Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Wed Jul 27 20:13:38 UTC 2016 Executing cloud-early-config
- Wed Jul 27 20:13:38 UTC 2016 Detected that we are running inside vmware guest
- Wed Jul 27 20:13:38 UTC 2016 Patching scripts oldmd5=a0c20fe63cef544b65a4d9171b443e42 newmd5=44f724d028ad1ecdc566d2d101e3f6e5
- Wed Jul 27 20:13:38 UTC 2016 Patching cloud service
- Wed Jul 27 20:13:40 UTC 2016 Rebooting system since we patched init scripts
- Wed Jul 27 20:13:42 UTC 2016 Updating log4j-cloud.xml
- Wed Jul 27 20:13:42 UTC 2016 Setting up dhcp server system vm
- Wed Jul 27 20:13:42 UTC 2016 checking that eth0 has IP
- Wed Jul 27 20:13:42 UTC 2016 checking that eth1 has IP
- Wed Jul 27 20:13:43 UTC 2016 waiting for eth1 interface setup with ip timer=0
- Wed Jul 27 20:14:10 UTC 2016 Executing cloud-early-config
- Wed Jul 27 20:14:10 UTC 2016 Detected that we are running inside vmware guest
- Wed Jul 27 20:14:11 UTC 2016 Patching cloud service
- Wed Jul 27 20:14:12 UTC 2016 Updating log4j-cloud.xml
- Wed Jul 27 20:14:12 UTC 2016 Setting up dhcp server system vm
- Wed Jul 27 20:14:12 UTC 2016 checking that eth0 has IP
- Wed Jul 27 20:14:13 UTC 2016 waiting for eth0 interface setup with ip timer=0
- Wed Jul 27 20:14:13 UTC 2016 checking that eth1 has IP
- Wed Jul 27 20:14:14 UTC 2016 waiting for eth1 interface setup with ip timer=0
- Wed Jul 27 20:14:15 UTC 2016 waiting for eth1 interface setup with ip timer=1
- Wed Jul 27 20:14:16 UTC 2016 waiting for eth1 interface setup with ip timer=2
- Wed Jul 27 20:14:18 UTC 2016 waiting for eth1 interface setup with ip timer=3
- Wed Jul 27 20:14:19 UTC 2016 waiting for eth1 interface setup with ip timer=4
- Wed Jul 27 20:14:20 UTC 2016 waiting for eth1 interface setup with ip timer=5
- Wed Jul 27 20:14:21 UTC 2016 waiting for eth1 interface setup with ip timer=6
- Wed Jul 27 20:14:22 UTC 2016 waiting for eth1 interface setup with ip timer=7
- Wed Jul 27 20:14:23 UTC 2016 waiting for eth1 interface setup with ip timer=8
- Wed Jul 27 20:14:24 UTC 2016 waiting for eth1 interface setup with ip timer=9
- Wed Jul 27 20:14:25 UTC 2016 waiting for eth1 interface setup with ip timer=10
- Wed Jul 27 20:14:26 UTC 2016 waiting for eth1 interface setup with ip timer=11
- Wed Jul 27 20:14:27 UTC 2016 waiting for eth1 interface setup with ip timer=12
- Wed Jul 27 20:14:28 UTC 2016 waiting for eth1 interface setup with ip timer=13
- Wed Jul 27 20:14:29 UTC 2016 waiting for eth1 interface setup with ip timer=14
- Wed Jul 27 20:14:30 UTC 2016 waiting for eth1 interface setup with ip timer=15
- Wed Jul 27 20:14:31 UTC 2016 waiting for eth1 interface setup with ip timer=16
- Wed Jul 27 20:14:31 UTC 2016 interface eth1 is not set up with ip... exiting
- Wed Jul 27 20:14:40 UTC 2016 Setting up dnsmasq
- Wed Jul 27 20:14:41 UTC 2016 Setting up apache web server
- Wed Jul 27 20:14:41 UTC 2016 Enable service dnsmasq = 1
- Wed Jul 27 20:14:41 UTC 2016 Enable service haproxy = 0
- Wed Jul 27 20:14:41 UTC 2016 Processors = 1 Enable service = 0
- Wed Jul 27 20:14:41 UTC 2016 Enable service cloud-passwd-srvr = 1
- Wed Jul 27 20:14:41 UTC 2016 Enable service cloud = 0
- Wed Jul 27 20:14:41 UTC 2016 cloud: enable_fwding = 0
- Wed Jul 27 20:14:41 UTC 2016 enable_fwding = 0
- 2016-07-27 20:14:42,988 merge.py load:57 Creating data bag type cmdline
- 2016-07-27 20:14:42,988 merge.py process:100 Command of type cmdline received
- 2016-07-27 20:14:42,988 merge.py load:57 Creating data bag type ips
- 2016-07-27 20:14:42,988 merge.py process:100 Command of type ips received
- 2016-07-27 20:14:42,989 merge.py save:71 Writing data bag type ips
- 2016-07-27 20:14:42,989 merge.py save:72 {'id': 'ips', 'eth0': [{'broadcast': '10.70.116.255', 'one_to_one_nat': False, 'nic_dev_id': '0', 'network': '10.70.116.0/24', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'10.70.116.75', 'netmask': u'255.255.255.0', 'nw_type': 'guest', 'device': 'eth0', 'cidr': '10.70.116.75/24', 'source_nat': False, 'size': '24'}]}
- 2016-07-27 20:14:42,990 merge.py load:60 Loading data bag type ips
- 2016-07-27 20:14:42,990 merge.py process:100 Command of type ips received
- 2016-07-27 20:14:42,990 merge.py save:71 Writing data bag type ips
- 2016-07-27 20:14:42,990 merge.py save:72 {u'id': u'ips', 'eth1': [{'broadcast': '255.255.255.255', 'one_to_one_nat': False, 'nic_dev_id': '1', 'network': '0.0.0.0/0', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'0.0.0.0', 'netmask': u'0.0.0.0', 'nw_type': 'control', 'device': 'eth1', 'cidr': '0.0.0.0/0', 'source_nat': False, 'size': '0'}], u'eth0': [{u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}]}
- 2016-07-27 20:14:42,991 merge.py save:71 Writing data bag type cmdline
- 2016-07-27 20:14:42,991 merge.py save:72 {'config': {u'domain': u'vit.vertitechit.com', u'cidrsize': u'24', u'baremetalnotificationsecuritykey': u'nu1HfF_DpC-gK-G_3y1u54Snb9ruROq-qldOvhnHj4EMypguvtfQu0o18eY3gs81iPZMD2Du1QOUAG5KOfMYXQ', u'port': u'8080', u'eth0ip': u'10.70.116.75', u'eth1mask': u'0.0.0.0', u'sshonguest': u'true', u'gateway': u'10.70.116.1', u'template': u'domP', u'mgmtcidr': u'10.70.110.0/24', u'type': u'dhcpsrvr', u'eth1ip': u'0.0.0.0', u'eth0mask': u'255.255.255.0', u'dhcprange': u'10.70.116.1', u'host': u'10.70.110.101', u'localgw': u'10.70.116.1', 'redundant_router': 'false', u'baremetalnotificationapikey': u'CKZoOXffpY5ihjvzly3yD_2t2qaDnFglYFDoeep37aH1qy5u67aX51ZsuZpZcphfOxJY52rkTlNOl0nkNSyXjQ', u'nic_macs': u'06:b1:2e:00:00:10|02:00:14:42:00:03', u'name': u'r-4-VM', u'dns1': u'10.70.10.21', u'disable_rp_filter': u'true', u'extra_pubnics': u'2'}, 'id': u'cmdline'}
- 2016-07-27 20:14:42,996 merge.py load:249 Could not open /var/cache/cloud/cmd_line.json
- 2016-07-27 20:14:42,996 merge.py load:60 Loading data bag type ips
- 2016-07-27 20:14:42,997 merge.py load:60 Loading data bag type cmdline
- 2016-07-27 20:14:42,997 configure.py main:924 Configuring ip addresses
- 2016-07-27 20:14:42,997 CsHelper.py execute:160 Executing: ip addr show dev eth1
- 2016-07-27 20:14:43,010 CsHelper.py execute:160 Executing: ip addr show dev eth0
- 2016-07-27 20:14:43,014 CsHelper.py execute:160 Executing: ip addr show dev eth1
- 2016-07-27 20:14:43,018 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'0.0.0.0', u'one_to_one_nat': False, u'nic_dev_id': u'1', u'network': u'0.0.0.0/0', u'netmask': u'0.0.0.0', u'source_nat': False, u'broadcast': u'255.255.255.255', u'add': True, u'nw_type': u'control', u'device': u'eth1', u'cidr': u'0.0.0.0/0', u'gateway': u'10.70.116.1', u'size': u'0'}
- 2016-07-27 20:14:43,019 CsAddress.py process:119 Address 0.0.0.0/0 on device eth1 not configured
- 2016-07-27 20:14:43,019 CsAddress.py configure:277 Configuring address 0.0.0.0/0 on device eth1
- 2016-07-27 20:14:43,023 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
- 2016-07-27 20:14:43,023 CsHelper.py execute:160 Executing: ip -4 route list 0/0
- 2016-07-27 20:14:43,028 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
- 2016-07-27 20:14:43,029 CsHelper.py execute:160 Executing: ip addr show dev eth0
- 2016-07-27 20:14:43,033 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}
- 2016-07-27 20:14:43,033 CsAddress.py process:119 Address 10.70.116.75/24 on device eth0 not configured
- 2016-07-27 20:14:43,033 CsAddress.py configure:277 Configuring address 10.70.116.75/24 on device eth0
- 2016-07-27 20:14:43,039 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
- 2016-07-27 20:14:43,042 CsHelper.py addifmissing:148 Added 0 Table_eth0 to file /etc/iproute2/rt_tables
- 2016-07-27 20:14:43,042 CsHelper.py execute:160 Executing: ip rule show
- 2016-07-27 20:14:43,047 CsHelper.py execute:160 Executing: ip rule add fwmark 0 table Table_eth0
- 2016-07-27 20:14:43,050 CsRule.py addMark:37 Added fwmark rule for Table_eth0
- 2016-07-27 20:14:43,051 CsHelper.py execute:160 Executing: ip link show eth0 | grep 'state DOWN'
- 2016-07-27 20:14:43,056 CsHelper.py execute:160 Executing: arping -c 1 -I eth0 -A -U -s 10.70.116.75 10.70.116.1
- 2016-07-27 20:14:43,069 CsAddress.py inKernel:686 rpsfr is not present in the kernel
- 2016-07-27 20:14:43,069 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
- 2016-07-27 20:14:43,069 CsRoute.py add_route:50 Adding route: dev eth0 table: Table_eth0 network: 10.70.116.0/24 if not present
- 2016-07-27 20:14:43,070 CsHelper.py execute:160 Executing: ip route show dev eth0 table Table_eth0 10.70.116.0/24
- 2016-07-27 20:14:43,077 CsHelper.py execute:160 Executing: ps aux
- 2016-07-27 20:14:43,090 CsProcess.py start:33 Started dummy
- 2016-07-27 20:14:43,092 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
- 2016-07-27 20:14:43,093 CsHelper.py execute:160 Executing: ip -4 route list 0/0
- 2016-07-27 20:14:43,106 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
- 2016-07-27 20:14:43,107 configure.py main:929 Configuring Guest Network
- 2016-07-27 20:14:43,107 configure.py main:933 Configuring vmpassword
- 2016-07-27 20:14:43,107 merge.py load:57 Creating data bag type vmpassword
- 2016-07-27 20:14:43,107 configure.py main:938 Configuring vmdata
- 2016-07-27 20:14:43,107 merge.py load:57 Creating data bag type vmdata
- 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type networkacl
- 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type firewallrules
- 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type forwardingrules
- 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type site2sitevpn
- 2016-07-27 20:14:43,110 merge.py load:57 Creating data bag type remoteaccessvpn
- 2016-07-27 20:14:43,111 configure.py process:624 {'id': 'remoteaccessvpn'}
- 2016-07-27 20:14:43,111 merge.py load:57 Creating data bag type loadbalancer
- 2016-07-27 20:14:43,111 configure.py main:963 Configuring networkacl
- 2016-07-27 20:14:43,111 configure.py main:967 Configuring firewall rules
- 2016-07-27 20:14:43,111 configure.py main:971 Configuring PF rules
- 2016-07-27 20:14:43,111 configure.py main:975 Configuring s2s vpn
- 2016-07-27 20:14:43,111 configure.py main:979 Configuring remote access vpn
- 2016-07-27 20:14:43,111 configure.py main:983 Configuring vpn users list
- 2016-07-27 20:14:43,111 merge.py load:57 Creating data bag type vpnuserlist
- 2016-07-27 20:14:43,112 configure.py main:988 Configuring dhcp entry
- 2016-07-27 20:14:43,112 merge.py load:57 Creating data bag type dhcpentry
- 2016-07-27 20:14:43,112 CsHelper.py execute:160 Executing: ip addr show
- 2016-07-27 20:14:43,129 CsFile.py load:37 File /etc/dhcphosts.txt does not exist
- 2016-07-27 20:14:43,129 CsFile.py load:37 File /etc/dnsmasq.d/cloud.conf does not exist
- 2016-07-27 20:14:43,129 CsFile.py load:39 Reading file /etc/hosts
- 2016-07-27 20:14:43,129 CsFile.py commit:66 Wrote edited file /etc/hosts
- 2016-07-27 20:14:43,130 CsFile.py commit:68 Updated file in-cache configuration
- 2016-07-27 20:14:43,130 CsDhcp.py write_hosts:121 Updated hosts file
- 2016-07-27 20:14:43,130 CsFile.py commit:60 Nothing to commit. The /etc/dnsmasq.d/cloud.conf file did not change
- 2016-07-27 20:14:43,130 CsFile.py commit:60 Nothing to commit. The /etc/dhcphosts.txt file did not change
- 2016-07-27 20:14:43,130 CsHelper.py execute:160 Executing: service dnsmasq restart
- 2016-07-27 20:14:45,289 CsHelper.py service:189 Service dnsmasq restart
- 2016-07-27 20:14:45,289 configure.py main:993 Configuring load balancer
- 2016-07-27 20:14:45,289 configure.py main:997 Configuring monitor service
- 2016-07-27 20:14:45,289 merge.py load:57 Creating data bag type monitorservice
- 2016-07-27 20:14:45,289 configure.py main:1003 Configuring iptables rules
- 2016-07-27 20:14:45,290 CsHelper.py execute:160 Executing: iptables-save
- 2016-07-27 20:14:45,314 CsHelper.py execute:160 Executing: iptables -t filter -N FW_OUTBOUND
- 2016-07-27 20:14:45,340 CsHelper.py execute:160 Executing: iptables -t filter -N INPUT
- 2016-07-27 20:14:45,345 CsHelper.py execute:160 Executing: iptables -t filter -N
- 2016-07-27 20:14:45,349 CsHelper.py execute:160 Executing: iptables -t mangle -N PREROUTING
- 2016-07-27 20:14:45,357 CsHelper.py execute:160 Executing: iptables -t filter -N FORWARD
- 2016-07-27 20:14:45,361 CsHelper.py execute:160 Executing: iptables -t filter -N OUTPUT
- 2016-07-27 20:14:45,365 CsHelper.py execute:160 Executing: iptables -t filter -N NETWORK_STATS
- 2016-07-27 20:14:45,368 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
- 2016-07-27 20:14:45,369 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,369 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,379 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,379 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,380 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,394 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
- 2016-07-27 20:14:45,394 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
- 2016-07-27 20:14:45,394 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
- 2016-07-27 20:14:45,398 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
- 2016-07-27 20:14:45,398 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
- 2016-07-27 20:14:45,398 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
- 2016-07-27 20:14:45,401 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
- 2016-07-27 20:14:45,402 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
- 2016-07-27 20:14:45,402 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
- 2016-07-27 20:14:45,414 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'--restore-mark': u'--nfmask', u'-j': u'CONNMARK', u'0xffffffff': u'--ctmask', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=mangle chain=PREROUTING
- 2016-07-27 20:14:45,415 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff table=mangle
- 2016-07-27 20:14:45,415 CsHelper.py execute:160 Executing: iptables -t mangle -I PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
- 2016-07-27 20:14:45,419 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'224.0.0.18/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,420 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 224.0.0.18/32 -j ACCEPT table=filter
- 2016-07-27 20:14:45,420 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 224.0.0.18/32 -j ACCEPT
- 2016-07-27 20:14:45,424 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'225.0.0.50/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,424 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 225.0.0.50/32 -j ACCEPT table=filter
- 2016-07-27 20:14:45,424 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 225.0.0.50/32 -j ACCEPT
- 2016-07-27 20:14:45,428 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-j': u'ACCEPT', u'-A': u'INPUT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=INPUT
- 2016-07-27 20:14:45,429 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,429 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,434 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-p': u'icmp', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,434 CsNetfilter.py compare:159 Add: rule=-A INPUT -p icmp -j ACCEPT table=filter
- 2016-07-27 20:14:45,434 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -p icmp -j ACCEPT
- 2016-07-27 20:14:45,439 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'lo', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,439 CsNetfilter.py compare:159 Add: rule=-A INPUT -i lo -j ACCEPT table=filter
- 2016-07-27 20:14:45,440 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i lo -j ACCEPT
- 2016-07-27 20:14:45,445 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'67', u'-p': u'udp'} table=filter chain=INPUT
- 2016-07-27 20:14:45,445 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT table=filter
- 2016-07-27 20:14:45,445 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT
- 2016-07-27 20:14:45,451 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'udp'} table=filter chain=INPUT
- 2016-07-27 20:14:45,451 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT table=filter
- 2016-07-27 20:14:45,451 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
- 2016-07-27 20:14:45,455 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'tcp'} table=filter chain=INPUT
- 2016-07-27 20:14:45,456 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT table=filter
- 2016-07-27 20:14:45,456 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
- 2016-07-27 20:14:45,460 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'80', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,461 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT table=filter
- 2016-07-27 20:14:45,461 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT
- 2016-07-27 20:14:45,465 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'8080', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,465 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT table=filter
- 2016-07-27 20:14:45,465 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT
- 2016-07-27 20:14:45,470 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth1', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-27 20:14:45,470 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,470 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,474 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'NEW', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-27 20:14:45,474 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT table=filter
- 2016-07-27 20:14:45,474 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT
- 2016-07-27 20:14:45,478 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth2', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-27 20:14:45,479 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,479 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,485 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-27 20:14:45,485 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,485 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,491 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'FORWARD', u'-j': u'FW_OUTBOUND'} table=filter chain=FORWARD
- 2016-07-27 20:14:45,491 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND table=filter
- 2016-07-27 20:14:45,491 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND
- 2016-07-27 20:14:45,495 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
- 2016-07-27 20:14:45,496 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
- 2016-07-27 20:14:45,496 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
- 2016-07-27 20:14:45,500 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-j': u'NETWORK_STATS'} table=filter chain=FORWARD
- 2016-07-27 20:14:45,500 CsNetfilter.py compare:159 Add: rule=-A FORWARD -j NETWORK_STATS table=filter
- 2016-07-27 20:14:45,500 CsHelper.py execute:160 Executing: iptables -t filter -I FORWARD -j NETWORK_STATS
- 2016-07-27 20:14:45,505 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-j': u'NETWORK_STATS'} table=filter chain=INPUT
- 2016-07-27 20:14:45,505 CsNetfilter.py compare:159 Add: rule=-A INPUT -j NETWORK_STATS table=filter
- 2016-07-27 20:14:45,505 CsHelper.py execute:160 Executing: iptables -t filter -I INPUT -j NETWORK_STATS
- 2016-07-27 20:14:45,509 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'OUTPUT', u'-j': u'NETWORK_STATS'} table=filter chain=OUTPUT
- 2016-07-27 20:14:45,510 CsNetfilter.py compare:159 Add: rule=-A OUTPUT -j NETWORK_STATS table=filter
- 2016-07-27 20:14:45,510 CsHelper.py execute:160 Executing: iptables -t filter -I OUTPUT -j NETWORK_STATS
- 2016-07-27 20:14:45,514 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
- 2016-07-27 20:14:45,514 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth0 -o eth2 table=filter
- 2016-07-27 20:14:45,514 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth0 -o eth2
- 2016-07-27 20:14:45,519 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth2', u'-o': u'eth0', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
- 2016-07-27 20:14:45,519 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 -o eth0 table=filter
- 2016-07-27 20:14:45,519 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 -o eth0
- 2016-07-27 20:14:45,524 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-o': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp', u'!_-i': u'eth0'} table=filter chain=NETWORK_STATS
- 2016-07-27 20:14:45,524 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -o eth2 ! -i eth0 -p tcp table=filter
- 2016-07-27 20:14:45,524 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -o eth2 ! -i eth0 -p tcp
- 2016-07-27 20:14:45,529 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'!_-o': u'eth0', u'-i': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp'} table=filter chain=NETWORK_STATS
- 2016-07-27 20:14:45,529 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 ! -o eth0 -p tcp table=filter
- 2016-07-27 20:14:45,529 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 ! -o eth0 -p tcp
- 2016-07-27 20:14:45,534 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
- 2016-07-27 20:14:45,534 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,535 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,539 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-27 20:14:45,540 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
- 2016-07-27 20:14:45,540 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
- 2016-07-27 20:14:45,545 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
- 2016-07-27 20:14:45,545 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
- 2016-07-27 20:14:45,545 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
- 2016-07-27 20:14:45,550 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
- 2016-07-27 20:14:45,550 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
- 2016-07-27 20:14:45,550 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
- 2016-07-27 20:14:45,555 merge.py load:60 Loading data bag type cmdline
- 2016-07-27 20:14:45,557 CsRedundant.py set:68 Router redundancy status is False
- 2016-07-27 20:14:45,557 CsHelper.py execute:160 Executing: service conntrackd stop
- 2016-07-27 20:14:45,588 CsHelper.py service:189 Service conntrackd stop
- 2016-07-27 20:14:45,589 CsHelper.py execute:160 Executing: service keepalived stop
- 2016-07-27 20:14:45,598 CsHelper.py service:189 Service keepalived stop
- 2016-07-27 20:14:45,598 CsHelper.py execute:160 Executing: mount
- 2016-07-27 20:14:45,604 configure.py main:1011 Configuring static routes
- 2016-07-27 20:14:45,604 merge.py load:57 Creating data bag type staticroutes
- 2016-07-27 20:14:45,604 configure.py process:80 Processing CsStaticRoutes file ==> {'id': 'staticroutes'}
- 2016-07-27 20:14:45,604 configure.py main:1016 Configuring iptables rules done ...saving rules
- 2016-07-27 20:14:45,605 CsHelper.py save_iptables:168 Saving iptables for iptables-save
- 2016-07-27 20:14:45,605 CsHelper.py execute:160 Executing: iptables-save
- 2016-07-27 20:14:45,610 CsHelper.py save_iptables:168 Saving iptables for ip6tables-save
- 2016-07-27 20:14:45,611 CsHelper.py execute:160 Executing: ip6tables-save
- Thu Jul 28 13:10:59 UTC 2016 Executing cloud-early-config
- Thu Jul 28 13:10:59 UTC 2016 Detected that we are running inside vmware guest
- Thu Jul 28 13:10:59 UTC 2016 Patching cloud service
- Thu Jul 28 13:11:01 UTC 2016 Updating log4j-cloud.xml
- Thu Jul 28 13:11:01 UTC 2016 Setting up dhcp server system vm
- Thu Jul 28 13:11:01 UTC 2016 checking that eth0 has IP
- Thu Jul 28 13:11:01 UTC 2016 checking that eth1 has IP
- Thu Jul 28 13:11:02 UTC 2016 waiting for eth1 interface setup with ip timer=0
- Thu Jul 28 13:11:03 UTC 2016 waiting for eth1 interface setup with ip timer=1
- Thu Jul 28 13:11:05 UTC 2016 waiting for eth1 interface setup with ip timer=2
- Thu Jul 28 13:11:06 UTC 2016 waiting for eth1 interface setup with ip timer=3
- Thu Jul 28 13:11:07 UTC 2016 waiting for eth1 interface setup with ip timer=4
- Thu Jul 28 13:11:08 UTC 2016 waiting for eth1 interface setup with ip timer=5
- Thu Jul 28 13:11:09 UTC 2016 waiting for eth1 interface setup with ip timer=6
- Thu Jul 28 13:11:11 UTC 2016 waiting for eth1 interface setup with ip timer=7
- Thu Jul 28 13:11:12 UTC 2016 waiting for eth1 interface setup with ip timer=8
- Thu Jul 28 13:11:13 UTC 2016 waiting for eth1 interface setup with ip timer=9
- Thu Jul 28 13:11:14 UTC 2016 waiting for eth1 interface setup with ip timer=10
- Thu Jul 28 13:11:15 UTC 2016 waiting for eth1 interface setup with ip timer=11
- Thu Jul 28 13:11:16 UTC 2016 waiting for eth1 interface setup with ip timer=12
- Thu Jul 28 13:11:17 UTC 2016 waiting for eth1 interface setup with ip timer=13
- Thu Jul 28 13:11:18 UTC 2016 waiting for eth1 interface setup with ip timer=14
- Thu Jul 28 13:11:19 UTC 2016 waiting for eth1 interface setup with ip timer=15
- Thu Jul 28 13:11:20 UTC 2016 waiting for eth1 interface setup with ip timer=16
- Thu Jul 28 13:11:20 UTC 2016 interface eth1 is not set up with ip... exiting
- Thu Jul 28 13:11:29 UTC 2016 Setting up dnsmasq
- Thu Jul 28 13:11:30 UTC 2016 Setting up apache web server
- Thu Jul 28 13:11:30 UTC 2016 Enable service dnsmasq = 1
- Thu Jul 28 13:11:30 UTC 2016 Enable service haproxy = 0
- Thu Jul 28 13:11:30 UTC 2016 Processors = 1 Enable service = 0
- Thu Jul 28 13:11:30 UTC 2016 Enable service cloud-passwd-srvr = 1
- Thu Jul 28 13:11:30 UTC 2016 Enable service cloud = 0
- Thu Jul 28 13:11:30 UTC 2016 cloud: enable_fwding = 0
- Thu Jul 28 13:11:30 UTC 2016 enable_fwding = 0
- 2016-07-28 13:11:30,869 merge.py load:60 Loading data bag type cmdline
- 2016-07-28 13:11:30,871 merge.py process:100 Command of type cmdline received
- 2016-07-28 13:11:30,871 merge.py load:60 Loading data bag type ips
- 2016-07-28 13:11:30,872 merge.py process:100 Command of type ips received
- 2016-07-28 13:11:30,872 merge.py save:71 Writing data bag type ips
- 2016-07-28 13:11:30,873 merge.py save:72 {u'id': u'ips', u'eth1': [{u'public_ip': u'0.0.0.0', u'one_to_one_nat': False, u'nic_dev_id': u'1', u'network': u'0.0.0.0/0', u'netmask': u'0.0.0.0', u'source_nat': False, u'broadcast': u'255.255.255.255', u'add': True, u'nw_type': u'control', u'device': u'eth1', u'cidr': u'0.0.0.0/0', u'gateway': u'10.70.116.1', u'size': u'0'}], u'eth0': [{'broadcast': '10.70.116.255', 'one_to_one_nat': False, 'nic_dev_id': '0', 'network': '10.70.116.0/24', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'10.70.116.75', 'netmask': u'255.255.255.0', 'nw_type': 'guest', 'device': 'eth0', 'cidr': '10.70.116.75/24', 'source_nat': False, 'size': '24'}]}
- 2016-07-28 13:11:30,874 merge.py load:60 Loading data bag type ips
- 2016-07-28 13:11:30,875 merge.py process:100 Command of type ips received
- 2016-07-28 13:11:30,881 merge.py save:71 Writing data bag type ips
- 2016-07-28 13:11:30,881 merge.py save:72 {u'id': u'ips', u'eth1': [{'broadcast': '255.255.255.255', 'one_to_one_nat': False, 'nic_dev_id': '1', 'network': '0.0.0.0/0', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'0.0.0.0', 'netmask': u'0.0.0.0', 'nw_type': 'control', 'device': 'eth1', 'cidr': '0.0.0.0/0', 'source_nat': False, 'size': '0'}], u'eth0': [{u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}]}
- 2016-07-28 13:11:30,882 merge.py save:71 Writing data bag type cmdline
- 2016-07-28 13:11:30,882 merge.py save:72 {u'config': {u'domain': u'vit.vertitechit.com', u'cidrsize': u'24', u'baremetalnotificationsecuritykey': u'nu1HfF_DpC-gK-G_3y1u54Snb9ruROq-qldOvhnHj4EMypguvtfQu0o18eY3gs81iPZMD2Du1QOUAG5KOfMYXQ', u'port': u'8080', u'eth0ip': u'10.70.116.75', u'eth1mask': u'0.0.0.0', u'sshonguest': u'true', u'gateway': u'10.70.116.1', u'template': u'domP', u'mgmtcidr': u'10.70.110.0/24', u'type': u'dhcpsrvr', u'eth1ip': u'0.0.0.0', u'eth0mask': u'255.255.255.0', u'dhcprange': u'10.70.116.1', u'host': u'10.70.110.101', u'localgw': u'10.70.116.1', 'redundant_router': 'false', u'baremetalnotificationapikey': u'CKZoOXffpY5ihjvzly3yD_2t2qaDnFglYFDoeep37aH1qy5u67aX51ZsuZpZcphfOxJY52rkTlNOl0nkNSyXjQ', u'nic_macs': u'06:b1:2e:00:00:10|02:00:14:42:00:03', u'name': u'r-4-VM', u'dns1': u'10.70.10.21', u'disable_rp_filter': u'true', u'extra_pubnics': u'2'}, u'id': u'cmdline'}
- 2016-07-28 13:11:30,887 merge.py load:249 Could not open /var/cache/cloud/cmd_line.json
- 2016-07-28 13:11:30,887 merge.py load:60 Loading data bag type ips
- 2016-07-28 13:11:30,887 merge.py load:60 Loading data bag type cmdline
- 2016-07-28 13:11:30,888 configure.py main:924 Configuring ip addresses
- 2016-07-28 13:11:30,888 CsHelper.py execute:160 Executing: ip addr show dev eth1
- 2016-07-28 13:11:30,895 CsHelper.py execute:160 Executing: ip addr show dev eth0
- 2016-07-28 13:11:30,899 CsHelper.py execute:160 Executing: ip addr show dev eth1
- 2016-07-28 13:11:30,905 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'0.0.0.0', u'one_to_one_nat': False, u'nic_dev_id': u'1', u'network': u'0.0.0.0/0', u'netmask': u'0.0.0.0', u'source_nat': False, u'broadcast': u'255.255.255.255', u'add': True, u'nw_type': u'control', u'device': u'eth1', u'cidr': u'0.0.0.0/0', u'gateway': u'10.70.116.1', u'size': u'0'}
- 2016-07-28 13:11:30,905 CsAddress.py process:119 Address 0.0.0.0/0 on device eth1 not configured
- 2016-07-28 13:11:30,905 CsAddress.py configure:277 Configuring address 0.0.0.0/0 on device eth1
- 2016-07-28 13:11:30,910 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
- 2016-07-28 13:11:30,910 CsHelper.py execute:160 Executing: ip -4 route list 0/0
- 2016-07-28 13:11:30,915 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
- 2016-07-28 13:11:30,915 CsHelper.py execute:160 Executing: ip addr show dev eth0
- 2016-07-28 13:11:30,920 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}
- 2016-07-28 13:11:30,920 CsAddress.py process:119 Address 10.70.116.75/24 on device eth0 not configured
- 2016-07-28 13:11:30,920 CsAddress.py configure:277 Configuring address 10.70.116.75/24 on device eth0
- 2016-07-28 13:11:30,927 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
- 2016-07-28 13:11:30,930 CsHelper.py addifmissing:148 Added 0 Table_eth0 to file /etc/iproute2/rt_tables
- 2016-07-28 13:11:30,930 CsHelper.py execute:160 Executing: ip rule show
- 2016-07-28 13:11:30,934 CsHelper.py execute:160 Executing: ip rule add fwmark 0 table Table_eth0
- 2016-07-28 13:11:30,938 CsRule.py addMark:37 Added fwmark rule for Table_eth0
- 2016-07-28 13:11:30,938 CsHelper.py execute:160 Executing: ip link show eth0 | grep 'state DOWN'
- 2016-07-28 13:11:30,943 CsHelper.py execute:160 Executing: arping -c 1 -I eth0 -A -U -s 10.70.116.75 10.70.116.1
- 2016-07-28 13:11:30,960 CsAddress.py inKernel:686 rpsfr is not present in the kernel
- 2016-07-28 13:11:30,961 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
- 2016-07-28 13:11:30,961 CsRoute.py add_route:50 Adding route: dev eth0 table: Table_eth0 network: 10.70.116.0/24 if not present
- 2016-07-28 13:11:30,961 CsHelper.py execute:160 Executing: ip route show dev eth0 table Table_eth0 10.70.116.0/24
- 2016-07-28 13:11:30,968 CsHelper.py execute:160 Executing: ps aux
- 2016-07-28 13:11:30,980 CsProcess.py start:33 Started dummy
- 2016-07-28 13:11:30,982 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
- 2016-07-28 13:11:30,982 CsHelper.py execute:160 Executing: ip -4 route list 0/0
- 2016-07-28 13:11:30,989 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
- 2016-07-28 13:11:30,990 configure.py main:929 Configuring Guest Network
- 2016-07-28 13:11:30,990 configure.py main:933 Configuring vmpassword
- 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type vmpassword
- 2016-07-28 13:11:30,990 configure.py main:938 Configuring vmdata
- 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type vmdata
- 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type networkacl
- 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type firewallrules
- 2016-07-28 13:11:30,991 merge.py load:57 Creating data bag type forwardingrules
- 2016-07-28 13:11:30,991 merge.py load:57 Creating data bag type site2sitevpn
- 2016-07-28 13:11:30,994 merge.py load:57 Creating data bag type remoteaccessvpn
- 2016-07-28 13:11:30,994 configure.py process:624 {'id': 'remoteaccessvpn'}
- 2016-07-28 13:11:30,994 merge.py load:57 Creating data bag type loadbalancer
- 2016-07-28 13:11:30,994 configure.py main:963 Configuring networkacl
- 2016-07-28 13:11:30,994 configure.py main:967 Configuring firewall rules
- 2016-07-28 13:11:30,994 configure.py main:971 Configuring PF rules
- 2016-07-28 13:11:30,994 configure.py main:975 Configuring s2s vpn
- 2016-07-28 13:11:30,994 configure.py main:979 Configuring remote access vpn
- 2016-07-28 13:11:30,995 configure.py main:983 Configuring vpn users list
- 2016-07-28 13:11:30,995 merge.py load:57 Creating data bag type vpnuserlist
- 2016-07-28 13:11:30,995 configure.py main:988 Configuring dhcp entry
- 2016-07-28 13:11:30,995 merge.py load:57 Creating data bag type dhcpentry
- 2016-07-28 13:11:30,995 CsHelper.py execute:160 Executing: ip addr show
- 2016-07-28 13:11:31,011 CsFile.py load:37 File /etc/dhcphosts.txt does not exist
- 2016-07-28 13:11:31,011 CsFile.py load:37 File /etc/dnsmasq.d/cloud.conf does not exist
- 2016-07-28 13:11:31,011 CsFile.py load:39 Reading file /etc/hosts
- 2016-07-28 13:11:31,012 CsFile.py commit:66 Wrote edited file /etc/hosts
- 2016-07-28 13:11:31,012 CsFile.py commit:68 Updated file in-cache configuration
- 2016-07-28 13:11:31,012 CsDhcp.py write_hosts:121 Updated hosts file
- 2016-07-28 13:11:31,012 CsFile.py commit:60 Nothing to commit. The /etc/dnsmasq.d/cloud.conf file did not change
- 2016-07-28 13:11:31,013 CsFile.py commit:60 Nothing to commit. The /etc/dhcphosts.txt file did not change
- 2016-07-28 13:11:31,013 CsHelper.py execute:160 Executing: service dnsmasq restart
- 2016-07-28 13:11:33,154 CsHelper.py service:189 Service dnsmasq restart
- 2016-07-28 13:11:33,154 configure.py main:993 Configuring load balancer
- 2016-07-28 13:11:33,155 configure.py main:997 Configuring monitor service
- 2016-07-28 13:11:33,155 merge.py load:57 Creating data bag type monitorservice
- 2016-07-28 13:11:33,155 configure.py main:1003 Configuring iptables rules
- 2016-07-28 13:11:33,155 CsHelper.py execute:160 Executing: iptables-save
- 2016-07-28 13:11:33,187 CsHelper.py execute:160 Executing: iptables -t filter -N FW_OUTBOUND
- 2016-07-28 13:11:33,253 CsHelper.py execute:160 Executing: iptables -t filter -N INPUT
- 2016-07-28 13:11:33,259 CsHelper.py execute:160 Executing: iptables -t filter -N
- 2016-07-28 13:11:33,263 CsHelper.py execute:160 Executing: iptables -t mangle -N PREROUTING
- 2016-07-28 13:11:33,272 CsHelper.py execute:160 Executing: iptables -t filter -N FORWARD
- 2016-07-28 13:11:33,278 CsHelper.py execute:160 Executing: iptables -t filter -N OUTPUT
- 2016-07-28 13:11:33,282 CsHelper.py execute:160 Executing: iptables -t filter -N NETWORK_STATS
- 2016-07-28 13:11:33,289 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
- 2016-07-28 13:11:33,289 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,289 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,342 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,343 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,343 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,376 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
- 2016-07-28 13:11:33,376 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
- 2016-07-28 13:11:33,377 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
- 2016-07-28 13:11:33,381 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
- 2016-07-28 13:11:33,382 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
- 2016-07-28 13:11:33,382 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
- 2016-07-28 13:11:33,392 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
- 2016-07-28 13:11:33,392 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
- 2016-07-28 13:11:33,392 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
- 2016-07-28 13:11:33,417 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'--restore-mark': u'--nfmask', u'-j': u'CONNMARK', u'0xffffffff': u'--ctmask', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=mangle chain=PREROUTING
- 2016-07-28 13:11:33,418 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff table=mangle
- 2016-07-28 13:11:33,418 CsHelper.py execute:160 Executing: iptables -t mangle -I PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
- 2016-07-28 13:11:33,423 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'224.0.0.18/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,424 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 224.0.0.18/32 -j ACCEPT table=filter
- 2016-07-28 13:11:33,424 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 224.0.0.18/32 -j ACCEPT
- 2016-07-28 13:11:33,428 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'225.0.0.50/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,428 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 225.0.0.50/32 -j ACCEPT table=filter
- 2016-07-28 13:11:33,429 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 225.0.0.50/32 -j ACCEPT
- 2016-07-28 13:11:33,433 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-j': u'ACCEPT', u'-A': u'INPUT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=INPUT
- 2016-07-28 13:11:33,433 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,433 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,438 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-p': u'icmp', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,439 CsNetfilter.py compare:159 Add: rule=-A INPUT -p icmp -j ACCEPT table=filter
- 2016-07-28 13:11:33,439 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -p icmp -j ACCEPT
- 2016-07-28 13:11:33,444 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'lo', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,444 CsNetfilter.py compare:159 Add: rule=-A INPUT -i lo -j ACCEPT table=filter
- 2016-07-28 13:11:33,445 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i lo -j ACCEPT
- 2016-07-28 13:11:33,449 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'67', u'-p': u'udp'} table=filter chain=INPUT
- 2016-07-28 13:11:33,449 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT table=filter
- 2016-07-28 13:11:33,449 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT
- 2016-07-28 13:11:33,457 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'udp'} table=filter chain=INPUT
- 2016-07-28 13:11:33,457 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT table=filter
- 2016-07-28 13:11:33,457 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
- 2016-07-28 13:11:33,462 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'tcp'} table=filter chain=INPUT
- 2016-07-28 13:11:33,463 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT table=filter
- 2016-07-28 13:11:33,463 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
- 2016-07-28 13:11:33,468 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'80', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,469 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT table=filter
- 2016-07-28 13:11:33,469 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT
- 2016-07-28 13:11:33,474 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'8080', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,475 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT table=filter
- 2016-07-28 13:11:33,475 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT
- 2016-07-28 13:11:33,480 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth1', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-28 13:11:33,480 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,481 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,485 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'NEW', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-28 13:11:33,486 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT table=filter
- 2016-07-28 13:11:33,486 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT
- 2016-07-28 13:11:33,491 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth2', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-28 13:11:33,491 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,491 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,496 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
- 2016-07-28 13:11:33,496 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,496 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,502 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'FORWARD', u'-j': u'FW_OUTBOUND'} table=filter chain=FORWARD
- 2016-07-28 13:11:33,502 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND table=filter
- 2016-07-28 13:11:33,502 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND
- 2016-07-28 13:11:33,507 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
- 2016-07-28 13:11:33,508 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
- 2016-07-28 13:11:33,508 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
- 2016-07-28 13:11:33,512 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-j': u'NETWORK_STATS'} table=filter chain=FORWARD
- 2016-07-28 13:11:33,513 CsNetfilter.py compare:159 Add: rule=-A FORWARD -j NETWORK_STATS table=filter
- 2016-07-28 13:11:33,513 CsHelper.py execute:160 Executing: iptables -t filter -I FORWARD -j NETWORK_STATS
- 2016-07-28 13:11:33,518 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-j': u'NETWORK_STATS'} table=filter chain=INPUT
- 2016-07-28 13:11:33,518 CsNetfilter.py compare:159 Add: rule=-A INPUT -j NETWORK_STATS table=filter
- 2016-07-28 13:11:33,518 CsHelper.py execute:160 Executing: iptables -t filter -I INPUT -j NETWORK_STATS
- 2016-07-28 13:11:33,523 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'OUTPUT', u'-j': u'NETWORK_STATS'} table=filter chain=OUTPUT
- 2016-07-28 13:11:33,524 CsNetfilter.py compare:159 Add: rule=-A OUTPUT -j NETWORK_STATS table=filter
- 2016-07-28 13:11:33,524 CsHelper.py execute:160 Executing: iptables -t filter -I OUTPUT -j NETWORK_STATS
- 2016-07-28 13:11:33,529 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
- 2016-07-28 13:11:33,529 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth0 -o eth2 table=filter
- 2016-07-28 13:11:33,529 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth0 -o eth2
- 2016-07-28 13:11:33,534 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth2', u'-o': u'eth0', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
- 2016-07-28 13:11:33,535 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 -o eth0 table=filter
- 2016-07-28 13:11:33,535 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 -o eth0
- 2016-07-28 13:11:33,540 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-o': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp', u'!_-i': u'eth0'} table=filter chain=NETWORK_STATS
- 2016-07-28 13:11:33,540 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -o eth2 ! -i eth0 -p tcp table=filter
- 2016-07-28 13:11:33,540 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -o eth2 ! -i eth0 -p tcp
- 2016-07-28 13:11:33,546 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'!_-o': u'eth0', u'-i': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp'} table=filter chain=NETWORK_STATS
- 2016-07-28 13:11:33,546 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 ! -o eth0 -p tcp table=filter
- 2016-07-28 13:11:33,546 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 ! -o eth0 -p tcp
- 2016-07-28 13:11:33,552 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
- 2016-07-28 13:11:33,552 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,552 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,559 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
- 2016-07-28 13:11:33,559 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
- 2016-07-28 13:11:33,559 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
- 2016-07-28 13:11:33,565 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
- 2016-07-28 13:11:33,565 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
- 2016-07-28 13:11:33,565 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
- 2016-07-28 13:11:33,570 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
- 2016-07-28 13:11:33,571 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
- 2016-07-28 13:11:33,571 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
- 2016-07-28 13:11:33,576 merge.py load:60 Loading data bag type cmdline
- 2016-07-28 13:11:33,580 CsRedundant.py set:68 Router redundancy status is False
- 2016-07-28 13:11:33,581 CsHelper.py execute:160 Executing: service conntrackd stop
- 2016-07-28 13:11:33,608 CsHelper.py service:189 Service conntrackd stop
- 2016-07-28 13:11:33,608 CsHelper.py execute:160 Executing: service keepalived stop
- 2016-07-28 13:11:33,619 CsHelper.py service:189 Service keepalived stop
- 2016-07-28 13:11:33,620 CsHelper.py execute:160 Executing: mount
- 2016-07-28 13:11:33,625 configure.py main:1011 Configuring static routes
- 2016-07-28 13:11:33,626 merge.py load:57 Creating data bag type staticroutes
- 2016-07-28 13:11:33,626 configure.py process:80 Processing CsStaticRoutes file ==> {'id': 'staticroutes'}
- 2016-07-28 13:11:33,626 configure.py main:1016 Configuring iptables rules done ...saving rules
- 2016-07-28 13:11:33,626 CsHelper.py save_iptables:168 Saving iptables for iptables-save
- 2016-07-28 13:11:33,626 CsHelper.py execute:160 Executing: iptables-save
- 2016-07-28 13:11:33,632 CsHelper.py save_iptables:168 Saving iptables for ip6tables-save
- 2016-07-28 13:11:33,632 CsHelper.py execute:160 Executing: ip6tables-save
Advertisement
Add Comment
Please, Sign In to add comment