mon_subscribe_ack(300s) v1 ==== 20+0+0 (676355301 0 0) 0x7f6ee00013a0 con 0x2cb7250
  65. 2013-02-13 19:17:31.788289 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 7 ==== osd_map(10..10 src has 1..10) v3 ==== 1513+0+0 (3135211064 0 0) 0x7f6ee0000ae0 con 0x2cb7250
  66. 2013-02-13 19:17:31.788443 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== mon.0 10.x.y.z:6789/0 8 ==== mon_subscribe_ack(300s) v1 ==== 20+0+0 (676355301 0 0) 0x7f6ee00016d0 con 0x2cb7250
  67. 2013-02-13 19:17:31.788618 7f6eee410780 1 -- 10.x.y.z:0/1004220 --> 10.x.y.z:6801/400 -- osd_op(client.4252.0:1 rbd_directory [read 0~0] 3.30a98c1c) v4 -- ?+0 0x2cb9b70 con 0x2cb98b0
  68. 2013-02-13 19:17:31.788994 7f6ee816c700 10 cephx client: build_authorizer for service osd
  69. 2013-02-13 19:17:31.789292 7f6ee816c700 10 In get_auth_session_handler for protocol 2
  70. 2013-02-13 19:17:31.789355 7f6ee816c700 10 sign_message: seq # 1 CRCs are: header 201308928 front 1934294822 middle 0 data 0
  71. 2013-02-13 19:17:31.789373 7f6ee816c700 20 Putting signature in client message(seq # 1): sig = 3974656849925233679
  72. 2013-02-13 19:17:31.789783 7f6edaffd700 10 check_message_signature: seq # = 1 front_crc_ = 823660382 middle_crc = 0 data_crc = 0
  73. 2013-02-13 19:17:31.789905 7f6eea271700 1 -- 10.x.y.z:0/1004220 <== osd.0 10.x.y.z:6801/400 1 ==== osd_op_reply(1 rbd_directory [read 0~0] = -1 (Operation not permitted)) v4 ==== 112+0+0 (823660382 0 0) 0x7f6ec80009a0 con 0x2cb98b0
  74. rbd: list: (1) Operation not permitted
  75. 2013-02-13 19:17:31.790236 7f6eee410780 1 -- 10.x.y.z:0/1004220 mark_down 0x2cb98b0 -- 0x2cb9660
  76. 2013-02-13 19:17:31.790587 7f6eee410780 1 -- 10.x.y.z:0/1004220 mark_down_all
  77. 2013-02-13 19:17:31.790724 7f6eee410780 1 -- 10.x.y.z:0/1004220 shutdown complete.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement