Guest User

Untitled

a guest
Jul 28th, 2016
56
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 57.42 KB | None | 0 0
  1. Wed Jul 27 20:13:38 UTC 2016 Executing cloud-early-config
  2. Wed Jul 27 20:13:38 UTC 2016 Detected that we are running inside vmware guest
  3. Wed Jul 27 20:13:38 UTC 2016 Patching scripts oldmd5=a0c20fe63cef544b65a4d9171b443e42 newmd5=44f724d028ad1ecdc566d2d101e3f6e5
  4. Wed Jul 27 20:13:38 UTC 2016 Patching cloud service
  5. Wed Jul 27 20:13:40 UTC 2016 Rebooting system since we patched init scripts
  6. Wed Jul 27 20:13:42 UTC 2016 Updating log4j-cloud.xml
  7. Wed Jul 27 20:13:42 UTC 2016 Setting up dhcp server system vm
  8. Wed Jul 27 20:13:42 UTC 2016 checking that eth0 has IP
  9. Wed Jul 27 20:13:42 UTC 2016 checking that eth1 has IP
  10. Wed Jul 27 20:13:43 UTC 2016 waiting for eth1 interface setup with ip timer=0
  11. Wed Jul 27 20:14:10 UTC 2016 Executing cloud-early-config
  12. Wed Jul 27 20:14:10 UTC 2016 Detected that we are running inside vmware guest
  13. Wed Jul 27 20:14:11 UTC 2016 Patching cloud service
  14. Wed Jul 27 20:14:12 UTC 2016 Updating log4j-cloud.xml
  15. Wed Jul 27 20:14:12 UTC 2016 Setting up dhcp server system vm
  16. Wed Jul 27 20:14:12 UTC 2016 checking that eth0 has IP
  17. Wed Jul 27 20:14:13 UTC 2016 waiting for eth0 interface setup with ip timer=0
  18. Wed Jul 27 20:14:13 UTC 2016 checking that eth1 has IP
  19. Wed Jul 27 20:14:14 UTC 2016 waiting for eth1 interface setup with ip timer=0
  20. Wed Jul 27 20:14:15 UTC 2016 waiting for eth1 interface setup with ip timer=1
  21. Wed Jul 27 20:14:16 UTC 2016 waiting for eth1 interface setup with ip timer=2
  22. Wed Jul 27 20:14:18 UTC 2016 waiting for eth1 interface setup with ip timer=3
  23. Wed Jul 27 20:14:19 UTC 2016 waiting for eth1 interface setup with ip timer=4
  24. Wed Jul 27 20:14:20 UTC 2016 waiting for eth1 interface setup with ip timer=5
  25. Wed Jul 27 20:14:21 UTC 2016 waiting for eth1 interface setup with ip timer=6
  26. Wed Jul 27 20:14:22 UTC 2016 waiting for eth1 interface setup with ip timer=7
  27. Wed Jul 27 20:14:23 UTC 2016 waiting for eth1 interface setup with ip timer=8
  28. Wed Jul 27 20:14:24 UTC 2016 waiting for eth1 interface setup with ip timer=9
  29. Wed Jul 27 20:14:25 UTC 2016 waiting for eth1 interface setup with ip timer=10
  30. Wed Jul 27 20:14:26 UTC 2016 waiting for eth1 interface setup with ip timer=11
  31. Wed Jul 27 20:14:27 UTC 2016 waiting for eth1 interface setup with ip timer=12
  32. Wed Jul 27 20:14:28 UTC 2016 waiting for eth1 interface setup with ip timer=13
  33. Wed Jul 27 20:14:29 UTC 2016 waiting for eth1 interface setup with ip timer=14
  34. Wed Jul 27 20:14:30 UTC 2016 waiting for eth1 interface setup with ip timer=15
  35. Wed Jul 27 20:14:31 UTC 2016 waiting for eth1 interface setup with ip timer=16
  36. Wed Jul 27 20:14:31 UTC 2016 interface eth1 is not set up with ip... exiting
  37. Wed Jul 27 20:14:40 UTC 2016 Setting up dnsmasq
  38. Wed Jul 27 20:14:41 UTC 2016 Setting up apache web server
  39. Wed Jul 27 20:14:41 UTC 2016 Enable service dnsmasq = 1
  40. Wed Jul 27 20:14:41 UTC 2016 Enable service haproxy = 0
  41. Wed Jul 27 20:14:41 UTC 2016 Processors = 1 Enable service = 0
  42. Wed Jul 27 20:14:41 UTC 2016 Enable service cloud-passwd-srvr = 1
  43. Wed Jul 27 20:14:41 UTC 2016 Enable service cloud = 0
  44. Wed Jul 27 20:14:41 UTC 2016 cloud: enable_fwding = 0
  45. Wed Jul 27 20:14:41 UTC 2016 enable_fwding = 0
  46. 2016-07-27 20:14:42,988 merge.py load:57 Creating data bag type cmdline
  47. 2016-07-27 20:14:42,988 merge.py process:100 Command of type cmdline received
  48. 2016-07-27 20:14:42,988 merge.py load:57 Creating data bag type ips
  49. 2016-07-27 20:14:42,988 merge.py process:100 Command of type ips received
  50. 2016-07-27 20:14:42,989 merge.py save:71 Writing data bag type ips
  51. 2016-07-27 20:14:42,989 merge.py save:72 {'id': 'ips', 'eth0': [{'broadcast': '10.70.116.255', 'one_to_one_nat': False, 'nic_dev_id': '0', 'network': '10.70.116.0/24', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'10.70.116.75', 'netmask': u'255.255.255.0', 'nw_type': 'guest', 'device': 'eth0', 'cidr': '10.70.116.75/24', 'source_nat': False, 'size': '24'}]}
  52. 2016-07-27 20:14:42,990 merge.py load:60 Loading data bag type ips
  53. 2016-07-27 20:14:42,990 merge.py process:100 Command of type ips received
  54. 2016-07-27 20:14:42,990 merge.py save:71 Writing data bag type ips
  55. 2016-07-27 20:14:42,990 merge.py save:72 {u'id': u'ips', 'eth1': [{'broadcast': '255.255.255.255', 'one_to_one_nat': False, 'nic_dev_id': '1', 'network': '0.0.0.0/0', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'0.0.0.0', 'netmask': u'0.0.0.0', 'nw_type': 'control', 'device': 'eth1', 'cidr': '0.0.0.0/0', 'source_nat': False, 'size': '0'}], u'eth0': [{u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}]}
  56. 2016-07-27 20:14:42,991 merge.py save:71 Writing data bag type cmdline
  57. 2016-07-27 20:14:42,991 merge.py save:72 {'config': {u'domain': u'vit.vertitechit.com', u'cidrsize': u'24', u'baremetalnotificationsecuritykey': u'nu1HfF_DpC-gK-G_3y1u54Snb9ruROq-qldOvhnHj4EMypguvtfQu0o18eY3gs81iPZMD2Du1QOUAG5KOfMYXQ', u'port': u'8080', u'eth0ip': u'10.70.116.75', u'eth1mask': u'0.0.0.0', u'sshonguest': u'true', u'gateway': u'10.70.116.1', u'template': u'domP', u'mgmtcidr': u'10.70.110.0/24', u'type': u'dhcpsrvr', u'eth1ip': u'0.0.0.0', u'eth0mask': u'255.255.255.0', u'dhcprange': u'10.70.116.1', u'host': u'10.70.110.101', u'localgw': u'10.70.116.1', 'redundant_router': 'false', u'baremetalnotificationapikey': u'CKZoOXffpY5ihjvzly3yD_2t2qaDnFglYFDoeep37aH1qy5u67aX51ZsuZpZcphfOxJY52rkTlNOl0nkNSyXjQ', u'nic_macs': u'06:b1:2e:00:00:10|02:00:14:42:00:03', u'name': u'r-4-VM', u'dns1': u'10.70.10.21', u'disable_rp_filter': u'true', u'extra_pubnics': u'2'}, 'id': u'cmdline'}
  58. 2016-07-27 20:14:42,996 merge.py load:249 Could not open /var/cache/cloud/cmd_line.json
  59. 2016-07-27 20:14:42,996 merge.py load:60 Loading data bag type ips
  60. 2016-07-27 20:14:42,997 merge.py load:60 Loading data bag type cmdline
  61. 2016-07-27 20:14:42,997 configure.py main:924 Configuring ip addresses
  62. 2016-07-27 20:14:42,997 CsHelper.py execute:160 Executing: ip addr show dev eth1
  63. 2016-07-27 20:14:43,010 CsHelper.py execute:160 Executing: ip addr show dev eth0
  64. 2016-07-27 20:14:43,014 CsHelper.py execute:160 Executing: ip addr show dev eth1
  65. 2016-07-27 20:14:43,018 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'0.0.0.0', u'one_to_one_nat': False, u'nic_dev_id': u'1', u'network': u'0.0.0.0/0', u'netmask': u'0.0.0.0', u'source_nat': False, u'broadcast': u'255.255.255.255', u'add': True, u'nw_type': u'control', u'device': u'eth1', u'cidr': u'0.0.0.0/0', u'gateway': u'10.70.116.1', u'size': u'0'}
  66. 2016-07-27 20:14:43,019 CsAddress.py process:119 Address 0.0.0.0/0 on device eth1 not configured
  67. 2016-07-27 20:14:43,019 CsAddress.py configure:277 Configuring address 0.0.0.0/0 on device eth1
  68. 2016-07-27 20:14:43,023 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
  69. 2016-07-27 20:14:43,023 CsHelper.py execute:160 Executing: ip -4 route list 0/0
  70. 2016-07-27 20:14:43,028 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
  71. 2016-07-27 20:14:43,029 CsHelper.py execute:160 Executing: ip addr show dev eth0
  72. 2016-07-27 20:14:43,033 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}
  73. 2016-07-27 20:14:43,033 CsAddress.py process:119 Address 10.70.116.75/24 on device eth0 not configured
  74. 2016-07-27 20:14:43,033 CsAddress.py configure:277 Configuring address 10.70.116.75/24 on device eth0
  75. 2016-07-27 20:14:43,039 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
  76. 2016-07-27 20:14:43,042 CsHelper.py addifmissing:148 Added 0 Table_eth0 to file /etc/iproute2/rt_tables
  77. 2016-07-27 20:14:43,042 CsHelper.py execute:160 Executing: ip rule show
  78. 2016-07-27 20:14:43,047 CsHelper.py execute:160 Executing: ip rule add fwmark 0 table Table_eth0
  79. 2016-07-27 20:14:43,050 CsRule.py addMark:37 Added fwmark rule for Table_eth0
  80. 2016-07-27 20:14:43,051 CsHelper.py execute:160 Executing: ip link show eth0 | grep 'state DOWN'
  81. 2016-07-27 20:14:43,056 CsHelper.py execute:160 Executing: arping -c 1 -I eth0 -A -U -s 10.70.116.75 10.70.116.1
  82. 2016-07-27 20:14:43,069 CsAddress.py inKernel:686 rpsfr is not present in the kernel
  83. 2016-07-27 20:14:43,069 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
  84. 2016-07-27 20:14:43,069 CsRoute.py add_route:50 Adding route: dev eth0 table: Table_eth0 network: 10.70.116.0/24 if not present
  85. 2016-07-27 20:14:43,070 CsHelper.py execute:160 Executing: ip route show dev eth0 table Table_eth0 10.70.116.0/24
  86. 2016-07-27 20:14:43,077 CsHelper.py execute:160 Executing: ps aux
  87. 2016-07-27 20:14:43,090 CsProcess.py start:33 Started dummy
  88. 2016-07-27 20:14:43,092 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
  89. 2016-07-27 20:14:43,093 CsHelper.py execute:160 Executing: ip -4 route list 0/0
  90. 2016-07-27 20:14:43,106 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
  91. 2016-07-27 20:14:43,107 configure.py main:929 Configuring Guest Network
  92. 2016-07-27 20:14:43,107 configure.py main:933 Configuring vmpassword
  93. 2016-07-27 20:14:43,107 merge.py load:57 Creating data bag type vmpassword
  94. 2016-07-27 20:14:43,107 configure.py main:938 Configuring vmdata
  95. 2016-07-27 20:14:43,107 merge.py load:57 Creating data bag type vmdata
  96. 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type networkacl
  97. 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type firewallrules
  98. 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type forwardingrules
  99. 2016-07-27 20:14:43,108 merge.py load:57 Creating data bag type site2sitevpn
  100. 2016-07-27 20:14:43,110 merge.py load:57 Creating data bag type remoteaccessvpn
  101. 2016-07-27 20:14:43,111 configure.py process:624 {'id': 'remoteaccessvpn'}
  102. 2016-07-27 20:14:43,111 merge.py load:57 Creating data bag type loadbalancer
  103. 2016-07-27 20:14:43,111 configure.py main:963 Configuring networkacl
  104. 2016-07-27 20:14:43,111 configure.py main:967 Configuring firewall rules
  105. 2016-07-27 20:14:43,111 configure.py main:971 Configuring PF rules
  106. 2016-07-27 20:14:43,111 configure.py main:975 Configuring s2s vpn
  107. 2016-07-27 20:14:43,111 configure.py main:979 Configuring remote access vpn
  108. 2016-07-27 20:14:43,111 configure.py main:983 Configuring vpn users list
  109. 2016-07-27 20:14:43,111 merge.py load:57 Creating data bag type vpnuserlist
  110. 2016-07-27 20:14:43,112 configure.py main:988 Configuring dhcp entry
  111. 2016-07-27 20:14:43,112 merge.py load:57 Creating data bag type dhcpentry
  112. 2016-07-27 20:14:43,112 CsHelper.py execute:160 Executing: ip addr show
  113. 2016-07-27 20:14:43,129 CsFile.py load:37 File /etc/dhcphosts.txt does not exist
  114. 2016-07-27 20:14:43,129 CsFile.py load:37 File /etc/dnsmasq.d/cloud.conf does not exist
  115. 2016-07-27 20:14:43,129 CsFile.py load:39 Reading file /etc/hosts
  116. 2016-07-27 20:14:43,129 CsFile.py commit:66 Wrote edited file /etc/hosts
  117. 2016-07-27 20:14:43,130 CsFile.py commit:68 Updated file in-cache configuration
  118. 2016-07-27 20:14:43,130 CsDhcp.py write_hosts:121 Updated hosts file
  119. 2016-07-27 20:14:43,130 CsFile.py commit:60 Nothing to commit. The /etc/dnsmasq.d/cloud.conf file did not change
  120. 2016-07-27 20:14:43,130 CsFile.py commit:60 Nothing to commit. The /etc/dhcphosts.txt file did not change
  121. 2016-07-27 20:14:43,130 CsHelper.py execute:160 Executing: service dnsmasq restart
  122. 2016-07-27 20:14:45,289 CsHelper.py service:189 Service dnsmasq restart
  123. 2016-07-27 20:14:45,289 configure.py main:993 Configuring load balancer
  124. 2016-07-27 20:14:45,289 configure.py main:997 Configuring monitor service
  125. 2016-07-27 20:14:45,289 merge.py load:57 Creating data bag type monitorservice
  126. 2016-07-27 20:14:45,289 configure.py main:1003 Configuring iptables rules
  127. 2016-07-27 20:14:45,290 CsHelper.py execute:160 Executing: iptables-save
  128. 2016-07-27 20:14:45,314 CsHelper.py execute:160 Executing: iptables -t filter -N FW_OUTBOUND
  129. 2016-07-27 20:14:45,340 CsHelper.py execute:160 Executing: iptables -t filter -N INPUT
  130. 2016-07-27 20:14:45,345 CsHelper.py execute:160 Executing: iptables -t filter -N
  131. 2016-07-27 20:14:45,349 CsHelper.py execute:160 Executing: iptables -t mangle -N PREROUTING
  132. 2016-07-27 20:14:45,357 CsHelper.py execute:160 Executing: iptables -t filter -N FORWARD
  133. 2016-07-27 20:14:45,361 CsHelper.py execute:160 Executing: iptables -t filter -N OUTPUT
  134. 2016-07-27 20:14:45,365 CsHelper.py execute:160 Executing: iptables -t filter -N NETWORK_STATS
  135. 2016-07-27 20:14:45,368 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
  136. 2016-07-27 20:14:45,369 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  137. 2016-07-27 20:14:45,369 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
  138. 2016-07-27 20:14:45,379 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
  139. 2016-07-27 20:14:45,379 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
  140. 2016-07-27 20:14:45,380 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
  141. 2016-07-27 20:14:45,394 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
  142. 2016-07-27 20:14:45,394 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
  143. 2016-07-27 20:14:45,394 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
  144. 2016-07-27 20:14:45,398 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
  145. 2016-07-27 20:14:45,398 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
  146. 2016-07-27 20:14:45,398 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
  147. 2016-07-27 20:14:45,401 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
  148. 2016-07-27 20:14:45,402 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
  149. 2016-07-27 20:14:45,402 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
  150. 2016-07-27 20:14:45,414 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'--restore-mark': u'--nfmask', u'-j': u'CONNMARK', u'0xffffffff': u'--ctmask', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=mangle chain=PREROUTING
  151. 2016-07-27 20:14:45,415 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff table=mangle
  152. 2016-07-27 20:14:45,415 CsHelper.py execute:160 Executing: iptables -t mangle -I PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
  153. 2016-07-27 20:14:45,419 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'224.0.0.18/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
  154. 2016-07-27 20:14:45,420 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 224.0.0.18/32 -j ACCEPT table=filter
  155. 2016-07-27 20:14:45,420 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 224.0.0.18/32 -j ACCEPT
  156. 2016-07-27 20:14:45,424 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'225.0.0.50/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
  157. 2016-07-27 20:14:45,424 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 225.0.0.50/32 -j ACCEPT table=filter
  158. 2016-07-27 20:14:45,424 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 225.0.0.50/32 -j ACCEPT
  159. 2016-07-27 20:14:45,428 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-j': u'ACCEPT', u'-A': u'INPUT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=INPUT
  160. 2016-07-27 20:14:45,429 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  161. 2016-07-27 20:14:45,429 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  162. 2016-07-27 20:14:45,434 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-p': u'icmp', u'-j': u'ACCEPT'} table=filter chain=INPUT
  163. 2016-07-27 20:14:45,434 CsNetfilter.py compare:159 Add: rule=-A INPUT -p icmp -j ACCEPT table=filter
  164. 2016-07-27 20:14:45,434 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -p icmp -j ACCEPT
  165. 2016-07-27 20:14:45,439 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'lo', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
  166. 2016-07-27 20:14:45,439 CsNetfilter.py compare:159 Add: rule=-A INPUT -i lo -j ACCEPT table=filter
  167. 2016-07-27 20:14:45,440 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i lo -j ACCEPT
  168. 2016-07-27 20:14:45,445 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'67', u'-p': u'udp'} table=filter chain=INPUT
  169. 2016-07-27 20:14:45,445 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT table=filter
  170. 2016-07-27 20:14:45,445 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT
  171. 2016-07-27 20:14:45,451 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'udp'} table=filter chain=INPUT
  172. 2016-07-27 20:14:45,451 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT table=filter
  173. 2016-07-27 20:14:45,451 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
  174. 2016-07-27 20:14:45,455 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'tcp'} table=filter chain=INPUT
  175. 2016-07-27 20:14:45,456 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT table=filter
  176. 2016-07-27 20:14:45,456 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
  177. 2016-07-27 20:14:45,460 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'80', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
  178. 2016-07-27 20:14:45,461 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT table=filter
  179. 2016-07-27 20:14:45,461 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT
  180. 2016-07-27 20:14:45,465 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'8080', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
  181. 2016-07-27 20:14:45,465 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT table=filter
  182. 2016-07-27 20:14:45,465 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT
  183. 2016-07-27 20:14:45,470 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth1', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
  184. 2016-07-27 20:14:45,470 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  185. 2016-07-27 20:14:45,470 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
  186. 2016-07-27 20:14:45,474 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'NEW', u'-m2': u'state'} table=filter chain=FORWARD
  187. 2016-07-27 20:14:45,474 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT table=filter
  188. 2016-07-27 20:14:45,474 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT
  189. 2016-07-27 20:14:45,478 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth2', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
  190. 2016-07-27 20:14:45,479 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  191. 2016-07-27 20:14:45,479 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  192. 2016-07-27 20:14:45,485 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
  193. 2016-07-27 20:14:45,485 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  194. 2016-07-27 20:14:45,485 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  195. 2016-07-27 20:14:45,491 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'FORWARD', u'-j': u'FW_OUTBOUND'} table=filter chain=FORWARD
  196. 2016-07-27 20:14:45,491 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND table=filter
  197. 2016-07-27 20:14:45,491 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND
  198. 2016-07-27 20:14:45,495 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
  199. 2016-07-27 20:14:45,496 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
  200. 2016-07-27 20:14:45,496 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
  201. 2016-07-27 20:14:45,500 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-j': u'NETWORK_STATS'} table=filter chain=FORWARD
  202. 2016-07-27 20:14:45,500 CsNetfilter.py compare:159 Add: rule=-A FORWARD -j NETWORK_STATS table=filter
  203. 2016-07-27 20:14:45,500 CsHelper.py execute:160 Executing: iptables -t filter -I FORWARD -j NETWORK_STATS
  204. 2016-07-27 20:14:45,505 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-j': u'NETWORK_STATS'} table=filter chain=INPUT
  205. 2016-07-27 20:14:45,505 CsNetfilter.py compare:159 Add: rule=-A INPUT -j NETWORK_STATS table=filter
  206. 2016-07-27 20:14:45,505 CsHelper.py execute:160 Executing: iptables -t filter -I INPUT -j NETWORK_STATS
  207. 2016-07-27 20:14:45,509 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'OUTPUT', u'-j': u'NETWORK_STATS'} table=filter chain=OUTPUT
  208. 2016-07-27 20:14:45,510 CsNetfilter.py compare:159 Add: rule=-A OUTPUT -j NETWORK_STATS table=filter
  209. 2016-07-27 20:14:45,510 CsHelper.py execute:160 Executing: iptables -t filter -I OUTPUT -j NETWORK_STATS
  210. 2016-07-27 20:14:45,514 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
  211. 2016-07-27 20:14:45,514 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth0 -o eth2 table=filter
  212. 2016-07-27 20:14:45,514 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth0 -o eth2
  213. 2016-07-27 20:14:45,519 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth2', u'-o': u'eth0', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
  214. 2016-07-27 20:14:45,519 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 -o eth0 table=filter
  215. 2016-07-27 20:14:45,519 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 -o eth0
  216. 2016-07-27 20:14:45,524 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-o': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp', u'!_-i': u'eth0'} table=filter chain=NETWORK_STATS
  217. 2016-07-27 20:14:45,524 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -o eth2 ! -i eth0 -p tcp table=filter
  218. 2016-07-27 20:14:45,524 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -o eth2 ! -i eth0 -p tcp
  219. 2016-07-27 20:14:45,529 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'!_-o': u'eth0', u'-i': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp'} table=filter chain=NETWORK_STATS
  220. 2016-07-27 20:14:45,529 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 ! -o eth0 -p tcp table=filter
  221. 2016-07-27 20:14:45,529 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 ! -o eth0 -p tcp
  222. 2016-07-27 20:14:45,534 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
  223. 2016-07-27 20:14:45,534 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  224. 2016-07-27 20:14:45,535 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
  225. 2016-07-27 20:14:45,539 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
  226. 2016-07-27 20:14:45,540 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
  227. 2016-07-27 20:14:45,540 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
  228. 2016-07-27 20:14:45,545 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
  229. 2016-07-27 20:14:45,545 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
  230. 2016-07-27 20:14:45,545 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
  231. 2016-07-27 20:14:45,550 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
  232. 2016-07-27 20:14:45,550 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
  233. 2016-07-27 20:14:45,550 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
  234. 2016-07-27 20:14:45,555 merge.py load:60 Loading data bag type cmdline
  235. 2016-07-27 20:14:45,557 CsRedundant.py set:68 Router redundancy status is False
  236. 2016-07-27 20:14:45,557 CsHelper.py execute:160 Executing: service conntrackd stop
  237. 2016-07-27 20:14:45,588 CsHelper.py service:189 Service conntrackd stop
  238. 2016-07-27 20:14:45,589 CsHelper.py execute:160 Executing: service keepalived stop
  239. 2016-07-27 20:14:45,598 CsHelper.py service:189 Service keepalived stop
  240. 2016-07-27 20:14:45,598 CsHelper.py execute:160 Executing: mount
  241. 2016-07-27 20:14:45,604 configure.py main:1011 Configuring static routes
  242. 2016-07-27 20:14:45,604 merge.py load:57 Creating data bag type staticroutes
  243. 2016-07-27 20:14:45,604 configure.py process:80 Processing CsStaticRoutes file ==> {'id': 'staticroutes'}
  244. 2016-07-27 20:14:45,604 configure.py main:1016 Configuring iptables rules done ...saving rules
  245. 2016-07-27 20:14:45,605 CsHelper.py save_iptables:168 Saving iptables for iptables-save
  246. 2016-07-27 20:14:45,605 CsHelper.py execute:160 Executing: iptables-save
  247. 2016-07-27 20:14:45,610 CsHelper.py save_iptables:168 Saving iptables for ip6tables-save
  248. 2016-07-27 20:14:45,611 CsHelper.py execute:160 Executing: ip6tables-save
  249. Thu Jul 28 13:10:59 UTC 2016 Executing cloud-early-config
  250. Thu Jul 28 13:10:59 UTC 2016 Detected that we are running inside vmware guest
  251. Thu Jul 28 13:10:59 UTC 2016 Patching cloud service
  252. Thu Jul 28 13:11:01 UTC 2016 Updating log4j-cloud.xml
  253. Thu Jul 28 13:11:01 UTC 2016 Setting up dhcp server system vm
  254. Thu Jul 28 13:11:01 UTC 2016 checking that eth0 has IP
  255. Thu Jul 28 13:11:01 UTC 2016 checking that eth1 has IP
  256. Thu Jul 28 13:11:02 UTC 2016 waiting for eth1 interface setup with ip timer=0
  257. Thu Jul 28 13:11:03 UTC 2016 waiting for eth1 interface setup with ip timer=1
  258. Thu Jul 28 13:11:05 UTC 2016 waiting for eth1 interface setup with ip timer=2
  259. Thu Jul 28 13:11:06 UTC 2016 waiting for eth1 interface setup with ip timer=3
  260. Thu Jul 28 13:11:07 UTC 2016 waiting for eth1 interface setup with ip timer=4
  261. Thu Jul 28 13:11:08 UTC 2016 waiting for eth1 interface setup with ip timer=5
  262. Thu Jul 28 13:11:09 UTC 2016 waiting for eth1 interface setup with ip timer=6
  263. Thu Jul 28 13:11:11 UTC 2016 waiting for eth1 interface setup with ip timer=7
  264. Thu Jul 28 13:11:12 UTC 2016 waiting for eth1 interface setup with ip timer=8
  265. Thu Jul 28 13:11:13 UTC 2016 waiting for eth1 interface setup with ip timer=9
  266. Thu Jul 28 13:11:14 UTC 2016 waiting for eth1 interface setup with ip timer=10
  267. Thu Jul 28 13:11:15 UTC 2016 waiting for eth1 interface setup with ip timer=11
  268. Thu Jul 28 13:11:16 UTC 2016 waiting for eth1 interface setup with ip timer=12
  269. Thu Jul 28 13:11:17 UTC 2016 waiting for eth1 interface setup with ip timer=13
  270. Thu Jul 28 13:11:18 UTC 2016 waiting for eth1 interface setup with ip timer=14
  271. Thu Jul 28 13:11:19 UTC 2016 waiting for eth1 interface setup with ip timer=15
  272. Thu Jul 28 13:11:20 UTC 2016 waiting for eth1 interface setup with ip timer=16
  273. Thu Jul 28 13:11:20 UTC 2016 interface eth1 is not set up with ip... exiting
  274. Thu Jul 28 13:11:29 UTC 2016 Setting up dnsmasq
  275. Thu Jul 28 13:11:30 UTC 2016 Setting up apache web server
  276. Thu Jul 28 13:11:30 UTC 2016 Enable service dnsmasq = 1
  277. Thu Jul 28 13:11:30 UTC 2016 Enable service haproxy = 0
  278. Thu Jul 28 13:11:30 UTC 2016 Processors = 1 Enable service = 0
  279. Thu Jul 28 13:11:30 UTC 2016 Enable service cloud-passwd-srvr = 1
  280. Thu Jul 28 13:11:30 UTC 2016 Enable service cloud = 0
  281. Thu Jul 28 13:11:30 UTC 2016 cloud: enable_fwding = 0
  282. Thu Jul 28 13:11:30 UTC 2016 enable_fwding = 0
  283. 2016-07-28 13:11:30,869 merge.py load:60 Loading data bag type cmdline
  284. 2016-07-28 13:11:30,871 merge.py process:100 Command of type cmdline received
  285. 2016-07-28 13:11:30,871 merge.py load:60 Loading data bag type ips
  286. 2016-07-28 13:11:30,872 merge.py process:100 Command of type ips received
  287. 2016-07-28 13:11:30,872 merge.py save:71 Writing data bag type ips
  288. 2016-07-28 13:11:30,873 merge.py save:72 {u'id': u'ips', u'eth1': [{u'public_ip': u'0.0.0.0', u'one_to_one_nat': False, u'nic_dev_id': u'1', u'network': u'0.0.0.0/0', u'netmask': u'0.0.0.0', u'source_nat': False, u'broadcast': u'255.255.255.255', u'add': True, u'nw_type': u'control', u'device': u'eth1', u'cidr': u'0.0.0.0/0', u'gateway': u'10.70.116.1', u'size': u'0'}], u'eth0': [{'broadcast': '10.70.116.255', 'one_to_one_nat': False, 'nic_dev_id': '0', 'network': '10.70.116.0/24', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'10.70.116.75', 'netmask': u'255.255.255.0', 'nw_type': 'guest', 'device': 'eth0', 'cidr': '10.70.116.75/24', 'source_nat': False, 'size': '24'}]}
  289. 2016-07-28 13:11:30,874 merge.py load:60 Loading data bag type ips
  290. 2016-07-28 13:11:30,875 merge.py process:100 Command of type ips received
  291. 2016-07-28 13:11:30,881 merge.py save:71 Writing data bag type ips
  292. 2016-07-28 13:11:30,881 merge.py save:72 {u'id': u'ips', u'eth1': [{'broadcast': '255.255.255.255', 'one_to_one_nat': False, 'nic_dev_id': '1', 'network': '0.0.0.0/0', 'add': True, 'gateway': u'10.70.116.1', 'public_ip': u'0.0.0.0', 'netmask': u'0.0.0.0', 'nw_type': 'control', 'device': 'eth1', 'cidr': '0.0.0.0/0', 'source_nat': False, 'size': '0'}], u'eth0': [{u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}]}
  293. 2016-07-28 13:11:30,882 merge.py save:71 Writing data bag type cmdline
  294. 2016-07-28 13:11:30,882 merge.py save:72 {u'config': {u'domain': u'vit.vertitechit.com', u'cidrsize': u'24', u'baremetalnotificationsecuritykey': u'nu1HfF_DpC-gK-G_3y1u54Snb9ruROq-qldOvhnHj4EMypguvtfQu0o18eY3gs81iPZMD2Du1QOUAG5KOfMYXQ', u'port': u'8080', u'eth0ip': u'10.70.116.75', u'eth1mask': u'0.0.0.0', u'sshonguest': u'true', u'gateway': u'10.70.116.1', u'template': u'domP', u'mgmtcidr': u'10.70.110.0/24', u'type': u'dhcpsrvr', u'eth1ip': u'0.0.0.0', u'eth0mask': u'255.255.255.0', u'dhcprange': u'10.70.116.1', u'host': u'10.70.110.101', u'localgw': u'10.70.116.1', 'redundant_router': 'false', u'baremetalnotificationapikey': u'CKZoOXffpY5ihjvzly3yD_2t2qaDnFglYFDoeep37aH1qy5u67aX51ZsuZpZcphfOxJY52rkTlNOl0nkNSyXjQ', u'nic_macs': u'06:b1:2e:00:00:10|02:00:14:42:00:03', u'name': u'r-4-VM', u'dns1': u'10.70.10.21', u'disable_rp_filter': u'true', u'extra_pubnics': u'2'}, u'id': u'cmdline'}
  295. 2016-07-28 13:11:30,887 merge.py load:249 Could not open /var/cache/cloud/cmd_line.json
  296. 2016-07-28 13:11:30,887 merge.py load:60 Loading data bag type ips
  297. 2016-07-28 13:11:30,887 merge.py load:60 Loading data bag type cmdline
  298. 2016-07-28 13:11:30,888 configure.py main:924 Configuring ip addresses
  299. 2016-07-28 13:11:30,888 CsHelper.py execute:160 Executing: ip addr show dev eth1
  300. 2016-07-28 13:11:30,895 CsHelper.py execute:160 Executing: ip addr show dev eth0
  301. 2016-07-28 13:11:30,899 CsHelper.py execute:160 Executing: ip addr show dev eth1
  302. 2016-07-28 13:11:30,905 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'0.0.0.0', u'one_to_one_nat': False, u'nic_dev_id': u'1', u'network': u'0.0.0.0/0', u'netmask': u'0.0.0.0', u'source_nat': False, u'broadcast': u'255.255.255.255', u'add': True, u'nw_type': u'control', u'device': u'eth1', u'cidr': u'0.0.0.0/0', u'gateway': u'10.70.116.1', u'size': u'0'}
  303. 2016-07-28 13:11:30,905 CsAddress.py process:119 Address 0.0.0.0/0 on device eth1 not configured
  304. 2016-07-28 13:11:30,905 CsAddress.py configure:277 Configuring address 0.0.0.0/0 on device eth1
  305. 2016-07-28 13:11:30,910 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
  306. 2016-07-28 13:11:30,910 CsHelper.py execute:160 Executing: ip -4 route list 0/0
  307. 2016-07-28 13:11:30,915 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
  308. 2016-07-28 13:11:30,915 CsHelper.py execute:160 Executing: ip addr show dev eth0
  309. 2016-07-28 13:11:30,920 CsAddress.py process:110 Address found in DataBag ==> {u'public_ip': u'10.70.116.75', u'one_to_one_nat': False, u'nic_dev_id': u'0', u'network': u'10.70.116.0/24', u'netmask': u'255.255.255.0', u'source_nat': False, u'broadcast': u'10.70.116.255', u'add': True, u'nw_type': u'guest', u'device': u'eth0', u'cidr': u'10.70.116.75/24', u'gateway': u'10.70.116.1', u'size': u'24'}
  310. 2016-07-28 13:11:30,920 CsAddress.py process:119 Address 10.70.116.75/24 on device eth0 not configured
  311. 2016-07-28 13:11:30,920 CsAddress.py configure:277 Configuring address 10.70.116.75/24 on device eth0
  312. 2016-07-28 13:11:30,927 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
  313. 2016-07-28 13:11:30,930 CsHelper.py addifmissing:148 Added 0 Table_eth0 to file /etc/iproute2/rt_tables
  314. 2016-07-28 13:11:30,930 CsHelper.py execute:160 Executing: ip rule show
  315. 2016-07-28 13:11:30,934 CsHelper.py execute:160 Executing: ip rule add fwmark 0 table Table_eth0
  316. 2016-07-28 13:11:30,938 CsRule.py addMark:37 Added fwmark rule for Table_eth0
  317. 2016-07-28 13:11:30,938 CsHelper.py execute:160 Executing: ip link show eth0 | grep 'state DOWN'
  318. 2016-07-28 13:11:30,943 CsHelper.py execute:160 Executing: arping -c 1 -I eth0 -A -U -s 10.70.116.75 10.70.116.1
  319. 2016-07-28 13:11:30,960 CsAddress.py inKernel:686 rpsfr is not present in the kernel
  320. 2016-07-28 13:11:30,961 CsRoute.py add_table:38 Adding route table: 0 Table_eth0 to /etc/iproute2/rt_tables if not present
  321. 2016-07-28 13:11:30,961 CsRoute.py add_route:50 Adding route: dev eth0 table: Table_eth0 network: 10.70.116.0/24 if not present
  322. 2016-07-28 13:11:30,961 CsHelper.py execute:160 Executing: ip route show dev eth0 table Table_eth0 10.70.116.0/24
  323. 2016-07-28 13:11:30,968 CsHelper.py execute:160 Executing: ps aux
  324. 2016-07-28 13:11:30,980 CsProcess.py start:33 Started dummy
  325. 2016-07-28 13:11:30,982 CsRoute.py defaultroute_exists:89 Checking if default ipv4 route is present
  326. 2016-07-28 13:11:30,982 CsHelper.py execute:160 Executing: ip -4 route list 0/0
  327. 2016-07-28 13:11:30,989 CsRoute.py defaultroute_exists:93 Default route found: default via 10.70.116.1 dev eth0
  328. 2016-07-28 13:11:30,990 configure.py main:929 Configuring Guest Network
  329. 2016-07-28 13:11:30,990 configure.py main:933 Configuring vmpassword
  330. 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type vmpassword
  331. 2016-07-28 13:11:30,990 configure.py main:938 Configuring vmdata
  332. 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type vmdata
  333. 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type networkacl
  334. 2016-07-28 13:11:30,990 merge.py load:57 Creating data bag type firewallrules
  335. 2016-07-28 13:11:30,991 merge.py load:57 Creating data bag type forwardingrules
  336. 2016-07-28 13:11:30,991 merge.py load:57 Creating data bag type site2sitevpn
  337. 2016-07-28 13:11:30,994 merge.py load:57 Creating data bag type remoteaccessvpn
  338. 2016-07-28 13:11:30,994 configure.py process:624 {'id': 'remoteaccessvpn'}
  339. 2016-07-28 13:11:30,994 merge.py load:57 Creating data bag type loadbalancer
  340. 2016-07-28 13:11:30,994 configure.py main:963 Configuring networkacl
  341. 2016-07-28 13:11:30,994 configure.py main:967 Configuring firewall rules
  342. 2016-07-28 13:11:30,994 configure.py main:971 Configuring PF rules
  343. 2016-07-28 13:11:30,994 configure.py main:975 Configuring s2s vpn
  344. 2016-07-28 13:11:30,994 configure.py main:979 Configuring remote access vpn
  345. 2016-07-28 13:11:30,995 configure.py main:983 Configuring vpn users list
  346. 2016-07-28 13:11:30,995 merge.py load:57 Creating data bag type vpnuserlist
  347. 2016-07-28 13:11:30,995 configure.py main:988 Configuring dhcp entry
  348. 2016-07-28 13:11:30,995 merge.py load:57 Creating data bag type dhcpentry
  349. 2016-07-28 13:11:30,995 CsHelper.py execute:160 Executing: ip addr show
  350. 2016-07-28 13:11:31,011 CsFile.py load:37 File /etc/dhcphosts.txt does not exist
  351. 2016-07-28 13:11:31,011 CsFile.py load:37 File /etc/dnsmasq.d/cloud.conf does not exist
  352. 2016-07-28 13:11:31,011 CsFile.py load:39 Reading file /etc/hosts
  353. 2016-07-28 13:11:31,012 CsFile.py commit:66 Wrote edited file /etc/hosts
  354. 2016-07-28 13:11:31,012 CsFile.py commit:68 Updated file in-cache configuration
  355. 2016-07-28 13:11:31,012 CsDhcp.py write_hosts:121 Updated hosts file
  356. 2016-07-28 13:11:31,012 CsFile.py commit:60 Nothing to commit. The /etc/dnsmasq.d/cloud.conf file did not change
  357. 2016-07-28 13:11:31,013 CsFile.py commit:60 Nothing to commit. The /etc/dhcphosts.txt file did not change
  358. 2016-07-28 13:11:31,013 CsHelper.py execute:160 Executing: service dnsmasq restart
  359. 2016-07-28 13:11:33,154 CsHelper.py service:189 Service dnsmasq restart
  360. 2016-07-28 13:11:33,154 configure.py main:993 Configuring load balancer
  361. 2016-07-28 13:11:33,155 configure.py main:997 Configuring monitor service
  362. 2016-07-28 13:11:33,155 merge.py load:57 Creating data bag type monitorservice
  363. 2016-07-28 13:11:33,155 configure.py main:1003 Configuring iptables rules
  364. 2016-07-28 13:11:33,155 CsHelper.py execute:160 Executing: iptables-save
  365. 2016-07-28 13:11:33,187 CsHelper.py execute:160 Executing: iptables -t filter -N FW_OUTBOUND
  366. 2016-07-28 13:11:33,253 CsHelper.py execute:160 Executing: iptables -t filter -N INPUT
  367. 2016-07-28 13:11:33,259 CsHelper.py execute:160 Executing: iptables -t filter -N
  368. 2016-07-28 13:11:33,263 CsHelper.py execute:160 Executing: iptables -t mangle -N PREROUTING
  369. 2016-07-28 13:11:33,272 CsHelper.py execute:160 Executing: iptables -t filter -N FORWARD
  370. 2016-07-28 13:11:33,278 CsHelper.py execute:160 Executing: iptables -t filter -N OUTPUT
  371. 2016-07-28 13:11:33,282 CsHelper.py execute:160 Executing: iptables -t filter -N NETWORK_STATS
  372. 2016-07-28 13:11:33,289 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
  373. 2016-07-28 13:11:33,289 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  374. 2016-07-28 13:11:33,289 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
  375. 2016-07-28 13:11:33,342 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
  376. 2016-07-28 13:11:33,343 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
  377. 2016-07-28 13:11:33,343 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
  378. 2016-07-28 13:11:33,376 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
  379. 2016-07-28 13:11:33,376 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
  380. 2016-07-28 13:11:33,377 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
  381. 2016-07-28 13:11:33,381 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
  382. 2016-07-28 13:11:33,382 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
  383. 2016-07-28 13:11:33,382 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
  384. 2016-07-28 13:11:33,392 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
  385. 2016-07-28 13:11:33,392 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
  386. 2016-07-28 13:11:33,392 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
  387. 2016-07-28 13:11:33,417 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'--restore-mark': u'--nfmask', u'-j': u'CONNMARK', u'0xffffffff': u'--ctmask', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=mangle chain=PREROUTING
  388. 2016-07-28 13:11:33,418 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff table=mangle
  389. 2016-07-28 13:11:33,418 CsHelper.py execute:160 Executing: iptables -t mangle -I PREROUTING -m state --state RELATED,ESTABLISHED -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
  390. 2016-07-28 13:11:33,423 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'224.0.0.18/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
  391. 2016-07-28 13:11:33,424 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 224.0.0.18/32 -j ACCEPT table=filter
  392. 2016-07-28 13:11:33,424 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 224.0.0.18/32 -j ACCEPT
  393. 2016-07-28 13:11:33,428 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-d': u'225.0.0.50/32', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
  394. 2016-07-28 13:11:33,428 CsNetfilter.py compare:159 Add: rule=-A INPUT -d 225.0.0.50/32 -j ACCEPT table=filter
  395. 2016-07-28 13:11:33,429 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -d 225.0.0.50/32 -j ACCEPT
  396. 2016-07-28 13:11:33,433 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-j': u'ACCEPT', u'-A': u'INPUT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=INPUT
  397. 2016-07-28 13:11:33,433 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  398. 2016-07-28 13:11:33,433 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  399. 2016-07-28 13:11:33,438 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-p': u'icmp', u'-j': u'ACCEPT'} table=filter chain=INPUT
  400. 2016-07-28 13:11:33,439 CsNetfilter.py compare:159 Add: rule=-A INPUT -p icmp -j ACCEPT table=filter
  401. 2016-07-28 13:11:33,439 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -p icmp -j ACCEPT
  402. 2016-07-28 13:11:33,444 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'lo', u'-A': u'INPUT', u'-j': u'ACCEPT'} table=filter chain=INPUT
  403. 2016-07-28 13:11:33,444 CsNetfilter.py compare:159 Add: rule=-A INPUT -i lo -j ACCEPT table=filter
  404. 2016-07-28 13:11:33,445 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i lo -j ACCEPT
  405. 2016-07-28 13:11:33,449 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'67', u'-p': u'udp'} table=filter chain=INPUT
  406. 2016-07-28 13:11:33,449 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT table=filter
  407. 2016-07-28 13:11:33,449 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 67 -j ACCEPT
  408. 2016-07-28 13:11:33,457 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'udp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'udp'} table=filter chain=INPUT
  409. 2016-07-28 13:11:33,457 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT table=filter
  410. 2016-07-28 13:11:33,457 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
  411. 2016-07-28 13:11:33,462 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-j': u'ACCEPT', u'--dport': u'53', u'-p': u'tcp'} table=filter chain=INPUT
  412. 2016-07-28 13:11:33,463 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT table=filter
  413. 2016-07-28 13:11:33,463 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
  414. 2016-07-28 13:11:33,468 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'80', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
  415. 2016-07-28 13:11:33,469 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT table=filter
  416. 2016-07-28 13:11:33,469 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT
  417. 2016-07-28 13:11:33,474 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth0', u'-m2': u'state', u'--dport': u'8080', u'-p': u'tcp', u'--state': u'NEW', u'-j': u'ACCEPT'} table=filter chain=INPUT
  418. 2016-07-28 13:11:33,475 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT table=filter
  419. 2016-07-28 13:11:33,475 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth0 -p tcp -m tcp --dport 8080 -m state --state NEW -j ACCEPT
  420. 2016-07-28 13:11:33,480 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth1', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
  421. 2016-07-28 13:11:33,480 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  422. 2016-07-28 13:11:33,481 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
  423. 2016-07-28 13:11:33,485 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'NEW', u'-m2': u'state'} table=filter chain=FORWARD
  424. 2016-07-28 13:11:33,486 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT table=filter
  425. 2016-07-28 13:11:33,486 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state NEW -j ACCEPT
  426. 2016-07-28 13:11:33,491 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth2', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
  427. 2016-07-28 13:11:33,491 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  428. 2016-07-28 13:11:33,491 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth2 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  429. 2016-07-28 13:11:33,496 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-o': u'eth0', u'-i': u'eth0', u'-j': u'ACCEPT', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FORWARD
  430. 2016-07-28 13:11:33,496 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  431. 2016-07-28 13:11:33,496 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  432. 2016-07-28 13:11:33,502 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'FORWARD', u'-j': u'FW_OUTBOUND'} table=filter chain=FORWARD
  433. 2016-07-28 13:11:33,502 CsNetfilter.py compare:159 Add: rule=-A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND table=filter
  434. 2016-07-28 13:11:33,502 CsHelper.py execute:160 Executing: iptables -t filter -A FORWARD -i eth0 -o eth2 -j FW_OUTBOUND
  435. 2016-07-28 13:11:33,507 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'PREROUTING', u'-i': u'eth0', u'-j': u'CONNMARK', u'--set-xmark': u'0x0/0xffffffff', u'--state': u'NEW', u'-m2': u'state'} table=mangle chain=PREROUTING
  436. 2016-07-28 13:11:33,508 CsNetfilter.py compare:159 Add: rule=-A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff table=mangle
  437. 2016-07-28 13:11:33,508 CsHelper.py execute:160 Executing: iptables -t mangle -A PREROUTING -i eth0 -m state --state NEW -j CONNMARK --set-xmark 0x0/0xffffffff
  438. 2016-07-28 13:11:33,512 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'FORWARD', u'-j': u'NETWORK_STATS'} table=filter chain=FORWARD
  439. 2016-07-28 13:11:33,513 CsNetfilter.py compare:159 Add: rule=-A FORWARD -j NETWORK_STATS table=filter
  440. 2016-07-28 13:11:33,513 CsHelper.py execute:160 Executing: iptables -t filter -I FORWARD -j NETWORK_STATS
  441. 2016-07-28 13:11:33,518 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-j': u'NETWORK_STATS'} table=filter chain=INPUT
  442. 2016-07-28 13:11:33,518 CsNetfilter.py compare:159 Add: rule=-A INPUT -j NETWORK_STATS table=filter
  443. 2016-07-28 13:11:33,518 CsHelper.py execute:160 Executing: iptables -t filter -I INPUT -j NETWORK_STATS
  444. 2016-07-28 13:11:33,523 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'OUTPUT', u'-j': u'NETWORK_STATS'} table=filter chain=OUTPUT
  445. 2016-07-28 13:11:33,524 CsNetfilter.py compare:159 Add: rule=-A OUTPUT -j NETWORK_STATS table=filter
  446. 2016-07-28 13:11:33,524 CsHelper.py execute:160 Executing: iptables -t filter -I OUTPUT -j NETWORK_STATS
  447. 2016-07-28 13:11:33,529 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth0', u'-o': u'eth2', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
  448. 2016-07-28 13:11:33,529 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth0 -o eth2 table=filter
  449. 2016-07-28 13:11:33,529 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth0 -o eth2
  450. 2016-07-28 13:11:33,534 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-i': u'eth2', u'-o': u'eth0', u'-A': u'NETWORK_STATS'} table=filter chain=NETWORK_STATS
  451. 2016-07-28 13:11:33,535 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 -o eth0 table=filter
  452. 2016-07-28 13:11:33,535 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 -o eth0
  453. 2016-07-28 13:11:33,540 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-o': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp', u'!_-i': u'eth0'} table=filter chain=NETWORK_STATS
  454. 2016-07-28 13:11:33,540 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -o eth2 ! -i eth0 -p tcp table=filter
  455. 2016-07-28 13:11:33,540 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -o eth2 ! -i eth0 -p tcp
  456. 2016-07-28 13:11:33,546 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'!_-o': u'eth0', u'-i': u'eth2', u'-A': u'NETWORK_STATS', u'-p': u'tcp'} table=filter chain=NETWORK_STATS
  457. 2016-07-28 13:11:33,546 CsNetfilter.py compare:159 Add: rule=-A NETWORK_STATS -i eth2 ! -o eth0 -p tcp table=filter
  458. 2016-07-28 13:11:33,546 CsHelper.py execute:160 Executing: iptables -t filter -A NETWORK_STATS -i eth2 ! -o eth0 -p tcp
  459. 2016-07-28 13:11:33,552 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-j': u'ACCEPT', u'-A': u'FW_OUTBOUND', u'--state': u'RELATED,ESTABLISHED', u'-m2': u'state'} table=filter chain=FW_OUTBOUND
  460. 2016-07-28 13:11:33,552 CsNetfilter.py compare:159 Add: rule=-A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT table=filter
  461. 2016-07-28 13:11:33,552 CsHelper.py execute:160 Executing: iptables -t filter -A FW_OUTBOUND -m state --state RELATED,ESTABLISHED -j ACCEPT
  462. 2016-07-28 13:11:33,559 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-A': u'INPUT', u'-m': u'tcp', u'-i': u'eth1', u'-m2': u'state', u'--dport': u'3922', u'-p': u'tcp', u'--state': u'NEW,ESTABLISHED', u'-j': u'ACCEPT'} table=filter chain=INPUT
  463. 2016-07-28 13:11:33,559 CsNetfilter.py compare:159 Add: rule=-A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT table=filter
  464. 2016-07-28 13:11:33,559 CsHelper.py execute:160 Executing: iptables -t filter -A INPUT -i eth1 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT
  465. 2016-07-28 13:11:33,565 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'INPUT'} table=filter chain=
  466. 2016-07-28 13:11:33,565 CsNetfilter.py compare:159 Add: rule=-P INPUT DROP table=filter
  467. 2016-07-28 13:11:33,565 CsHelper.py execute:160 Executing: iptables -t filter -P INPUT DROP
  468. 2016-07-28 13:11:33,570 CsNetfilter.py compare:154 Checking if the rule already exists: rule={u'-P': u'FORWARD'} table=filter chain=
  469. 2016-07-28 13:11:33,571 CsNetfilter.py compare:159 Add: rule=-P FORWARD DROP table=filter
  470. 2016-07-28 13:11:33,571 CsHelper.py execute:160 Executing: iptables -t filter -P FORWARD DROP
  471. 2016-07-28 13:11:33,576 merge.py load:60 Loading data bag type cmdline
  472. 2016-07-28 13:11:33,580 CsRedundant.py set:68 Router redundancy status is False
  473. 2016-07-28 13:11:33,581 CsHelper.py execute:160 Executing: service conntrackd stop
  474. 2016-07-28 13:11:33,608 CsHelper.py service:189 Service conntrackd stop
  475. 2016-07-28 13:11:33,608 CsHelper.py execute:160 Executing: service keepalived stop
  476. 2016-07-28 13:11:33,619 CsHelper.py service:189 Service keepalived stop
  477. 2016-07-28 13:11:33,620 CsHelper.py execute:160 Executing: mount
  478. 2016-07-28 13:11:33,625 configure.py main:1011 Configuring static routes
  479. 2016-07-28 13:11:33,626 merge.py load:57 Creating data bag type staticroutes
  480. 2016-07-28 13:11:33,626 configure.py process:80 Processing CsStaticRoutes file ==> {'id': 'staticroutes'}
  481. 2016-07-28 13:11:33,626 configure.py main:1016 Configuring iptables rules done ...saving rules
  482. 2016-07-28 13:11:33,626 CsHelper.py save_iptables:168 Saving iptables for iptables-save
  483. 2016-07-28 13:11:33,626 CsHelper.py execute:160 Executing: iptables-save
  484. 2016-07-28 13:11:33,632 CsHelper.py save_iptables:168 Saving iptables for ip6tables-save
  485. 2016-07-28 13:11:33,632 CsHelper.py execute:160 Executing: ip6tables-save
Advertisement
Add Comment
Please, Sign In to add comment