2018-02-08 00:22:37,081 - paramiko.transport- DEBUG - starting thread (client mode): 0xec890c90L 2018-02-08 00:22:37,081 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:37,098 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:37,098 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:37,101 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:37,101 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:37,101 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:37,101 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:37,101 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:37,127 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:37,127 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:37,145 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.168.122.97: 3a970c148065f1362dac3db3795c407c 2018-02-08 00:22:37,145 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:37,166 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:37,193 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:37,210 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:37,432 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:37,432 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:37,447 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:40,445 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:40,446 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:40,449 - paramiko.transport- DEBUG - starting thread (client mode): 0xed524a10L 2018-02-08 00:22:40,449 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:40,453 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:40,454 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:40,456 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:40,456 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:40,456 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:40,457 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:40,457 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:40,479 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:40,480 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:40,483 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 3b73aa4bd2b8d73f853ebbb7d27a5f98 2018-02-08 00:22:40,485 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:40,519 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:40,528 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:40,549 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:40,602 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:40,602 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:40,615 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:40,660 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:40,661 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:40,661 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:40,662 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:40,662 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:40,702 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:40,737 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:40,738 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:40,739 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:40,739 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:40,739 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:40,779 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:40,803 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:40,803 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:40,805 - paramiko.transport- DEBUG - starting thread (client mode): 0xea5b6090L 2018-02-08 00:22:40,805 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:40,811 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:40,811 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:40,814 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:40,814 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:40,814 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:40,814 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:40,814 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:40,833 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:40,833 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:40,839 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 66f08db031be081e85d7bf5a8280c216 2018-02-08 00:22:40,840 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:40,873 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:40,883 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:40,904 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:40,957 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:40,957 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:40,970 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:40,997 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:40,997 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:40,998 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:40,999 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:40,999 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:41,040 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:41,073 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:41,074 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:41,075 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:41,075 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:41,075 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:41,116 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:41,142 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:41,143 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:41,144 - paramiko.transport- DEBUG - starting thread (client mode): 0xea5be5d0L 2018-02-08 00:22:41,145 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:41,150 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:41,150 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:41,152 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:41,152 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:41,153 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:41,153 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:41,153 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:41,176 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:41,176 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:41,180 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: 1bc8ac8ded9eed08ecd2e53256f45439 2018-02-08 00:22:41,181 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:41,215 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:41,225 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:41,245 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:41,289 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:41,289 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:41,312 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:41,340 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:41,341 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:41,341 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:41,342 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:41,342 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:41,382 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:41,415 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:41,417 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:41,417 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:41,418 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:41,418 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:41,459 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:41,486 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:41,487 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:41,489 - paramiko.transport- DEBUG - starting thread (client mode): 0xea5c5650L 2018-02-08 00:22:41,489 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:41,493 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:41,493 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:41,496 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:41,496 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:41,496 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:41,496 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:41,496 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:41,517 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:41,518 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:41,522 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.3: 1e022df595cf5e4d315abafb9ee191a2 2018-02-08 00:22:41,523 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:41,557 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:41,566 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:41,587 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:41,632 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:41,632 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:41,654 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:41,679 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:41,679 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:41,680 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:41,681 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:41,681 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:41,722 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:41,755 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:41,756 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:41,757 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:41,757 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:41,758 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:41,798 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:41,822 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:41,823 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:41,824 - paramiko.transport- DEBUG - starting thread (client mode): 0xea5c5f50L 2018-02-08 00:22:41,825 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:41,830 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:41,830 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:41,833 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:41,833 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:41,833 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:41,833 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:41,833 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:41,856 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:41,856 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:41,859 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.9: 1049cdbc68002293b1c4c27522329fc4 2018-02-08 00:22:41,861 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:41,896 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:41,905 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:41,925 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:41,974 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:41,974 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:41,993 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:42,022 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:42,023 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:42,024 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:42,024 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:42,024 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:42,067 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:42,099 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:42,100 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:42,101 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:42,101 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:42,101 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:42,142 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:42,166 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:42,167 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:42,168 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:42,168 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:42,169 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:42,175 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:45,346 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:45,347 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:45,349 - paramiko.transport- DEBUG - starting thread (client mode): 0xea5a31d0L 2018-02-08 00:22:45,349 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:45,353 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:45,354 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:45,356 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:45,356 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:45,356 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:45,356 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:45,356 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:45,379 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:45,380 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:45,383 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 3b73aa4bd2b8d73f853ebbb7d27a5f98 2018-02-08 00:22:45,384 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:45,418 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:45,427 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:45,448 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:45,490 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:45,490 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:45,515 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:45,540 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:45,541 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:45,542 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:45,542 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:45,542 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:45,583 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:45,606 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:45,607 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:45,607 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:45,608 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:45,608 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:45,648 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:45,671 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:45,672 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:45,673 - paramiko.transport- DEBUG - starting thread (client mode): 0xea510fd0L 2018-02-08 00:22:45,674 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:45,679 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:45,679 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:45,681 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:45,682 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:45,682 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:45,682 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:45,682 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:45,703 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:45,704 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:45,708 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 66f08db031be081e85d7bf5a8280c216 2018-02-08 00:22:45,709 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:45,744 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:45,753 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:45,773 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:45,823 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:45,823 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:45,840 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:45,867 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:45,868 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:45,869 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:45,869 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:45,870 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:45,910 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:45,934 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:45,935 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:45,936 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:45,937 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:45,937 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:45,979 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:46,004 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:46,005 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:46,007 - paramiko.transport- DEBUG - starting thread (client mode): 0xea516f10L 2018-02-08 00:22:46,007 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:46,012 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:46,012 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:46,014 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:46,014 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:46,014 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:46,014 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:46,014 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:46,038 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:46,039 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:46,040 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: 1bc8ac8ded9eed08ecd2e53256f45439 2018-02-08 00:22:46,041 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:46,078 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:46,086 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:46,105 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:46,148 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:46,148 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:46,172 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:46,200 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:46,200 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:46,201 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:46,202 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:46,202 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:46,243 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:46,268 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:46,269 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:46,270 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:46,271 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:46,271 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:46,311 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:46,336 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:46,337 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:46,338 - paramiko.transport- DEBUG - starting thread (client mode): 0xea527350L 2018-02-08 00:22:46,338 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:46,343 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:46,343 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:46,345 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:46,346 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:46,346 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:46,346 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:46,346 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:46,368 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:46,369 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:46,375 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.3: 1e022df595cf5e4d315abafb9ee191a2 2018-02-08 00:22:46,376 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:46,408 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:46,417 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:46,440 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:46,478 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:46,478 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:46,506 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:46,528 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:46,529 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:46,530 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:46,531 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:46,531 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:46,571 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:46,594 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:46,595 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:46,595 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:46,596 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:46,596 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:46,636 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:46,659 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:46,660 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:46,661 - paramiko.transport- DEBUG - starting thread (client mode): 0xea5cead0L 2018-02-08 00:22:46,662 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:46,667 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:46,667 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:46,669 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:46,669 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:46,670 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:46,670 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:46,670 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:46,691 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:46,692 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:46,695 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.9: 1049cdbc68002293b1c4c27522329fc4 2018-02-08 00:22:46,696 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:46,731 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:46,741 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:46,761 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:46,808 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:46,808 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:46,828 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:22:46,854 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:22:46,855 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:22:46,856 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:22:46,856 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:22:46,856 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:22:46,897 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:22:46,924 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:22:46,925 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:22:46,926 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:22:46,927 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:22:46,927 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:22:46,967 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:22:46,994 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:22:46,994 - __main__- INFO - Fetch /etc/heat/heat.conf from controller 192.30.9.10 2018-02-08 00:22:46,995 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-08 00:22:46,996 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:22:46,996 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-08 00:22:46,997 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-08 00:22:47,001 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-08 00:22:47,040 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-08 00:22:47,041 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-08 00:22:47,042 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-08 00:22:47,042 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-08 00:22:47,042 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-08 00:22:47,084 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-08 00:22:47,114 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-08 00:22:47,114 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/heat.conf from 192.30.9.10 2018-02-08 00:22:47,115 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-08 00:22:47,115 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-08 00:22:47,116 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-08 00:22:47,116 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-08 00:22:47,158 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-08 00:22:47,184 - paramiko.transport.sftp- INFO - [chan 5] Opened sftp connection (server version 3) 2018-02-08 00:22:47,184 - paramiko.transport.sftp- DEBUG - [chan 5] stat('/home/heat-admin/heat.conf') 2018-02-08 00:22:47,185 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') 2018-02-08 00:22:47,186 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') -> 00000000 2018-02-08 00:22:47,193 - paramiko.transport.sftp- DEBUG - [chan 5] close(00000000) 2018-02-08 00:22:47,194 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.10:/home/heat-admin/heat.conf to /tmp/heat.conf 2018-02-08 00:22:47,194 - __main__- INFO - Replace /etc/heat/heat.conf with /tmp/heat.conf in controller 192.30.9.10 2018-02-08 00:22:47,195 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-08 00:22:47,195 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-08 00:22:47,195 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-08 00:22:47,197 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-08 00:22:47,198 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-08 00:22:47,198 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:47,199 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:47,199 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:47,226 - paramiko.transport- DEBUG - [chan 6] EOF received (6) 2018-02-08 00:22:47,227 - paramiko.transport- DEBUG - [chan 7] Max packet in: 32768 bytes 2018-02-08 00:22:47,228 - paramiko.transport- DEBUG - [chan 6] EOF sent (6) 2018-02-08 00:22:47,229 - paramiko.transport- DEBUG - [chan 7] Max packet out: 32768 bytes 2018-02-08 00:22:47,229 - paramiko.transport- DEBUG - Secsh channel 7 opened. 2018-02-08 00:22:47,270 - paramiko.transport- DEBUG - [chan 7] Sesch channel 7 request ok 2018-02-08 00:22:47,299 - paramiko.transport- DEBUG - [chan 7] EOF received (7) 2018-02-08 00:22:47,299 - opnfv.deployment.manager - INFO - Copying /tmp/heat.conf to 192.30.9.10 2018-02-08 00:22:47,300 - paramiko.transport- DEBUG - [chan 8] Max packet in: 32768 bytes 2018-02-08 00:22:47,301 - paramiko.transport- DEBUG - [chan 7] EOF sent (7) 2018-02-08 00:22:47,301 - paramiko.transport- DEBUG - [chan 8] Max packet out: 32768 bytes 2018-02-08 00:22:47,302 - paramiko.transport- DEBUG - Secsh channel 8 opened. 2018-02-08 00:22:47,343 - paramiko.transport- DEBUG - [chan 8] Sesch channel 8 request ok 2018-02-08 00:22:47,368 - paramiko.transport.sftp- INFO - [chan 8] Opened sftp connection (server version 3) 2018-02-08 00:22:47,369 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') 2018-02-08 00:22:47,370 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') -> 00000000 2018-02-08 00:22:47,373 - paramiko.transport.sftp- DEBUG - [chan 8] close(00000000) 2018-02-08 00:22:47,374 - paramiko.transport.sftp- DEBUG - [chan 8] stat('/home/heat-admin/heat.conf') 2018-02-08 00:22:47,375 - opnfv.deployment.manager - INFO - Successfully copied /tmp/heat.conf to /home/heat-admin/heat.conf:192.30.9.10 2018-02-08 00:22:47,375 - paramiko.transport- DEBUG - [chan 9] Max packet in: 32768 bytes 2018-02-08 00:22:47,376 - paramiko.transport- DEBUG - [chan 9] Max packet out: 32768 bytes 2018-02-08 00:22:47,376 - paramiko.transport- DEBUG - Secsh channel 9 opened. 2018-02-08 00:22:47,378 - paramiko.transport- DEBUG - [chan 8] EOF sent (8) 2018-02-08 00:22:47,379 - paramiko.transport- DEBUG - [chan 9] Sesch channel 9 request ok 2018-02-08 00:22:47,379 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:47,380 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:47,380 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:47,408 - paramiko.transport- DEBUG - [chan 9] EOF received (9) 2018-02-08 00:22:47,408 - __main__- INFO - Restart heat-engine in 192.30.9.10 2018-02-08 00:22:47,409 - paramiko.transport- DEBUG - [chan 10] Max packet in: 32768 bytes 2018-02-08 00:22:47,409 - paramiko.transport- DEBUG - [chan 9] EOF sent (9) 2018-02-08 00:22:47,410 - paramiko.transport- DEBUG - [chan 10] Max packet out: 32768 bytes 2018-02-08 00:22:47,411 - paramiko.transport- DEBUG - Secsh channel 10 opened. 2018-02-08 00:22:47,451 - paramiko.transport- DEBUG - [chan 10] Sesch channel 10 request ok 2018-02-08 00:22:47,654 - paramiko.transport- DEBUG - [chan 10] EOF received (10) 2018-02-08 00:22:47,655 - __main__- INFO - Fetch /etc/heat/heat.conf from controller 192.30.9.8 2018-02-08 00:22:47,656 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-08 00:22:47,656 - paramiko.transport- DEBUG - [chan 10] EOF sent (10) 2018-02-08 00:22:47,657 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-08 00:22:47,657 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-08 00:22:47,660 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-08 00:22:47,695 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-08 00:22:47,696 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-08 00:22:47,696 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-08 00:22:47,697 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-08 00:22:47,697 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-08 00:22:47,737 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-08 00:22:47,765 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-08 00:22:47,765 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/heat.conf from 192.30.9.8 2018-02-08 00:22:47,766 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-08 00:22:47,766 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-08 00:22:47,767 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-08 00:22:47,767 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-08 00:22:47,808 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-08 00:22:47,834 - paramiko.transport.sftp- INFO - [chan 5] Opened sftp connection (server version 3) 2018-02-08 00:22:47,835 - paramiko.transport.sftp- DEBUG - [chan 5] stat('/home/heat-admin/heat.conf') 2018-02-08 00:22:47,836 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') 2018-02-08 00:22:47,836 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') -> 00000000 2018-02-08 00:22:47,842 - paramiko.transport.sftp- DEBUG - [chan 5] close(00000000) 2018-02-08 00:22:47,843 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.8:/home/heat-admin/heat.conf to /tmp/heat.conf 2018-02-08 00:22:47,843 - __main__- INFO - Replace /etc/heat/heat.conf with /tmp/heat.conf in controller 192.30.9.8 2018-02-08 00:22:47,844 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-08 00:22:47,844 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-08 00:22:47,844 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-08 00:22:47,846 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-08 00:22:47,847 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-08 00:22:47,847 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:47,848 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:47,848 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:47,877 - paramiko.transport- DEBUG - [chan 6] EOF received (6) 2018-02-08 00:22:47,877 - paramiko.transport- DEBUG - [chan 7] Max packet in: 32768 bytes 2018-02-08 00:22:47,878 - paramiko.transport- DEBUG - [chan 6] EOF sent (6) 2018-02-08 00:22:47,879 - paramiko.transport- DEBUG - [chan 7] Max packet out: 32768 bytes 2018-02-08 00:22:47,879 - paramiko.transport- DEBUG - Secsh channel 7 opened. 2018-02-08 00:22:47,919 - paramiko.transport- DEBUG - [chan 7] Sesch channel 7 request ok 2018-02-08 00:22:47,950 - paramiko.transport- DEBUG - [chan 7] EOF received (7) 2018-02-08 00:22:47,951 - opnfv.deployment.manager - INFO - Copying /tmp/heat.conf to 192.30.9.8 2018-02-08 00:22:47,951 - paramiko.transport- DEBUG - [chan 8] Max packet in: 32768 bytes 2018-02-08 00:22:47,952 - paramiko.transport- DEBUG - [chan 7] EOF sent (7) 2018-02-08 00:22:47,952 - paramiko.transport- DEBUG - [chan 8] Max packet out: 32768 bytes 2018-02-08 00:22:47,953 - paramiko.transport- DEBUG - Secsh channel 8 opened. 2018-02-08 00:22:47,993 - paramiko.transport- DEBUG - [chan 8] Sesch channel 8 request ok 2018-02-08 00:22:48,017 - paramiko.transport.sftp- INFO - [chan 8] Opened sftp connection (server version 3) 2018-02-08 00:22:48,017 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') 2018-02-08 00:22:48,018 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') -> 00000000 2018-02-08 00:22:48,021 - paramiko.transport.sftp- DEBUG - [chan 8] close(00000000) 2018-02-08 00:22:48,022 - paramiko.transport.sftp- DEBUG - [chan 8] stat('/home/heat-admin/heat.conf') 2018-02-08 00:22:48,023 - opnfv.deployment.manager - INFO - Successfully copied /tmp/heat.conf to /home/heat-admin/heat.conf:192.30.9.8 2018-02-08 00:22:48,023 - paramiko.transport- DEBUG - [chan 9] Max packet in: 32768 bytes 2018-02-08 00:22:48,024 - paramiko.transport- DEBUG - [chan 9] Max packet out: 32768 bytes 2018-02-08 00:22:48,024 - paramiko.transport- DEBUG - Secsh channel 9 opened. 2018-02-08 00:22:48,026 - paramiko.transport- DEBUG - [chan 8] EOF sent (8) 2018-02-08 00:22:48,027 - paramiko.transport- DEBUG - [chan 9] Sesch channel 9 request ok 2018-02-08 00:22:48,027 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:48,028 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:48,028 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:48,054 - paramiko.transport- DEBUG - [chan 9] EOF received (9) 2018-02-08 00:22:48,055 - __main__- INFO - Restart heat-engine in 192.30.9.8 2018-02-08 00:22:48,055 - paramiko.transport- DEBUG - [chan 9] EOF sent (9) 2018-02-08 00:22:48,055 - paramiko.transport- DEBUG - [chan 10] Max packet in: 32768 bytes 2018-02-08 00:22:48,095 - paramiko.transport- DEBUG - [chan 10] Max packet out: 32768 bytes 2018-02-08 00:22:48,095 - paramiko.transport- DEBUG - Secsh channel 10 opened. 2018-02-08 00:22:48,121 - paramiko.transport- DEBUG - [chan 10] Sesch channel 10 request ok 2018-02-08 00:22:48,316 - paramiko.transport- DEBUG - [chan 10] EOF received (10) 2018-02-08 00:22:48,316 - __main__- INFO - Fetch /etc/heat/heat.conf from controller 192.30.9.9 2018-02-08 00:22:48,317 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-08 00:22:48,317 - paramiko.transport- DEBUG - [chan 10] EOF sent (10) 2018-02-08 00:22:48,318 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-08 00:22:48,318 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-08 00:22:48,322 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-08 00:22:48,359 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-08 00:22:48,359 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-08 00:22:48,360 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-08 00:22:48,361 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-08 00:22:48,361 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-08 00:22:48,402 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-08 00:22:48,431 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-08 00:22:48,432 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/heat.conf from 192.30.9.9 2018-02-08 00:22:48,432 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-08 00:22:48,432 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-08 00:22:48,473 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-08 00:22:48,474 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-08 00:22:48,498 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-08 00:22:48,523 - paramiko.transport.sftp- INFO - [chan 5] Opened sftp connection (server version 3) 2018-02-08 00:22:48,523 - paramiko.transport.sftp- DEBUG - [chan 5] stat('/home/heat-admin/heat.conf') 2018-02-08 00:22:48,524 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') 2018-02-08 00:22:48,525 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') -> 00000000 2018-02-08 00:22:48,531 - paramiko.transport.sftp- DEBUG - [chan 5] close(00000000) 2018-02-08 00:22:48,532 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.9:/home/heat-admin/heat.conf to /tmp/heat.conf 2018-02-08 00:22:48,533 - __main__- INFO - Replace /etc/heat/heat.conf with /tmp/heat.conf in controller 192.30.9.9 2018-02-08 00:22:48,533 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-08 00:22:48,534 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-08 00:22:48,534 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-08 00:22:48,535 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-08 00:22:48,536 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-08 00:22:48,537 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:48,537 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:48,537 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-08 00:22:48,563 - paramiko.transport- DEBUG - [chan 6] EOF received (6) 2018-02-08 00:22:48,564 - paramiko.transport- DEBUG - [chan 7] Max packet in: 32768 bytes 2018-02-08 00:22:48,564 - paramiko.transport- DEBUG - [chan 6] EOF sent (6) 2018-02-08 00:22:48,565 - paramiko.transport- DEBUG - [chan 7] Max packet out: 32768 bytes 2018-02-08 00:22:48,565 - paramiko.transport- DEBUG - Secsh channel 7 opened. 2018-02-08 00:22:48,605 - paramiko.transport- DEBUG - [chan 7] Sesch channel 7 request ok 2018-02-08 00:22:48,633 - paramiko.transport- DEBUG - [chan 7] EOF received (7) 2018-02-08 00:22:48,633 - opnfv.deployment.manager - INFO - Copying /tmp/heat.conf to 192.30.9.9 2018-02-08 00:22:48,634 - paramiko.transport- DEBUG - [chan 8] Max packet in: 32768 bytes 2018-02-08 00:22:48,634 - paramiko.transport- DEBUG - [chan 7] EOF sent (7) 2018-02-08 00:22:48,635 - paramiko.transport- DEBUG - [chan 8] Max packet out: 32768 bytes 2018-02-08 00:22:48,635 - paramiko.transport- DEBUG - Secsh channel 8 opened. 2018-02-08 00:22:48,676 - paramiko.transport- DEBUG - [chan 8] Sesch channel 8 request ok 2018-02-08 00:22:48,700 - paramiko.transport.sftp- INFO - [chan 8] Opened sftp connection (server version 3) 2018-02-08 00:22:48,700 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') 2018-02-08 00:22:48,701 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') -> 00000000 2018-02-08 00:22:48,705 - paramiko.transport.sftp- DEBUG - [chan 8] close(00000000) 2018-02-08 00:22:48,706 - paramiko.transport.sftp- DEBUG - [chan 8] stat('/home/heat-admin/heat.conf') 2018-02-08 00:22:48,707 - opnfv.deployment.manager - INFO - Successfully copied /tmp/heat.conf to /home/heat-admin/heat.conf:192.30.9.9 2018-02-08 00:22:48,707 - paramiko.transport- DEBUG - [chan 9] Max packet in: 32768 bytes 2018-02-08 00:22:48,708 - paramiko.transport- DEBUG - [chan 9] Max packet out: 32768 bytes 2018-02-08 00:22:48,708 - paramiko.transport- DEBUG - Secsh channel 9 opened. 2018-02-08 00:22:48,710 - paramiko.transport- DEBUG - [chan 8] EOF sent (8) 2018-02-08 00:22:48,710 - paramiko.transport- DEBUG - [chan 9] Sesch channel 9 request ok 2018-02-08 00:22:48,711 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:48,711 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:48,711 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-08 00:22:48,739 - paramiko.transport- DEBUG - [chan 9] EOF received (9) 2018-02-08 00:22:48,740 - __main__- INFO - Restart heat-engine in 192.30.9.9 2018-02-08 00:22:48,740 - paramiko.transport- DEBUG - [chan 10] Max packet in: 32768 bytes 2018-02-08 00:22:48,741 - paramiko.transport- DEBUG - [chan 9] EOF sent (9) 2018-02-08 00:22:48,742 - paramiko.transport- DEBUG - [chan 10] Max packet out: 32768 bytes 2018-02-08 00:22:48,742 - paramiko.transport- DEBUG - Secsh channel 10 opened. 2018-02-08 00:22:48,782 - paramiko.transport- DEBUG - [chan 10] Sesch channel 10 request ok 2018-02-08 00:22:48,971 - paramiko.transport- DEBUG - [chan 10] EOF received (10) 2018-02-08 00:22:48,971 - __main__- INFO - Waiting for heat-engine to restart in controllers 2018-02-08 00:22:48,972 - paramiko.transport- DEBUG - [chan 10] EOF sent (10) 2018-02-08 00:22:58,975 - paramiko.transport- DEBUG - [chan 11] Max packet in: 32768 bytes 2018-02-08 00:22:58,977 - paramiko.transport- DEBUG - [chan 11] Max packet out: 32768 bytes 2018-02-08 00:22:58,977 - paramiko.transport- DEBUG - Secsh channel 11 opened. 2018-02-08 00:22:58,982 - paramiko.transport- DEBUG - [chan 11] Sesch channel 11 request ok 2018-02-08 00:22:59,007 - paramiko.transport- DEBUG - [chan 11] EOF received (11) 2018-02-08 00:22:59,008 - paramiko.transport- DEBUG - [chan 12] Max packet in: 32768 bytes 2018-02-08 00:22:59,008 - paramiko.transport- DEBUG - [chan 11] EOF sent (11) 2018-02-08 00:22:59,009 - paramiko.transport- DEBUG - [chan 12] Max packet out: 32768 bytes 2018-02-08 00:22:59,009 - paramiko.transport- DEBUG - Secsh channel 12 opened. 2018-02-08 00:22:59,050 - paramiko.transport- DEBUG - [chan 12] Sesch channel 12 request ok 2018-02-08 00:22:59,081 - paramiko.transport- DEBUG - [chan 12] EOF received (12) 2018-02-08 00:22:59,082 - paramiko.transport- DEBUG - [chan 13] Max packet in: 32768 bytes 2018-02-08 00:22:59,083 - paramiko.transport- DEBUG - [chan 12] EOF sent (12) 2018-02-08 00:22:59,083 - paramiko.transport- DEBUG - [chan 13] Max packet out: 32768 bytes 2018-02-08 00:22:59,083 - paramiko.transport- DEBUG - Secsh channel 13 opened. 2018-02-08 00:22:59,124 - paramiko.transport- DEBUG - [chan 13] Sesch channel 13 request ok 2018-02-08 00:22:59,154 - paramiko.transport- DEBUG - [chan 13] EOF received (13) 2018-02-08 00:22:59,154 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/ml2_conf.ini from 192.30.9.10 2018-02-08 00:22:59,155 - paramiko.transport- DEBUG - [chan 14] Max packet in: 32768 bytes 2018-02-08 00:22:59,156 - paramiko.transport- DEBUG - [chan 13] EOF sent (13) 2018-02-08 00:22:59,156 - paramiko.transport- DEBUG - [chan 14] Max packet out: 32768 bytes 2018-02-08 00:22:59,157 - paramiko.transport- DEBUG - Secsh channel 14 opened. 2018-02-08 00:22:59,197 - paramiko.transport- DEBUG - [chan 14] Sesch channel 14 request ok 2018-02-08 00:22:59,221 - paramiko.transport.sftp- INFO - [chan 14] Opened sftp connection (server version 3) 2018-02-08 00:22:59,221 - paramiko.transport.sftp- DEBUG - [chan 14] stat('/home/heat-admin/ml2_conf.ini') 2018-02-08 00:22:59,222 - paramiko.transport.sftp- DEBUG - [chan 14] open('/home/heat-admin/ml2_conf.ini', 'rb') 2018-02-08 00:22:59,223 - paramiko.transport.sftp- DEBUG - [chan 14] open('/home/heat-admin/ml2_conf.ini', 'rb') -> 00000000 2018-02-08 00:22:59,226 - paramiko.transport.sftp- DEBUG - [chan 14] close(00000000) 2018-02-08 00:22:59,227 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.10:/home/heat-admin/ml2_conf.ini to /ml2_conf.ini 2018-02-08 00:22:59,257 - __main__- INFO - Running 'sfc_one_chain_two_service_functions - ODL-SFC Testing SFs when they are located on the same chain' 2018-02-08 00:22:59,257 - __main__- INFO - =========================================================================================================== 2018-02-08 00:22:59,628 - paramiko.transport- DEBUG - starting thread (client mode): 0xea543050L 2018-02-08 00:22:59,628 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:22:59,647 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:22:59,647 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:22:59,652 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:22:59,653 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:22:59,653 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:22:59,653 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:22:59,653 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:22:59,677 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:22:59,677 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:22:59,695 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.168.122.97: 3a970c148065f1362dac3db3795c407c 2018-02-08 00:22:59,695 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:22:59,717 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:22:59,747 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:22:59,759 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:22:59,932 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:22:59,932 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:22:59,965 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:03,051 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:03,052 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:03,053 - paramiko.transport- DEBUG - starting thread (client mode): 0xea452b90L 2018-02-08 00:23:03,054 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:03,059 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:03,059 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:03,060 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:03,061 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:03,061 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:03,061 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:03,061 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:03,085 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:03,085 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:03,088 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 3b73aa4bd2b8d73f853ebbb7d27a5f98 2018-02-08 00:23:03,089 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:03,125 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:03,133 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:03,153 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:03,198 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:03,198 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:03,219 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:03,244 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:03,245 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:03,246 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:03,246 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:03,247 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:03,286 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:03,310 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:03,312 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:03,312 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:03,313 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:03,313 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:03,354 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:03,376 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:03,377 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:03,378 - paramiko.transport- DEBUG - starting thread (client mode): 0xea452a50L 2018-02-08 00:23:03,379 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:03,384 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:03,384 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:03,387 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:03,387 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:03,387 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:03,388 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:03,388 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:03,409 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:03,409 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:03,413 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 66f08db031be081e85d7bf5a8280c216 2018-02-08 00:23:03,415 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:03,449 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:03,458 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:03,479 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:03,536 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:03,536 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:03,545 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:03,576 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:03,577 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:03,577 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:03,578 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:03,578 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:03,619 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:03,646 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:03,647 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:03,648 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:03,649 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:03,649 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:03,690 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:03,716 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:03,716 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:03,718 - paramiko.transport- DEBUG - starting thread (client mode): 0xea405110L 2018-02-08 00:23:03,719 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:03,723 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:03,723 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:03,726 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:03,726 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:03,726 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:03,726 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:03,726 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:03,747 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:03,748 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:03,752 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: 1bc8ac8ded9eed08ecd2e53256f45439 2018-02-08 00:23:03,753 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:03,787 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:03,796 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:03,817 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:03,859 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:03,859 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:03,885 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:03,912 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:03,913 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:03,914 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:03,914 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:03,915 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:03,955 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:03,980 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:03,982 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:03,982 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:03,983 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:03,983 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:04,024 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:04,049 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:04,050 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:04,051 - paramiko.transport- DEBUG - starting thread (client mode): 0xea44c990L 2018-02-08 00:23:04,052 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:04,056 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:04,056 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:04,058 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:04,058 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:04,058 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:04,059 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:04,059 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:04,081 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:04,081 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:04,096 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.3: 1e022df595cf5e4d315abafb9ee191a2 2018-02-08 00:23:04,098 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:04,120 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:04,128 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:04,130 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:04,189 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:04,189 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:04,196 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:04,220 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:04,221 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:04,222 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:04,222 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:04,223 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:04,263 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:04,286 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:04,287 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:04,288 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:04,289 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:04,289 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:04,329 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:04,352 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:04,353 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:04,355 - paramiko.transport- DEBUG - starting thread (client mode): 0xea45ecd0L 2018-02-08 00:23:04,355 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:04,360 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:04,360 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:04,363 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:04,363 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:04,363 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:04,363 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:04,363 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:04,386 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:04,387 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:04,390 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.9: 1049cdbc68002293b1c4c27522329fc4 2018-02-08 00:23:04,391 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:04,425 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:04,436 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:04,455 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:04,501 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:04,501 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:04,523 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:04,555 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:04,556 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:04,557 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:04,558 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:04,558 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:04,598 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:04,625 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:04,626 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:04,627 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:04,627 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:04,627 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:04,669 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:04,695 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:04,696 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:04,696 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:04,697 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:04,697 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:04,703 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:08,152 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:08,153 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:08,155 - paramiko.transport- DEBUG - starting thread (client mode): 0xea543590L 2018-02-08 00:23:08,156 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:08,161 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:08,161 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:08,163 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:08,163 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:08,163 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:08,163 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:08,164 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:08,186 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:08,187 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:08,190 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 3b73aa4bd2b8d73f853ebbb7d27a5f98 2018-02-08 00:23:08,191 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:08,226 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:08,234 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:08,255 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:08,299 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:08,299 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:08,321 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:08,345 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:08,346 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:08,346 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:08,347 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:08,347 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:08,388 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:08,410 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:08,411 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:08,411 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:08,412 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:08,412 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:08,453 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:08,475 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:08,477 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:08,478 - paramiko.transport- DEBUG - starting thread (client mode): 0xea4656d0L 2018-02-08 00:23:08,478 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:08,483 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:08,483 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:08,486 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:08,486 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:08,486 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:08,486 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:08,486 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:08,509 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:08,510 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:08,512 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 66f08db031be081e85d7bf5a8280c216 2018-02-08 00:23:08,513 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:08,549 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:08,558 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:08,577 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:08,625 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:08,625 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:08,645 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:08,671 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:08,672 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:08,673 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:08,673 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:08,674 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:08,714 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:08,741 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:08,742 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:08,743 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:08,743 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:08,743 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:08,785 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:08,810 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:08,811 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:08,812 - paramiko.transport- DEBUG - starting thread (client mode): 0xea470590L 2018-02-08 00:23:08,813 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:08,818 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:08,818 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:08,820 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:08,820 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:08,821 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:08,821 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:08,821 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:08,843 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:08,844 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:08,847 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: 1bc8ac8ded9eed08ecd2e53256f45439 2018-02-08 00:23:08,848 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:08,884 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:08,893 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:08,913 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:08,955 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:08,955 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:08,979 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:09,005 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:09,006 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:09,007 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:09,007 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:09,007 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:09,048 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:09,074 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:09,075 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:09,076 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:09,077 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:09,077 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:09,117 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:09,142 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:09,143 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:09,145 - paramiko.transport- DEBUG - starting thread (client mode): 0xea475710L 2018-02-08 00:23:09,146 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:09,150 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:09,150 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:09,151 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:09,151 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:09,152 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:09,152 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:09,152 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:09,175 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:09,175 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:09,179 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.3: 1e022df595cf5e4d315abafb9ee191a2 2018-02-08 00:23:09,180 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:09,214 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:09,223 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:09,244 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:09,283 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:09,284 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:09,311 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:09,334 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:09,335 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:09,336 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:09,337 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:09,337 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:09,377 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:09,399 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:09,401 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:09,401 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:09,402 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:09,402 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:09,442 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:09,464 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:09,465 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:09,466 - paramiko.transport- DEBUG - starting thread (client mode): 0xea475f90L 2018-02-08 00:23:09,467 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-08 00:23:09,472 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-08 00:23:09,472 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-08 00:23:09,474 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-08 00:23:09,474 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-08 00:23:09,474 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-08 00:23:09,475 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-08 00:23:09,475 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-08 00:23:09,496 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-08 00:23:09,497 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-08 00:23:09,501 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.9: 1049cdbc68002293b1c4c27522329fc4 2018-02-08 00:23:09,502 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-08 00:23:09,536 - paramiko.transport- DEBUG - userauth is OK 2018-02-08 00:23:09,546 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-08 00:23:09,566 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-08 00:23:09,610 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-08 00:23:09,610 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-08 00:23:09,633 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-08 00:23:09,660 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-08 00:23:09,660 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-08 00:23:09,661 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-08 00:23:09,662 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-08 00:23:09,662 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-08 00:23:09,703 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-08 00:23:09,726 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-08 00:23:09,728 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-08 00:23:09,728 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-08 00:23:09,729 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-08 00:23:09,729 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-08 00:23:09,769 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-08 00:23:09,793 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-08 00:23:09,794 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-08 00:23:09,795 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-08 00:23:09,795 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-08 00:23:09,796 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-08 00:23:09,798 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-08 00:23:09,826 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-08 00:23:09,827 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-08 00:23:09,827 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-08 00:23:09,828 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-08 00:23:09,828 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-08 00:23:09,870 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-08 00:23:09,907 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-08 00:23:09,908 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-08 00:23:09,909 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-08 00:23:09,909 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-08 00:23:09,909 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-08 00:23:09,951 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-08 00:23:09,981 - paramiko.transport- DEBUG - [chan 5] EOF received (5) 2018-02-08 00:23:09,982 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/ml2_conf.ini from 192.30.9.10 2018-02-08 00:23:09,983 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-08 00:23:09,983 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-08 00:23:09,984 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-08 00:23:09,984 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-08 00:23:10,025 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-08 00:23:10,050 - paramiko.transport.sftp- INFO - [chan 6] Opened sftp connection (server version 3) 2018-02-08 00:23:10,050 - paramiko.transport.sftp- DEBUG - [chan 6] stat('/home/heat-admin/ml2_conf.ini') 2018-02-08 00:23:10,053 - paramiko.transport.sftp- DEBUG - [chan 6] open('/home/heat-admin/ml2_conf.ini', 'rb') 2018-02-08 00:23:10,054 - paramiko.transport.sftp- DEBUG - [chan 6] open('/home/heat-admin/ml2_conf.ini', 'rb') -> 00000000 2018-02-08 00:23:10,058 - paramiko.transport.sftp- DEBUG - [chan 6] close(00000000) 2018-02-08 00:23:10,059 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.10:/home/heat-admin/ml2_conf.ini to /ml2_conf.ini 2018-02-08 00:23:10,060 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - This is a compute: 192.30.9.7 2018-02-08 00:23:10,060 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - This is a compute: 192.30.9.3 2018-02-08 00:23:10,060 - sfc.lib.utils- INFO - Downloading image 2018-02-08 00:23:31,607 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:23:31,607 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:23:31,607 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:23:31,607 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:23:31,607 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:23:31,608 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:23:31,609 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:23:31,609 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:23:31,609 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:23:31,647 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:23:31,649 - requests.packages.urllib3.connectionpool- DEBUG - Starting new HTTP connection (1): 172.30.9.28 2018-02-08 00:23:31,653 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.28:5000 "GET /v3 HTTP/1.1" 200 194 2018-02-08 00:23:31,660 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:23:31 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-908942c9-18fd-421c-aeca-c7540ce13132 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:23:31,660 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-908942c9-18fd-421c-aeca-c7540ce13132 2018-02-08 00:23:31,660 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:23:31,798 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.28:5000 "POST /v3/auth/tokens HTTP/1.1" 201 9237 2018-02-08 00:23:31,800 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["8xsZQJsgTaG30N2erw9vIA"], "issued_at": "2018-02-08T00:23:31.000000Z"}} 2018-02-08 00:23:31,801 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/flavors/detail -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}f2fe16a93fe6b4e7c75842d8f4ec8c2a4c830477" 2018-02-08 00:23:31,802 - requests.packages.urllib3.connectionpool- DEBUG - Starting new HTTP connection (1): 172.30.9.28 2018-02-08 00:23:31,977 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.28:8774 "GET /v2.1/flavors/detail HTTP/1.1" 200 464 2018-02-08 00:23:31,978 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 464 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-694dbefc-d6d0-4b2a-8f2c-164a2b378ce8 Date: Thu, 08 Feb 2018 00:23:31 GMT RESP BODY: {"flavors": [{"links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/d582e074-773e-49df-9ab0-8978b6d77335", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/d582e074-773e-49df-9ab0-8978b6d77335", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "d582e074-773e-49df-9ab0-8978b6d77335", "name": "m1.tiny", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}]} 2018-02-08 00:23:31,979 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/flavors/detail used request id req-694dbefc-d6d0-4b2a-8f2c-164a2b378ce8 2018-02-08 00:23:31,979 - functest.utils.openstack_utils- INFO - Creating flavor 'custom' with '1500' RAM, '10' disk size, '1' vcpus... 2018-02-08 00:23:31,980 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:8774/v2.1/flavors -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}f2fe16a93fe6b4e7c75842d8f4ec8c2a4c830477" -d '{"flavor": {"vcpus": 1, "disk": 10, "name": "custom", "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "OS-FLV-EXT-DATA:ephemeral": 0, "ram": 1500, "id": null, "swap": 0}}' 2018-02-08 00:23:32,019 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.28:8774 "POST /v2.1/flavors HTTP/1.1" 200 462 2018-02-08 00:23:32,021 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 462 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-b908f057-dbc6-4a06-9daf-0be4653919d3 Date: Thu, 08 Feb 2018 00:23:31 GMT RESP BODY: {"flavor": {"links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}], "ram": 1500, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "name": "custom", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2018-02-08 00:23:32,021 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.28:8774/v2.1/flavors used request id req-b908f057-dbc6-4a06-9daf-0be4653919d3 2018-02-08 00:23:32,083 - functest.utils.openstack_utils- DEBUG - Flavor 'custom' with ID=b743f505-1c9a-48c5-becf-e084e31a9b09 created successfully. 2018-02-08 00:23:32,083 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:23:32,083 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:23:32,084 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:23:32,085 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:23:32,085 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:23:32,085 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:23:32,085 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:23:32,085 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:23:32,085 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:23:32,100 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:23:32,100 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:23:32,100 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:23:32,101 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:23:32,102 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:23:32,102 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:23:32,102 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:23:32,102 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:23:32,110 - stevedore.extension- DEBUG - found extension EntryPoint.parse('bgpvpn = networking_bgpvpn.neutronclient.neutron.v2_0.bgpvpn.bgpvpn') 2018-02-08 00:23:32,117 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:23:32,118 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:23:32,119 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:23:32,120 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:23:32,120 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:23:32,121 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:23:32,122 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:23:32,122 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:23:32,122 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:23:32,122 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:23:32,136 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:23:32,141 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:23:32 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-1cc31102-05be-41d6-b91d-4233aa3f021b Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:23:32,141 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-1cc31102-05be-41d6-b91d-4233aa3f021b 2018-02-08 00:23:32,141 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:23:32,291 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:23:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["ZiPmJETmSrWh0K18iwq2Ww"], "issued_at": "2018-02-08T00:23:32.000000Z"}} 2018-02-08 00:23:32,293 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9292/v2/images?limit=20 -H "User-Agent: python-glanceclient" -H "Content-Type: application/octet-stream" -H "X-Auth-Token: {SHA1}f163ee2d5165ac538a5998e10fd5583c74bf9142" 2018-02-08 00:23:32,480 - keystoneauth.session- DEBUG - RESP: [200] Content-Length: 78 Content-Type: application/json; charset=UTF-8 X-Openstack-Request-Id: req-076925ea-5432-4f24-8dee-951cd63f5146 Date: Thu, 08 Feb 2018 00:23:32 GMT RESP BODY: {"images": [], "schema": "/v2/schemas/images", "first": "/v2/images?limit=20"} 2018-02-08 00:23:32,480 - keystoneauth.session- DEBUG - GET call to image for http://172.30.9.28:9292/v2/images?limit=20 used request id req-076925ea-5432-4f24-8dee-951cd63f5146 2018-02-08 00:23:32,480 - glanceclient.common.http- DEBUG - GET call to glance-api for http://172.30.9.28:9292/v2/images?limit=20 used request id req-076925ea-5432-4f24-8dee-951cd63f5146 2018-02-08 00:23:32,480 - functest.utils.openstack_utils- INFO - Creating image 'sfc_nsh_euphrates' from '/home/opnfv/functest/data/sfc_nsh_euphrates.qcow2'... 2018-02-08 00:23:32,481 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9292/v2/schemas/image -H "User-Agent: python-glanceclient" -H "Content-Type: application/octet-stream" -H "X-Auth-Token: {SHA1}f163ee2d5165ac538a5998e10fd5583c74bf9142" 2018-02-08 00:23:32,633 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json; charset=UTF-8 Content-Length: 4169 X-Openstack-Request-Id: req-550948d2-0699-4b57-8cb0-0d349bc7205d Date: Thu, 08 Feb 2018 00:23:32 GMT RESP BODY: {"additionalProperties": {"type": "string"}, "name": "image", "links": [{"href": "{self}", "rel": "self"}, {"href": "{file}", "rel": "enclosure"}, {"href": "{schema}", "rel": "describedby"}], "properties": {"status": {"readOnly": true, "enum": ["queued", "saving", "active", "killed", "deleted", "pending_delete", "deactivated"], "type": "string", "description": "Status of the image"}, "tags": {"items": {"type": "string", "maxLength": 255}, "type": "array", "description": "List of strings related to the image"}, "kernel_id": {"pattern": "^([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}$", "type": ["null", "string"], "description": "ID of image stored in Glance that should be used as the kernel when booting an AMI-style image.", "is_base": false}, "container_format": {"enum": [null, "ami", "ari", "aki", "bare", "ovf", "ova", "docker"], "type": ["null", "string"], "description": "Format of the container"}, "min_ram": {"type": "integer", "description": "Amount of ram (in MB) required to boot image."}, "ramdisk_id": {"pattern": "^([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}$", "type": ["null", "string"], "description": "ID of image stored in Glance that should be used as the ramdisk when booting an AMI-style image.", "is_base": false}, "locations": {"items": {"required": ["url", "metadata"], "type": "object", "properties": {"url": {"type": "string", "maxLength": 255}, "metadata": {"type": "object"}}}, "type": "array", "description": "A set of URLs to access the image file kept in external store"}, "visibility": {"enum": ["community", "public", "private", "shared"], "type": "string", "description": "Scope of image accessibility"}, "updated_at": {"readOnly": true, "type": "string", "description": "Date and time of the last image modification"}, "owner": {"type": ["null", "string"], "description": "Owner of the image", "maxLength": 255}, "file": {"readOnly": true, "type": "string", "description": "An image file url"}, "min_disk": {"type": "integer", "description": "Amount of disk space (in GB) required to boot image."}, "virtual_size": {"readOnly": true, "type": ["null", "integer"], "description": "Virtual size of image in bytes"}, "id": {"pattern": "^([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}$", "type": "string", "description": "An identifier for the image"}, "size": {"readOnly": true, "type": ["null", "integer"], "description": "Size of image file in bytes"}, "instance_uuid": {"type": "string", "description": "Metadata which can be used to record which instance this image is associated with. (Informational only, does not create an instance snapshot.)", "is_base": false}, "os_distro": {"type": "string", "description": "Common name of operating system distribution as specified in http://docs.openstack.org/trunk/openstack-compute/admin/content/adding-images.html", "is_base": false}, "name": {"type": ["null", "string"], "description": "Descriptive name for the image", "maxLength": 255}, "checksum": {"readOnly": true, "type": ["null", "string"], "description": "md5 hash of image contents.", "maxLength": 32}, "created_at": {"readOnly": true, "type": "string", "description": "Date and time of image registration"}, "disk_format": {"enum": [null, "ami", "ari", "aki", "vhd", "vhdx", "vmdk", "raw", "qcow2", "vdi", "iso", "ploop"], "type": ["null", "string"], "description": "Format of the disk"}, "os_version": {"type": "string", "description": "Operating system version as specified by the distributor", "is_base": false}, "protected": {"type": "boolean", "description": "If true, image will not be deletable."}, "architecture": {"type": "string", "description": "Operating system architecture as specified in http://docs.openstack.org/trunk/openstack-compute/admin/content/adding-images.html", "is_base": false}, "direct_url": {"readOnly": true, "type": "string", "description": "URL to access the image file kept in external store"}, "self": {"readOnly": true, "type": "string", "description": "An image self url"}, "schema": {"readOnly": true, "type": "string", "description": "An image schema url"}}} 2018-02-08 00:23:32,634 - keystoneauth.session- DEBUG - GET call to image for http://172.30.9.28:9292/v2/schemas/image used request id req-550948d2-0699-4b57-8cb0-0d349bc7205d 2018-02-08 00:23:32,634 - glanceclient.common.http- DEBUG - GET call to glance-api for http://172.30.9.28:9292/v2/schemas/image used request id req-550948d2-0699-4b57-8cb0-0d349bc7205d 2018-02-08 00:23:32,720 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9292/v2/images -H "User-Agent: python-glanceclient" -H "Content-Type: application/json" -H "X-Auth-Token: {SHA1}f163ee2d5165ac538a5998e10fd5583c74bf9142" -d '{"container_format": "bare", "disk_format": "qcow2", "name": "sfc_nsh_euphrates", "visibility": "public"}' 2018-02-08 00:23:32,924 - keystoneauth.session- DEBUG - RESP: [201] Content-Length: 578 Content-Type: application/json; charset=UTF-8 Location: http://172.30.9.28:9292/v2/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3 X-Openstack-Request-Id: req-deb5bc98-db9a-4c2e-a13d-1968a922bf2d Date: Thu, 08 Feb 2018 00:23:32 GMT RESP BODY: {"status": "queued", "name": "sfc_nsh_euphrates", "tags": [], "container_format": "bare", "created_at": "2018-02-08T00:23:32Z", "size": null, "disk_format": "qcow2", "updated_at": "2018-02-08T00:23:32Z", "visibility": "public", "locations": [], "self": "/v2/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "min_disk": 0, "protected": false, "id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "file": "/v2/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3/file", "checksum": null, "owner": "3b86644ae842461fa36c6e3c5b2938b5", "virtual_size": null, "min_ram": 0, "schema": "/v2/schemas/image"} 2018-02-08 00:23:32,925 - keystoneauth.session- DEBUG - POST call to image for http://172.30.9.28:9292/v2/images used request id req-deb5bc98-db9a-4c2e-a13d-1968a922bf2d 2018-02-08 00:23:32,925 - glanceclient.common.http- DEBUG - POST call to glance-api for http://172.30.9.28:9292/v2/images used request id req-deb5bc98-db9a-4c2e-a13d-1968a922bf2d 2018-02-08 00:23:32,934 - keystoneauth.session- DEBUG - REQ: curl -g -i -X PUT http://172.30.9.28:9292/v2/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3/file -H "User-Agent: python-glanceclient" -H "Content-Type: application/octet-stream" -H "X-Auth-Token: {SHA1}f163ee2d5165ac538a5998e10fd5583c74bf9142" -d '' 2018-02-08 00:24:08,192 - keystoneauth.session- DEBUG - RESP: [204] Content-Type: text/html; charset=UTF-8 Content-Length: 0 X-Openstack-Request-Id: req-b21f7040-df22-4715-bef2-db51a1fcd95f Date: Thu, 08 Feb 2018 00:24:08 GMT RESP BODY: Omitted, Content-Type is set to text/html; charset=UTF-8. Only application/json responses have their bodies logged. 2018-02-08 00:24:08,193 - keystoneauth.session- DEBUG - PUT call to image for http://172.30.9.28:9292/v2/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3/file used request id req-b21f7040-df22-4715-bef2-db51a1fcd95f 2018-02-08 00:24:08,193 - glanceclient.common.http- DEBUG - PUT call to glance-api for http://172.30.9.28:9292/v2/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3/file used request id req-b21f7040-df22-4715-bef2-db51a1fcd95f 2018-02-08 00:24:08,194 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:24:08,200 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:24:08 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-7658febc-1795-437c-924e-8c4b36995781 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:24:08,201 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-7658febc-1795-437c-924e-8c4b36995781 2018-02-08 00:24:08,201 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:24:08,351 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:24:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["9_X6_2ohQR2xvhMOfQ4l2g"], "issued_at": "2018-02-08T00:24:08.000000Z"}} 2018-02-08 00:24:08,352 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/networks.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:08,589 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 743 X-Openstack-Request-Id: req-c4c3839f-56f7-465a-8768-ca5a4c87b989 Date: Thu, 08 Feb 2018 00:24:08 GMT RESP BODY: {"networks": [{"provider:physical_network": "datacentre", "ipv6_address_scope": null, "revision_number": 6, "port_security_enabled": true, "mtu": 1500, "id": "05bb6e74-93f2-446c-9d00-3743221eff95", "router:external": true, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "shared": false, "project_id": "cb40ef02ea5943f398caf105bedc937f", "status": "ACTIVE", "subnets": ["f2de0892-55a6-4c63-9ddd-ac5d01724940"], "description": "", "tags": [], "updated_at": "2018-02-07T22:50:20Z", "is_default": false, "provider:segmentation_id": null, "name": "external", "admin_state_up": true, "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:55Z", "provider:network_type": "flat"}]} 2018-02-08 00:24:08,590 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/networks.json used request id req-c4c3839f-56f7-465a-8768-ca5a4c87b989 2018-02-08 00:24:08,590 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/networks.json used request id req-c4c3839f-56f7-465a-8768-ca5a4c87b989 2018-02-08 00:24:08,591 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/subnets.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:08,863 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 669 X-Openstack-Request-Id: req-97adc140-ee53-4469-9615-4acc8e5b89bc Date: Thu, 08 Feb 2018 00:24:08 GMT RESP BODY: {"subnets": [{"service_types": [], "description": "", "enable_dhcp": false, "tags": [], "network_id": "05bb6e74-93f2-446c-9d00-3743221eff95", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:50:20Z", "dns_nameservers": [], "updated_at": "2018-02-07T22:50:20Z", "gateway_ip": "172.30.9.1", "ipv6_ra_mode": null, "allocation_pools": [{"start": "172.30.9.200", "end": "172.30.9.220"}], "host_routes": [], "revision_number": 2, "ip_version": 4, "ipv6_address_mode": null, "cidr": "172.30.9.0/24", "project_id": "cb40ef02ea5943f398caf105bedc937f", "id": "f2de0892-55a6-4c63-9ddd-ac5d01724940", "subnetpool_id": null, "name": "external-subnet"}]} 2018-02-08 00:24:08,863 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/subnets.json used request id req-97adc140-ee53-4469-9615-4acc8e5b89bc 2018-02-08 00:24:08,863 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/subnets.json used request id req-97adc140-ee53-4469-9615-4acc8e5b89bc 2018-02-08 00:24:08,864 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/routers.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:09,054 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 15 X-Openstack-Request-Id: req-8c12ed57-99c3-41d7-83b2-8310150f1e3d Date: Thu, 08 Feb 2018 00:24:09 GMT RESP BODY: {"routers": []} 2018-02-08 00:24:09,054 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/routers.json used request id req-8c12ed57-99c3-41d7-83b2-8310150f1e3d 2018-02-08 00:24:09,054 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/routers.json used request id req-8c12ed57-99c3-41d7-83b2-8310150f1e3d 2018-02-08 00:24:09,054 - functest.utils.openstack_utils- INFO - Creating neutron network example-net... 2018-02-08 00:24:09,056 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/networks.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"network": {"name": "example-net", "admin_state_up": true}}' 2018-02-08 00:24:09,424 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 670 X-Openstack-Request-Id: req-24a11205-ff1c-404b-aea4-4f0925e07ca3 Date: Thu, 08 Feb 2018 00:24:09 GMT RESP BODY: {"network": {"provider:physical_network": null, "updated_at": "2018-02-08T00:24:09Z", "revision_number": 3, "port_security_enabled": true, "mtu": 1450, "id": "0312aff9-1e91-4c0f-b239-b3b07aa50fac", "router:external": false, "availability_zone_hints": [], "availability_zones": [], "ipv4_address_scope": null, "shared": false, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "status": "ACTIVE", "subnets": [], "description": "", "tags": [], "ipv6_address_scope": null, "provider:segmentation_id": 57, "name": "example-net", "admin_state_up": true, "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:09Z", "provider:network_type": "vxlan"}} 2018-02-08 00:24:09,424 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/networks.json used request id req-24a11205-ff1c-404b-aea4-4f0925e07ca3 2018-02-08 00:24:09,424 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/networks.json used request id req-24a11205-ff1c-404b-aea4-4f0925e07ca3 2018-02-08 00:24:09,424 - functest.utils.openstack_utils- DEBUG - Network '0312aff9-1e91-4c0f-b239-b3b07aa50fac' created successfully 2018-02-08 00:24:09,425 - functest.utils.openstack_utils- DEBUG - Creating Subnet.... 2018-02-08 00:24:09,426 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/subnets.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"subnets": [{"ip_version": 4, "network_id": "0312aff9-1e91-4c0f-b239-b3b07aa50fac", "cidr": "11.0.0.0/24", "dns_nameservers": ["8.8.8.8", "8.8.4.4"], "name": "example-subnet"}]}' 2018-02-08 00:24:09,801 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 677 X-Openstack-Request-Id: req-f83adb88-8658-4a8b-b0c6-37b710992aa4 Date: Thu, 08 Feb 2018 00:24:09 GMT RESP BODY: {"subnets": [{"service_types": [], "description": "", "enable_dhcp": true, "tags": [], "network_id": "0312aff9-1e91-4c0f-b239-b3b07aa50fac", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:09Z", "dns_nameservers": ["8.8.8.8", "8.8.4.4"], "updated_at": "2018-02-08T00:24:09Z", "gateway_ip": "11.0.0.1", "ipv6_ra_mode": null, "allocation_pools": [{"start": "11.0.0.2", "end": "11.0.0.254"}], "host_routes": [], "revision_number": 2, "ip_version": 4, "ipv6_address_mode": null, "cidr": "11.0.0.0/24", "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "e99b267f-dd28-4268-b6af-0269c5bad600", "subnetpool_id": null, "name": "example-subnet"}]} 2018-02-08 00:24:09,801 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/subnets.json used request id req-f83adb88-8658-4a8b-b0c6-37b710992aa4 2018-02-08 00:24:09,801 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/subnets.json used request id req-f83adb88-8658-4a8b-b0c6-37b710992aa4 2018-02-08 00:24:09,801 - functest.utils.openstack_utils- DEBUG - Subnet 'e99b267f-dd28-4268-b6af-0269c5bad600' created successfully 2018-02-08 00:24:09,802 - functest.utils.openstack_utils- DEBUG - Creating Router... 2018-02-08 00:24:09,803 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/routers.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"router": {"name": "example-router", "admin_state_up": true}}' 2018-02-08 00:24:09,920 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 423 X-Openstack-Request-Id: req-de082e77-4e36-49fb-9c91-ea4a62068e78 Date: Thu, 08 Feb 2018 00:24:09 GMT RESP BODY: {"router": {"status": "ACTIVE", "external_gateway_info": null, "description": "", "tags": [], "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:09Z", "admin_state_up": true, "distributed": false, "updated_at": "2018-02-08T00:24:09Z", "revision_number": 1, "routes": [], "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "fa841732-b4b6-495a-8c27-b8a7935cafc3", "name": "example-router"}} 2018-02-08 00:24:09,920 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/routers.json used request id req-de082e77-4e36-49fb-9c91-ea4a62068e78 2018-02-08 00:24:09,921 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/routers.json used request id req-de082e77-4e36-49fb-9c91-ea4a62068e78 2018-02-08 00:24:09,921 - functest.utils.openstack_utils- DEBUG - Router 'fa841732-b4b6-495a-8c27-b8a7935cafc3' created successfully 2018-02-08 00:24:09,921 - functest.utils.openstack_utils- DEBUG - Adding router to subnet... 2018-02-08 00:24:09,922 - keystoneauth.session- DEBUG - REQ: curl -g -i -X PUT http://172.30.9.28:9696/v2.0/routers/fa841732-b4b6-495a-8c27-b8a7935cafc3/add_router_interface.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"subnet_id": "e99b267f-dd28-4268-b6af-0269c5bad600"}' 2018-02-08 00:24:11,561 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 309 X-Openstack-Request-Id: req-b569155b-2d1a-4c20-a1be-f999bc0fb87a Date: Thu, 08 Feb 2018 00:24:11 GMT RESP BODY: {"network_id": "0312aff9-1e91-4c0f-b239-b3b07aa50fac", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "subnet_id": "e99b267f-dd28-4268-b6af-0269c5bad600", "subnet_ids": ["e99b267f-dd28-4268-b6af-0269c5bad600"], "port_id": "718c0755-067d-43f4-8bb8-7d56884240cd", "id": "fa841732-b4b6-495a-8c27-b8a7935cafc3"} 2018-02-08 00:24:11,561 - keystoneauth.session- DEBUG - PUT call to network for http://172.30.9.28:9696/v2.0/routers/fa841732-b4b6-495a-8c27-b8a7935cafc3/add_router_interface.json used request id req-b569155b-2d1a-4c20-a1be-f999bc0fb87a 2018-02-08 00:24:11,561 - neutronclient.v2_0.client- DEBUG - PUT call to neutron for http://172.30.9.28:9696/v2.0/routers/fa841732-b4b6-495a-8c27-b8a7935cafc3/add_router_interface.json used request id req-b569155b-2d1a-4c20-a1be-f999bc0fb87a 2018-02-08 00:24:11,562 - functest.utils.openstack_utils- DEBUG - Interface added successfully. 2018-02-08 00:24:11,562 - functest.utils.openstack_utils- DEBUG - Adding gateway to router... 2018-02-08 00:24:11,563 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/networks.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:11,952 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 1446 X-Openstack-Request-Id: req-ea4a4191-7702-470c-b947-9d307ad35994 Date: Thu, 08 Feb 2018 00:24:11 GMT RESP BODY: {"networks": [{"provider:physical_network": null, "ipv6_address_scope": null, "revision_number": 5, "port_security_enabled": true, "mtu": 1450, "id": "0312aff9-1e91-4c0f-b239-b3b07aa50fac", "router:external": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "shared": false, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "status": "ACTIVE", "subnets": ["e99b267f-dd28-4268-b6af-0269c5bad600"], "description": "", "tags": [], "updated_at": "2018-02-08T00:24:09Z", "provider:segmentation_id": 57, "name": "example-net", "admin_state_up": true, "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:09Z", "provider:network_type": "vxlan"}, {"provider:physical_network": "datacentre", "ipv6_address_scope": null, "revision_number": 6, "port_security_enabled": true, "mtu": 1500, "id": "05bb6e74-93f2-446c-9d00-3743221eff95", "router:external": true, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "shared": false, "project_id": "cb40ef02ea5943f398caf105bedc937f", "status": "ACTIVE", "subnets": ["f2de0892-55a6-4c63-9ddd-ac5d01724940"], "description": "", "tags": [], "updated_at": "2018-02-07T22:50:20Z", "is_default": false, "provider:segmentation_id": null, "name": "external", "admin_state_up": true, "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:55Z", "provider:network_type": "flat"}]} 2018-02-08 00:24:11,952 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/networks.json used request id req-ea4a4191-7702-470c-b947-9d307ad35994 2018-02-08 00:24:11,952 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/networks.json used request id req-ea4a4191-7702-470c-b947-9d307ad35994 2018-02-08 00:24:11,954 - keystoneauth.session- DEBUG - REQ: curl -g -i -X PUT http://172.30.9.28:9696/v2.0/routers/fa841732-b4b6-495a-8c27-b8a7935cafc3.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"router": {"external_gateway_info": {"network_id": "05bb6e74-93f2-446c-9d00-3743221eff95"}}}' 2018-02-08 00:24:13,273 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 603 X-Openstack-Request-Id: req-1ed6f2b8-b826-4078-9dc2-6b820c1c330d Date: Thu, 08 Feb 2018 00:24:13 GMT RESP BODY: {"router": {"status": "ACTIVE", "external_gateway_info": {"network_id": "05bb6e74-93f2-446c-9d00-3743221eff95", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "f2de0892-55a6-4c63-9ddd-ac5d01724940", "ip_address": "172.30.9.202"}]}, "description": "", "tags": [], "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:09Z", "admin_state_up": true, "distributed": false, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 5, "routes": [], "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "fa841732-b4b6-495a-8c27-b8a7935cafc3", "name": "example-router"}} 2018-02-08 00:24:13,273 - keystoneauth.session- DEBUG - PUT call to network for http://172.30.9.28:9696/v2.0/routers/fa841732-b4b6-495a-8c27-b8a7935cafc3.json used request id req-1ed6f2b8-b826-4078-9dc2-6b820c1c330d 2018-02-08 00:24:13,274 - neutronclient.v2_0.client- DEBUG - PUT call to neutron for http://172.30.9.28:9696/v2.0/routers/fa841732-b4b6-495a-8c27-b8a7935cafc3.json used request id req-1ed6f2b8-b826-4078-9dc2-6b820c1c330d 2018-02-08 00:24:13,274 - functest.utils.openstack_utils- DEBUG - Gateway added successfully. 2018-02-08 00:24:13,275 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:13,543 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 9113 X-Openstack-Request-Id: req-f88adb8c-f451-4986-8c2b-1aa4590e5a3a Date: Thu, 08 Feb 2018 00:24:13 GMT RESP BODY: {"security_groups": [{"description": "Default security group", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "created_at": "2018-02-08T00:20:42Z", "updated_at": "2018-02-08T00:20:42Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "e38fca89-7add-4039-b660-c7cd9b24c1af", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "50cbee1c-c418-48c7-9066-5f8987ede843", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "d868f850-cefe-4cd3-8e29-3c75266d471d", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "9ccfc0ef-13c2-4201-982e-6064b1307aa2", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}], "revision_number": 1, "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "name": "default"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-07T22:57:46Z", "updated_at": "2018-02-07T22:57:46Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "ee9f830e-7d83-455e-9f3a-87e40ee12a87", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "6afe4d07-bc49-4fe8-a6e8-a5f7227f9bab", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "d0bb6151-bf1c-4e90-a6b6-3b6d5884012c", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "c3a4d241-dadb-42ff-9784-ef9c67a3d5de", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}], "revision_number": 1, "project_id": "", "id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "name": "default"}, {"description": "Default security group", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:54Z", "updated_at": "2018-02-07T22:49:54Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "7f384bda-4db9-4cfe-a30e-00ae1d61fa0f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "28c3f759-0f51-4ea0-89e7-3e3012d9ba7f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "09304564-4c0f-41f8-88f7-b37b2e10a25e", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "70c1e1ba-d331-4655-b984-97c852730ad7", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}], "revision_number": 1, "project_id": "cb40ef02ea5943f398caf105bedc937f", "id": "84b182f4-29d5-4cd4-911c-05a40952e699", "name": "default"}, {"description": "Default security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-07T22:50:48Z", "updated_at": "2018-02-07T22:50:48Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "9c48af93-7cc8-4fc0-835e-edc249a8380e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "8a8f570d-76e1-4857-9275-91e18d071b36", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "380acc8e-8451-497f-900b-2af37d877a6b", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "7e14b2c9-941f-44c4-83ce-aac8fe3500cf", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 1, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "name": "default"}]} 2018-02-08 00:24:13,543 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-f88adb8c-f451-4986-8c2b-1aa4590e5a3a 2018-02-08 00:24:13,544 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-f88adb8c-f451-4986-8c2b-1aa4590e5a3a 2018-02-08 00:24:13,545 - functest.utils.openstack_utils- INFO - Creating security group 'example-sg'... 2018-02-08 00:24:13,546 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group": {"name": "example-sg", "description": "Example Security group"}}' 2018-02-08 00:24:13,932 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 1328 X-Openstack-Request-Id: req-800d07bd-deda-434b-bba3-5b61c65b0a2e Date: Thu, 08 Feb 2018 00:24:13 GMT RESP BODY: {"security_group": {"description": "Example Security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:13Z", "updated_at": "2018-02-08T00:24:13Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "d96a2630-b5da-4039-98a1-951c8ec7a7a8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "25b89fc4-a95c-41ff-9d2a-f98bfb9dab38", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 1, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "name": "example-sg"}} 2018-02-08 00:24:13,933 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-800d07bd-deda-434b-bba3-5b61c65b0a2e 2018-02-08 00:24:13,933 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-800d07bd-deda-434b-bba3-5b61c65b0a2e 2018-02-08 00:24:13,933 - functest.utils.openstack_utils- DEBUG - Security group 'example-sg' with ID=64ad2624-2b18-410d-a765-4a03e69ada6d created successfully. 2018-02-08 00:24:13,933 - functest.utils.openstack_utils- DEBUG - Adding ICMP rules in security group 'example-sg'... 2018-02-08 00:24:13,933 - functest.utils.openstack_utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:13,934 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:14,240 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-b1082db0-7ca9-4df6-88b7-18ae7a25e2e3 Date: Thu, 08 Feb 2018 00:24:14 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "8d2a6b1b-653d-42ee-894d-7e7a98793065", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:14,240 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-b1082db0-7ca9-4df6-88b7-18ae7a25e2e3 2018-02-08 00:24:14,241 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-b1082db0-7ca9-4df6-88b7-18ae7a25e2e3 2018-02-08 00:24:14,241 - functest.utils.openstack_utils- DEBUG - Adding SSH rules in security group 'example-sg'... 2018-02-08 00:24:14,241 - functest.utils.openstack_utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:14,242 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": "22", "direction": "ingress", "protocol": "tcp", "port_range_max": "22", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:14,414 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-7ea3bc3a-ee50-405b-8626-dfde7cdda909 Date: Thu, 08 Feb 2018 00:24:14 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "d8fe84d3-64a7-4096-8f0c-54120e6d3028", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:14,414 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-7ea3bc3a-ee50-405b-8626-dfde7cdda909 2018-02-08 00:24:14,414 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-7ea3bc3a-ee50-405b-8626-dfde7cdda909 2018-02-08 00:24:14,415 - functest.utils.openstack_utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:14,416 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": "22", "direction": "egress", "protocol": "tcp", "port_range_max": "22", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:14,701 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-f4a998a3-72c2-47ba-bf37-9eb3e9b76268 Date: Thu, 08 Feb 2018 00:24:14 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "1feb3f32-c2f5-4250-b1f1-0b7531835f59", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:14,701 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-f4a998a3-72c2-47ba-bf37-9eb3e9b76268 2018-02-08 00:24:14,701 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-f4a998a3-72c2-47ba-bf37-9eb3e9b76268 2018-02-08 00:24:14,702 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:14,913 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 11879 X-Openstack-Request-Id: req-7530c5ce-faea-4052-87c5-f114f12ea5da Date: Thu, 08 Feb 2018 00:24:14 GMT RESP BODY: {"security_groups": [{"description": "Example Security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:13Z", "updated_at": "2018-02-08T00:24:14Z", "security_group_rules": [{"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "1feb3f32-c2f5-4250-b1f1-0b7531835f59", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "25b89fc4-a95c-41ff-9d2a-f98bfb9dab38", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "8d2a6b1b-653d-42ee-894d-7e7a98793065", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "d8fe84d3-64a7-4096-8f0c-54120e6d3028", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "d96a2630-b5da-4039-98a1-951c8ec7a7a8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 4, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "created_at": "2018-02-08T00:20:42Z", "updated_at": "2018-02-08T00:20:42Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "50cbee1c-c418-48c7-9066-5f8987ede843", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "9ccfc0ef-13c2-4201-982e-6064b1307aa2", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "d868f850-cefe-4cd3-8e29-3c75266d471d", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "e38fca89-7add-4039-b660-c7cd9b24c1af", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}], "revision_number": 1, "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "name": "default"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-07T22:57:46Z", "updated_at": "2018-02-07T22:57:46Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "6afe4d07-bc49-4fe8-a6e8-a5f7227f9bab", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "c3a4d241-dadb-42ff-9784-ef9c67a3d5de", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "d0bb6151-bf1c-4e90-a6b6-3b6d5884012c", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "ee9f830e-7d83-455e-9f3a-87e40ee12a87", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 1, "project_id": "", "id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "name": "default"}, {"description": "Default security group", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:54Z", "updated_at": "2018-02-07T22:49:54Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "09304564-4c0f-41f8-88f7-b37b2e10a25e", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "28c3f759-0f51-4ea0-89e7-3e3012d9ba7f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "70c1e1ba-d331-4655-b984-97c852730ad7", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "7f384bda-4db9-4cfe-a30e-00ae1d61fa0f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}], "revision_number": 1, "project_id": "cb40ef02ea5943f398caf105bedc937f", "id": "84b182f4-29d5-4cd4-911c-05a40952e699", "name": "default"}, {"description": "Default security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-07T22:50:48Z", "updated_at": "2018-02-07T22:50:48Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "380acc8e-8451-497f-900b-2af37d877a6b", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "7e14b2c9-941f-44c4-83ce-aac8fe3500cf", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "8a8f570d-76e1-4857-9275-91e18d071b36", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "9c48af93-7cc8-4fc0-835e-edc249a8380e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 1, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "name": "default"}]} 2018-02-08 00:24:14,913 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-7530c5ce-faea-4052-87c5-f114f12ea5da 2018-02-08 00:24:14,915 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-7530c5ce-faea-4052-87c5-f114f12ea5da 2018-02-08 00:24:14,915 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:14,916 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:15,002 - keystoneauth.session- DEBUG - RESP: [409] Content-Type: application/json Content-Length: 166 X-Openstack-Request-Id: req-1d00890b-e917-4970-adca-28bdb4685566 Date: Thu, 08 Feb 2018 00:24:15 GMT RESP BODY: {"NeutronError": {"message": "Security group rule already exists. Rule id is 8d2a6b1b-653d-42ee-894d-7e7a98793065.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-08 00:24:15,003 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-1d00890b-e917-4970-adca-28bdb4685566 2018-02-08 00:24:15,003 - neutronclient.v2_0.client- DEBUG - Error message: {"NeutronError": {"message": "Security group rule already exists. Rule id is 8d2a6b1b-653d-42ee-894d-7e7a98793065.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-08 00:24:15,003 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-1d00890b-e917-4970-adca-28bdb4685566 2018-02-08 00:24:15,003 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:15,004 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:15,281 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-60b9872c-c58d-41d5-8acc-2c4733954212 Date: Thu, 08 Feb 2018 00:24:15 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "9f998eaa-4b6e-4b40-8725-273894af9d75", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:15,282 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-60b9872c-c58d-41d5-8acc-2c4733954212 2018-02-08 00:24:15,282 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-60b9872c-c58d-41d5-8acc-2c4733954212 2018-02-08 00:24:15,282 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:15,283 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:15,420 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-9950c98d-bc9a-4b15-97f7-af8b2ed0d002 Date: Thu, 08 Feb 2018 00:24:15 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "8365b6f1-c120-4066-a391-b9a1ce892bdc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:15,421 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-9950c98d-bc9a-4b15-97f7-af8b2ed0d002 2018-02-08 00:24:15,421 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-9950c98d-bc9a-4b15-97f7-af8b2ed0d002 2018-02-08 00:24:15,421 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:15,422 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:15,708 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-0c468672-4d8d-4a27-aa1e-f3c021ac7418 Date: Thu, 08 Feb 2018 00:24:15 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "bf93eb6d-192f-4b94-bdc0-77c633a1d710", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:15,708 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-0c468672-4d8d-4a27-aa1e-f3c021ac7418 2018-02-08 00:24:15,709 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-0c468672-4d8d-4a27-aa1e-f3c021ac7418 2018-02-08 00:24:15,709 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:15,710 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:15,853 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-6f5ae768-c9f7-405d-a011-b17dad764125 Date: Thu, 08 Feb 2018 00:24:15 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "ee0b8c0f-a9f1-4f3a-965f-8c597378e617", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:15,853 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-6f5ae768-c9f7-405d-a011-b17dad764125 2018-02-08 00:24:15,853 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-6f5ae768-c9f7-405d-a011-b17dad764125 2018-02-08 00:24:15,853 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:15,854 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:16,277 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-ff657c09-f033-4d84-8617-361c5125daaf Date: Thu, 08 Feb 2018 00:24:16 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1494a0d3-fd0d-424f-b965-f333ce6dc060", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:16,277 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-ff657c09-f033-4d84-8617-361c5125daaf 2018-02-08 00:24:16,277 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-ff657c09-f033-4d84-8617-361c5125daaf 2018-02-08 00:24:16,278 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:16,279 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:16,407 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-5816e1dd-60c8-4192-a753-d6b224d0a66a Date: Thu, 08 Feb 2018 00:24:16 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "bb413f1d-b338-410a-90e8-a5936a071d88", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:16,407 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-5816e1dd-60c8-4192-a753-d6b224d0a66a 2018-02-08 00:24:16,407 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-5816e1dd-60c8-4192-a753-d6b224d0a66a 2018-02-08 00:24:16,408 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:16,409 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:16,689 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-8e517c9f-f0f7-46c5-8a42-a35077bfe704 Date: Thu, 08 Feb 2018 00:24:16 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "dd9b77b6-9a77-43bc-ae81-bd1b1fbcdf1a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:16,689 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-8e517c9f-f0f7-46c5-8a42-a35077bfe704 2018-02-08 00:24:16,689 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-8e517c9f-f0f7-46c5-8a42-a35077bfe704 2018-02-08 00:24:16,689 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:16,691 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:16,958 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-00549f77-5a43-434e-886d-1801a87df189 Date: Thu, 08 Feb 2018 00:24:16 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1f4671a5-d9d5-4331-a387-879161470a18", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:16,958 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-00549f77-5a43-434e-886d-1801a87df189 2018-02-08 00:24:16,958 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-00549f77-5a43-434e-886d-1801a87df189 2018-02-08 00:24:16,959 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-08 00:24:16,960 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:17,258 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-633e4a2e-b0f3-400f-8060-adc9e27c756b Date: Thu, 08 Feb 2018 00:24:17 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "01e2d93b-ed0b-435c-b6af-fc1d7a725902", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:17,258 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-633e4a2e-b0f3-400f-8060-adc9e27c756b 2018-02-08 00:24:17,259 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-633e4a2e-b0f3-400f-8060-adc9e27c756b 2018-02-08 00:24:17,260 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:17,346 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 16275 X-Openstack-Request-Id: req-f1ce26dc-4c92-4e2d-9129-bc6b5a6d4322 Date: Thu, 08 Feb 2018 00:24:17 GMT RESP BODY: {"security_groups": [{"description": "Example Security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:13Z", "updated_at": "2018-02-08T00:24:15Z", "security_group_rules": [{"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "1feb3f32-c2f5-4250-b1f1-0b7531835f59", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "25b89fc4-a95c-41ff-9d2a-f98bfb9dab38", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "8d2a6b1b-653d-42ee-894d-7e7a98793065", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "9f998eaa-4b6e-4b40-8725-273894af9d75", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "d8fe84d3-64a7-4096-8f0c-54120e6d3028", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "d96a2630-b5da-4039-98a1-951c8ec7a7a8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 5, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "created_at": "2018-02-08T00:20:42Z", "updated_at": "2018-02-08T00:24:15Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "50cbee1c-c418-48c7-9066-5f8987ede843", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "8365b6f1-c120-4066-a391-b9a1ce892bdc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "9ccfc0ef-13c2-4201-982e-6064b1307aa2", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "bf93eb6d-192f-4b94-bdc0-77c633a1d710", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "d868f850-cefe-4cd3-8e29-3c75266d471d", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "e38fca89-7add-4039-b660-c7cd9b24c1af", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}], "revision_number": 3, "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "name": "default"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-07T22:57:46Z", "updated_at": "2018-02-08T00:24:16Z", "security_group_rules": [{"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1494a0d3-fd0d-424f-b965-f333ce6dc060", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "6afe4d07-bc49-4fe8-a6e8-a5f7227f9bab", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "c3a4d241-dadb-42ff-9784-ef9c67a3d5de", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "d0bb6151-bf1c-4e90-a6b6-3b6d5884012c", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "ee0b8c0f-a9f1-4f3a-965f-8c597378e617", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "ee9f830e-7d83-455e-9f3a-87e40ee12a87", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 3, "project_id": "", "id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "name": "default"}, {"description": "Default security group", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:54Z", "updated_at": "2018-02-08T00:24:16Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "09304564-4c0f-41f8-88f7-b37b2e10a25e", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "28c3f759-0f51-4ea0-89e7-3e3012d9ba7f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "70c1e1ba-d331-4655-b984-97c852730ad7", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "7f384bda-4db9-4cfe-a30e-00ae1d61fa0f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "bb413f1d-b338-410a-90e8-a5936a071d88", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "dd9b77b6-9a77-43bc-ae81-bd1b1fbcdf1a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 3, "project_id": "cb40ef02ea5943f398caf105bedc937f", "id": "84b182f4-29d5-4cd4-911c-05a40952e699", "name": "default"}, {"description": "Default security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-07T22:50:48Z", "updated_at": "2018-02-08T00:24:17Z", "security_group_rules": [{"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "01e2d93b-ed0b-435c-b6af-fc1d7a725902", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1f4671a5-d9d5-4331-a387-879161470a18", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "380acc8e-8451-497f-900b-2af37d877a6b", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "7e14b2c9-941f-44c4-83ce-aac8fe3500cf", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "8a8f570d-76e1-4857-9275-91e18d071b36", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "9c48af93-7cc8-4fc0-835e-edc249a8380e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 3, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "name": "default"}]} 2018-02-08 00:24:17,346 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-f1ce26dc-4c92-4e2d-9129-bc6b5a6d4322 2018-02-08 00:24:17,348 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-f1ce26dc-4c92-4e2d-9129-bc6b5a6d4322 2018-02-08 00:24:17,348 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:17,349 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:17,445 - keystoneauth.session- DEBUG - RESP: [409] Content-Type: application/json Content-Length: 166 X-Openstack-Request-Id: req-e68d1e7d-642e-4b07-846c-f3f2755436c6 Date: Thu, 08 Feb 2018 00:24:17 GMT RESP BODY: {"NeutronError": {"message": "Security group rule already exists. Rule id is d8fe84d3-64a7-4096-8f0c-54120e6d3028.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-08 00:24:17,446 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e68d1e7d-642e-4b07-846c-f3f2755436c6 2018-02-08 00:24:17,446 - neutronclient.v2_0.client- DEBUG - Error message: {"NeutronError": {"message": "Security group rule already exists. Rule id is d8fe84d3-64a7-4096-8f0c-54120e6d3028.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-08 00:24:17,446 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e68d1e7d-642e-4b07-846c-f3f2755436c6 2018-02-08 00:24:17,446 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:17,447 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:17,685 - keystoneauth.session- DEBUG - RESP: [409] Content-Type: application/json Content-Length: 166 X-Openstack-Request-Id: req-a920bfc4-98ca-4305-95e0-0b807ca3489a Date: Thu, 08 Feb 2018 00:24:17 GMT RESP BODY: {"NeutronError": {"message": "Security group rule already exists. Rule id is 1feb3f32-c2f5-4250-b1f1-0b7531835f59.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-08 00:24:17,685 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-a920bfc4-98ca-4305-95e0-0b807ca3489a 2018-02-08 00:24:17,685 - neutronclient.v2_0.client- DEBUG - Error message: {"NeutronError": {"message": "Security group rule already exists. Rule id is 1feb3f32-c2f5-4250-b1f1-0b7531835f59.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-08 00:24:17,685 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-a920bfc4-98ca-4305-95e0-0b807ca3489a 2018-02-08 00:24:17,686 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:17,687 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:18,001 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-ca68fd0c-2358-4ab5-a4f2-b5787a5a1f0e Date: Thu, 08 Feb 2018 00:24:18 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "d15db8f0-a7ee-4b6f-9901-1ea0ca78d7ca", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:18,001 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-ca68fd0c-2358-4ab5-a4f2-b5787a5a1f0e 2018-02-08 00:24:18,001 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-ca68fd0c-2358-4ab5-a4f2-b5787a5a1f0e 2018-02-08 00:24:18,001 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:18,002 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:18,281 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-6b3c2e1d-1425-4e1f-bc9d-59e0fceef1aa Date: Thu, 08 Feb 2018 00:24:18 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "f70c4ffe-1fd7-4065-b4c0-61a5bd497cd0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:18,281 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-6b3c2e1d-1425-4e1f-bc9d-59e0fceef1aa 2018-02-08 00:24:18,281 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-6b3c2e1d-1425-4e1f-bc9d-59e0fceef1aa 2018-02-08 00:24:18,282 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:18,283 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:18,583 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-12fe3478-bfb5-4e23-be3a-ad57fc06a491 Date: Thu, 08 Feb 2018 00:24:18 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "13577e85-44f1-4bcc-9b6f-9db93372bef3", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:18,583 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-12fe3478-bfb5-4e23-be3a-ad57fc06a491 2018-02-08 00:24:18,583 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-12fe3478-bfb5-4e23-be3a-ad57fc06a491 2018-02-08 00:24:18,584 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:18,585 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:18,724 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-5a5ed31f-9a1f-4f14-a079-ae121c3e21b4 Date: Thu, 08 Feb 2018 00:24:18 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "2c7a8334-c040-4222-bd35-34923ee170df", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:18,724 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-5a5ed31f-9a1f-4f14-a079-ae121c3e21b4 2018-02-08 00:24:18,725 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-5a5ed31f-9a1f-4f14-a079-ae121c3e21b4 2018-02-08 00:24:18,725 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:18,726 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:18,876 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-48c42afa-a6aa-4a9b-83d9-622375096589 Date: Thu, 08 Feb 2018 00:24:18 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "52c02dc7-437d-4df1-b7dd-db96750f1628", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:18,876 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-48c42afa-a6aa-4a9b-83d9-622375096589 2018-02-08 00:24:18,876 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-48c42afa-a6aa-4a9b-83d9-622375096589 2018-02-08 00:24:18,876 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:18,878 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:19,042 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-64e44091-c8f6-4c74-a1c7-5d63f96e1d00 Date: Thu, 08 Feb 2018 00:24:19 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "4312d6f1-5c18-4356-9adc-978237fa142d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:19,042 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-64e44091-c8f6-4c74-a1c7-5d63f96e1d00 2018-02-08 00:24:19,042 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-64e44091-c8f6-4c74-a1c7-5d63f96e1d00 2018-02-08 00:24:19,043 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:19,044 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:19,204 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-8e1f5926-8c62-4b19-ab96-95c13be711fb Date: Thu, 08 Feb 2018 00:24:19 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "a8123c49-15ce-4394-b61a-1ea0e46b933c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:19,204 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-8e1f5926-8c62-4b19-ab96-95c13be711fb 2018-02-08 00:24:19,204 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-8e1f5926-8c62-4b19-ab96-95c13be711fb 2018-02-08 00:24:19,205 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:19,206 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:19,359 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-4adc7093-4ba4-49e3-a5f5-983682b5c4e9 Date: Thu, 08 Feb 2018 00:24:19 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "4a465cd2-849f-4207-ad8c-832915311951", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:19,359 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-4adc7093-4ba4-49e3-a5f5-983682b5c4e9 2018-02-08 00:24:19,360 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-4adc7093-4ba4-49e3-a5f5-983682b5c4e9 2018-02-08 00:24:19,361 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:19,421 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 20143 X-Openstack-Request-Id: req-dfce0469-305c-464e-b763-8937ffa63c93 Date: Thu, 08 Feb 2018 00:24:19 GMT RESP BODY: {"security_groups": [{"description": "Example Security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:13Z", "updated_at": "2018-02-08T00:24:15Z", "security_group_rules": [{"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "1feb3f32-c2f5-4250-b1f1-0b7531835f59", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "25b89fc4-a95c-41ff-9d2a-f98bfb9dab38", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "8d2a6b1b-653d-42ee-894d-7e7a98793065", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "9f998eaa-4b6e-4b40-8725-273894af9d75", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "d8fe84d3-64a7-4096-8f0c-54120e6d3028", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "d96a2630-b5da-4039-98a1-951c8ec7a7a8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 5, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "created_at": "2018-02-08T00:20:42Z", "updated_at": "2018-02-08T00:24:18Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "50cbee1c-c418-48c7-9066-5f8987ede843", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "8365b6f1-c120-4066-a391-b9a1ce892bdc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "9ccfc0ef-13c2-4201-982e-6064b1307aa2", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "bf93eb6d-192f-4b94-bdc0-77c633a1d710", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "d15db8f0-a7ee-4b6f-9901-1ea0ca78d7ca", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "d868f850-cefe-4cd3-8e29-3c75266d471d", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "e38fca89-7add-4039-b660-c7cd9b24c1af", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "f70c4ffe-1fd7-4065-b4c0-61a5bd497cd0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 5, "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "name": "default"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-07T22:57:46Z", "updated_at": "2018-02-08T00:24:18Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "13577e85-44f1-4bcc-9b6f-9db93372bef3", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1494a0d3-fd0d-424f-b965-f333ce6dc060", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "2c7a8334-c040-4222-bd35-34923ee170df", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "6afe4d07-bc49-4fe8-a6e8-a5f7227f9bab", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "c3a4d241-dadb-42ff-9784-ef9c67a3d5de", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "d0bb6151-bf1c-4e90-a6b6-3b6d5884012c", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "ee0b8c0f-a9f1-4f3a-965f-8c597378e617", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "ee9f830e-7d83-455e-9f3a-87e40ee12a87", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 5, "project_id": "", "id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "name": "default"}, {"description": "Default security group", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:54Z", "updated_at": "2018-02-08T00:24:18Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "09304564-4c0f-41f8-88f7-b37b2e10a25e", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "28c3f759-0f51-4ea0-89e7-3e3012d9ba7f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "4312d6f1-5c18-4356-9adc-978237fa142d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "52c02dc7-437d-4df1-b7dd-db96750f1628", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "70c1e1ba-d331-4655-b984-97c852730ad7", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "7f384bda-4db9-4cfe-a30e-00ae1d61fa0f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "bb413f1d-b338-410a-90e8-a5936a071d88", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "dd9b77b6-9a77-43bc-ae81-bd1b1fbcdf1a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 5, "project_id": "cb40ef02ea5943f398caf105bedc937f", "id": "84b182f4-29d5-4cd4-911c-05a40952e699", "name": "default"}, {"description": "Default security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-07T22:50:48Z", "updated_at": "2018-02-08T00:24:19Z", "security_group_rules": [{"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "01e2d93b-ed0b-435c-b6af-fc1d7a725902", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1f4671a5-d9d5-4331-a387-879161470a18", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "380acc8e-8451-497f-900b-2af37d877a6b", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "4a465cd2-849f-4207-ad8c-832915311951", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "7e14b2c9-941f-44c4-83ce-aac8fe3500cf", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "8a8f570d-76e1-4857-9275-91e18d071b36", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "9c48af93-7cc8-4fc0-835e-edc249a8380e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "a8123c49-15ce-4394-b61a-1ea0e46b933c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 5, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "name": "default"}]} 2018-02-08 00:24:19,421 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-dfce0469-305c-464e-b763-8937ffa63c93 2018-02-08 00:24:19,423 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-dfce0469-305c-464e-b763-8937ffa63c93 2018-02-08 00:24:19,424 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:19,425 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:19,725 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-cdaac5e1-2852-4aeb-8c43-5ddea24dda27 Date: Thu, 08 Feb 2018 00:24:19 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "9c7987f1-1c37-4e86-9bd7-c15b8321a53e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:19,725 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-cdaac5e1-2852-4aeb-8c43-5ddea24dda27 2018-02-08 00:24:19,725 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-cdaac5e1-2852-4aeb-8c43-5ddea24dda27 2018-02-08 00:24:19,726 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:19,727 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:19,889 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-3134d5a3-0742-4451-bcd2-78a8c0f1b164 Date: Thu, 08 Feb 2018 00:24:19 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "b9f34fa9-a7bf-4577-bb76-596dbbee98ad", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:19,889 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-3134d5a3-0742-4451-bcd2-78a8c0f1b164 2018-02-08 00:24:19,889 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-3134d5a3-0742-4451-bcd2-78a8c0f1b164 2018-02-08 00:24:19,889 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:19,890 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:20,031 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-67ef87c2-899e-4a18-a5c6-092cfe6e7e6d Date: Thu, 08 Feb 2018 00:24:20 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "faf48085-6f85-4d8d-ad95-422f4400ef2a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:20,031 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-67ef87c2-899e-4a18-a5c6-092cfe6e7e6d 2018-02-08 00:24:20,031 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-67ef87c2-899e-4a18-a5c6-092cfe6e7e6d 2018-02-08 00:24:20,031 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:20,032 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:20,389 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-921521ea-75bf-4c84-ba06-e604f72dd69f Date: Thu, 08 Feb 2018 00:24:20 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "a61a3c8b-f0fb-482e-9497-225087f23031", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:20,389 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-921521ea-75bf-4c84-ba06-e604f72dd69f 2018-02-08 00:24:20,390 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-921521ea-75bf-4c84-ba06-e604f72dd69f 2018-02-08 00:24:20,390 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:20,391 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:20,527 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-e3974162-b910-4d6c-881d-cf737706386c Date: Thu, 08 Feb 2018 00:24:20 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "f776dddb-7980-410d-9850-4369d68d14b1", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:20,527 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e3974162-b910-4d6c-881d-cf737706386c 2018-02-08 00:24:20,527 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e3974162-b910-4d6c-881d-cf737706386c 2018-02-08 00:24:20,527 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:20,528 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:20,820 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-ac7fc261-497f-41be-859a-8395edade0ea Date: Thu, 08 Feb 2018 00:24:20 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "fce57030-ed27-4789-a301-6c513e216547", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:20,820 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-ac7fc261-497f-41be-859a-8395edade0ea 2018-02-08 00:24:20,820 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-ac7fc261-497f-41be-859a-8395edade0ea 2018-02-08 00:24:20,821 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:20,822 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:20,958 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-02b32556-0707-4a38-b033-277c4401fa13 Date: Thu, 08 Feb 2018 00:24:20 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "029507d8-c9f7-45d2-8d04-6fd993fbcf13", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:20,958 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-02b32556-0707-4a38-b033-277c4401fa13 2018-02-08 00:24:20,958 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-02b32556-0707-4a38-b033-277c4401fa13 2018-02-08 00:24:20,959 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:20,960 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:21,263 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-2731d830-35c5-4f6d-97aa-e930dd334278 Date: Thu, 08 Feb 2018 00:24:21 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "7f5fd24b-c0ec-4fb2-b81c-e3ea28fe3fc2", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:21,264 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-2731d830-35c5-4f6d-97aa-e930dd334278 2018-02-08 00:24:21,264 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-2731d830-35c5-4f6d-97aa-e930dd334278 2018-02-08 00:24:21,264 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:21,265 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:21,409 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-13a98e5e-1799-4ab4-b505-de902b0f480c Date: Thu, 08 Feb 2018 00:24:21 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "7e80fb80-1ffb-46a3-9494-f26af08cafc0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:21,409 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-13a98e5e-1799-4ab4-b505-de902b0f480c 2018-02-08 00:24:21,410 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-13a98e5e-1799-4ab4-b505-de902b0f480c 2018-02-08 00:24:21,410 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:21,411 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:21,561 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-306d3677-94eb-4ec3-836c-5e558b42c492 Date: Thu, 08 Feb 2018 00:24:21 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "5001d66b-7d9a-428c-9954-dae0c375c405", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:21,561 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-306d3677-94eb-4ec3-836c-5e558b42c492 2018-02-08 00:24:21,561 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-306d3677-94eb-4ec3-836c-5e558b42c492 2018-02-08 00:24:21,562 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" 2018-02-08 00:24:21,620 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 24978 X-Openstack-Request-Id: req-0501045a-f69c-4079-addd-9a2eb9bb45f3 Date: Thu, 08 Feb 2018 00:24:21 GMT RESP BODY: {"security_groups": [{"description": "Example Security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08T00:24:13Z", "updated_at": "2018-02-08T00:24:19Z", "security_group_rules": [{"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "1feb3f32-c2f5-4250-b1f1-0b7531835f59", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "25b89fc4-a95c-41ff-9d2a-f98bfb9dab38", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "8d2a6b1b-653d-42ee-894d-7e7a98793065", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "9c7987f1-1c37-4e86-9bd7-c15b8321a53e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "9f998eaa-4b6e-4b40-8725-273894af9d75", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "b9f34fa9-a7bf-4577-bb76-596dbbee98ad", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:14Z", "revision_number": 1, "id": "d8fe84d3-64a7-4096-8f0c-54120e6d3028", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:14Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:24:13Z", "revision_number": 1, "id": "d96a2630-b5da-4039-98a1-951c8ec7a7a8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:13Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 7, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "created_at": "2018-02-08T00:20:42Z", "updated_at": "2018-02-08T00:24:20Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "50cbee1c-c418-48c7-9066-5f8987ede843", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "8365b6f1-c120-4066-a391-b9a1ce892bdc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "9ccfc0ef-13c2-4201-982e-6064b1307aa2", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "a61a3c8b-f0fb-482e-9497-225087f23031", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "bf93eb6d-192f-4b94-bdc0-77c633a1d710", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "d15db8f0-a7ee-4b6f-9901-1ea0ca78d7ca", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "d868f850-cefe-4cd3-8e29-3c75266d471d", "remote_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-08T00:20:42Z", "revision_number": 1, "id": "e38fca89-7add-4039-b660-c7cd9b24c1af", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:20:42Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "f70c4ffe-1fd7-4065-b4c0-61a5bd497cd0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "faf48085-6f85-4d8d-ad95-422f4400ef2a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 7, "project_id": "c6a8e22f79b04534ac0f42d5e39a13e5", "id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "name": "default"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-07T22:57:46Z", "updated_at": "2018-02-08T00:24:20Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "13577e85-44f1-4bcc-9b6f-9db93372bef3", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1494a0d3-fd0d-424f-b965-f333ce6dc060", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "2c7a8334-c040-4222-bd35-34923ee170df", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "6afe4d07-bc49-4fe8-a6e8-a5f7227f9bab", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "c3a4d241-dadb-42ff-9784-ef9c67a3d5de", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "d0bb6151-bf1c-4e90-a6b6-3b6d5884012c", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:15Z", "revision_number": 1, "id": "ee0b8c0f-a9f1-4f3a-965f-8c597378e617", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:15Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:57:46Z", "revision_number": 1, "id": "ee9f830e-7d83-455e-9f3a-87e40ee12a87", "remote_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "remote_ip_prefix": null, "created_at": "2018-02-07T22:57:46Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "f776dddb-7980-410d-9850-4369d68d14b1", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "fce57030-ed27-4789-a301-6c513e216547", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 7, "project_id": "", "id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "name": "default"}, {"description": "Default security group", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "created_at": "2018-02-07T22:49:54Z", "updated_at": "2018-02-08T00:24:21Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:20Z", "revision_number": 1, "id": "029507d8-c9f7-45d2-8d04-6fd993fbcf13", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:20Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "09304564-4c0f-41f8-88f7-b37b2e10a25e", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "28c3f759-0f51-4ea0-89e7-3e3012d9ba7f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv4", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "4312d6f1-5c18-4356-9adc-978237fa142d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:18Z", "revision_number": 1, "id": "52c02dc7-437d-4df1-b7dd-db96750f1628", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:18Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "70c1e1ba-d331-4655-b984-97c852730ad7", "remote_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:49:54Z", "revision_number": 1, "id": "7f384bda-4db9-4cfe-a30e-00ae1d61fa0f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:49:54Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "cb40ef02ea5943f398caf105bedc937f", "port_range_min": null, "ethertype": "IPv6", "project_id": "cb40ef02ea5943f398caf105bedc937f"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "7f5fd24b-c0ec-4fb2-b81c-e3ea28fe3fc2", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "bb413f1d-b338-410a-90e8-a5936a071d88", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "dd9b77b6-9a77-43bc-ae81-bd1b1fbcdf1a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 7, "project_id": "cb40ef02ea5943f398caf105bedc937f", "id": "84b182f4-29d5-4cd4-911c-05a40952e699", "name": "default"}, {"description": "Default security group", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-07T22:50:48Z", "updated_at": "2018-02-08T00:24:21Z", "security_group_rules": [{"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:17Z", "revision_number": 1, "id": "01e2d93b-ed0b-435c-b6af-fc1d7a725902", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:17Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-08T00:24:16Z", "revision_number": 1, "id": "1f4671a5-d9d5-4331-a387-879161470a18", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:16Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "380acc8e-8451-497f-900b-2af37d877a6b", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "4a465cd2-849f-4207-ad8c-832915311951", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "5001d66b-7d9a-428c-9954-dae0c375c405", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "7e14b2c9-941f-44c4-83ce-aac8fe3500cf", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv6", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "7e80fb80-1ffb-46a3-9494-f26af08cafc0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 80, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "8a8f570d-76e1-4857-9275-91e18d071b36", "remote_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-07T22:50:48Z", "revision_number": 1, "id": "9c48af93-7cc8-4fc0-835e-edc249a8380e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-07T22:50:48Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": null, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-08T00:24:19Z", "revision_number": 1, "id": "a8123c49-15ce-4394-b61a-1ea0e46b933c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:19Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 22, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}], "revision_number": 7, "project_id": "3b86644ae842461fa36c6e3c5b2938b5", "id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "name": "default"}]} 2018-02-08 00:24:21,620 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-0501045a-f69c-4079-addd-9a2eb9bb45f3 2018-02-08 00:24:21,623 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.28:9696/v2.0/security-groups.json used request id req-0501045a-f69c-4079-addd-9a2eb9bb45f3 2018-02-08 00:24:21,623 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:21,624 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:21,773 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-f557a467-9a23-4904-a0c7-12bdbac57d43 Date: Thu, 08 Feb 2018 00:24:21 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "7ce6667b-f750-42ff-a269-b4de44877b4d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:21,773 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-f557a467-9a23-4904-a0c7-12bdbac57d43 2018-02-08 00:24:21,773 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-f557a467-9a23-4904-a0c7-12bdbac57d43 2018-02-08 00:24:21,774 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:21,775 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:24:21,911 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-29d6edc2-3d36-4dd1-bed9-5dd642717074 Date: Thu, 08 Feb 2018 00:24:21 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "291fff00-eb28-4a85-96dc-68cf53e1515e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "64ad2624-2b18-410d-a765-4a03e69ada6d", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:21,911 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-29d6edc2-3d36-4dd1-bed9-5dd642717074 2018-02-08 00:24:21,911 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-29d6edc2-3d36-4dd1-bed9-5dd642717074 2018-02-08 00:24:21,911 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:21,913 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:22,066 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-018157f5-be12-4192-935f-53d94cacc5fc Date: Thu, 08 Feb 2018 00:24:22 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:21Z", "revision_number": 1, "id": "512c110f-692e-44a4-99b8-5a11e8bc2c1a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:21Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:22,066 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-018157f5-be12-4192-935f-53d94cacc5fc 2018-02-08 00:24:22,066 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-018157f5-be12-4192-935f-53d94cacc5fc 2018-02-08 00:24:22,067 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:22,068 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522"}}' 2018-02-08 00:24:22,365 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-e798ac00-1e50-4b9d-b242-72effa6e525f Date: Thu, 08 Feb 2018 00:24:22 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:22Z", "revision_number": 1, "id": "2cf873ad-e3f0-4f2a-b73c-fe8d039be444", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:22Z", "security_group_id": "6b5a6584-fda8-4eaf-b0b8-4a85a2884522", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:22,366 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e798ac00-1e50-4b9d-b242-72effa6e525f 2018-02-08 00:24:22,366 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e798ac00-1e50-4b9d-b242-72effa6e525f 2018-02-08 00:24:22,366 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:22,367 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:22,622 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-6edb8aaf-a3f4-440d-9dcf-ef6fd735c373 Date: Thu, 08 Feb 2018 00:24:22 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:22Z", "revision_number": 1, "id": "74ff0cfb-9703-4362-a0cf-f7e8e1019d69", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:22Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:22,622 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-6edb8aaf-a3f4-440d-9dcf-ef6fd735c373 2018-02-08 00:24:22,623 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-6edb8aaf-a3f4-440d-9dcf-ef6fd735c373 2018-02-08 00:24:22,623 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:22,624 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc"}}' 2018-02-08 00:24:23,053 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-efca85a9-4cfa-481f-8acd-f413775ff845 Date: Thu, 08 Feb 2018 00:24:23 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:22Z", "revision_number": 1, "id": "a98cde0d-6eb0-42ec-952c-2bbe34abb810", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:22Z", "security_group_id": "6c0fa25f-5da3-494c-a03b-475c86a513cc", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:23,053 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-efca85a9-4cfa-481f-8acd-f413775ff845 2018-02-08 00:24:23,054 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-efca85a9-4cfa-481f-8acd-f413775ff845 2018-02-08 00:24:23,054 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:23,055 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:23,191 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-e9f28021-f0ee-4589-aaf0-0abf12a92a33 Date: Thu, 08 Feb 2018 00:24:23 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:23Z", "revision_number": 1, "id": "4b954340-b5d4-4969-aa89-e09af32a6e6b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:23Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:23,192 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e9f28021-f0ee-4589-aaf0-0abf12a92a33 2018-02-08 00:24:23,192 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-e9f28021-f0ee-4589-aaf0-0abf12a92a33 2018-02-08 00:24:23,192 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:23,193 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699"}}' 2018-02-08 00:24:23,347 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-af7f180e-743c-4a54-b592-3df8b77b73fa Date: Thu, 08 Feb 2018 00:24:23 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:23Z", "revision_number": 1, "id": "9ccde15e-620e-4218-a308-7bf9b317e63e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:23Z", "security_group_id": "84b182f4-29d5-4cd4-911c-05a40952e699", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:23,347 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-af7f180e-743c-4a54-b592-3df8b77b73fa 2018-02-08 00:24:23,348 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-af7f180e-743c-4a54-b592-3df8b77b73fa 2018-02-08 00:24:23,348 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:23,349 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:23,484 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-15e84663-3a3c-4408-9924-1ddae44d2ecb Date: Thu, 08 Feb 2018 00:24:23 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:23Z", "revision_number": 1, "id": "5ecd77d5-4190-46f6-af67-c490d8fcf082", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:23Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:23,484 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-15e84663-3a3c-4408-9924-1ddae44d2ecb 2018-02-08 00:24:23,485 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-15e84663-3a3c-4408-9924-1ddae44d2ecb 2018-02-08 00:24:23,485 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-08 00:24:23,486 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a96030e90c4c2f0f3d3ca63b6e0cc60dbcdb0035" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce"}}' 2018-02-08 00:24:23,652 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-079fdae4-1dfc-4a82-bea4-1a0eb1a66e63 Date: Thu, 08 Feb 2018 00:24:23 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-08T00:24:23Z", "revision_number": 1, "id": "d306d36c-0b9c-4aef-a752-b5c33b87dfa9", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-08T00:24:23Z", "security_group_id": "a58a3bb3-6b42-4b4f-9dbf-e1a4894b1bce", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "port_range_min": 67, "ethertype": "IPv4", "project_id": "3b86644ae842461fa36c6e3c5b2938b5"}} 2018-02-08 00:24:23,653 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-079fdae4-1dfc-4a82-bea4-1a0eb1a66e63 2018-02-08 00:24:23,653 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.28:9696/v2.0/security-group-rules.json used request id req-079fdae4-1dfc-4a82-bea4-1a0eb1a66e63 2018-02-08 00:24:23,653 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:24:23,653 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:24:23,654 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:24:23,655 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:24:23,656 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:24:23,658 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:24:23,665 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:24:23 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-906474ad-5bfc-4cb4-a6ac-a40b730687c8 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:24:23,665 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-906474ad-5bfc-4cb4-a6ac-a40b730687c8 2018-02-08 00:24:23,665 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:24:23,812 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:24:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["73xar-9rSI2-dT0NnKiB2A"], "issued_at": "2018-02-08T00:24:23.000000Z"}} 2018-02-08 00:24:23,813 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/os-hypervisors/detail -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}563e90563ca5dcda7043f0be400d1abde9a992e4" 2018-02-08 00:24:23,979 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 2965 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-451f95dc-d7d7-45f9-9c79-c6b209877d97 Date: Thu, 08 Feb 2018 00:24:23 GMT RESP BODY: {"hypervisors": [{"status": "enabled", "service": {"host": "overcloud-novacompute-0.opnfvlf.org", "disabled_reason": null, "id": 101}, "vcpus_used": 0, "hypervisor_type": "QEMU", "local_gb_used": 0, "vcpus": 16, "hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "memory_mb_used": 2048, "memory_mb": 32502, "current_workload": 0, "state": "up", "host_ip": "192.30.9.7", "cpu_info": "{\"vendor\": \"Intel\", \"model\": \"Haswell-noTSX\", \"arch\": \"x86_64\", \"features\": [\"pge\", \"avx\", \"xsaveopt\", \"clflush\", \"sep\", \"syscall\", \"tsc_adjust\", \"tsc-deadline\", \"dtes64\", \"invpcid\", \"tsc\", \"fsgsbase\", \"xsave\", \"vmx\", \"erms\", \"xtpr\", \"cmov\", \"smep\", \"pcid\", \"est\", \"pat\", \"monitor\", \"smx\", \"pbe\", \"lm\", \"msr\", \"nx\", \"fxsr\", \"tm\", \"sse4.1\", \"pae\", \"sse4.2\", \"pclmuldq\", \"acpi\", \"fma\", \"vme\", \"popcnt\", \"mmx\", \"osxsave\", \"cx8\", \"mce\", \"de\", \"rdtscp\", \"ht\", \"dca\", \"lahf_lm\", \"abm\", \"pdcm\", \"mca\", \"pdpe1gb\", \"apic\", \"sse\", \"f16c\", \"pse\", \"ds\", \"invtsc\", \"pni\", \"tm2\", \"avx2\", \"aes\", \"sse2\", \"ss\", \"ds_cpl\", \"arat\", \"bmi1\", \"bmi2\", \"ssse3\", \"fpu\", \"cx16\", \"pse36\", \"mtrr\", \"movbe\", \"rdrand\", \"cmt\", \"x2apic\"], \"topology\": {\"cores\": 4, \"cells\": 2, \"threads\": 2, \"sockets\": 1}}", "running_vms": 0, "free_disk_gb": 926, "hypervisor_version": 2006000, "disk_available_least": 826, "local_gb": 926, "free_ram_mb": 30454, "id": 2}, {"status": "enabled", "service": {"host": "overcloud-novacompute-1.opnfvlf.org", "disabled_reason": null, "id": 104}, "vcpus_used": 0, "hypervisor_type": "QEMU", "local_gb_used": 0, "vcpus": 16, "hypervisor_hostname": "overcloud-novacompute-1.opnfvlf.org", "memory_mb_used": 2048, "memory_mb": 32502, "current_workload": 0, "state": "up", "host_ip": "192.30.9.3", "cpu_info": "{\"vendor\": \"Intel\", \"model\": \"Haswell-noTSX\", \"arch\": \"x86_64\", \"features\": [\"pge\", \"avx\", \"xsaveopt\", \"clflush\", \"sep\", \"syscall\", \"tsc_adjust\", \"tsc-deadline\", \"dtes64\", \"invpcid\", \"tsc\", \"fsgsbase\", \"xsave\", \"vmx\", \"erms\", \"xtpr\", \"cmov\", \"smep\", \"pcid\", \"est\", \"pat\", \"monitor\", \"smx\", \"pbe\", \"lm\", \"msr\", \"nx\", \"fxsr\", \"tm\", \"sse4.1\", \"pae\", \"sse4.2\", \"pclmuldq\", \"acpi\", \"fma\", \"vme\", \"popcnt\", \"mmx\", \"osxsave\", \"cx8\", \"mce\", \"de\", \"rdtscp\", \"ht\", \"dca\", \"lahf_lm\", \"abm\", \"pdcm\", \"mca\", \"pdpe1gb\", \"apic\", \"sse\", \"f16c\", \"pse\", \"ds\", \"invtsc\", \"pni\", \"tm2\", \"avx2\", \"aes\", \"sse2\", \"ss\", \"ds_cpl\", \"arat\", \"bmi1\", \"bmi2\", \"ssse3\", \"fpu\", \"cx16\", \"pse36\", \"mtrr\", \"movbe\", \"rdrand\", \"cmt\", \"x2apic\"], \"topology\": {\"cores\": 4, \"cells\": 2, \"threads\": 2, \"sockets\": 1}}", "running_vms": 0, "free_disk_gb": 926, "hypervisor_version": 2006000, "disk_available_least": 822, "local_gb": 926, "free_ram_mb": 30454, "id": 5}]} 2018-02-08 00:24:23,979 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/os-hypervisors/detail used request id req-451f95dc-d7d7-45f9-9c79-c6b209877d97 2018-02-08 00:24:23,981 - sfc.lib.topology_shuffler- INFO - Creating enpoint and VNF topology on the compute hosts 2018-02-08 00:24:23,981 - sfc.lib.topology_shuffler- INFO - All endpoints and VNFs are on a single host. This is the baseline test. 2018-02-08 00:24:23,981 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - This test is run with the topology CLIENT_SERVER_VNF_SAME_HOST 2018-02-08 00:24:23,981 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - Topology description: All endpoints and VNFs are on a single host. This is the baseline test. 2018-02-08 00:24:23,981 - sfc.lib.utils- INFO - Creating instance 'client'... 2018-02-08 00:24:23,981 - sfc.lib.utils- DEBUG - Configuration: name=client flavor=custom image=7e82a2e9-6cf5-43d1-86e7-aa51f5added3 network=0312aff9-1e91-4c0f-b239-b3b07aa50fac secgroup=64ad2624-2b18-410d-a765-4a03e69ada6d hypervisor=nova::overcloud-novacompute-0.opnfvlf.org fixed_ip=None files=None userdata= None 2018-02-08 00:24:23,981 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:24:23,981 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:24:23,982 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:24:23,983 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:24:23,985 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:24:23,986 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:24:23,987 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:24:23,988 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:24:23,988 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:24:23,990 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:24:23,996 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:24:23 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-f975f448-db96-44a4-b138-768638f32165 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:24:23,997 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-f975f448-db96-44a4-b138-768638f32165 2018-02-08 00:24:23,997 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:24:24,166 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:24:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["tGwmWC8-RSK8ulCWo1i5dg"], "issued_at": "2018-02-08T00:24:24.000000Z"}} 2018-02-08 00:24:24,167 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/flavors -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}72d146da14a06589a43417049886731540539d27" 2018-02-08 00:24:24,343 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 574 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-66d6a249-4fad-4e7e-a7fb-b5b6bc421c2a Date: Thu, 08 Feb 2018 00:24:24 GMT RESP BODY: {"flavors": [{"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}], "name": "custom"}, {"id": "d582e074-773e-49df-9ab0-8978b6d77335", "links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/d582e074-773e-49df-9ab0-8978b6d77335", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/d582e074-773e-49df-9ab0-8978b6d77335", "rel": "bookmark"}], "name": "m1.tiny"}]} 2018-02-08 00:24:24,343 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/flavors used request id req-66d6a249-4fad-4e7e-a7fb-b5b6bc421c2a 2018-02-08 00:24:24,344 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}72d146da14a06589a43417049886731540539d27" 2018-02-08 00:24:24,367 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 462 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-914dbd5e-5c70-41ee-af9d-3407928824a2 Date: Thu, 08 Feb 2018 00:24:24 GMT RESP BODY: {"flavor": {"links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}], "ram": 1500, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "name": "custom", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2018-02-08 00:24:24,367 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09 used request id req-914dbd5e-5c70-41ee-af9d-3407928824a2 2018-02-08 00:24:24,368 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:8774/v2.1/servers -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}72d146da14a06589a43417049886731540539d27" -d '{"server": {"name": "client", "imageRef": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "availability_zone": "nova::overcloud-novacompute-0.opnfvlf.org", "flavorRef": "b743f505-1c9a-48c5-becf-e084e31a9b09", "max_count": 1, "min_count": 1, "networks": [{"uuid": "0312aff9-1e91-4c0f-b239-b3b07aa50fac"}]}}' 2018-02-08 00:24:26,060 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 374 Location: http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-17d68607-9c00-4c8b-aae3-e2642ca6874d Date: Thu, 08 Feb 2018 00:24:26 GMT RESP BODY: {"server": {"security_groups": [{"name": "default"}], "OS-DCF:diskConfig": "MANUAL", "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "adminPass": "vjtmW8KNP3GH"}} 2018-02-08 00:24:26,061 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.28:8774/v2.1/servers used request id req-17d68607-9c00-4c8b-aae3-e2642ca6874d 2018-02-08 00:24:26,062 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:24:26,067 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:24:26 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-d47230ae-a730-49da-bdc0-0c5d72838a05 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:24:26,068 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-d47230ae-a730-49da-bdc0-0c5d72838a05 2018-02-08 00:24:26,068 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:24:26,237 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:24:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["YTVnbNfcTuCbR7huZS9ssg"], "issued_at": "2018-02-08T00:24:26.000000Z"}} 2018-02-08 00:24:26,238 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:26,769 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1344 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-ade9fb89-187e-454e-86f3-a59ddd86aa19 Date: Thu, 08 Feb 2018 00:24:26 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "scheduling", "addresses": {}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:26Z", "hostId": "", "OS-EXT-SRV-ATTR:host": null, "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:26,770 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-ade9fb89-187e-454e-86f3-a59ddd86aa19 2018-02-08 00:24:29,774 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:30,452 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1523 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-9982926e-62e3-4378-a9cb-595f68131585 Date: Thu, 08 Feb 2018 00:24:30 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:30,452 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-9982926e-62e3-4378-a9cb-595f68131585 2018-02-08 00:24:33,457 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:34,242 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-173caa0d-17f8-46d9-9f1a-c2a2c9b6112d Date: Thu, 08 Feb 2018 00:24:34 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:34,242 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-173caa0d-17f8-46d9-9f1a-c2a2c9b6112d 2018-02-08 00:24:37,246 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:37,881 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-38e10366-b946-4ac2-9505-eb7d9e86c135 Date: Thu, 08 Feb 2018 00:24:37 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:37,881 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-38e10366-b946-4ac2-9505-eb7d9e86c135 2018-02-08 00:24:40,885 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:41,494 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-cdacc68f-883a-49fa-9842-302ae4a2f4cd Date: Thu, 08 Feb 2018 00:24:41 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:41,494 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-cdacc68f-883a-49fa-9842-302ae4a2f4cd 2018-02-08 00:24:44,496 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:45,299 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-ab7238f3-97fb-4b5e-a5dd-46b160a09490 Date: Thu, 08 Feb 2018 00:24:45 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:45,299 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-ab7238f3-97fb-4b5e-a5dd-46b160a09490 2018-02-08 00:24:48,304 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:48,947 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-1378510f-8a6d-435f-a651-81eed785c841 Date: Thu, 08 Feb 2018 00:24:48 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:48,947 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-1378510f-8a6d-435f-a651-81eed785c841 2018-02-08 00:24:51,952 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:52,753 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-9028cad8-c528-4731-9a45-d2f072ef91f9 Date: Thu, 08 Feb 2018 00:24:52 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:52,753 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-9028cad8-c528-4731-9a45-d2f072ef91f9 2018-02-08 00:24:55,757 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:56,408 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-749899a3-ce59-4512-a0b5-741251208af1 Date: Thu, 08 Feb 2018 00:24:56 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:56,408 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-749899a3-ce59-4512-a0b5-741251208af1 2018-02-08 00:24:59,413 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:24:59,915 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-213ed46d-7488-4d36-8584-2a82a5da0212 Date: Thu, 08 Feb 2018 00:24:59 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:24:59,915 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-213ed46d-7488-4d36-8584-2a82a5da0212 2018-02-08 00:25:02,919 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:25:03,415 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-583f1e68-61b0-419a-9d28-0d9d8d269c03 Date: Thu, 08 Feb 2018 00:25:03 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:24:27Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:03,415 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-583f1e68-61b0-419a-9d28-0d9d8d269c03 2018-02-08 00:25:06,420 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}0bb755d114305a3c8aa4002f21cc9b0ee14a9f85" 2018-02-08 00:25:07,273 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1667 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-5319b767-b1cf-49dc-8273-3503e75b2a24 Date: Thu, 08 Feb 2018 00:25:07 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": "2018-02-08T00:19:57.000000", "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-08T00:25:05Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:07,274 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-5319b767-b1cf-49dc-8273-3503e75b2a24 2018-02-08 00:25:07,274 - sfc.lib.utils- DEBUG - Adding 'client' to security group '64ad2624-2b18-410d-a765-4a03e69ada6d'... 2018-02-08 00:25:07,274 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:25:07,282 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:25:07 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-86e0c38e-be1e-4e30-b58e-82ce2ed7c856 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:25:07,282 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-86e0c38e-be1e-4e30-b58e-82ce2ed7c856 2018-02-08 00:25:07,283 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:25:07,466 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:25:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["OV_-Jkw0RpyX_uwXIRDUDA"], "issued_at": "2018-02-08T00:25:07.000000Z"}} 2018-02-08 00:25:07,467 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b/action -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b46ccb415aa50bb707fa0dcb9ee2d05d1b69c0ca" -d '{"addSecurityGroup": {"name": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:25:09,057 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 0 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-3d431323-aacd-4bbe-8785-53f4b009467e Date: Thu, 08 Feb 2018 00:25:09 GMT 2018-02-08 00:25:09,057 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b/action used request id req-3d431323-aacd-4bbe-8785-53f4b009467e 2018-02-08 00:25:09,057 - sfc.lib.utils- INFO - Creating instance 'server'... 2018-02-08 00:25:09,057 - sfc.lib.utils- DEBUG - Configuration: name=server flavor=custom image=7e82a2e9-6cf5-43d1-86e7-aa51f5added3 network=0312aff9-1e91-4c0f-b239-b3b07aa50fac secgroup=64ad2624-2b18-410d-a765-4a03e69ada6d hypervisor=nova::overcloud-novacompute-0.opnfvlf.org fixed_ip=None files=None userdata= None 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:25:09,058 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:25:09,059 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:25:09,060 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:25:09,060 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:25:09,060 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:25:09,060 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-08 00:25:09,063 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-08 00:25:09,064 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-08 00:25:09,065 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-08 00:25:09,065 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-08 00:25:09,065 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-08 00:25:09,065 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-08 00:25:09,065 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-08 00:25:09,068 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:25:09,074 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:25:09 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-542bb250-84e0-4917-bb8d-2e92ccca4352 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:25:09,075 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-542bb250-84e0-4917-bb8d-2e92ccca4352 2018-02-08 00:25:09,075 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:25:09,315 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["Y3XTsse2Qya7NNUCmkT-lg"], "issued_at": "2018-02-08T00:25:09.000000Z"}} 2018-02-08 00:25:09,316 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/flavors -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}44f3c377f54493a591ca0e34dd25184e8dc2eda5" 2018-02-08 00:25:09,557 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 574 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-693b46d0-47ad-450b-bca3-b0bb34f56616 Date: Thu, 08 Feb 2018 00:25:09 GMT RESP BODY: {"flavors": [{"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}], "name": "custom"}, {"id": "d582e074-773e-49df-9ab0-8978b6d77335", "links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/d582e074-773e-49df-9ab0-8978b6d77335", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/d582e074-773e-49df-9ab0-8978b6d77335", "rel": "bookmark"}], "name": "m1.tiny"}]} 2018-02-08 00:25:09,557 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/flavors used request id req-693b46d0-47ad-450b-bca3-b0bb34f56616 2018-02-08 00:25:09,559 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}44f3c377f54493a591ca0e34dd25184e8dc2eda5" 2018-02-08 00:25:09,583 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 462 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-b5a39e43-ff7b-4256-8fd9-099a0f744a64 Date: Thu, 08 Feb 2018 00:25:09 GMT RESP BODY: {"flavor": {"links": [{"href": "http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "self"}, {"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}], "ram": 1500, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "name": "custom", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2018-02-08 00:25:09,583 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09 used request id req-b5a39e43-ff7b-4256-8fd9-099a0f744a64 2018-02-08 00:25:09,584 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:8774/v2.1/servers -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}44f3c377f54493a591ca0e34dd25184e8dc2eda5" -d '{"server": {"name": "server", "imageRef": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "availability_zone": "nova::overcloud-novacompute-0.opnfvlf.org", "flavorRef": "b743f505-1c9a-48c5-becf-e084e31a9b09", "max_count": 1, "min_count": 1, "networks": [{"uuid": "0312aff9-1e91-4c0f-b239-b3b07aa50fac"}]}}' 2018-02-08 00:25:11,224 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 374 Location: http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-02d89054-1fd7-4cbb-88f7-a13ab769b697 Date: Thu, 08 Feb 2018 00:25:11 GMT RESP BODY: {"server": {"security_groups": [{"name": "default"}], "OS-DCF:diskConfig": "MANUAL", "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "adminPass": "SCmaydb64jwh"}} 2018-02-08 00:25:11,224 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.28:8774/v2.1/servers used request id req-02d89054-1fd7-4cbb-88f7-a13ab769b697 2018-02-08 00:25:11,225 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:25:11,232 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:25:11 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-3dae3742-e133-45f3-8a9c-c7f5cf799f0c Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:25:11,232 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-3dae3742-e133-45f3-8a9c-c7f5cf799f0c 2018-02-08 00:25:11,232 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:25:11,387 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:25:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["w-ShCD5oTg2SezufxPe85g"], "issued_at": "2018-02-08T00:25:11.000000Z"}} 2018-02-08 00:25:11,388 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:11,958 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1344 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-4a359b96-4297-40b3-ac50-4b6861fcf4ec Date: Thu, 08 Feb 2018 00:25:11 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "scheduling", "addresses": {}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:25:11Z", "hostId": "", "OS-EXT-SRV-ATTR:host": null, "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:11,958 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-4a359b96-4297-40b3-ac50-4b6861fcf4ec 2018-02-08 00:25:14,962 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:15,484 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1523 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-e0f7f177-9b84-4302-b462-a753ab2e3655 Date: Thu, 08 Feb 2018 00:25:15 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:25:12Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:15,484 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-e0f7f177-9b84-4302-b462-a753ab2e3655 2018-02-08 00:25:18,488 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:19,276 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-1562f8f3-6468-4498-b6a8-205076a3bd5b Date: Thu, 08 Feb 2018 00:25:19 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:98:69:36", "version": 4, "addr": "11.0.0.14", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:25:12Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:19,276 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-1562f8f3-6468-4498-b6a8-205076a3bd5b 2018-02-08 00:25:22,280 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:22,798 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-89a0f3c1-d532-4d93-b84f-1a348bbaece1 Date: Thu, 08 Feb 2018 00:25:22 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:98:69:36", "version": 4, "addr": "11.0.0.14", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:25:12Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:22,798 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-89a0f3c1-d532-4d93-b84f-1a348bbaece1 2018-02-08 00:25:25,802 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:26,547 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-e4949164-0ea7-4d9a-8235-acd0958bd3dc Date: Thu, 08 Feb 2018 00:25:26 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:98:69:36", "version": 4, "addr": "11.0.0.14", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:25:12Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:26,547 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-e4949164-0ea7-4d9a-8235-acd0958bd3dc 2018-02-08 00:25:29,551 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:30,183 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-68a0b039-b842-4dc3-885b-47af11a16078 Date: Thu, 08 Feb 2018 00:25:30 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:98:69:36", "version": 4, "addr": "11.0.0.14", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": null, "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-08T00:25:12Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:30,183 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-68a0b039-b842-4dc3-885b-47af11a16078 2018-02-08 00:25:33,188 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}41870962de7db2f5e5e0dcfd5eb99b8970caefc2" 2018-02-08 00:25:33,677 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1668 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-7ad7a582-0371-4aac-b0d8-a70722ce6e97 Date: Thu, 08 Feb 2018 00:25:33 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:98:69:36", "version": 4, "addr": "11.0.0.14", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": "2018-02-08T00:20:23.000000", "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-08T00:25:30Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:33,677 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-7ad7a582-0371-4aac-b0d8-a70722ce6e97 2018-02-08 00:25:33,677 - sfc.lib.utils- DEBUG - Adding 'server' to security group '64ad2624-2b18-410d-a765-4a03e69ada6d'... 2018-02-08 00:25:33,678 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88/action -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b46ccb415aa50bb707fa0dcb9ee2d05d1b69c0ca" -d '{"addSecurityGroup": {"name": "64ad2624-2b18-410d-a765-4a03e69ada6d"}}' 2018-02-08 00:25:35,268 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 0 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-40d62cbf-4968-4926-bac8-7a808f66e847 Date: Thu, 08 Feb 2018 00:25:35 GMT 2018-02-08 00:25:35,268 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88/action used request id req-40d62cbf-4968-4926-bac8-7a808f66e847 2018-02-08 00:25:35,270 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}72d146da14a06589a43417049886731540539d27" 2018-02-08 00:25:35,926 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1691 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-d387d352-2e76-426c-9199-253265bd2650 Date: Thu, 08 Feb 2018 00:25:35 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:87:15:04", "version": 4, "addr": "11.0.0.7", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/679ab492-23ea-44bb-a564-1191f6b98d1b", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000101", "OS-SRV-USG:launched_at": "2018-02-08T00:19:57.000000", "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "679ab492-23ea-44bb-a564-1191f6b98d1b", "security_groups": [{"name": "example-sg"}, {"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-08T00:25:05Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-08T00:24:25Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:35,926 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/679ab492-23ea-44bb-a564-1191f6b98d1b used request id req-d387d352-2e76-426c-9199-253265bd2650 2018-02-08 00:25:35,927 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - Client instance received private ip [11.0.0.7] 2018-02-08 00:25:35,928 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}44f3c377f54493a591ca0e34dd25184e8dc2eda5" 2018-02-08 00:25:36,573 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1692 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-0cd050a9-5072-464c-895d-62e71f3b41a0 Date: Thu, 08 Feb 2018 00:25:36 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:98:69:36", "version": 4, "addr": "11.0.0.14", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "self"}, {"href": "http://172.30.9.28:8774/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88", "rel": "bookmark"}], "image": {"id": "7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "links": [{"href": "http://172.30.9.28:8774/images/7e82a2e9-6cf5-43d1-86e7-aa51f5added3", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000104", "OS-SRV-USG:launched_at": "2018-02-08T00:20:23.000000", "flavor": {"id": "b743f505-1c9a-48c5-becf-e084e31a9b09", "links": [{"href": "http://172.30.9.28:8774/flavors/b743f505-1c9a-48c5-becf-e084e31a9b09", "rel": "bookmark"}]}, "id": "84b51a10-a8d8-439e-9a81-a3d7060bcf88", "security_groups": [{"name": "example-sg"}, {"name": "default"}], "user_id": "c31cd483df8441d7aafbf66f54adb5b2", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-08T00:25:30Z", "hostId": "0b7add89b143488872e8b68f8b7308c7e48257ca65e380ae926b2bba", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-08T00:25:11Z", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-08 00:25:36,573 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.28:8774/v2.1/servers/84b51a10-a8d8-439e-9a81-a3d7060bcf88 used request id req-0cd050a9-5072-464c-895d-62e71f3b41a0 2018-02-08 00:25:36,574 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - Server instance received private ip [11.0.0.14] 2018-02-08 00:25:36,575 - sfc.lib.openstack_tacker- INFO - VIM template: {u'vim': {u'auth_cred': {u'username': u'admin', u'user_domain_name': u'Default', u'password': u'xXTQuXpJutXGKKnXvMtv2GDPY', u'user_id': u''}, u'auth_url': u'http://172.30.9.28:5000/v3', u'type': u'openstack', u'vim_project': {u'project_domain_name': u'Default', u'id': u'', u'name': u'admin'}, u'name': u'test-vim'}} 2018-02-08 00:25:36,576 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-08 00:25:36,584 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 08 Feb 2018 00:25:36 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-1ada88ed-552a-4cdc-bed8-90303456b98e Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.28:5000/v3/", "rel": "self"}]}} 2018-02-08 00:25:36,584 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.28:5000/v3 used request id req-1ada88ed-552a-4cdc-bed8-90303456b98e 2018-02-08 00:25:36,584 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.28:5000/v3/auth/tokens 2018-02-08 00:25:36,746 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "a6f6d3881c9e45a0a855961803686856", "name": "admin"}], "expires_at": "2018-02-08T01:25:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3b86644ae842461fa36c6e3c5b2938b5", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://192.30.9.5:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "0cb711f511ac436da6859017e7f2eeb1"}, {"url": "http://192.30.9.5:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6000a6a4791340eaac0f01324d55ec35"}, {"url": "http://172.30.9.28:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b967300ed8164e4c932b8d08597efc93"}], "type": "metering", "id": "0e6ae759abf5472eb914949c259e6e80", "name": "ceilometer"}, {"endpoints": [{"url": "http://192.30.9.5:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1c63bff1aa554b16ae3099cd1b312ec2"}, {"url": "http://192.30.9.5:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6d51c497a7c54d36825a6ba8b7dab9e1"}, {"url": "http://172.30.9.28:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "82733acfab2342d4957d3dd1e9579323"}], "type": "cloudformation", "id": "2674102520304b57bedda884b637bd68", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.5:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4e8a23e0cdb043d589ebda61d9bb26d0"}, {"url": "http://192.30.9.5:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "95c4fcedffdb452dbe2d3bd4c662367d"}, {"url": "http://172.30.9.28:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c4c5bd0c4791460cbd81b8ba72c036a6"}], "type": "alarming", "id": "52042bb3a7464b0dacea82221caf9f90", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.5:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "72e41c5237f64ce7a8bd73ec1c10c969"}, {"url": "http://172.30.9.28:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d10312144d784cdfbf1907ed17281da5"}, {"url": "http://192.30.9.5:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "e5b6184bb48f4d70938325260878e35c"}], "type": "network", "id": "68fd6c4ffffc4fadab985b10d0d6ccef", "name": "neutron"}, {"endpoints": [{"url": "http://192.30.9.5:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "156a5b0c9f85437db194de5c2ddae32d"}, {"url": "http://172.30.9.28:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "4ddd5e1d5a794f4d92667b8b9f188e78"}, {"url": "http://192.30.9.5:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "cf9f6f3298b44e85a301f191bf4b14ee"}], "type": "policy", "id": "7500f7ddebbb4b0b97c8a6f61da7f809", "name": "congress"}, {"endpoints": [{"url": "http://192.30.9.5:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "1e63e759642d4ebd853cfedec1eb7193"}, {"url": "http://172.30.9.28:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3bd6026e808b48aebfa51841c4081afe"}, {"url": "http://192.30.9.5:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "674d835d2b774e27841dedd5d998097a"}], "type": "identity", "id": "883862e3245d4c69bb3e500f551ff6fa", "name": "keystone"}, {"endpoints": [{"url": "http://192.30.9.5:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "042ef3b4591545ad8c360297d5958e07"}, {"url": "http://172.30.9.28:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b008877b83004b6ba82056aea6005f4c"}, {"url": "http://192.30.9.5:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "cb381fd314e24de4ab3705b5d3fec0ae"}], "type": "placement", "id": "8e6ed50deb974cc1b868740c61462b07", "name": "placement"}, {"endpoints": [{"url": "http://172.30.9.28:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "28cda7c499254ceb91a61d8ac05e2e4f"}, {"url": "http://192.30.9.5:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4a0214d3f2e14dd892ed4ab8b3812621"}, {"url": "http://192.30.9.5:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "99951d902aab49dcaf54ff11ef50037e"}], "type": "nfv-orchestration", "id": "aeeeb8a35b154b02ba2b83395fcd466b", "name": "tacker"}, {"endpoints": [{"url": "http://172.30.9.28:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2b79b02f4e6644af97a1bda8d9f63c08"}, {"url": "http://192.30.9.5:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "50654a68cfc24409b44e40a832603fa7"}, {"url": "http://192.30.9.5:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "5bd1daaeedd142338f2838ae406c47a7"}], "type": "metric", "id": "b48fceb31fcb4732bc2a1bbd3518d48a", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "57b49536908b4615ad8267177f2c7e18"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "7382f34a497a422bac64ac2375e7049e"}, {"url": "http://192.30.9.5:8776/v2/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e780e416ef554751800d7199d53a8c3d"}], "type": "volumev2", "id": "b6af315ddb554c5da8ba0cf8e40179f7", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.9.28:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2c4a222b0fea4a888ec3c4f179572bb9"}, {"url": "http://192.30.9.5:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "533c219f4e664e619eae53fac14df6be"}, {"url": "http://192.30.9.5:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e8b74efa34a94f8daa33b11609b8d486"}], "type": "image", "id": "c0770e1d86dd4aff8ac1145ab7df1178", "name": "glance"}, {"endpoints": [{"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "53f0a783b59249fcb3829ba57bdf0a7c"}, {"url": "http://172.30.9.28:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "641ea360060a404ab9eae51ef64ebe2e"}, {"url": "http://192.30.9.5:8004/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "9eb18940cf864e11abccf3263594e168"}], "type": "orchestration", "id": "c36a610642094257ae183ac62ef42d38", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.5:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "75ef980c964d4e1599dff5e3b11eaced"}, {"url": "http://172.30.9.28:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a30e5261565d479191cf9021083c9c66"}, {"url": "http://192.30.9.5:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "f5d0e106da4c473083a0cb0a293b1c46"}], "type": "compute", "id": "cc4f3bdc156849df9292ae50b0e57347", "name": "nova"}, {"endpoints": [{"url": "http://172.30.9.28:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "2f39a5db8465416286aada5e60740bd9"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "87c795d1098a4982a83983371dbeb33b"}, {"url": "http://192.30.9.5:8776/v3/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "8e760454f17149c8a1aa9673e0c5a2e8"}], "type": "volumev3", "id": "ea4ea29b5b594493a3a35592cef416c6", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "39dabafa03a24de7a32af8aa482cb28f"}, {"url": "http://172.30.9.28:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "3c5fcb714d604848a732465a235cf070"}, {"url": "http://192.30.9.5:8776/v1/3b86644ae842461fa36c6e3c5b2938b5", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "927bbe7badb747249449bed4466d8f9b"}], "type": "volume", "id": "fd893bda7643442a97022fabb711da6e", "name": "cinder"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "c31cd483df8441d7aafbf66f54adb5b2"}, "audit_ids": ["djkBOAZ8TD-vKnuwkPHCjQ"], "issued_at": "2018-02-08T00:25:36.000000Z"}} 2018-02-08 00:25:36,747 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9890/v1.0/vims.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" -d '{"vim": {"auth_cred": {"username": "admin", "user_domain_name": "Default", "password": "xXTQuXpJutXGKKnXvMtv2GDPY", "user_id": ""}, "auth_url": "http://172.30.9.28:5000/v3", "type": "openstack", "vim_project": {"project_domain_name": "Default", "id": "", "name": "admin"}, "name": "test-vim"}}' 2018-02-08 00:25:37,571 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 773 X-Openstack-Request-Id: req-da681b2c-67ce-44e6-8298-7d96d6fcc3df Date: Thu, 08 Feb 2018 00:25:37 GMT RESP BODY: {"vim": {"status": "REACHABLE", "description": "", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08 00:25:37.381413", "updated_at": null, "name": "test-vim", "is_default": false, "auth_url": "http://172.30.9.28:5000/v3", "placement_attr": {"regions": ["regionOne", "tempest-region-1148922781", "tempest-region-1257396706", "tempest-region-1612659325", "tempest-region-183423155"]}, "auth_cred": {"username": "admin", "project_name": "admin", "user_id": "", "user_domain_name": "Default", "project_id": "", "auth_url": "http://172.30.9.28:5000/v3", "password": "***", "project_domain_name": "Default"}, "type": "openstack", "id": "a97503e3-0afe-4f24-b7b9-995f11540d43", "vim_project": {"id": "", "name": "admin", "project_domain_name": "Default"}}} 2018-02-08 00:25:37,571 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vims.json used request id req-da681b2c-67ce-44e6-8298-7d96d6fcc3df 2018-02-08 00:25:37,572 - sfc.lib.openstack_tacker- INFO - VNFD template: --- tosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0 description: firewall1-example metadata: template_name: test-vnfd1 topology_template: inputs: zone: type: string node_templates: VDU1: type: tosca.nodes.nfv.VDU.Tacker capabilities: nfv_compute: properties: num_cpus: 1 mem_size: 2 GB disk_size: 10 GB properties: image: sfc_nsh_euphrates availability_zone: {get_input: zone} mgmt_driver: noop config: | param0: key1 param1: key2 service_type: firewall monitoring_policy: name: ping parameters: monitoring_delay: 10 count: 3 interval: 2 timeout: 2 action: failure: respawn retry: 5 port: 22 CP1: type: tosca.nodes.nfv.CP.Tacker properties: management: true order: 0 anti_spoofing_protection: false requirements: - virtualLink: node: VL1 - virtualBinding: node: VDU1 VL1: type: tosca.nodes.nfv.VL properties: network_name: example-net vendor: Tacker 2018-02-08 00:25:37,573 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9890/v1.0/vnfds.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" -d '{"vnfd": {"attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall1-example\nmetadata:\n template_name: test-vnfd1\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key1\n param1: key2\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "service_types": [{"service_type": "vnfd"}], "name": "test-vnfd1"}}' 2018-02-08 00:25:38,080 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 1633 X-Openstack-Request-Id: req-e16e0c81-7db2-4681-9b1d-2f531a090344 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vnfd": {"template_source": "onboarded", "service_types": ["vnfd"], "description": "firewall1-example", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08 00:25:38.007924", "updated_at": null, "attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall1-example\nmetadata:\n template_name: test-vnfd1\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key1\n param1: key2\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "id": "ec6128c4-5ecd-4692-bf04-d9781d2082fb", "name": "test-vnfd1"}} 2018-02-08 00:25:38,080 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfds.json used request id req-e16e0c81-7db2-4681-9b1d-2f531a090344 2018-02-08 00:25:38,081 - sfc.lib.openstack_tacker- INFO - VNFD template: --- tosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0 description: firewall2-example metadata: template_name: test-vnfd2 topology_template: inputs: zone: type: string node_templates: VDU1: type: tosca.nodes.nfv.VDU.Tacker capabilities: nfv_compute: properties: num_cpus: 1 mem_size: 2 GB disk_size: 10 GB properties: image: sfc_nsh_euphrates availability_zone: {get_input: zone} mgmt_driver: noop config: | param0: key0 param1: key1 service_type: firewall monitoring_policy: name: ping parameters: monitoring_delay: 10 count: 3 interval: 2 timeout: 2 action: failure: respawn retry: 5 port: 22 CP1: type: tosca.nodes.nfv.CP.Tacker properties: management: true order: 0 anti_spoofing_protection: false requirements: - virtualLink: node: VL1 - virtualBinding: node: VDU1 VL1: type: tosca.nodes.nfv.VL properties: network_name: example-net vendor: Tacker 2018-02-08 00:25:38,082 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9890/v1.0/vnfds.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" -d '{"vnfd": {"attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall2-example\nmetadata:\n template_name: test-vnfd2\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key0\n param1: key1\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "service_types": [{"service_type": "vnfd"}], "name": "test-vnfd2"}}' 2018-02-08 00:25:38,625 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 1633 X-Openstack-Request-Id: req-d2527312-26a3-42c0-b6e9-888dbb2544b3 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vnfd": {"template_source": "onboarded", "service_types": ["vnfd"], "description": "firewall2-example", "tenant_id": "3b86644ae842461fa36c6e3c5b2938b5", "created_at": "2018-02-08 00:25:38.519761", "updated_at": null, "attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall2-example\nmetadata:\n template_name: test-vnfd2\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key0\n param1: key1\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "id": "6559e9a5-815f-4879-a9b6-37f807d78746", "name": "test-vnfd2"}} 2018-02-08 00:25:38,626 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfds.json used request id req-d2527312-26a3-42c0-b6e9-888dbb2544b3 2018-02-08 00:25:38,627 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfds.json?fields=id&name=test-vnfd1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:38,642 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 59 X-Openstack-Request-Id: req-1ebce171-95cc-4346-bf38-5aef3516938c Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vnfds": [{"id": "ec6128c4-5ecd-4692-bf04-d9781d2082fb"}]} 2018-02-08 00:25:38,642 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfds.json?fields=id&name=test-vnfd1 used request id req-1ebce171-95cc-4346-bf38-5aef3516938c 2018-02-08 00:25:38,643 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vims.json?fields=id&name=test-vim -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:38,655 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 58 X-Openstack-Request-Id: req-b527afdd-25c5-487a-ba92-10923ce4e8d7 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vims": [{"id": "a97503e3-0afe-4f24-b7b9-995f11540d43"}]} 2018-02-08 00:25:38,655 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vims.json?fields=id&name=test-vim used request id req-b527afdd-25c5-487a-ba92-10923ce4e8d7 2018-02-08 00:25:38,656 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9890/v1.0/vnfs.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" -d '{"vnf": {"attributes": {"param_values": "{\"zone\": \"nova::overcloud-novacompute-0.opnfvlf.org\"}"}, "vim_id": "a97503e3-0afe-4f24-b7b9-995f11540d43", "name": "testVNF1", "vnfd_id": "ec6128c4-5ecd-4692-bf04-d9781d2082fb"}}' 2018-02-08 00:25:38,686 - keystoneauth.session- DEBUG - RESP: [500] Content-Type: application/json Content-Length: 87 X-Openstack-Request-Id: req-d1407095-cf36-4f2c-a515-7c08095f6892 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-08 00:25:38,687 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json used request id req-d1407095-cf36-4f2c-a515-7c08095f6892 2018-02-08 00:25:38,687 - tackerclient.v1_0.client- DEBUG - Error message: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-08 00:25:38,687 - sfc.lib.openstack_tacker- ERROR - error [create_vnf(tacker_client, 'testVNF1', 'None', 'test-vnfd1')]: Request Failed: internal server error while processing your request. 2018-02-08 00:25:38,688 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfds.json?fields=id&name=test-vnfd2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:38,699 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 59 X-Openstack-Request-Id: req-d3178bf4-ab33-4a31-88d7-9a856e1e1b58 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vnfds": [{"id": "6559e9a5-815f-4879-a9b6-37f807d78746"}]} 2018-02-08 00:25:38,699 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfds.json?fields=id&name=test-vnfd2 used request id req-d3178bf4-ab33-4a31-88d7-9a856e1e1b58 2018-02-08 00:25:38,700 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vims.json?fields=id&name=test-vim -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:38,710 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 58 X-Openstack-Request-Id: req-b6de190a-b573-43c7-9567-d7266e9092ce Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vims": [{"id": "a97503e3-0afe-4f24-b7b9-995f11540d43"}]} 2018-02-08 00:25:38,711 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vims.json?fields=id&name=test-vim used request id req-b6de190a-b573-43c7-9567-d7266e9092ce 2018-02-08 00:25:38,712 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.28:9890/v1.0/vnfs.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" -d '{"vnf": {"attributes": {"param_values": "{\"zone\": \"nova::overcloud-novacompute-0.opnfvlf.org\"}"}, "vim_id": "a97503e3-0afe-4f24-b7b9-995f11540d43", "name": "testVNF2", "vnfd_id": "6559e9a5-815f-4879-a9b6-37f807d78746"}}' 2018-02-08 00:25:38,728 - keystoneauth.session- DEBUG - RESP: [500] Content-Type: application/json Content-Length: 87 X-Openstack-Request-Id: req-eb6d3284-4307-4102-b3e1-0ef7809c2099 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-08 00:25:38,728 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json used request id req-eb6d3284-4307-4102-b3e1-0ef7809c2099 2018-02-08 00:25:38,729 - tackerclient.v1_0.client- DEBUG - Error message: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-08 00:25:38,729 - sfc.lib.openstack_tacker- ERROR - error [create_vnf(tacker_client, 'testVNF2', 'None', 'test-vnfd2')]: Request Failed: internal server error while processing your request. 2018-02-08 00:25:38,730 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:38,738 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-572fee09-9374-407f-9417-7a428fc6b492 Date: Thu, 08 Feb 2018 00:25:38 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:38,738 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-572fee09-9374-407f-9417-7a428fc6b492 2018-02-08 00:25:38,738 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:38,739 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-08 00:25:39,741 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:39,753 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-209e9ed8-b31d-46f2-8522-5b872faf2d70 Date: Thu, 08 Feb 2018 00:25:39 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:39,753 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-209e9ed8-b31d-46f2-8522-5b872faf2d70 2018-02-08 00:25:39,753 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:39,753 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-08 00:25:40,755 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:40,766 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-f85a3e1b-071b-43b9-9e36-ed7779cb88bd Date: Thu, 08 Feb 2018 00:25:40 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:40,766 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-f85a3e1b-071b-43b9-9e36-ed7779cb88bd 2018-02-08 00:25:40,766 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:40,766 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-08 00:25:41,768 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:41,777 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-3f57bf00-f54f-49e7-af7c-e1632813dded Date: Thu, 08 Feb 2018 00:25:41 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:41,778 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-3f57bf00-f54f-49e7-af7c-e1632813dded 2018-02-08 00:25:41,778 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:41,778 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-08 00:25:42,780 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:42,790 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-9215d4d5-9b46-4e70-bf8f-dd4cb65c92b4 Date: Thu, 08 Feb 2018 00:25:42 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:42,790 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-9215d4d5-9b46-4e70-bf8f-dd4cb65c92b4 2018-02-08 00:25:42,790 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:42,790 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-08 00:25:43,793 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:43,802 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-3df58d29-e9fb-4fcc-b490-37d2bbeec407 Date: Thu, 08 Feb 2018 00:25:43 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:43,802 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-3df58d29-e9fb-4fcc-b490-37d2bbeec407 2018-02-08 00:25:43,803 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:43,803 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-08 00:25:44,804 - sfc.lib.openstack_tacker- ERROR - Could not retrieve VNF [vnf_id=None, vnf_name=testVNF1] - Could not retrieve ID from name [testVNF1] 2018-02-08 00:25:44,804 - sfc.lib.openstack_tacker- ERROR - error [wait_for_vnf(tacker_client, 'None', 'testVNF1')]: not enough arguments for format string 2018-02-08 00:25:44,805 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:44,814 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-4fee63ee-1137-4d00-9435-c5825ecc1a2e Date: Thu, 08 Feb 2018 00:25:44 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:44,814 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-4fee63ee-1137-4d00-9435-c5825ecc1a2e 2018-02-08 00:25:44,814 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:44,815 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-08 00:25:45,817 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:45,826 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-9da33891-0348-4283-afe6-6139c7678f62 Date: Thu, 08 Feb 2018 00:25:45 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:45,827 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-9da33891-0348-4283-afe6-6139c7678f62 2018-02-08 00:25:45,827 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:45,827 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-08 00:25:46,829 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:46,839 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-f541bd73-86aa-4f6c-813f-2c03a6a884d4 Date: Thu, 08 Feb 2018 00:25:46 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:46,839 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-f541bd73-86aa-4f6c-813f-2c03a6a884d4 2018-02-08 00:25:46,839 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:46,840 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-08 00:25:47,842 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:47,853 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-412ccf56-5b82-458c-b438-92ef5b0b4ca3 Date: Thu, 08 Feb 2018 00:25:47 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:47,854 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-412ccf56-5b82-458c-b438-92ef5b0b4ca3 2018-02-08 00:25:47,854 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:47,854 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-08 00:25:48,856 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:48,865 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-a8d45fc2-c71e-48fd-8cd4-fa1c957398cd Date: Thu, 08 Feb 2018 00:25:48 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:48,865 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-a8d45fc2-c71e-48fd-8cd4-fa1c957398cd 2018-02-08 00:25:48,866 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:48,866 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-08 00:25:49,868 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}cc6b27e9755002b8359ec5ae0937a8be8985b2e4" 2018-02-08 00:25:49,877 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-af087ffa-e370-41e8-b8d6-dba29b5a4425 Date: Thu, 08 Feb 2018 00:25:49 GMT RESP BODY: {"vnfs": []} 2018-02-08 00:25:49,877 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.28:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-af087ffa-e370-41e8-b8d6-dba29b5a4425 2018-02-08 00:25:49,878 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-08 00:25:49,878 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-08 00:25:50,879 - sfc.lib.openstack_tacker- ERROR - Could not retrieve VNF [vnf_id=None, vnf_name=testVNF2] - Could not retrieve ID from name [testVNF2] 2018-02-08 00:25:50,879 - sfc.lib.openstack_tacker- ERROR - error [wait_for_vnf(tacker_client, 'None', 'testVNF2')]: not enough arguments for format string 2018-02-08 00:25:50,879 - sfc.tests.functest.sfc_one_chain_two_service_functions- ERROR - ERROR while booting vnfs 2018-02-08 00:25:50,948 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,026 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,157 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,249 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,328 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,349 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,427 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,527 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,550 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,650 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,762 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,827 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:51,951 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,028 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,128 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,151 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,250 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,328 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,433 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,551 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,652 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,734 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-08 00:25:52,818 - functest.core.feature - INFO - Test result is stored in '/home/opnfv/functest/results/functest-odl-sfc.log' 2018-02-08 00:26:12,748 - functest.core.feature - INFO - Test result is stored in '/home/opnfv/functest/results/domino-multinode.log'