2018-02-15 18:31:37,816 - paramiko.transport- DEBUG - starting thread (client mode): 0x23887cd0L 2018-02-15 18:31:37,817 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:37,836 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:37,836 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:37,840 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:37,840 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:37,840 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:37,840 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:37,840 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:37,861 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:37,861 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:37,881 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.168.122.232: 05ff74b4badd7cc9c6662187e948a29a 2018-02-15 18:31:37,882 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:37,901 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:37,942 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:37,947 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:38,119 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:38,119 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:38,152 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:41,938 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:41,941 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:41,942 - paramiko.transport- DEBUG - starting thread (client mode): 0x21606a90L 2018-02-15 18:31:41,943 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:41,948 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:41,948 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:41,950 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:41,950 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:41,951 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:41,951 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:41,951 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:41,975 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:41,975 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:41,978 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 2f6e3be67096c7f47e21cb4c66a4c397 2018-02-15 18:31:41,979 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:42,016 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:42,024 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:42,044 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:42,091 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:42,092 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:42,111 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:42,139 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:42,140 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:42,141 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:42,142 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:42,142 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:42,183 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:42,221 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:42,222 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:42,223 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:42,223 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:42,224 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:42,264 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:42,290 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:42,291 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:42,293 - paramiko.transport- DEBUG - starting thread (client mode): 0x215ab150L 2018-02-15 18:31:42,293 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:42,298 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:42,298 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:42,300 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:42,301 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:42,301 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:42,301 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:42,301 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:42,323 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:42,324 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:42,328 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.6: f5ec7f248eff5ade1c8e1c483f8f49c8 2018-02-15 18:31:42,329 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:42,363 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:42,372 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:42,393 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:42,440 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:42,440 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:42,460 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:42,486 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:42,487 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:42,487 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:42,488 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:42,488 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:42,529 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:42,577 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:42,578 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:42,578 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:42,580 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:42,580 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:42,620 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:42,644 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:42,645 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:42,646 - paramiko.transport- DEBUG - starting thread (client mode): 0x215b36d0L 2018-02-15 18:31:42,647 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:42,651 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:42,651 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:42,653 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:42,653 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:42,654 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:42,654 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:42,654 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:42,676 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:42,677 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:42,680 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 7bf8f5f7e21d55dfcfa992c9ce8a50ba 2018-02-15 18:31:42,681 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:42,716 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:42,724 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:42,746 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:42,796 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:42,796 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:42,812 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:42,843 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:42,845 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:42,845 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:42,846 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:42,846 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:42,887 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:42,921 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:42,922 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:42,923 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:42,924 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:42,924 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:42,964 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:42,985 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:42,986 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:42,988 - paramiko.transport- DEBUG - starting thread (client mode): 0x215bb410L 2018-02-15 18:31:42,989 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:42,994 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:42,994 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:42,996 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:42,996 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:42,996 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:42,997 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:42,997 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:43,020 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:43,021 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:43,036 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: d66e9f4828ee6fb640cc36e306167dcf 2018-02-15 18:31:43,037 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:43,059 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:43,069 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:43,070 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:43,134 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:43,134 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:43,174 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:43,202 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:43,203 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:43,203 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:43,204 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:43,204 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:43,245 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:43,280 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:43,282 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:43,282 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:43,283 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:43,283 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:43,324 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:43,350 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:43,351 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:43,353 - paramiko.transport- DEBUG - starting thread (client mode): 0x215c3250L 2018-02-15 18:31:43,353 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:43,359 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:43,359 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:43,362 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:43,362 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:43,362 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:43,362 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:43,362 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:43,383 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:43,384 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:43,388 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.5: 2a9b78394070781e19208dcca0af8a21 2018-02-15 18:31:43,389 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:43,423 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:43,433 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:43,454 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:43,517 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:43,517 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:43,521 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:43,549 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:43,550 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:43,551 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:43,551 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:43,551 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:43,592 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:43,623 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:43,624 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:43,625 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:43,625 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:43,625 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:43,666 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:43,692 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:43,693 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:43,693 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:43,694 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:43,694 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:43,701 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:47,436 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:47,438 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:47,440 - paramiko.transport- DEBUG - starting thread (client mode): 0x2159a210L 2018-02-15 18:31:47,440 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:47,445 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:47,445 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:47,447 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:47,448 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:47,448 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:47,448 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:47,448 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:47,472 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:47,472 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:47,475 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 2f6e3be67096c7f47e21cb4c66a4c397 2018-02-15 18:31:47,476 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:47,513 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:47,522 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:47,540 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:47,588 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:47,588 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:47,607 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:47,636 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:47,637 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:47,638 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:47,638 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:47,638 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:47,679 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:47,704 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:47,705 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:47,706 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:47,706 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:47,706 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:47,747 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:47,772 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:47,773 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:47,775 - paramiko.transport- DEBUG - starting thread (client mode): 0x2150d0d0L 2018-02-15 18:31:47,775 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:47,780 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:47,780 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:47,782 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:47,782 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:47,783 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:47,783 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:47,783 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:47,803 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:47,803 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:47,808 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.6: f5ec7f248eff5ade1c8e1c483f8f49c8 2018-02-15 18:31:47,809 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:47,842 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:47,850 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:47,873 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:47,913 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:47,913 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:47,940 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:47,964 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:47,965 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:47,966 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:47,967 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:47,967 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:48,008 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:48,030 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:48,031 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:48,032 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:48,033 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:48,033 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:48,073 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:48,095 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:48,096 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:48,098 - paramiko.transport- DEBUG - starting thread (client mode): 0x2150ddd0L 2018-02-15 18:31:48,098 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:48,103 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:48,103 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:48,105 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:48,105 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:48,106 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:48,106 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:48,106 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:48,127 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:48,127 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:48,131 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 7bf8f5f7e21d55dfcfa992c9ce8a50ba 2018-02-15 18:31:48,133 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:48,167 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:48,176 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:48,197 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:48,239 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:48,239 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:48,264 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:48,289 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:48,290 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:48,290 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:48,291 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:48,291 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:48,332 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:48,355 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:48,356 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:48,357 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:48,357 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:48,357 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:48,398 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:48,420 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:48,421 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:48,423 - paramiko.transport- DEBUG - starting thread (client mode): 0x2151e610L 2018-02-15 18:31:48,423 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:48,428 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:48,428 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:48,430 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:48,430 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:48,430 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:48,431 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:48,431 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:48,454 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:48,455 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:48,460 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: d66e9f4828ee6fb640cc36e306167dcf 2018-02-15 18:31:48,461 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:48,495 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:48,505 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:48,525 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:48,567 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:48,567 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:48,593 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:48,620 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:48,620 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:48,621 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:48,622 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:48,622 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:48,662 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:48,689 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:48,690 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:48,691 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:48,691 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:48,691 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:48,732 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:48,756 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:48,757 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:48,758 - paramiko.transport- DEBUG - starting thread (client mode): 0x2151ec50L 2018-02-15 18:31:48,758 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:31:48,763 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:31:48,763 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:31:48,766 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:31:48,766 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:31:48,766 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:31:48,766 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:31:48,766 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:31:48,784 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:31:48,784 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:31:48,792 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.5: 2a9b78394070781e19208dcca0af8a21 2018-02-15 18:31:48,793 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:31:48,823 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:31:48,830 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:31:48,857 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:31:48,899 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:31:48,899 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:31:48,924 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:31:48,951 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:31:48,952 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:31:48,953 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:31:48,953 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:31:48,953 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:31:48,995 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:31:49,019 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:31:49,021 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:31:49,021 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:31:49,022 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:31:49,022 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:31:49,062 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:31:49,089 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:31:49,090 - __main__- INFO - Fetch /etc/heat/heat.conf from controller 192.30.9.10 2018-02-15 18:31:49,090 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-15 18:31:49,091 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:31:49,091 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-15 18:31:49,092 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-15 18:31:49,095 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-15 18:31:49,133 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-15 18:31:49,134 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-15 18:31:49,135 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-15 18:31:49,136 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-15 18:31:49,136 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-15 18:31:49,177 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-15 18:31:49,206 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-15 18:31:49,206 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/heat.conf from 192.30.9.10 2018-02-15 18:31:49,207 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-15 18:31:49,208 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-15 18:31:49,209 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-15 18:31:49,209 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-15 18:31:49,249 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-15 18:31:49,273 - paramiko.transport.sftp- INFO - [chan 5] Opened sftp connection (server version 3) 2018-02-15 18:31:49,274 - paramiko.transport.sftp- DEBUG - [chan 5] stat('/home/heat-admin/heat.conf') 2018-02-15 18:31:49,275 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') 2018-02-15 18:31:49,276 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') -> 00000000 2018-02-15 18:31:49,282 - paramiko.transport.sftp- DEBUG - [chan 5] close(00000000) 2018-02-15 18:31:49,283 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.10:/home/heat-admin/heat.conf to /tmp/heat.conf 2018-02-15 18:31:49,283 - __main__- INFO - Replace /etc/heat/heat.conf with /tmp/heat.conf in controller 192.30.9.10 2018-02-15 18:31:49,283 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-15 18:31:49,284 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-15 18:31:49,284 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-15 18:31:49,286 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-15 18:31:49,287 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-15 18:31:49,287 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:49,287 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:49,287 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:49,315 - paramiko.transport- DEBUG - [chan 6] EOF received (6) 2018-02-15 18:31:49,316 - paramiko.transport- DEBUG - [chan 7] Max packet in: 32768 bytes 2018-02-15 18:31:49,316 - paramiko.transport- DEBUG - [chan 6] EOF sent (6) 2018-02-15 18:31:49,317 - paramiko.transport- DEBUG - [chan 7] Max packet out: 32768 bytes 2018-02-15 18:31:49,317 - paramiko.transport- DEBUG - Secsh channel 7 opened. 2018-02-15 18:31:49,358 - paramiko.transport- DEBUG - [chan 7] Sesch channel 7 request ok 2018-02-15 18:31:49,386 - paramiko.transport- DEBUG - [chan 7] EOF received (7) 2018-02-15 18:31:49,386 - opnfv.deployment.manager - INFO - Copying /tmp/heat.conf to 192.30.9.10 2018-02-15 18:31:49,387 - paramiko.transport- DEBUG - [chan 8] Max packet in: 32768 bytes 2018-02-15 18:31:49,387 - paramiko.transport- DEBUG - [chan 7] EOF sent (7) 2018-02-15 18:31:49,388 - paramiko.transport- DEBUG - [chan 8] Max packet out: 32768 bytes 2018-02-15 18:31:49,388 - paramiko.transport- DEBUG - Secsh channel 8 opened. 2018-02-15 18:31:49,429 - paramiko.transport- DEBUG - [chan 8] Sesch channel 8 request ok 2018-02-15 18:31:49,453 - paramiko.transport.sftp- INFO - [chan 8] Opened sftp connection (server version 3) 2018-02-15 18:31:49,453 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') 2018-02-15 18:31:49,454 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') -> 00000000 2018-02-15 18:31:49,457 - paramiko.transport.sftp- DEBUG - [chan 8] close(00000000) 2018-02-15 18:31:49,458 - paramiko.transport.sftp- DEBUG - [chan 8] stat('/home/heat-admin/heat.conf') 2018-02-15 18:31:49,459 - opnfv.deployment.manager - INFO - Successfully copied /tmp/heat.conf to /home/heat-admin/heat.conf:192.30.9.10 2018-02-15 18:31:49,460 - paramiko.transport- DEBUG - [chan 9] Max packet in: 32768 bytes 2018-02-15 18:31:49,460 - paramiko.transport- DEBUG - [chan 9] Max packet out: 32768 bytes 2018-02-15 18:31:49,460 - paramiko.transport- DEBUG - Secsh channel 9 opened. 2018-02-15 18:31:49,463 - paramiko.transport- DEBUG - [chan 8] EOF sent (8) 2018-02-15 18:31:49,463 - paramiko.transport- DEBUG - [chan 9] Sesch channel 9 request ok 2018-02-15 18:31:49,464 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:49,464 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:49,465 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:49,496 - paramiko.transport- DEBUG - [chan 9] EOF received (9) 2018-02-15 18:31:49,496 - __main__- INFO - Restart heat-engine in 192.30.9.10 2018-02-15 18:31:49,497 - paramiko.transport- DEBUG - [chan 10] Max packet in: 32768 bytes 2018-02-15 18:31:49,497 - paramiko.transport- DEBUG - [chan 9] EOF sent (9) 2018-02-15 18:31:49,498 - paramiko.transport- DEBUG - [chan 10] Max packet out: 32768 bytes 2018-02-15 18:31:49,498 - paramiko.transport- DEBUG - Secsh channel 10 opened. 2018-02-15 18:31:49,539 - paramiko.transport- DEBUG - [chan 10] Sesch channel 10 request ok 2018-02-15 18:31:49,716 - paramiko.transport- DEBUG - [chan 10] EOF received (10) 2018-02-15 18:31:49,716 - __main__- INFO - Fetch /etc/heat/heat.conf from controller 192.30.9.8 2018-02-15 18:31:49,717 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-15 18:31:49,718 - paramiko.transport- DEBUG - [chan 10] EOF sent (10) 2018-02-15 18:31:49,718 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-15 18:31:49,719 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-15 18:31:49,722 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-15 18:31:49,760 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-15 18:31:49,761 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-15 18:31:49,762 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-15 18:31:49,763 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-15 18:31:49,763 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-15 18:31:49,803 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-15 18:31:49,833 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-15 18:31:49,833 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/heat.conf from 192.30.9.8 2018-02-15 18:31:49,834 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-15 18:31:49,835 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-15 18:31:49,874 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-15 18:31:49,875 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-15 18:31:49,900 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-15 18:31:49,925 - paramiko.transport.sftp- INFO - [chan 5] Opened sftp connection (server version 3) 2018-02-15 18:31:49,925 - paramiko.transport.sftp- DEBUG - [chan 5] stat('/home/heat-admin/heat.conf') 2018-02-15 18:31:49,927 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') 2018-02-15 18:31:49,928 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') -> 00000000 2018-02-15 18:31:49,936 - paramiko.transport.sftp- DEBUG - [chan 5] close(00000000) 2018-02-15 18:31:49,937 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.8:/home/heat-admin/heat.conf to /tmp/heat.conf 2018-02-15 18:31:49,938 - __main__- INFO - Replace /etc/heat/heat.conf with /tmp/heat.conf in controller 192.30.9.8 2018-02-15 18:31:49,938 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-15 18:31:49,939 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-15 18:31:49,939 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-15 18:31:49,941 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-15 18:31:49,941 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-15 18:31:49,942 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:49,942 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:49,943 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:49,972 - paramiko.transport- DEBUG - [chan 6] EOF received (6) 2018-02-15 18:31:49,972 - paramiko.transport- DEBUG - [chan 7] Max packet in: 32768 bytes 2018-02-15 18:31:49,973 - paramiko.transport- DEBUG - [chan 6] EOF sent (6) 2018-02-15 18:31:49,974 - paramiko.transport- DEBUG - [chan 7] Max packet out: 32768 bytes 2018-02-15 18:31:49,974 - paramiko.transport- DEBUG - Secsh channel 7 opened. 2018-02-15 18:31:50,016 - paramiko.transport- DEBUG - [chan 7] Sesch channel 7 request ok 2018-02-15 18:31:50,045 - paramiko.transport- DEBUG - [chan 7] EOF received (7) 2018-02-15 18:31:50,045 - opnfv.deployment.manager - INFO - Copying /tmp/heat.conf to 192.30.9.8 2018-02-15 18:31:50,046 - paramiko.transport- DEBUG - [chan 8] Max packet in: 32768 bytes 2018-02-15 18:31:50,046 - paramiko.transport- DEBUG - [chan 7] EOF sent (7) 2018-02-15 18:31:50,047 - paramiko.transport- DEBUG - [chan 8] Max packet out: 32768 bytes 2018-02-15 18:31:50,048 - paramiko.transport- DEBUG - Secsh channel 8 opened. 2018-02-15 18:31:50,088 - paramiko.transport- DEBUG - [chan 8] Sesch channel 8 request ok 2018-02-15 18:31:50,113 - paramiko.transport.sftp- INFO - [chan 8] Opened sftp connection (server version 3) 2018-02-15 18:31:50,114 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') 2018-02-15 18:31:50,114 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') -> 00000000 2018-02-15 18:31:50,118 - paramiko.transport.sftp- DEBUG - [chan 8] close(00000000) 2018-02-15 18:31:50,119 - paramiko.transport.sftp- DEBUG - [chan 8] stat('/home/heat-admin/heat.conf') 2018-02-15 18:31:50,120 - opnfv.deployment.manager - INFO - Successfully copied /tmp/heat.conf to /home/heat-admin/heat.conf:192.30.9.8 2018-02-15 18:31:50,120 - paramiko.transport- DEBUG - [chan 9] Max packet in: 32768 bytes 2018-02-15 18:31:50,121 - paramiko.transport- DEBUG - [chan 9] Max packet out: 32768 bytes 2018-02-15 18:31:50,121 - paramiko.transport- DEBUG - Secsh channel 9 opened. 2018-02-15 18:31:50,123 - paramiko.transport- DEBUG - [chan 8] EOF sent (8) 2018-02-15 18:31:50,123 - paramiko.transport- DEBUG - [chan 9] Sesch channel 9 request ok 2018-02-15 18:31:50,124 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:50,124 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:50,124 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:50,155 - paramiko.transport- DEBUG - [chan 9] EOF received (9) 2018-02-15 18:31:50,155 - __main__- INFO - Restart heat-engine in 192.30.9.8 2018-02-15 18:31:50,156 - paramiko.transport- DEBUG - [chan 10] Max packet in: 32768 bytes 2018-02-15 18:31:50,156 - paramiko.transport- DEBUG - [chan 9] EOF sent (9) 2018-02-15 18:31:50,157 - paramiko.transport- DEBUG - [chan 10] Max packet out: 32768 bytes 2018-02-15 18:31:50,157 - paramiko.transport- DEBUG - Secsh channel 10 opened. 2018-02-15 18:31:50,198 - paramiko.transport- DEBUG - [chan 10] Sesch channel 10 request ok 2018-02-15 18:31:50,393 - paramiko.transport- DEBUG - [chan 10] EOF received (10) 2018-02-15 18:31:50,394 - __main__- INFO - Fetch /etc/heat/heat.conf from controller 192.30.9.5 2018-02-15 18:31:50,394 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-15 18:31:50,395 - paramiko.transport- DEBUG - [chan 10] EOF sent (10) 2018-02-15 18:31:50,395 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-15 18:31:50,396 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-15 18:31:50,398 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-15 18:31:50,441 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-15 18:31:50,441 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-15 18:31:50,442 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-15 18:31:50,443 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-15 18:31:50,443 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-15 18:31:50,485 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-15 18:31:50,518 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-15 18:31:50,518 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/heat.conf from 192.30.9.5 2018-02-15 18:31:50,519 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-15 18:31:50,519 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-15 18:31:50,520 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-15 18:31:50,520 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-15 18:31:50,560 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-15 18:31:50,587 - paramiko.transport.sftp- INFO - [chan 5] Opened sftp connection (server version 3) 2018-02-15 18:31:50,587 - paramiko.transport.sftp- DEBUG - [chan 5] stat('/home/heat-admin/heat.conf') 2018-02-15 18:31:50,588 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') 2018-02-15 18:31:50,589 - paramiko.transport.sftp- DEBUG - [chan 5] open('/home/heat-admin/heat.conf', 'rb') -> 00000000 2018-02-15 18:31:50,595 - paramiko.transport.sftp- DEBUG - [chan 5] close(00000000) 2018-02-15 18:31:50,596 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.5:/home/heat-admin/heat.conf to /tmp/heat.conf 2018-02-15 18:31:50,596 - __main__- INFO - Replace /etc/heat/heat.conf with /tmp/heat.conf in controller 192.30.9.5 2018-02-15 18:31:50,597 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-15 18:31:50,597 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-15 18:31:50,598 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-15 18:31:50,600 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-15 18:31:50,600 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-15 18:31:50,601 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:50,601 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:50,601 - paramiko.transport- DEBUG - Ignoring message for dead channel 5 2018-02-15 18:31:50,632 - paramiko.transport- DEBUG - [chan 6] EOF received (6) 2018-02-15 18:31:50,633 - paramiko.transport- DEBUG - [chan 7] Max packet in: 32768 bytes 2018-02-15 18:31:50,633 - paramiko.transport- DEBUG - [chan 6] EOF sent (6) 2018-02-15 18:31:50,634 - paramiko.transport- DEBUG - [chan 7] Max packet out: 32768 bytes 2018-02-15 18:31:50,634 - paramiko.transport- DEBUG - Secsh channel 7 opened. 2018-02-15 18:31:50,676 - paramiko.transport- DEBUG - [chan 7] Sesch channel 7 request ok 2018-02-15 18:31:50,708 - paramiko.transport- DEBUG - [chan 7] EOF received (7) 2018-02-15 18:31:50,708 - opnfv.deployment.manager - INFO - Copying /tmp/heat.conf to 192.30.9.5 2018-02-15 18:31:50,708 - paramiko.transport- DEBUG - [chan 7] EOF sent (7) 2018-02-15 18:31:50,709 - paramiko.transport- DEBUG - [chan 8] Max packet in: 32768 bytes 2018-02-15 18:31:50,749 - paramiko.transport- DEBUG - [chan 8] Max packet out: 32768 bytes 2018-02-15 18:31:50,749 - paramiko.transport- DEBUG - Secsh channel 8 opened. 2018-02-15 18:31:50,775 - paramiko.transport- DEBUG - [chan 8] Sesch channel 8 request ok 2018-02-15 18:31:50,801 - paramiko.transport.sftp- INFO - [chan 8] Opened sftp connection (server version 3) 2018-02-15 18:31:50,801 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') 2018-02-15 18:31:50,802 - paramiko.transport.sftp- DEBUG - [chan 8] open('/home/heat-admin/heat.conf', 'wb') -> 00000000 2018-02-15 18:31:50,805 - paramiko.transport.sftp- DEBUG - [chan 8] close(00000000) 2018-02-15 18:31:50,806 - paramiko.transport.sftp- DEBUG - [chan 8] stat('/home/heat-admin/heat.conf') 2018-02-15 18:31:50,807 - opnfv.deployment.manager - INFO - Successfully copied /tmp/heat.conf to /home/heat-admin/heat.conf:192.30.9.5 2018-02-15 18:31:50,808 - paramiko.transport- DEBUG - [chan 9] Max packet in: 32768 bytes 2018-02-15 18:31:50,808 - paramiko.transport- DEBUG - [chan 9] Max packet out: 32768 bytes 2018-02-15 18:31:50,809 - paramiko.transport- DEBUG - Secsh channel 9 opened. 2018-02-15 18:31:50,811 - paramiko.transport- DEBUG - [chan 8] EOF sent (8) 2018-02-15 18:31:50,811 - paramiko.transport- DEBUG - [chan 9] Sesch channel 9 request ok 2018-02-15 18:31:50,812 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:50,812 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:50,813 - paramiko.transport- DEBUG - Ignoring message for dead channel 8 2018-02-15 18:31:50,841 - paramiko.transport- DEBUG - [chan 9] EOF received (9) 2018-02-15 18:31:50,841 - __main__- INFO - Restart heat-engine in 192.30.9.5 2018-02-15 18:31:50,842 - paramiko.transport- DEBUG - [chan 9] EOF sent (9) 2018-02-15 18:31:50,842 - paramiko.transport- DEBUG - [chan 10] Max packet in: 32768 bytes 2018-02-15 18:31:50,843 - paramiko.transport- DEBUG - [chan 10] Max packet out: 32768 bytes 2018-02-15 18:31:50,843 - paramiko.transport- DEBUG - Secsh channel 10 opened. 2018-02-15 18:31:50,884 - paramiko.transport- DEBUG - [chan 10] Sesch channel 10 request ok 2018-02-15 18:31:51,080 - paramiko.transport- DEBUG - [chan 10] EOF received (10) 2018-02-15 18:31:51,081 - __main__- INFO - Waiting for heat-engine to restart in controllers 2018-02-15 18:31:51,081 - paramiko.transport- DEBUG - [chan 10] EOF sent (10) 2018-02-15 18:32:01,091 - paramiko.transport- DEBUG - [chan 11] Max packet in: 32768 bytes 2018-02-15 18:32:01,092 - paramiko.transport- DEBUG - [chan 11] Max packet out: 32768 bytes 2018-02-15 18:32:01,092 - paramiko.transport- DEBUG - Secsh channel 11 opened. 2018-02-15 18:32:01,094 - paramiko.transport- DEBUG - [chan 11] Sesch channel 11 request ok 2018-02-15 18:32:01,117 - paramiko.transport- DEBUG - [chan 11] EOF received (11) 2018-02-15 18:32:01,118 - paramiko.transport- DEBUG - [chan 12] Max packet in: 32768 bytes 2018-02-15 18:32:01,119 - paramiko.transport- DEBUG - [chan 11] EOF sent (11) 2018-02-15 18:32:01,119 - paramiko.transport- DEBUG - [chan 12] Max packet out: 32768 bytes 2018-02-15 18:32:01,119 - paramiko.transport- DEBUG - Secsh channel 12 opened. 2018-02-15 18:32:01,161 - paramiko.transport- DEBUG - [chan 12] Sesch channel 12 request ok 2018-02-15 18:32:01,189 - paramiko.transport- DEBUG - [chan 12] EOF received (12) 2018-02-15 18:32:01,190 - paramiko.transport- DEBUG - [chan 13] Max packet in: 32768 bytes 2018-02-15 18:32:01,190 - paramiko.transport- DEBUG - [chan 12] EOF sent (12) 2018-02-15 18:32:01,191 - paramiko.transport- DEBUG - [chan 13] Max packet out: 32768 bytes 2018-02-15 18:32:01,191 - paramiko.transport- DEBUG - Secsh channel 13 opened. 2018-02-15 18:32:01,232 - paramiko.transport- DEBUG - [chan 13] Sesch channel 13 request ok 2018-02-15 18:32:01,260 - paramiko.transport- DEBUG - [chan 13] EOF received (13) 2018-02-15 18:32:01,261 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/ml2_conf.ini from 192.30.9.10 2018-02-15 18:32:01,261 - paramiko.transport- DEBUG - [chan 14] Max packet in: 32768 bytes 2018-02-15 18:32:01,262 - paramiko.transport- DEBUG - [chan 13] EOF sent (13) 2018-02-15 18:32:01,263 - paramiko.transport- DEBUG - [chan 14] Max packet out: 32768 bytes 2018-02-15 18:32:01,263 - paramiko.transport- DEBUG - Secsh channel 14 opened. 2018-02-15 18:32:01,305 - paramiko.transport- DEBUG - [chan 14] Sesch channel 14 request ok 2018-02-15 18:32:01,328 - paramiko.transport.sftp- INFO - [chan 14] Opened sftp connection (server version 3) 2018-02-15 18:32:01,328 - paramiko.transport.sftp- DEBUG - [chan 14] stat('/home/heat-admin/ml2_conf.ini') 2018-02-15 18:32:01,329 - paramiko.transport.sftp- DEBUG - [chan 14] open('/home/heat-admin/ml2_conf.ini', 'rb') 2018-02-15 18:32:01,330 - paramiko.transport.sftp- DEBUG - [chan 14] open('/home/heat-admin/ml2_conf.ini', 'rb') -> 00000000 2018-02-15 18:32:01,333 - paramiko.transport.sftp- DEBUG - [chan 14] close(00000000) 2018-02-15 18:32:01,334 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.10:/home/heat-admin/ml2_conf.ini to /ml2_conf.ini 2018-02-15 18:32:01,363 - __main__- INFO - Running 'sfc_one_chain_two_service_functions - ODL-SFC Testing SFs when they are located on the same chain' 2018-02-15 18:32:01,364 - __main__- INFO - =========================================================================================================== 2018-02-15 18:32:01,788 - paramiko.transport- DEBUG - starting thread (client mode): 0x213f92d0L 2018-02-15 18:32:01,788 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:01,808 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:01,808 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:01,813 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:01,813 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:01,813 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:01,813 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:01,813 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:01,837 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:01,837 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:01,855 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.168.122.232: 05ff74b4badd7cc9c6662187e948a29a 2018-02-15 18:32:01,856 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:01,877 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:01,910 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:01,920 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:02,144 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:02,144 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:02,160 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:05,280 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:05,281 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:05,283 - paramiko.transport- DEBUG - starting thread (client mode): 0x213f9bd0L 2018-02-15 18:32:05,284 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:05,289 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:05,289 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:05,291 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:05,291 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:05,291 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:05,292 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:05,292 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:05,314 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:05,315 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:05,318 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 2f6e3be67096c7f47e21cb4c66a4c397 2018-02-15 18:32:05,319 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:05,354 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:05,361 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:05,383 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:05,428 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:05,428 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:05,450 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:05,476 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:05,477 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:05,478 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:05,479 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:05,479 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:05,519 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:05,542 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:05,544 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:05,545 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:05,545 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:05,545 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:05,586 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:05,609 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:05,610 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:05,612 - paramiko.transport- DEBUG - starting thread (client mode): 0x21541e90L 2018-02-15 18:32:05,613 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:05,618 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:05,619 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:05,620 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:05,620 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:05,621 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:05,621 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:05,621 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:05,641 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:05,641 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:05,646 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.6: f5ec7f248eff5ade1c8e1c483f8f49c8 2018-02-15 18:32:05,647 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:05,680 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:05,689 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:05,711 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:05,752 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:05,752 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:05,778 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:05,803 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:05,804 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:05,804 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:05,805 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:05,805 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:05,846 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:05,870 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:05,871 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:05,871 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:05,872 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:05,872 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:05,913 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:05,936 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:05,937 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:05,939 - paramiko.transport- DEBUG - starting thread (client mode): 0x214495d0L 2018-02-15 18:32:05,939 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:05,944 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:05,944 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:05,946 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:05,946 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:05,946 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:05,947 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:05,947 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:05,968 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:05,968 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:05,972 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 7bf8f5f7e21d55dfcfa992c9ce8a50ba 2018-02-15 18:32:05,974 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:06,007 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:06,016 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:06,038 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:06,079 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:06,079 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:06,104 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:06,130 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:06,131 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:06,132 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:06,132 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:06,133 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:06,174 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:06,195 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:06,197 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:06,197 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:06,198 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:06,198 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:06,238 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:06,261 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:06,263 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:06,264 - paramiko.transport- DEBUG - starting thread (client mode): 0x21527d50L 2018-02-15 18:32:06,265 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:06,270 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:06,270 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:06,273 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:06,274 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:06,274 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:06,274 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:06,274 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:06,295 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:06,296 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:06,300 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: d66e9f4828ee6fb640cc36e306167dcf 2018-02-15 18:32:06,301 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:06,336 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:06,346 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:06,365 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:06,423 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:06,423 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:06,432 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:06,461 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:06,462 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:06,462 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:06,463 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:06,463 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:06,503 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:06,530 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:06,531 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:06,532 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:06,532 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:06,533 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:06,574 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:06,600 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:06,600 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:06,602 - paramiko.transport- DEBUG - starting thread (client mode): 0x21441a90L 2018-02-15 18:32:06,602 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:06,608 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:06,608 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:06,611 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:06,611 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:06,611 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:06,612 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:06,612 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:06,629 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:06,629 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:06,635 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.5: 2a9b78394070781e19208dcca0af8a21 2018-02-15 18:32:06,636 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:06,668 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:06,679 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:06,700 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:06,749 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:06,750 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:06,767 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:06,801 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:06,802 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:06,802 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:06,803 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:06,803 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:06,844 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:06,873 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:06,874 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:06,874 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:06,875 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:06,875 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:06,915 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:06,942 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:06,943 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:06,944 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:06,944 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:06,945 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:06,952 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:10,244 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:10,246 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:10,248 - paramiko.transport- DEBUG - starting thread (client mode): 0x213f9f50L 2018-02-15 18:32:10,248 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:10,253 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:10,253 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:10,256 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:10,256 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:10,256 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:10,256 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:10,256 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:10,279 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:10,280 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:10,283 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.10: 2f6e3be67096c7f47e21cb4c66a4c397 2018-02-15 18:32:10,285 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:10,319 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:10,328 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:10,349 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:10,392 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:10,392 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:10,416 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:10,443 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:10,444 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:10,445 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:10,445 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:10,446 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:10,487 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:10,512 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:10,513 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:10,513 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:10,514 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:10,514 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:10,555 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:10,580 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:10,581 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:10,583 - paramiko.transport- DEBUG - starting thread (client mode): 0x21462790L 2018-02-15 18:32:10,583 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:10,588 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:10,588 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:10,590 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:10,590 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:10,590 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:10,590 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:10,590 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:10,609 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:10,610 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:10,615 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.6: f5ec7f248eff5ade1c8e1c483f8f49c8 2018-02-15 18:32:10,616 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:10,649 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:10,659 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:10,681 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:10,722 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:10,722 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:10,747 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:10,770 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:10,771 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:10,772 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:10,772 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:10,773 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:10,813 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:10,835 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:10,837 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:10,837 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:10,838 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:10,838 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:10,878 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:10,900 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:10,902 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:10,903 - paramiko.transport- DEBUG - starting thread (client mode): 0x214615d0L 2018-02-15 18:32:10,903 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:10,908 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:10,908 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:10,910 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:10,910 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:10,910 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:10,910 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:10,911 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:10,932 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:10,932 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:10,936 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.7: 7bf8f5f7e21d55dfcfa992c9ce8a50ba 2018-02-15 18:32:10,937 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:10,971 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:10,980 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:11,002 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:11,043 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:11,043 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:11,068 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:11,092 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:11,092 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:11,093 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:11,093 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:11,093 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:11,134 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:11,158 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:11,159 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:11,159 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:11,160 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:11,160 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:11,201 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:11,223 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:11,224 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:11,225 - paramiko.transport- DEBUG - starting thread (client mode): 0x21466290L 2018-02-15 18:32:11,226 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:11,230 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:11,230 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:11,232 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:11,232 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:11,232 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:11,233 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:11,233 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:11,251 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:11,252 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:11,258 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.8: d66e9f4828ee6fb640cc36e306167dcf 2018-02-15 18:32:11,259 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:11,291 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:11,299 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:11,323 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:11,362 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:11,362 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:11,390 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:11,423 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:11,424 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:11,425 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:11,426 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:11,426 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:11,467 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:11,492 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:11,493 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:11,494 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:11,495 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:11,495 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:11,536 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:11,559 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:11,560 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:11,562 - paramiko.transport- DEBUG - starting thread (client mode): 0x21466fd0L 2018-02-15 18:32:11,562 - paramiko.transport- DEBUG - Local version/idstring: SSH-2.0-paramiko_2.1.1 2018-02-15 18:32:11,567 - paramiko.transport- DEBUG - Remote version/idstring: SSH-2.0-OpenSSH_6.6.1 2018-02-15 18:32:11,568 - paramiko.transport- INFO - Connected (version 2.0, client OpenSSH_6.6.1) 2018-02-15 18:32:11,570 - paramiko.transport- DEBUG - kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False 2018-02-15 18:32:11,571 - paramiko.transport- DEBUG - Kex agreed: diffie-hellman-group1-sha1 2018-02-15 18:32:11,571 - paramiko.transport- DEBUG - Cipher agreed: aes128-ctr 2018-02-15 18:32:11,571 - paramiko.transport- DEBUG - MAC agreed: hmac-sha2-256 2018-02-15 18:32:11,571 - paramiko.transport- DEBUG - Compression agreed: none 2018-02-15 18:32:11,593 - paramiko.transport- DEBUG - kex engine KexGroup1 specified hash_algo 2018-02-15 18:32:11,593 - paramiko.transport- DEBUG - Switch to new keys ... 2018-02-15 18:32:11,597 - paramiko.transport- DEBUG - Adding ssh-rsa host key for 192.30.9.5: 2a9b78394070781e19208dcca0af8a21 2018-02-15 18:32:11,598 - paramiko.transport- DEBUG - Trying SSH key 53a32704d80d9fa5426a394ad4fcf413 2018-02-15 18:32:11,633 - paramiko.transport- DEBUG - userauth is OK 2018-02-15 18:32:11,642 - paramiko.transport- INFO - Authentication (publickey) successful! 2018-02-15 18:32:11,662 - paramiko.transport- DEBUG - [chan 0] Max packet in: 32768 bytes 2018-02-15 18:32:11,723 - paramiko.transport- DEBUG - [chan 0] Max packet out: 32768 bytes 2018-02-15 18:32:11,724 - paramiko.transport- DEBUG - Secsh channel 0 opened. 2018-02-15 18:32:11,730 - paramiko.transport- DEBUG - [chan 0] Sesch channel 0 request ok 2018-02-15 18:32:11,756 - paramiko.transport- DEBUG - [chan 0] EOF received (0) 2018-02-15 18:32:11,757 - paramiko.transport- DEBUG - [chan 1] Max packet in: 32768 bytes 2018-02-15 18:32:11,758 - paramiko.transport- DEBUG - [chan 0] EOF sent (0) 2018-02-15 18:32:11,759 - paramiko.transport- DEBUG - [chan 1] Max packet out: 32768 bytes 2018-02-15 18:32:11,759 - paramiko.transport- DEBUG - Secsh channel 1 opened. 2018-02-15 18:32:11,799 - paramiko.transport- DEBUG - [chan 1] Sesch channel 1 request ok 2018-02-15 18:32:11,824 - paramiko.transport- DEBUG - [chan 1] EOF received (1) 2018-02-15 18:32:11,825 - paramiko.transport- DEBUG - [chan 1] EOF sent (1) 2018-02-15 18:32:11,825 - paramiko.transport- DEBUG - [chan 2] Max packet in: 32768 bytes 2018-02-15 18:32:11,865 - paramiko.transport- DEBUG - [chan 2] Max packet out: 32768 bytes 2018-02-15 18:32:11,866 - paramiko.transport- DEBUG - Secsh channel 2 opened. 2018-02-15 18:32:11,891 - paramiko.transport- DEBUG - [chan 2] Sesch channel 2 request ok 2018-02-15 18:32:11,915 - paramiko.transport- DEBUG - [chan 2] EOF received (2) 2018-02-15 18:32:11,916 - paramiko.transport- DEBUG - [chan 3] Max packet in: 32768 bytes 2018-02-15 18:32:11,917 - paramiko.transport- DEBUG - [chan 2] EOF sent (2) 2018-02-15 18:32:11,918 - paramiko.transport- DEBUG - [chan 3] Max packet out: 32768 bytes 2018-02-15 18:32:11,918 - paramiko.transport- DEBUG - Secsh channel 3 opened. 2018-02-15 18:32:11,922 - paramiko.transport- DEBUG - [chan 3] Sesch channel 3 request ok 2018-02-15 18:32:11,945 - paramiko.transport- DEBUG - [chan 3] EOF received (3) 2018-02-15 18:32:11,946 - paramiko.transport- DEBUG - [chan 4] Max packet in: 32768 bytes 2018-02-15 18:32:11,946 - paramiko.transport- DEBUG - [chan 3] EOF sent (3) 2018-02-15 18:32:11,947 - paramiko.transport- DEBUG - [chan 4] Max packet out: 32768 bytes 2018-02-15 18:32:11,947 - paramiko.transport- DEBUG - Secsh channel 4 opened. 2018-02-15 18:32:11,989 - paramiko.transport- DEBUG - [chan 4] Sesch channel 4 request ok 2018-02-15 18:32:12,025 - paramiko.transport- DEBUG - [chan 4] EOF received (4) 2018-02-15 18:32:12,026 - paramiko.transport- DEBUG - [chan 5] Max packet in: 32768 bytes 2018-02-15 18:32:12,027 - paramiko.transport- DEBUG - [chan 4] EOF sent (4) 2018-02-15 18:32:12,028 - paramiko.transport- DEBUG - [chan 5] Max packet out: 32768 bytes 2018-02-15 18:32:12,028 - paramiko.transport- DEBUG - Secsh channel 5 opened. 2018-02-15 18:32:12,070 - paramiko.transport- DEBUG - [chan 5] Sesch channel 5 request ok 2018-02-15 18:32:12,103 - paramiko.transport- DEBUG - [chan 5] EOF received (5) 2018-02-15 18:32:12,103 - opnfv.deployment.manager - INFO - Fetching /home/heat-admin/ml2_conf.ini from 192.30.9.10 2018-02-15 18:32:12,104 - paramiko.transport- DEBUG - [chan 5] EOF sent (5) 2018-02-15 18:32:12,104 - paramiko.transport- DEBUG - [chan 6] Max packet in: 32768 bytes 2018-02-15 18:32:12,105 - paramiko.transport- DEBUG - [chan 6] Max packet out: 32768 bytes 2018-02-15 18:32:12,105 - paramiko.transport- DEBUG - Secsh channel 6 opened. 2018-02-15 18:32:12,146 - paramiko.transport- DEBUG - [chan 6] Sesch channel 6 request ok 2018-02-15 18:32:12,170 - paramiko.transport.sftp- INFO - [chan 6] Opened sftp connection (server version 3) 2018-02-15 18:32:12,170 - paramiko.transport.sftp- DEBUG - [chan 6] stat('/home/heat-admin/ml2_conf.ini') 2018-02-15 18:32:12,171 - paramiko.transport.sftp- DEBUG - [chan 6] open('/home/heat-admin/ml2_conf.ini', 'rb') 2018-02-15 18:32:12,172 - paramiko.transport.sftp- DEBUG - [chan 6] open('/home/heat-admin/ml2_conf.ini', 'rb') -> 00000000 2018-02-15 18:32:12,175 - paramiko.transport.sftp- DEBUG - [chan 6] close(00000000) 2018-02-15 18:32:12,176 - opnfv.deployment.manager - INFO - Successfully copied 192.30.9.10:/home/heat-admin/ml2_conf.ini to /ml2_conf.ini 2018-02-15 18:32:12,178 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - This is a compute: 192.30.9.6 2018-02-15 18:32:12,178 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - This is a compute: 192.30.9.7 2018-02-15 18:32:12,178 - sfc.lib.utils- INFO - Downloading image 2018-02-15 18:32:34,877 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:32:34,877 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:32:34,878 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:32:34,879 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:32:34,879 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:32:34,879 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:32:34,879 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:32:34,879 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:32:34,879 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:32:34,880 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:32:34,880 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:32:34,880 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:32:34,931 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:32:34,933 - requests.packages.urllib3.connectionpool- DEBUG - Starting new HTTP connection (1): 172.30.9.22 2018-02-15 18:32:34,938 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.22:5000 "GET /v3 HTTP/1.1" 200 194 2018-02-15 18:32:34,951 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:32:34 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-4bf654e2-56da-4712-be86-866c7c9b3562 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:32:34,951 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-4bf654e2-56da-4712-be86-866c7c9b3562 2018-02-15 18:32:34,951 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:32:35,094 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.22:5000 "POST /v3/auth/tokens HTTP/1.1" 201 9237 2018-02-15 18:32:35,095 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:32:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["grsARZncTmOjOaUVNu4iRQ"], "issued_at": "2018-02-15T18:32:35.000000Z"}} 2018-02-15 18:32:35,096 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/flavors/detail -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b880be5fa28626f3921ce5ec103df512843444e9" 2018-02-15 18:32:35,098 - requests.packages.urllib3.connectionpool- DEBUG - Starting new HTTP connection (1): 172.30.9.22 2018-02-15 18:32:35,342 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.22:8774 "GET /v2.1/flavors/detail HTTP/1.1" 200 464 2018-02-15 18:32:35,344 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 464 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-5ddc273e-58f7-4c7e-9730-8c46805d9af4 Date: Thu, 15 Feb 2018 18:32:35 GMT RESP BODY: {"flavors": [{"links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/80b10048-8bc5-44d6-bfb8-68a21e26b784", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/80b10048-8bc5-44d6-bfb8-68a21e26b784", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "80b10048-8bc5-44d6-bfb8-68a21e26b784", "name": "m1.tiny", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}]} 2018-02-15 18:32:35,344 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/flavors/detail used request id req-5ddc273e-58f7-4c7e-9730-8c46805d9af4 2018-02-15 18:32:35,345 - functest.utils.openstack_utils- INFO - Creating flavor 'custom' with '1500' RAM, '10' disk size, '1' vcpus... 2018-02-15 18:32:35,346 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:8774/v2.1/flavors -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b880be5fa28626f3921ce5ec103df512843444e9" -d '{"flavor": {"vcpus": 1, "disk": 10, "name": "custom", "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "OS-FLV-EXT-DATA:ephemeral": 0, "ram": 1500, "id": null, "swap": 0}}' 2018-02-15 18:32:35,381 - requests.packages.urllib3.connectionpool- DEBUG - http://172.30.9.22:8774 "POST /v2.1/flavors HTTP/1.1" 200 462 2018-02-15 18:32:35,382 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 462 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-4077647e-a8ef-4092-920b-4604b5c0b062 Date: Thu, 15 Feb 2018 18:32:35 GMT RESP BODY: {"flavor": {"links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}], "ram": 1500, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "name": "custom", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2018-02-15 18:32:35,382 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.22:8774/v2.1/flavors used request id req-4077647e-a8ef-4092-920b-4604b5c0b062 2018-02-15 18:32:35,438 - functest.utils.openstack_utils- DEBUG - Flavor 'custom' with ID=6c0217d4-ee28-4ea9-b136-c356f048afb0 created successfully. 2018-02-15 18:32:35,438 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:32:35,438 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:32:35,438 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:32:35,438 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:32:35,438 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:32:35,438 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:32:35,439 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:32:35,440 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:32:35,440 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:32:35,454 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:32:35,455 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:32:35,455 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:32:35,455 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:32:35,455 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:32:35,455 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:32:35,455 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:32:35,462 - stevedore.extension- DEBUG - found extension EntryPoint.parse('bgpvpn = networking_bgpvpn.neutronclient.neutron.v2_0.bgpvpn.bgpvpn') 2018-02-15 18:32:35,513 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:32:35,513 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:32:35,513 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:32:35,513 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:32:35,514 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:32:35,515 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:32:35,515 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:32:35,515 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:32:35,515 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:32:35,515 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:32:35,515 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:32:35,517 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:32:35,518 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:32:35,519 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:32:35,519 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:32:35,519 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:32:35,572 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:32:35,578 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:32:35 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-06f6d61a-c2d1-49ab-868a-053c7ba9ddf9 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:32:35,578 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-06f6d61a-c2d1-49ab-868a-053c7ba9ddf9 2018-02-15 18:32:35,578 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:32:35,723 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:32:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["vz_vZB5cRLORHS6o5TuDpQ"], "issued_at": "2018-02-15T18:32:35.000000Z"}} 2018-02-15 18:32:35,724 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9292/v2/images?limit=20 -H "User-Agent: python-glanceclient" -H "Content-Type: application/octet-stream" -H "X-Auth-Token: {SHA1}f655d2c732bf3983503b2964368cffcfc72afe1f" 2018-02-15 18:32:35,895 - keystoneauth.session- DEBUG - RESP: [200] Content-Length: 78 Content-Type: application/json; charset=UTF-8 X-Openstack-Request-Id: req-22dd287c-9a1b-469f-a40a-8ab80e4af0f7 Date: Thu, 15 Feb 2018 18:32:35 GMT RESP BODY: {"images": [], "schema": "/v2/schemas/images", "first": "/v2/images?limit=20"} 2018-02-15 18:32:35,895 - keystoneauth.session- DEBUG - GET call to image for http://172.30.9.22:9292/v2/images?limit=20 used request id req-22dd287c-9a1b-469f-a40a-8ab80e4af0f7 2018-02-15 18:32:35,896 - glanceclient.common.http- DEBUG - GET call to glance-api for http://172.30.9.22:9292/v2/images?limit=20 used request id req-22dd287c-9a1b-469f-a40a-8ab80e4af0f7 2018-02-15 18:32:35,896 - functest.utils.openstack_utils- INFO - Creating image 'sfc_nsh_euphrates' from '/home/opnfv/functest/data/sfc_nsh_euphrates.qcow2'... 2018-02-15 18:32:35,897 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9292/v2/schemas/image -H "User-Agent: python-glanceclient" -H "Content-Type: application/octet-stream" -H "X-Auth-Token: {SHA1}f655d2c732bf3983503b2964368cffcfc72afe1f" 2018-02-15 18:32:36,056 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json; charset=UTF-8 Content-Length: 4169 X-Openstack-Request-Id: req-688a61eb-5b27-42c6-b0ef-f9f4388dbf78 Date: Thu, 15 Feb 2018 18:32:36 GMT RESP BODY: {"additionalProperties": {"type": "string"}, "name": "image", "links": [{"href": "{self}", "rel": "self"}, {"href": "{file}", "rel": "enclosure"}, {"href": "{schema}", "rel": "describedby"}], "properties": {"status": {"readOnly": true, "enum": ["queued", "saving", "active", "killed", "deleted", "pending_delete", "deactivated"], "type": "string", "description": "Status of the image"}, "tags": {"items": {"type": "string", "maxLength": 255}, "type": "array", "description": "List of strings related to the image"}, "kernel_id": {"pattern": "^([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}$", "type": ["null", "string"], "description": "ID of image stored in Glance that should be used as the kernel when booting an AMI-style image.", "is_base": false}, "container_format": {"enum": [null, "ami", "ari", "aki", "bare", "ovf", "ova", "docker"], "type": ["null", "string"], "description": "Format of the container"}, "min_ram": {"type": "integer", "description": "Amount of ram (in MB) required to boot image."}, "ramdisk_id": {"pattern": "^([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}$", "type": ["null", "string"], "description": "ID of image stored in Glance that should be used as the ramdisk when booting an AMI-style image.", "is_base": false}, "locations": {"items": {"required": ["url", "metadata"], "type": "object", "properties": {"url": {"type": "string", "maxLength": 255}, "metadata": {"type": "object"}}}, "type": "array", "description": "A set of URLs to access the image file kept in external store"}, "visibility": {"enum": ["community", "public", "private", "shared"], "type": "string", "description": "Scope of image accessibility"}, "updated_at": {"readOnly": true, "type": "string", "description": "Date and time of the last image modification"}, "owner": {"type": ["null", "string"], "description": "Owner of the image", "maxLength": 255}, "file": {"readOnly": true, "type": "string", "description": "An image file url"}, "min_disk": {"type": "integer", "description": "Amount of disk space (in GB) required to boot image."}, "virtual_size": {"readOnly": true, "type": ["null", "integer"], "description": "Virtual size of image in bytes"}, "id": {"pattern": "^([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}$", "type": "string", "description": "An identifier for the image"}, "size": {"readOnly": true, "type": ["null", "integer"], "description": "Size of image file in bytes"}, "instance_uuid": {"type": "string", "description": "Metadata which can be used to record which instance this image is associated with. (Informational only, does not create an instance snapshot.)", "is_base": false}, "os_distro": {"type": "string", "description": "Common name of operating system distribution as specified in http://docs.openstack.org/trunk/openstack-compute/admin/content/adding-images.html", "is_base": false}, "name": {"type": ["null", "string"], "description": "Descriptive name for the image", "maxLength": 255}, "checksum": {"readOnly": true, "type": ["null", "string"], "description": "md5 hash of image contents.", "maxLength": 32}, "created_at": {"readOnly": true, "type": "string", "description": "Date and time of image registration"}, "disk_format": {"enum": [null, "ami", "ari", "aki", "vhd", "vhdx", "vmdk", "raw", "qcow2", "vdi", "iso", "ploop"], "type": ["null", "string"], "description": "Format of the disk"}, "os_version": {"type": "string", "description": "Operating system version as specified by the distributor", "is_base": false}, "protected": {"type": "boolean", "description": "If true, image will not be deletable."}, "architecture": {"type": "string", "description": "Operating system architecture as specified in http://docs.openstack.org/trunk/openstack-compute/admin/content/adding-images.html", "is_base": false}, "direct_url": {"readOnly": true, "type": "string", "description": "URL to access the image file kept in external store"}, "self": {"readOnly": true, "type": "string", "description": "An image self url"}, "schema": {"readOnly": true, "type": "string", "description": "An image schema url"}}} 2018-02-15 18:32:36,056 - keystoneauth.session- DEBUG - GET call to image for http://172.30.9.22:9292/v2/schemas/image used request id req-688a61eb-5b27-42c6-b0ef-f9f4388dbf78 2018-02-15 18:32:36,056 - glanceclient.common.http- DEBUG - GET call to glance-api for http://172.30.9.22:9292/v2/schemas/image used request id req-688a61eb-5b27-42c6-b0ef-f9f4388dbf78 2018-02-15 18:32:36,137 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9292/v2/images -H "User-Agent: python-glanceclient" -H "Content-Type: application/json" -H "X-Auth-Token: {SHA1}f655d2c732bf3983503b2964368cffcfc72afe1f" -d '{"container_format": "bare", "disk_format": "qcow2", "name": "sfc_nsh_euphrates", "visibility": "public"}' 2018-02-15 18:32:36,326 - keystoneauth.session- DEBUG - RESP: [201] Content-Length: 578 Content-Type: application/json; charset=UTF-8 Location: http://172.30.9.22:9292/v2/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da X-Openstack-Request-Id: req-d853ae75-3027-40a8-9c6d-76ec04433f47 Date: Thu, 15 Feb 2018 18:32:36 GMT RESP BODY: {"status": "queued", "name": "sfc_nsh_euphrates", "tags": [], "container_format": "bare", "created_at": "2018-02-15T18:32:36Z", "size": null, "disk_format": "qcow2", "updated_at": "2018-02-15T18:32:36Z", "visibility": "public", "locations": [], "self": "/v2/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "min_disk": 0, "protected": false, "id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "file": "/v2/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da/file", "checksum": null, "owner": "43a3651d794746998b740a442f92ccfd", "virtual_size": null, "min_ram": 0, "schema": "/v2/schemas/image"} 2018-02-15 18:32:36,327 - keystoneauth.session- DEBUG - POST call to image for http://172.30.9.22:9292/v2/images used request id req-d853ae75-3027-40a8-9c6d-76ec04433f47 2018-02-15 18:32:36,327 - glanceclient.common.http- DEBUG - POST call to glance-api for http://172.30.9.22:9292/v2/images used request id req-d853ae75-3027-40a8-9c6d-76ec04433f47 2018-02-15 18:32:36,336 - keystoneauth.session- DEBUG - REQ: curl -g -i -X PUT http://172.30.9.22:9292/v2/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da/file -H "User-Agent: python-glanceclient" -H "Content-Type: application/octet-stream" -H "X-Auth-Token: {SHA1}f655d2c732bf3983503b2964368cffcfc72afe1f" -d '' 2018-02-15 18:33:10,624 - keystoneauth.session- DEBUG - RESP: [204] Content-Type: text/html; charset=UTF-8 Content-Length: 0 X-Openstack-Request-Id: req-50de32af-0efd-4e7e-858e-b54327274dd0 Date: Thu, 15 Feb 2018 18:33:10 GMT RESP BODY: Omitted, Content-Type is set to text/html; charset=UTF-8. Only application/json responses have their bodies logged. 2018-02-15 18:33:10,625 - keystoneauth.session- DEBUG - PUT call to image for http://172.30.9.22:9292/v2/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da/file used request id req-50de32af-0efd-4e7e-858e-b54327274dd0 2018-02-15 18:33:10,625 - glanceclient.common.http- DEBUG - PUT call to glance-api for http://172.30.9.22:9292/v2/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da/file used request id req-50de32af-0efd-4e7e-858e-b54327274dd0 2018-02-15 18:33:10,626 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:33:10,632 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:33:10 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-1ffcc621-1a56-4260-85e4-7f3247bc6218 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:33:10,632 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-1ffcc621-1a56-4260-85e4-7f3247bc6218 2018-02-15 18:33:10,633 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:33:10,777 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:33:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["LkGxu31TSrKIinSp8eSIpw"], "issued_at": "2018-02-15T18:33:10.000000Z"}} 2018-02-15 18:33:10,778 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/networks.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:11,007 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 743 X-Openstack-Request-Id: req-6c65bb5f-9319-4c2e-b228-da519087a168 Date: Thu, 15 Feb 2018 18:33:11 GMT RESP BODY: {"networks": [{"provider:physical_network": "datacentre", "ipv6_address_scope": null, "revision_number": 6, "port_security_enabled": true, "mtu": 1500, "id": "356b2343-cd6f-44f5-b8db-9340d7f7cb2a", "router:external": true, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "shared": false, "project_id": "c812352603634a88ab7f4aac1d15cb89", "status": "ACTIVE", "subnets": ["18dcf76b-2dea-4cf5-91c9-57380889359f"], "description": "", "tags": [], "updated_at": "2018-02-15T16:48:33Z", "is_default": false, "provider:segmentation_id": null, "name": "external", "admin_state_up": true, "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "provider:network_type": "flat"}]} 2018-02-15 18:33:11,007 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/networks.json used request id req-6c65bb5f-9319-4c2e-b228-da519087a168 2018-02-15 18:33:11,007 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/networks.json used request id req-6c65bb5f-9319-4c2e-b228-da519087a168 2018-02-15 18:33:11,009 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/subnets.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:11,275 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 669 X-Openstack-Request-Id: req-11ef8db0-6e8b-4d3e-b66f-e5cfdf292cd6 Date: Thu, 15 Feb 2018 18:33:11 GMT RESP BODY: {"subnets": [{"service_types": [], "description": "", "enable_dhcp": false, "tags": [], "network_id": "356b2343-cd6f-44f5-b8db-9340d7f7cb2a", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:33Z", "dns_nameservers": [], "updated_at": "2018-02-15T16:48:33Z", "gateway_ip": "172.30.9.1", "ipv6_ra_mode": null, "allocation_pools": [{"start": "172.30.9.200", "end": "172.30.9.220"}], "host_routes": [], "revision_number": 2, "ip_version": 4, "ipv6_address_mode": null, "cidr": "172.30.9.0/24", "project_id": "c812352603634a88ab7f4aac1d15cb89", "id": "18dcf76b-2dea-4cf5-91c9-57380889359f", "subnetpool_id": null, "name": "external-subnet"}]} 2018-02-15 18:33:11,275 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/subnets.json used request id req-11ef8db0-6e8b-4d3e-b66f-e5cfdf292cd6 2018-02-15 18:33:11,275 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/subnets.json used request id req-11ef8db0-6e8b-4d3e-b66f-e5cfdf292cd6 2018-02-15 18:33:11,277 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/routers.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:11,480 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 15 X-Openstack-Request-Id: req-87154879-dbbf-443e-9b6d-898bea2f9edf Date: Thu, 15 Feb 2018 18:33:11 GMT RESP BODY: {"routers": []} 2018-02-15 18:33:11,480 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/routers.json used request id req-87154879-dbbf-443e-9b6d-898bea2f9edf 2018-02-15 18:33:11,480 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/routers.json used request id req-87154879-dbbf-443e-9b6d-898bea2f9edf 2018-02-15 18:33:11,480 - functest.utils.openstack_utils- INFO - Creating neutron network example-net... 2018-02-15 18:33:11,482 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/networks.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"network": {"name": "example-net", "admin_state_up": true}}' 2018-02-15 18:33:11,833 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 669 X-Openstack-Request-Id: req-bda0237d-9303-44bf-8de8-5c93b8f5a3af Date: Thu, 15 Feb 2018 18:33:11 GMT RESP BODY: {"network": {"provider:physical_network": null, "updated_at": "2018-02-15T18:33:11Z", "revision_number": 3, "port_security_enabled": true, "mtu": 1450, "id": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01", "router:external": false, "availability_zone_hints": [], "availability_zones": [], "ipv4_address_scope": null, "shared": false, "project_id": "43a3651d794746998b740a442f92ccfd", "status": "ACTIVE", "subnets": [], "description": "", "tags": [], "ipv6_address_scope": null, "provider:segmentation_id": 3, "name": "example-net", "admin_state_up": true, "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:11Z", "provider:network_type": "vxlan"}} 2018-02-15 18:33:11,834 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/networks.json used request id req-bda0237d-9303-44bf-8de8-5c93b8f5a3af 2018-02-15 18:33:11,834 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/networks.json used request id req-bda0237d-9303-44bf-8de8-5c93b8f5a3af 2018-02-15 18:33:11,834 - functest.utils.openstack_utils- DEBUG - Network '1a9afbd0-9e88-41e5-8e79-54ef2af32b01' created successfully 2018-02-15 18:33:11,834 - functest.utils.openstack_utils- DEBUG - Creating Subnet.... 2018-02-15 18:33:11,835 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/subnets.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"subnets": [{"ip_version": 4, "network_id": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01", "cidr": "11.0.0.0/24", "dns_nameservers": ["8.8.8.8", "8.8.4.4"], "name": "example-subnet"}]}' 2018-02-15 18:33:12,412 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 677 X-Openstack-Request-Id: req-90f47fab-283f-4083-ba2d-7734d2bc9097 Date: Thu, 15 Feb 2018 18:33:12 GMT RESP BODY: {"subnets": [{"service_types": [], "description": "", "enable_dhcp": true, "tags": [], "network_id": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:12Z", "dns_nameservers": ["8.8.8.8", "8.8.4.4"], "updated_at": "2018-02-15T18:33:12Z", "gateway_ip": "11.0.0.1", "ipv6_ra_mode": null, "allocation_pools": [{"start": "11.0.0.2", "end": "11.0.0.254"}], "host_routes": [], "revision_number": 2, "ip_version": 4, "ipv6_address_mode": null, "cidr": "11.0.0.0/24", "project_id": "43a3651d794746998b740a442f92ccfd", "id": "8017d2fd-1778-4d85-9990-7016632908ec", "subnetpool_id": null, "name": "example-subnet"}]} 2018-02-15 18:33:12,412 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/subnets.json used request id req-90f47fab-283f-4083-ba2d-7734d2bc9097 2018-02-15 18:33:12,412 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/subnets.json used request id req-90f47fab-283f-4083-ba2d-7734d2bc9097 2018-02-15 18:33:12,413 - functest.utils.openstack_utils- DEBUG - Subnet '8017d2fd-1778-4d85-9990-7016632908ec' created successfully 2018-02-15 18:33:12,413 - functest.utils.openstack_utils- DEBUG - Creating Router... 2018-02-15 18:33:12,414 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/routers.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"router": {"name": "example-router", "admin_state_up": true}}' 2018-02-15 18:33:12,736 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 423 X-Openstack-Request-Id: req-07c09a44-c923-4791-a204-03b0b9a3b421 Date: Thu, 15 Feb 2018 18:33:12 GMT RESP BODY: {"router": {"status": "ACTIVE", "external_gateway_info": null, "description": "", "tags": [], "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:12Z", "admin_state_up": true, "distributed": false, "updated_at": "2018-02-15T18:33:12Z", "revision_number": 1, "routes": [], "project_id": "43a3651d794746998b740a442f92ccfd", "id": "6e46c0e2-6751-4a2a-873f-1395c23c127e", "name": "example-router"}} 2018-02-15 18:33:12,736 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/routers.json used request id req-07c09a44-c923-4791-a204-03b0b9a3b421 2018-02-15 18:33:12,736 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/routers.json used request id req-07c09a44-c923-4791-a204-03b0b9a3b421 2018-02-15 18:33:12,736 - functest.utils.openstack_utils- DEBUG - Router '6e46c0e2-6751-4a2a-873f-1395c23c127e' created successfully 2018-02-15 18:33:12,736 - functest.utils.openstack_utils- DEBUG - Adding router to subnet... 2018-02-15 18:33:12,737 - keystoneauth.session- DEBUG - REQ: curl -g -i -X PUT http://172.30.9.22:9696/v2.0/routers/6e46c0e2-6751-4a2a-873f-1395c23c127e/add_router_interface.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"subnet_id": "8017d2fd-1778-4d85-9990-7016632908ec"}' 2018-02-15 18:33:14,174 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 309 X-Openstack-Request-Id: req-66d59a73-fa5c-4c32-b8aa-937d035a044e Date: Thu, 15 Feb 2018 18:33:14 GMT RESP BODY: {"network_id": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01", "tenant_id": "43a3651d794746998b740a442f92ccfd", "subnet_id": "8017d2fd-1778-4d85-9990-7016632908ec", "subnet_ids": ["8017d2fd-1778-4d85-9990-7016632908ec"], "port_id": "691ceccd-499d-431c-8e2e-2b7166a64485", "id": "6e46c0e2-6751-4a2a-873f-1395c23c127e"} 2018-02-15 18:33:14,174 - keystoneauth.session- DEBUG - PUT call to network for http://172.30.9.22:9696/v2.0/routers/6e46c0e2-6751-4a2a-873f-1395c23c127e/add_router_interface.json used request id req-66d59a73-fa5c-4c32-b8aa-937d035a044e 2018-02-15 18:33:14,175 - neutronclient.v2_0.client- DEBUG - PUT call to neutron for http://172.30.9.22:9696/v2.0/routers/6e46c0e2-6751-4a2a-873f-1395c23c127e/add_router_interface.json used request id req-66d59a73-fa5c-4c32-b8aa-937d035a044e 2018-02-15 18:33:14,175 - functest.utils.openstack_utils- DEBUG - Interface added successfully. 2018-02-15 18:33:14,175 - functest.utils.openstack_utils- DEBUG - Adding gateway to router... 2018-02-15 18:33:14,176 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/networks.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:14,410 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 1445 X-Openstack-Request-Id: req-400a4ebf-ea40-4710-af32-ce6261081d08 Date: Thu, 15 Feb 2018 18:33:14 GMT RESP BODY: {"networks": [{"provider:physical_network": null, "ipv6_address_scope": null, "revision_number": 5, "port_security_enabled": true, "mtu": 1450, "id": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01", "router:external": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "shared": false, "project_id": "43a3651d794746998b740a442f92ccfd", "status": "ACTIVE", "subnets": ["8017d2fd-1778-4d85-9990-7016632908ec"], "description": "", "tags": [], "updated_at": "2018-02-15T18:33:12Z", "provider:segmentation_id": 3, "name": "example-net", "admin_state_up": true, "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:11Z", "provider:network_type": "vxlan"}, {"provider:physical_network": "datacentre", "ipv6_address_scope": null, "revision_number": 6, "port_security_enabled": true, "mtu": 1500, "id": "356b2343-cd6f-44f5-b8db-9340d7f7cb2a", "router:external": true, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "shared": false, "project_id": "c812352603634a88ab7f4aac1d15cb89", "status": "ACTIVE", "subnets": ["18dcf76b-2dea-4cf5-91c9-57380889359f"], "description": "", "tags": [], "updated_at": "2018-02-15T16:48:33Z", "is_default": false, "provider:segmentation_id": null, "name": "external", "admin_state_up": true, "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "provider:network_type": "flat"}]} 2018-02-15 18:33:14,410 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/networks.json used request id req-400a4ebf-ea40-4710-af32-ce6261081d08 2018-02-15 18:33:14,410 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/networks.json used request id req-400a4ebf-ea40-4710-af32-ce6261081d08 2018-02-15 18:33:14,411 - keystoneauth.session- DEBUG - REQ: curl -g -i -X PUT http://172.30.9.22:9696/v2.0/routers/6e46c0e2-6751-4a2a-873f-1395c23c127e.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"router": {"external_gateway_info": {"network_id": "356b2343-cd6f-44f5-b8db-9340d7f7cb2a"}}}' 2018-02-15 18:33:15,993 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 603 X-Openstack-Request-Id: req-2a7ac8eb-c67c-4ed4-9d6d-b42580595230 Date: Thu, 15 Feb 2018 18:33:15 GMT RESP BODY: {"router": {"status": "ACTIVE", "external_gateway_info": {"network_id": "356b2343-cd6f-44f5-b8db-9340d7f7cb2a", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "18dcf76b-2dea-4cf5-91c9-57380889359f", "ip_address": "172.30.9.207"}]}, "description": "", "tags": [], "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:12Z", "admin_state_up": true, "distributed": false, "updated_at": "2018-02-15T18:33:15Z", "revision_number": 5, "routes": [], "project_id": "43a3651d794746998b740a442f92ccfd", "id": "6e46c0e2-6751-4a2a-873f-1395c23c127e", "name": "example-router"}} 2018-02-15 18:33:15,993 - keystoneauth.session- DEBUG - PUT call to network for http://172.30.9.22:9696/v2.0/routers/6e46c0e2-6751-4a2a-873f-1395c23c127e.json used request id req-2a7ac8eb-c67c-4ed4-9d6d-b42580595230 2018-02-15 18:33:15,993 - neutronclient.v2_0.client- DEBUG - PUT call to neutron for http://172.30.9.22:9696/v2.0/routers/6e46c0e2-6751-4a2a-873f-1395c23c127e.json used request id req-2a7ac8eb-c67c-4ed4-9d6d-b42580595230 2018-02-15 18:33:15,993 - functest.utils.openstack_utils- DEBUG - Gateway added successfully. 2018-02-15 18:33:15,994 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:16,193 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 9113 X-Openstack-Request-Id: req-1b7e7fdb-1460-4a91-a393-5402bbbfc69e Date: Thu, 15 Feb 2018 18:33:16 GMT RESP BODY: {"security_groups": [{"description": "Default security group", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "updated_at": "2018-02-15T16:48:09Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "266fe554-ff7a-41d2-9fcf-2428e1141884", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "bfeb317d-5ae8-4142-b20e-3d464ee0b693", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "1bea388a-ffc0-4e30-9e08-a09b34a075ee", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "d2fdfd55-1af7-48d8-9b69-2c169b034c97", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}], "revision_number": 1, "project_id": "c812352603634a88ab7f4aac1d15cb89", "id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "name": "default"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-15T16:51:54Z", "updated_at": "2018-02-15T16:51:54Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "867f4cf6-86a5-4f9d-abb4-6bb61ee731ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "45a07f84-4695-4e7b-81ad-fbfb25ad90f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "a0eef51d-ef32-44a4-85ea-af1099474d0e", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "27362b4b-2dd1-4982-875e-caae9db865f3", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}], "revision_number": 1, "project_id": "", "id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "name": "default"}, {"description": "Default security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T16:48:53Z", "updated_at": "2018-02-15T16:48:53Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "4b1f7746-e449-464f-a892-78a0603d873e", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "ba1ae3eb-870c-49e2-96be-e60940f3c33d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "de846c74-e63a-4bcb-b12f-8850a2fc2409", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "927eaea2-def0-4bda-9b12-d2b424d1c490", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 1, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "name": "default"}, {"description": "Default security group", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "created_at": "2018-02-15T18:29:14Z", "updated_at": "2018-02-15T18:29:14Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "159fa130-fb88-4e5f-8a10-fc494a348436", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "00f92522-c7c8-4ce8-8adf-ed2e80d6a2fc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "34d8cb82-387b-4a25-a27d-917d22c2fc58", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "9a2a32a4-8bca-4744-937d-f3826badf357", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}], "revision_number": 1, "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "name": "default"}]} 2018-02-15 18:33:16,193 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-1b7e7fdb-1460-4a91-a393-5402bbbfc69e 2018-02-15 18:33:16,194 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-1b7e7fdb-1460-4a91-a393-5402bbbfc69e 2018-02-15 18:33:16,195 - functest.utils.openstack_utils- INFO - Creating security group 'example-sg'... 2018-02-15 18:33:16,196 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group": {"name": "example-sg", "description": "Example Security group"}}' 2018-02-15 18:33:16,534 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 1328 X-Openstack-Request-Id: req-a097ffa9-ce48-4d7d-956b-ccf53adfd5b2 Date: Thu, 15 Feb 2018 18:33:16 GMT RESP BODY: {"security_group": {"description": "Example Security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:16Z", "updated_at": "2018-02-15T18:33:16Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "2eac3de8-8899-42c2-a994-1e887b9e6cc8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "5ad75814-5586-49e8-b09e-c4600801c1e9", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 1, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "name": "example-sg"}} 2018-02-15 18:33:16,534 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-a097ffa9-ce48-4d7d-956b-ccf53adfd5b2 2018-02-15 18:33:16,534 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-a097ffa9-ce48-4d7d-956b-ccf53adfd5b2 2018-02-15 18:33:16,534 - functest.utils.openstack_utils- DEBUG - Security group 'example-sg' with ID=4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71 created successfully. 2018-02-15 18:33:16,535 - functest.utils.openstack_utils- DEBUG - Adding ICMP rules in security group 'example-sg'... 2018-02-15 18:33:16,535 - functest.utils.openstack_utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:16,536 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:16,841 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-176796b6-6d5d-41a5-a44c-aadd02094253 Date: Thu, 15 Feb 2018 18:33:16 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "161046f4-3953-4b86-b268-6b43e0df8bd7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:16,841 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-176796b6-6d5d-41a5-a44c-aadd02094253 2018-02-15 18:33:16,842 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-176796b6-6d5d-41a5-a44c-aadd02094253 2018-02-15 18:33:16,842 - functest.utils.openstack_utils- DEBUG - Adding SSH rules in security group 'example-sg'... 2018-02-15 18:33:16,842 - functest.utils.openstack_utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:16,843 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": "22", "direction": "ingress", "protocol": "tcp", "port_range_max": "22", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:17,153 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-25130d82-97d1-48d8-b6c3-fb797d9b50de Date: Thu, 15 Feb 2018 18:33:17 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "e1e60e72-35cb-455f-8fec-75ddea3cad4b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:17,153 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-25130d82-97d1-48d8-b6c3-fb797d9b50de 2018-02-15 18:33:17,154 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-25130d82-97d1-48d8-b6c3-fb797d9b50de 2018-02-15 18:33:17,154 - functest.utils.openstack_utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:17,155 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": "22", "direction": "egress", "protocol": "tcp", "port_range_max": "22", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:17,344 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-fa653768-4571-400f-9be9-c3a28a86c582 Date: Thu, 15 Feb 2018 18:33:17 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "bbdf8503-fd64-4988-810c-b12e6e4426c5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:17,344 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-fa653768-4571-400f-9be9-c3a28a86c582 2018-02-15 18:33:17,345 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-fa653768-4571-400f-9be9-c3a28a86c582 2018-02-15 18:33:17,346 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:17,546 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 11879 X-Openstack-Request-Id: req-1917f570-aa67-4374-bfb4-b425fe5fef9e Date: Thu, 15 Feb 2018 18:33:17 GMT RESP BODY: {"security_groups": [{"description": "Default security group", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "updated_at": "2018-02-15T16:48:09Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "1bea388a-ffc0-4e30-9e08-a09b34a075ee", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "266fe554-ff7a-41d2-9fcf-2428e1141884", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "bfeb317d-5ae8-4142-b20e-3d464ee0b693", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "d2fdfd55-1af7-48d8-9b69-2c169b034c97", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}], "revision_number": 1, "project_id": "c812352603634a88ab7f4aac1d15cb89", "id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "name": "default"}, {"description": "Example Security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:16Z", "updated_at": "2018-02-15T18:33:17Z", "security_group_rules": [{"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "161046f4-3953-4b86-b268-6b43e0df8bd7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "2eac3de8-8899-42c2-a994-1e887b9e6cc8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "5ad75814-5586-49e8-b09e-c4600801c1e9", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "bbdf8503-fd64-4988-810c-b12e6e4426c5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "e1e60e72-35cb-455f-8fec-75ddea3cad4b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 4, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-15T16:51:54Z", "updated_at": "2018-02-15T16:51:54Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "27362b4b-2dd1-4982-875e-caae9db865f3", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "45a07f84-4695-4e7b-81ad-fbfb25ad90f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "867f4cf6-86a5-4f9d-abb4-6bb61ee731ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "a0eef51d-ef32-44a4-85ea-af1099474d0e", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 1, "project_id": "", "id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "name": "default"}, {"description": "Default security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T16:48:53Z", "updated_at": "2018-02-15T16:48:53Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "4b1f7746-e449-464f-a892-78a0603d873e", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "927eaea2-def0-4bda-9b12-d2b424d1c490", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "ba1ae3eb-870c-49e2-96be-e60940f3c33d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "de846c74-e63a-4bcb-b12f-8850a2fc2409", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 1, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "name": "default"}, {"description": "Default security group", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "created_at": "2018-02-15T18:29:14Z", "updated_at": "2018-02-15T18:29:14Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "00f92522-c7c8-4ce8-8adf-ed2e80d6a2fc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "159fa130-fb88-4e5f-8a10-fc494a348436", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "34d8cb82-387b-4a25-a27d-917d22c2fc58", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "9a2a32a4-8bca-4744-937d-f3826badf357", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}], "revision_number": 1, "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "name": "default"}]} 2018-02-15 18:33:17,546 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-1917f570-aa67-4374-bfb4-b425fe5fef9e 2018-02-15 18:33:17,548 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-1917f570-aa67-4374-bfb4-b425fe5fef9e 2018-02-15 18:33:17,548 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:17,549 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:17,683 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-72ab09e3-2de7-4ff0-87a5-da16e131fc72 Date: Thu, 15 Feb 2018 18:33:17 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "7d53d2d8-d67f-4fcb-9798-27fbdba1d834", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:17,683 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-72ab09e3-2de7-4ff0-87a5-da16e131fc72 2018-02-15 18:33:17,684 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-72ab09e3-2de7-4ff0-87a5-da16e131fc72 2018-02-15 18:33:17,685 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:17,686 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:17,977 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-c8887ca0-6798-4ccb-8993-da82b210c6a4 Date: Thu, 15 Feb 2018 18:33:17 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "3169633d-de71-41eb-a03c-085c2ba8a7b7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:17,977 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-c8887ca0-6798-4ccb-8993-da82b210c6a4 2018-02-15 18:33:17,978 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-c8887ca0-6798-4ccb-8993-da82b210c6a4 2018-02-15 18:33:17,978 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:17,979 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:18,065 - keystoneauth.session- DEBUG - RESP: [409] Content-Type: application/json Content-Length: 166 X-Openstack-Request-Id: req-c713a0c0-e588-4008-8886-4ec169c929fc Date: Thu, 15 Feb 2018 18:33:18 GMT RESP BODY: {"NeutronError": {"message": "Security group rule already exists. Rule id is 161046f4-3953-4b86-b268-6b43e0df8bd7.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-15 18:33:18,065 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-c713a0c0-e588-4008-8886-4ec169c929fc 2018-02-15 18:33:18,065 - neutronclient.v2_0.client- DEBUG - Error message: {"NeutronError": {"message": "Security group rule already exists. Rule id is 161046f4-3953-4b86-b268-6b43e0df8bd7.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-15 18:33:18,065 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-c713a0c0-e588-4008-8886-4ec169c929fc 2018-02-15 18:33:18,065 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:18,066 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:18,200 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-24b703c0-e4e6-412b-bd0b-788d6742dd59 Date: Thu, 15 Feb 2018 18:33:18 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "24d62374-8cf7-40ac-bfff-c09d7dd02c35", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:18,200 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-24b703c0-e4e6-412b-bd0b-788d6742dd59 2018-02-15 18:33:18,200 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-24b703c0-e4e6-412b-bd0b-788d6742dd59 2018-02-15 18:33:18,200 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:18,201 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:18,370 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-3f2df47a-41a6-425a-b43e-159408da34dd Date: Thu, 15 Feb 2018 18:33:18 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "187d6022-d9b1-438d-a207-789211ff992c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:18,370 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-3f2df47a-41a6-425a-b43e-159408da34dd 2018-02-15 18:33:18,370 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-3f2df47a-41a6-425a-b43e-159408da34dd 2018-02-15 18:33:18,370 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:18,371 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:18,666 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-9f1184ee-697e-4f5e-80a2-11729001a634 Date: Thu, 15 Feb 2018 18:33:18 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "40cca284-bd8d-4f7f-8708-12895d8964e7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:18,666 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-9f1184ee-697e-4f5e-80a2-11729001a634 2018-02-15 18:33:18,667 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-9f1184ee-697e-4f5e-80a2-11729001a634 2018-02-15 18:33:18,667 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:18,668 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:18,965 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-f7d97d25-dca3-4581-b894-be693d0619d1 Date: Thu, 15 Feb 2018 18:33:18 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "552f8a7c-808d-46a6-b1ec-11f77ee6fd9b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:18,965 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-f7d97d25-dca3-4581-b894-be693d0619d1 2018-02-15 18:33:18,965 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-f7d97d25-dca3-4581-b894-be693d0619d1 2018-02-15 18:33:18,965 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:18,966 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:19,116 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-13f73bc4-cc3a-423a-97ef-a2776e1108cc Date: Thu, 15 Feb 2018 18:33:19 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "a5bfcaf7-6145-4a50-9dce-cd49a196c7a5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:19,116 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-13f73bc4-cc3a-423a-97ef-a2776e1108cc 2018-02-15 18:33:19,116 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-13f73bc4-cc3a-423a-97ef-a2776e1108cc 2018-02-15 18:33:19,116 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:19,117 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "ingress", "protocol": "icmp", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:19,408 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 512 X-Openstack-Request-Id: req-7d3222fa-424a-4e8f-8c27-eca1eb4e55f9 Date: Thu, 15 Feb 2018 18:33:19 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "e3cc0e92-393c-4cc7-8459-2309058fd6c6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:19,409 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7d3222fa-424a-4e8f-8c27-eca1eb4e55f9 2018-02-15 18:33:19,409 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7d3222fa-424a-4e8f-8c27-eca1eb4e55f9 2018-02-15 18:33:19,409 - sfc.lib.utils- DEBUG - Security_group format set (no port range mentioned) 2018-02-15 18:33:19,410 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"direction": "egress", "protocol": "icmp", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:19,709 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 511 X-Openstack-Request-Id: req-0b123c64-ad8a-4917-90ba-b361c5f7e82c Date: Thu, 15 Feb 2018 18:33:19 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "d30d61e4-e8e8-433a-8f21-9068211baad4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:19,710 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-0b123c64-ad8a-4917-90ba-b361c5f7e82c 2018-02-15 18:33:19,710 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-0b123c64-ad8a-4917-90ba-b361c5f7e82c 2018-02-15 18:33:19,711 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:20,048 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 16275 X-Openstack-Request-Id: req-c7b2d1d1-1d7e-4b2d-8593-8772356c2a4b Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"security_groups": [{"description": "Default security group", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "updated_at": "2018-02-15T18:33:17Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "1bea388a-ffc0-4e30-9e08-a09b34a075ee", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "266fe554-ff7a-41d2-9fcf-2428e1141884", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "3169633d-de71-41eb-a03c-085c2ba8a7b7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "7d53d2d8-d67f-4fcb-9798-27fbdba1d834", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "bfeb317d-5ae8-4142-b20e-3d464ee0b693", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "d2fdfd55-1af7-48d8-9b69-2c169b034c97", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}], "revision_number": 3, "project_id": "c812352603634a88ab7f4aac1d15cb89", "id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "name": "default"}, {"description": "Example Security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:16Z", "updated_at": "2018-02-15T18:33:18Z", "security_group_rules": [{"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "161046f4-3953-4b86-b268-6b43e0df8bd7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "24d62374-8cf7-40ac-bfff-c09d7dd02c35", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "2eac3de8-8899-42c2-a994-1e887b9e6cc8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "5ad75814-5586-49e8-b09e-c4600801c1e9", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "bbdf8503-fd64-4988-810c-b12e6e4426c5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "e1e60e72-35cb-455f-8fec-75ddea3cad4b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 5, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-15T16:51:54Z", "updated_at": "2018-02-15T18:33:18Z", "security_group_rules": [{"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "187d6022-d9b1-438d-a207-789211ff992c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "27362b4b-2dd1-4982-875e-caae9db865f3", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "40cca284-bd8d-4f7f-8708-12895d8964e7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "45a07f84-4695-4e7b-81ad-fbfb25ad90f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "867f4cf6-86a5-4f9d-abb4-6bb61ee731ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "a0eef51d-ef32-44a4-85ea-af1099474d0e", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 3, "project_id": "", "id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "name": "default"}, {"description": "Default security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T16:48:53Z", "updated_at": "2018-02-15T18:33:19Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "4b1f7746-e449-464f-a892-78a0603d873e", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "552f8a7c-808d-46a6-b1ec-11f77ee6fd9b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "927eaea2-def0-4bda-9b12-d2b424d1c490", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "a5bfcaf7-6145-4a50-9dce-cd49a196c7a5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "ba1ae3eb-870c-49e2-96be-e60940f3c33d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "de846c74-e63a-4bcb-b12f-8850a2fc2409", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 3, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "name": "default"}, {"description": "Default security group", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "created_at": "2018-02-15T18:29:14Z", "updated_at": "2018-02-15T18:33:19Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "00f92522-c7c8-4ce8-8adf-ed2e80d6a2fc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "159fa130-fb88-4e5f-8a10-fc494a348436", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "34d8cb82-387b-4a25-a27d-917d22c2fc58", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "9a2a32a4-8bca-4744-937d-f3826badf357", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "d30d61e4-e8e8-433a-8f21-9068211baad4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "e3cc0e92-393c-4cc7-8459-2309058fd6c6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 3, "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "name": "default"}]} 2018-02-15 18:33:20,048 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-c7b2d1d1-1d7e-4b2d-8593-8772356c2a4b 2018-02-15 18:33:20,050 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-c7b2d1d1-1d7e-4b2d-8593-8772356c2a4b 2018-02-15 18:33:20,051 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,052 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:20,189 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-d8ea1559-7c78-44c5-8988-8959c2d681e3 Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "ee27c5cc-3dc4-4863-a29c-abf96ed5689b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:20,189 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-d8ea1559-7c78-44c5-8988-8959c2d681e3 2018-02-15 18:33:20,190 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-d8ea1559-7c78-44c5-8988-8959c2d681e3 2018-02-15 18:33:20,190 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,191 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:20,320 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-7f67e0c4-c07f-4289-a80c-d24a4dbb0adc Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "5e519615-9380-4e24-aad2-2aecbdac8fe8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:20,320 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7f67e0c4-c07f-4289-a80c-d24a4dbb0adc 2018-02-15 18:33:20,320 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7f67e0c4-c07f-4289-a80c-d24a4dbb0adc 2018-02-15 18:33:20,320 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,322 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:20,417 - keystoneauth.session- DEBUG - RESP: [409] Content-Type: application/json Content-Length: 166 X-Openstack-Request-Id: req-56ff67f9-796f-4b38-b3ba-1e26ce4dbc47 Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"NeutronError": {"message": "Security group rule already exists. Rule id is e1e60e72-35cb-455f-8fec-75ddea3cad4b.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-15 18:33:20,417 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-56ff67f9-796f-4b38-b3ba-1e26ce4dbc47 2018-02-15 18:33:20,417 - neutronclient.v2_0.client- DEBUG - Error message: {"NeutronError": {"message": "Security group rule already exists. Rule id is e1e60e72-35cb-455f-8fec-75ddea3cad4b.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-15 18:33:20,417 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-56ff67f9-796f-4b38-b3ba-1e26ce4dbc47 2018-02-15 18:33:20,418 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,419 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:20,502 - keystoneauth.session- DEBUG - RESP: [409] Content-Type: application/json Content-Length: 166 X-Openstack-Request-Id: req-2fbb6887-8a93-4aae-8e7e-83fbf9a359c1 Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"NeutronError": {"message": "Security group rule already exists. Rule id is bbdf8503-fd64-4988-810c-b12e6e4426c5.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-15 18:33:20,502 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-2fbb6887-8a93-4aae-8e7e-83fbf9a359c1 2018-02-15 18:33:20,503 - neutronclient.v2_0.client- DEBUG - Error message: {"NeutronError": {"message": "Security group rule already exists. Rule id is bbdf8503-fd64-4988-810c-b12e6e4426c5.", "type": "SecurityGroupRuleExists", "detail": ""}} 2018-02-15 18:33:20,503 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-2fbb6887-8a93-4aae-8e7e-83fbf9a359c1 2018-02-15 18:33:20,503 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,504 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:20,639 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-a743545e-aa09-47df-9ece-ca4248a33e67 Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "5c533121-632f-4709-bebb-3ad07967d3ad", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:20,640 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-a743545e-aa09-47df-9ece-ca4248a33e67 2018-02-15 18:33:20,640 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-a743545e-aa09-47df-9ece-ca4248a33e67 2018-02-15 18:33:20,640 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,641 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:20,767 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-ef7d0217-de57-4ecb-9247-01d1db27c194 Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "6e59b577-790d-405c-bdfb-8b155d77aa47", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:20,767 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-ef7d0217-de57-4ecb-9247-01d1db27c194 2018-02-15 18:33:20,767 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-ef7d0217-de57-4ecb-9247-01d1db27c194 2018-02-15 18:33:20,768 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,769 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:20,923 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-d8d095c6-7d52-41fe-9fb7-a9bb191f1880 Date: Thu, 15 Feb 2018 18:33:20 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "080b51e7-7a65-45ca-b1ef-30c729cc26ec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:20,923 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-d8d095c6-7d52-41fe-9fb7-a9bb191f1880 2018-02-15 18:33:20,924 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-d8d095c6-7d52-41fe-9fb7-a9bb191f1880 2018-02-15 18:33:20,924 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:20,925 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:21,074 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-3fbbdc0d-b184-478c-9056-766d59d84c1b Date: Thu, 15 Feb 2018 18:33:21 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "c411541c-8350-4d1f-966f-93721f74aeec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:21,075 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-3fbbdc0d-b184-478c-9056-766d59d84c1b 2018-02-15 18:33:21,075 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-3fbbdc0d-b184-478c-9056-766d59d84c1b 2018-02-15 18:33:21,075 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:21,076 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "ingress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:21,350 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-9d18cf70-bd9a-46a2-9d5d-f83c58f88379 Date: Thu, 15 Feb 2018 18:33:21 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "08a0fc0a-14e4-4dc0-916e-ec86de64e999", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:21,350 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-9d18cf70-bd9a-46a2-9d5d-f83c58f88379 2018-02-15 18:33:21,351 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-9d18cf70-bd9a-46a2-9d5d-f83c58f88379 2018-02-15 18:33:21,351 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:21,352 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 22, "direction": "egress", "protocol": "tcp", "port_range_max": 22, "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:21,493 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-3eda3ca0-4e28-4ad5-b7e4-264bcc335176 Date: Thu, 15 Feb 2018 18:33:21 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "2006e804-6639-4302-a8a4-0194d3ea26bb", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:21,493 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-3eda3ca0-4e28-4ad5-b7e4-264bcc335176 2018-02-15 18:33:21,493 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-3eda3ca0-4e28-4ad5-b7e4-264bcc335176 2018-02-15 18:33:21,495 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:21,692 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 20143 X-Openstack-Request-Id: req-673eeec9-5306-45c5-b80a-b15136ced067 Date: Thu, 15 Feb 2018 18:33:21 GMT RESP BODY: {"security_groups": [{"description": "Default security group", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "updated_at": "2018-02-15T18:33:20Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "1bea388a-ffc0-4e30-9e08-a09b34a075ee", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "266fe554-ff7a-41d2-9fcf-2428e1141884", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "3169633d-de71-41eb-a03c-085c2ba8a7b7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "5e519615-9380-4e24-aad2-2aecbdac8fe8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "7d53d2d8-d67f-4fcb-9798-27fbdba1d834", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "bfeb317d-5ae8-4142-b20e-3d464ee0b693", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "d2fdfd55-1af7-48d8-9b69-2c169b034c97", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "ee27c5cc-3dc4-4863-a29c-abf96ed5689b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 5, "project_id": "c812352603634a88ab7f4aac1d15cb89", "id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "name": "default"}, {"description": "Example Security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:16Z", "updated_at": "2018-02-15T18:33:18Z", "security_group_rules": [{"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "161046f4-3953-4b86-b268-6b43e0df8bd7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "24d62374-8cf7-40ac-bfff-c09d7dd02c35", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "2eac3de8-8899-42c2-a994-1e887b9e6cc8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "5ad75814-5586-49e8-b09e-c4600801c1e9", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "bbdf8503-fd64-4988-810c-b12e6e4426c5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "e1e60e72-35cb-455f-8fec-75ddea3cad4b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 5, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-15T16:51:54Z", "updated_at": "2018-02-15T18:33:20Z", "security_group_rules": [{"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "187d6022-d9b1-438d-a207-789211ff992c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "27362b4b-2dd1-4982-875e-caae9db865f3", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "40cca284-bd8d-4f7f-8708-12895d8964e7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "45a07f84-4695-4e7b-81ad-fbfb25ad90f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "5c533121-632f-4709-bebb-3ad07967d3ad", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "6e59b577-790d-405c-bdfb-8b155d77aa47", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "867f4cf6-86a5-4f9d-abb4-6bb61ee731ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "a0eef51d-ef32-44a4-85ea-af1099474d0e", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 5, "project_id": "", "id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "name": "default"}, {"description": "Default security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T16:48:53Z", "updated_at": "2018-02-15T18:33:21Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "080b51e7-7a65-45ca-b1ef-30c729cc26ec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "4b1f7746-e449-464f-a892-78a0603d873e", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "552f8a7c-808d-46a6-b1ec-11f77ee6fd9b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "927eaea2-def0-4bda-9b12-d2b424d1c490", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "a5bfcaf7-6145-4a50-9dce-cd49a196c7a5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "ba1ae3eb-870c-49e2-96be-e60940f3c33d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "c411541c-8350-4d1f-966f-93721f74aeec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "de846c74-e63a-4bcb-b12f-8850a2fc2409", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 5, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "name": "default"}, {"description": "Default security group", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "created_at": "2018-02-15T18:29:14Z", "updated_at": "2018-02-15T18:33:21Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "00f92522-c7c8-4ce8-8adf-ed2e80d6a2fc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "08a0fc0a-14e4-4dc0-916e-ec86de64e999", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "159fa130-fb88-4e5f-8a10-fc494a348436", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "2006e804-6639-4302-a8a4-0194d3ea26bb", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "34d8cb82-387b-4a25-a27d-917d22c2fc58", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "9a2a32a4-8bca-4744-937d-f3826badf357", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "d30d61e4-e8e8-433a-8f21-9068211baad4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "e3cc0e92-393c-4cc7-8459-2309058fd6c6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 5, "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "name": "default"}]} 2018-02-15 18:33:21,693 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-673eeec9-5306-45c5-b80a-b15136ced067 2018-02-15 18:33:21,696 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-673eeec9-5306-45c5-b80a-b15136ced067 2018-02-15 18:33:21,696 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:21,698 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:21,847 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-7b457be9-0814-4400-b829-4f5fb0a9193c Date: Thu, 15 Feb 2018 18:33:21 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "5da38f6b-568f-4aef-8011-35361c840cf5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:21,847 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7b457be9-0814-4400-b829-4f5fb0a9193c 2018-02-15 18:33:21,847 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7b457be9-0814-4400-b829-4f5fb0a9193c 2018-02-15 18:33:21,848 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:21,849 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:22,001 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-4a84df07-19b7-4a7c-ab2b-d8ad8cb8e0f2 Date: Thu, 15 Feb 2018 18:33:21 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "5f783944-3b88-4a94-b436-3c2f8f2b0374", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,001 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-4a84df07-19b7-4a7c-ab2b-d8ad8cb8e0f2 2018-02-15 18:33:22,002 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-4a84df07-19b7-4a7c-ab2b-d8ad8cb8e0f2 2018-02-15 18:33:22,002 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,003 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:22,145 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-1b9bc013-da1a-405a-97a5-d9ca3e2e8f05 Date: Thu, 15 Feb 2018 18:33:22 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "120a810a-322f-4af6-ab7b-566a67c9842d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,145 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-1b9bc013-da1a-405a-97a5-d9ca3e2e8f05 2018-02-15 18:33:22,145 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-1b9bc013-da1a-405a-97a5-d9ca3e2e8f05 2018-02-15 18:33:22,145 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,146 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:22,310 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-7cd8b806-71ad-46d1-b3a7-b375ac7832e6 Date: Thu, 15 Feb 2018 18:33:22 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "ac9e7497-2bd2-4a79-a855-cf172c3d00b1", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,311 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7cd8b806-71ad-46d1-b3a7-b375ac7832e6 2018-02-15 18:33:22,311 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7cd8b806-71ad-46d1-b3a7-b375ac7832e6 2018-02-15 18:33:22,311 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,312 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:22,455 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-6470379e-29bb-4f7b-b9b5-7d475b4b5df5 Date: Thu, 15 Feb 2018 18:33:22 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "29a801aa-9571-4a1c-820a-fca34ab3086f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,455 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-6470379e-29bb-4f7b-b9b5-7d475b4b5df5 2018-02-15 18:33:22,455 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-6470379e-29bb-4f7b-b9b5-7d475b4b5df5 2018-02-15 18:33:22,455 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,457 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:22,602 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-1dfac1a6-5e19-410e-a460-6b9dcb1a0b44 Date: Thu, 15 Feb 2018 18:33:22 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "a90057d8-d749-4323-a66f-9cf3e8e56699", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,602 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-1dfac1a6-5e19-410e-a460-6b9dcb1a0b44 2018-02-15 18:33:22,602 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-1dfac1a6-5e19-410e-a460-6b9dcb1a0b44 2018-02-15 18:33:22,602 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,604 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:22,775 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-a32208ec-ae35-40ae-a3f0-5d3e36fa4b5c Date: Thu, 15 Feb 2018 18:33:22 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "05ca1ab5-e274-4260-bb74-fa3715283d0e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,775 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-a32208ec-ae35-40ae-a3f0-5d3e36fa4b5c 2018-02-15 18:33:22,776 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-a32208ec-ae35-40ae-a3f0-5d3e36fa4b5c 2018-02-15 18:33:22,776 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,777 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:22,931 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-6de1da04-6c85-4301-96f7-b995ca11e3fd Date: Thu, 15 Feb 2018 18:33:22 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "9c10ad63-a801-4dfd-af4d-6c45dcd12eb7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:22,931 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-6de1da04-6c85-4301-96f7-b995ca11e3fd 2018-02-15 18:33:22,932 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-6de1da04-6c85-4301-96f7-b995ca11e3fd 2018-02-15 18:33:22,932 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:22,933 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "ingress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:23,097 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-2e9dc669-6511-484c-9e46-bd7de8bf078d Date: Thu, 15 Feb 2018 18:33:23 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "ca284b6b-8e12-44a4-9d4e-6b3873ae616f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:23,097 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-2e9dc669-6511-484c-9e46-bd7de8bf078d 2018-02-15 18:33:23,098 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-2e9dc669-6511-484c-9e46-bd7de8bf078d 2018-02-15 18:33:23,098 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:23,099 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 80, "direction": "egress", "protocol": "tcp", "port_range_max": 80, "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:23,299 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-be9b640c-b067-4a09-a32f-6720982e379f Date: Thu, 15 Feb 2018 18:33:23 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "74bc9434-45e5-46d9-b818-49e3365c3599", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:23,299 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-be9b640c-b067-4a09-a32f-6720982e379f 2018-02-15 18:33:23,299 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-be9b640c-b067-4a09-a32f-6720982e379f 2018-02-15 18:33:23,301 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9696/v2.0/security-groups.json -H "User-Agent: python-neutronclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" 2018-02-15 18:33:23,358 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 24978 X-Openstack-Request-Id: req-18f1956f-91f4-48bf-9157-69ec115eaae8 Date: Thu, 15 Feb 2018 18:33:23 GMT RESP BODY: {"security_groups": [{"description": "Default security group", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "created_at": "2018-02-15T16:48:09Z", "updated_at": "2018-02-15T18:33:21Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "1bea388a-ffc0-4e30-9e08-a09b34a075ee", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "266fe554-ff7a-41d2-9fcf-2428e1141884", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv6", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "3169633d-de71-41eb-a03c-085c2ba8a7b7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "5da38f6b-568f-4aef-8011-35361c840cf5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "5e519615-9380-4e24-aad2-2aecbdac8fe8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "5f783944-3b88-4a94-b436-3c2f8f2b0374", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "7d53d2d8-d67f-4fcb-9798-27fbdba1d834", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "bfeb317d-5ae8-4142-b20e-3d464ee0b693", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:09Z", "revision_number": 1, "id": "d2fdfd55-1af7-48d8-9b69-2c169b034c97", "remote_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:09Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "c812352603634a88ab7f4aac1d15cb89", "port_range_min": null, "ethertype": "IPv4", "project_id": "c812352603634a88ab7f4aac1d15cb89"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "ee27c5cc-3dc4-4863-a29c-abf96ed5689b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 7, "project_id": "c812352603634a88ab7f4aac1d15cb89", "id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "name": "default"}, {"description": "Example Security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T18:33:16Z", "updated_at": "2018-02-15T18:33:22Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "120a810a-322f-4af6-ab7b-566a67c9842d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "161046f4-3953-4b86-b268-6b43e0df8bd7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "24d62374-8cf7-40ac-bfff-c09d7dd02c35", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "2eac3de8-8899-42c2-a994-1e887b9e6cc8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:33:16Z", "revision_number": 1, "id": "5ad75814-5586-49e8-b09e-c4600801c1e9", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:16Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "ac9e7497-2bd2-4a79-a855-cf172c3d00b1", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "bbdf8503-fd64-4988-810c-b12e6e4426c5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:17Z", "revision_number": 1, "id": "e1e60e72-35cb-455f-8fec-75ddea3cad4b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:17Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 7, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "name": "example-sg"}, {"description": "Default security group", "tenant_id": "", "created_at": "2018-02-15T16:51:54Z", "updated_at": "2018-02-15T18:33:22Z", "security_group_rules": [{"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "187d6022-d9b1-438d-a207-789211ff992c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "27362b4b-2dd1-4982-875e-caae9db865f3", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "29a801aa-9571-4a1c-820a-fca34ab3086f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "40cca284-bd8d-4f7f-8708-12895d8964e7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "45a07f84-4695-4e7b-81ad-fbfb25ad90f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "5c533121-632f-4709-bebb-3ad07967d3ad", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "6e59b577-790d-405c-bdfb-8b155d77aa47", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "867f4cf6-86a5-4f9d-abb4-6bb61ee731ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:51:54Z", "revision_number": 1, "id": "a0eef51d-ef32-44a4-85ea-af1099474d0e", "remote_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "remote_ip_prefix": null, "created_at": "2018-02-15T16:51:54Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "a90057d8-d749-4323-a66f-9cf3e8e56699", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 7, "project_id": "", "id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "name": "default"}, {"description": "Default security group", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15T16:48:53Z", "updated_at": "2018-02-15T18:33:22Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "05ca1ab5-e274-4260-bb74-fa3715283d0e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:20Z", "revision_number": 1, "id": "080b51e7-7a65-45ca-b1ef-30c729cc26ec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:20Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "4b1f7746-e449-464f-a892-78a0603d873e", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:18Z", "revision_number": 1, "id": "552f8a7c-808d-46a6-b1ec-11f77ee6fd9b", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:18Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "927eaea2-def0-4bda-9b12-d2b424d1c490", "remote_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:22Z", "revision_number": 1, "id": "9c10ad63-a801-4dfd-af4d-6c45dcd12eb7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:22Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "a5bfcaf7-6145-4a50-9dce-cd49a196c7a5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "ba1ae3eb-870c-49e2-96be-e60940f3c33d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv6", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "c411541c-8350-4d1f-966f-93721f74aeec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T16:48:53Z", "revision_number": 1, "id": "de846c74-e63a-4bcb-b12f-8850a2fc2409", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T16:48:53Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 7, "project_id": "43a3651d794746998b740a442f92ccfd", "id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "name": "default"}, {"description": "Default security group", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "created_at": "2018-02-15T18:29:14Z", "updated_at": "2018-02-15T18:33:23Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "00f92522-c7c8-4ce8-8adf-ed2e80d6a2fc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "08a0fc0a-14e4-4dc0-916e-ec86de64e999", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "159fa130-fb88-4e5f-8a10-fc494a348436", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv6", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 22, "updated_at": "2018-02-15T18:33:21Z", "revision_number": 1, "id": "2006e804-6639-4302-a8a4-0194d3ea26bb", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:21Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 22, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "34d8cb82-387b-4a25-a27d-917d22c2fc58", "remote_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "egress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "74bc9434-45e5-46d9-b818-49e3365c3599", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": null, "description": null, "port_range_max": null, "updated_at": "2018-02-15T18:29:14Z", "revision_number": 1, "id": "9a2a32a4-8bca-4744-937d-f3826badf357", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:29:14Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "port_range_min": null, "ethertype": "IPv4", "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c"}, {"direction": "ingress", "protocol": "tcp", "description": "", "port_range_max": 80, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "ca284b6b-8e12-44a4-9d4e-6b3873ae616f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 80, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "egress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "d30d61e4-e8e8-433a-8f21-9068211baad4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}, {"direction": "ingress", "protocol": "icmp", "description": "", "port_range_max": null, "updated_at": "2018-02-15T18:33:19Z", "revision_number": 1, "id": "e3cc0e92-393c-4cc7-8459-2309058fd6c6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:19Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": null, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}], "revision_number": 7, "project_id": "4be3f8fb9af04d2eb58e6765a1cacd2c", "id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "name": "default"}]} 2018-02-15 18:33:23,359 - keystoneauth.session- DEBUG - GET call to network for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-18f1956f-91f4-48bf-9157-69ec115eaae8 2018-02-15 18:33:23,362 - neutronclient.v2_0.client- DEBUG - GET call to neutron for http://172.30.9.22:9696/v2.0/security-groups.json used request id req-18f1956f-91f4-48bf-9157-69ec115eaae8 2018-02-15 18:33:23,362 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:23,363 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:23,504 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-1002fecd-deb6-4912-9081-d067cc5a0399 Date: Thu, 15 Feb 2018 18:33:23 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "7f72ea89-7c2b-4994-bd52-e555c4e33951", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:23,504 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-1002fecd-deb6-4912-9081-d067cc5a0399 2018-02-15 18:33:23,505 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-1002fecd-deb6-4912-9081-d067cc5a0399 2018-02-15 18:33:23,505 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:23,506 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6"}}' 2018-02-15 18:33:23,667 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-91b5abe0-cac0-4c53-9e67-34c5889b45b7 Date: Thu, 15 Feb 2018 18:33:23 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "19b20e67-cd79-46a3-b2cb-ffcecbbe6256", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "01e260a6-4bb0-4e83-92e0-bcf43579c8e6", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:23,668 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-91b5abe0-cac0-4c53-9e67-34c5889b45b7 2018-02-15 18:33:23,668 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-91b5abe0-cac0-4c53-9e67-34c5889b45b7 2018-02-15 18:33:23,668 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:23,669 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:23,947 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-b6c4ccff-3819-45fb-8fe0-6c0cf7615076 Date: Thu, 15 Feb 2018 18:33:23 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:23Z", "revision_number": 1, "id": "0088420c-f8d4-4a0a-ba37-aa2654715924", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:23Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:23,947 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-b6c4ccff-3819-45fb-8fe0-6c0cf7615076 2018-02-15 18:33:23,947 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-b6c4ccff-3819-45fb-8fe0-6c0cf7615076 2018-02-15 18:33:23,947 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:23,948 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:33:24,237 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-68458811-9af8-4ba7-905b-f86eb110fa42 Date: Thu, 15 Feb 2018 18:33:24 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:24Z", "revision_number": 1, "id": "eb39c15a-082a-4a5d-8be2-7544ef5615a4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:24Z", "security_group_id": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:24,237 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-68458811-9af8-4ba7-905b-f86eb110fa42 2018-02-15 18:33:24,237 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-68458811-9af8-4ba7-905b-f86eb110fa42 2018-02-15 18:33:24,237 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:24,238 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:24,642 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-8497a7eb-9532-45cd-a0a7-b761052023a6 Date: Thu, 15 Feb 2018 18:33:24 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:24Z", "revision_number": 1, "id": "0e5729cf-4776-4398-a18b-519af5581aac", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:24Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:24,642 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-8497a7eb-9532-45cd-a0a7-b761052023a6 2018-02-15 18:33:24,642 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-8497a7eb-9532-45cd-a0a7-b761052023a6 2018-02-15 18:33:24,642 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:24,643 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004"}}' 2018-02-15 18:33:24,800 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-06730086-f102-4dc4-a34c-682bb203681c Date: Thu, 15 Feb 2018 18:33:24 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:24Z", "revision_number": 1, "id": "d7c135a9-1fb8-43f7-a462-a76fe1d6542f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:24Z", "security_group_id": "d0701e7a-e1fe-4366-a731-d18e4cf22004", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:24,801 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-06730086-f102-4dc4-a34c-682bb203681c 2018-02-15 18:33:24,801 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-06730086-f102-4dc4-a34c-682bb203681c 2018-02-15 18:33:24,801 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:24,803 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:25,135 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-a0cf83fe-baab-4893-9ef2-a1714ad5e259 Date: Thu, 15 Feb 2018 18:33:25 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:25Z", "revision_number": 1, "id": "b63d523c-2938-48df-8731-33a295187818", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:25Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:25,136 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-a0cf83fe-baab-4893-9ef2-a1714ad5e259 2018-02-15 18:33:25,136 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-a0cf83fe-baab-4893-9ef2-a1714ad5e259 2018-02-15 18:33:25,136 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:25,137 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57"}}' 2018-02-15 18:33:25,408 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-241d8954-33cd-4a5c-baf8-b6ada0d10065 Date: Thu, 15 Feb 2018 18:33:25 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:25Z", "revision_number": 1, "id": "5e89aac7-198f-4f88-80fb-843ef40464d4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:25Z", "security_group_id": "e28781f2-4f45-4019-8793-a7738d1e2a57", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:25,408 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-241d8954-33cd-4a5c-baf8-b6ada0d10065 2018-02-15 18:33:25,408 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-241d8954-33cd-4a5c-baf8-b6ada0d10065 2018-02-15 18:33:25,409 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:25,410 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "ingress", "protocol": "udp", "port_range_max": 68, "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:25,566 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 507 X-Openstack-Request-Id: req-71054f9b-a19c-4c61-a603-00966e299cb8 Date: Thu, 15 Feb 2018 18:33:25 GMT RESP BODY: {"security_group_rule": {"direction": "ingress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:25Z", "revision_number": 1, "id": "64140532-c003-403a-95d8-dc1ab25d1cbc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:25Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:25,566 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-71054f9b-a19c-4c61-a603-00966e299cb8 2018-02-15 18:33:25,566 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-71054f9b-a19c-4c61-a603-00966e299cb8 2018-02-15 18:33:25,566 - sfc.lib.utils- DEBUG - Security_group format set (port range included) 2018-02-15 18:33:25,568 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9696/v2.0/security-group-rules.json -H "User-Agent: python-neutronclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}6a44174d4fbe15763f8dd19c71892e3762f4b1d6" -d '{"security_group_rule": {"port_range_min": 67, "direction": "egress", "protocol": "udp", "port_range_max": 68, "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97"}}' 2018-02-15 18:33:25,851 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 506 X-Openstack-Request-Id: req-7e0e8cae-b7f7-4e87-ad9c-81ac0d7df1da Date: Thu, 15 Feb 2018 18:33:25 GMT RESP BODY: {"security_group_rule": {"direction": "egress", "protocol": "udp", "description": "", "port_range_max": 68, "updated_at": "2018-02-15T18:33:25Z", "revision_number": 1, "id": "939a4935-f68e-412a-8b87-a7a492480db2", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2018-02-15T18:33:25Z", "security_group_id": "ec080213-bf7f-4e68-bb0f-45e172d85d97", "tenant_id": "43a3651d794746998b740a442f92ccfd", "port_range_min": 67, "ethertype": "IPv4", "project_id": "43a3651d794746998b740a442f92ccfd"}} 2018-02-15 18:33:25,852 - keystoneauth.session- DEBUG - POST call to network for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7e0e8cae-b7f7-4e87-ad9c-81ac0d7df1da 2018-02-15 18:33:25,852 - neutronclient.v2_0.client- DEBUG - POST call to neutron for http://172.30.9.22:9696/v2.0/security-group-rules.json used request id req-7e0e8cae-b7f7-4e87-ad9c-81ac0d7df1da 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:33:25,853 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:33:25,854 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:33:25,855 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:33:25,855 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:33:25,855 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:33:25,859 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:33:25,866 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:33:25 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-d4d7f879-aea5-4553-af93-aa0d53fe9e4c Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:33:25,866 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-d4d7f879-aea5-4553-af93-aa0d53fe9e4c 2018-02-15 18:33:25,867 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:33:26,018 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:33:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["12YOBpxoQ4G51ALsYd99zw"], "issued_at": "2018-02-15T18:33:26.000000Z"}} 2018-02-15 18:33:26,019 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/os-hypervisors/detail -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b2c952abab74179cec9bbddb30058ab18fc69e37" 2018-02-15 18:33:26,206 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 2965 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-738b2d2b-cf5b-43e1-8d67-4e8a40e5aab2 Date: Thu, 15 Feb 2018 18:33:26 GMT RESP BODY: {"hypervisors": [{"status": "enabled", "service": {"host": "overcloud-novacompute-0.opnfvlf.org", "disabled_reason": null, "id": 141}, "vcpus_used": 0, "hypervisor_type": "QEMU", "local_gb_used": 0, "vcpus": 16, "hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "memory_mb_used": 2048, "memory_mb": 32502, "current_workload": 0, "state": "up", "host_ip": "192.30.9.7", "cpu_info": "{\"vendor\": \"Intel\", \"model\": \"Haswell-noTSX\", \"arch\": \"x86_64\", \"features\": [\"pge\", \"avx\", \"xsaveopt\", \"clflush\", \"sep\", \"syscall\", \"tsc_adjust\", \"tsc-deadline\", \"dtes64\", \"invpcid\", \"tsc\", \"fsgsbase\", \"xsave\", \"vmx\", \"erms\", \"xtpr\", \"cmov\", \"smep\", \"pcid\", \"est\", \"pat\", \"monitor\", \"smx\", \"pbe\", \"lm\", \"msr\", \"nx\", \"fxsr\", \"tm\", \"sse4.1\", \"pae\", \"sse4.2\", \"pclmuldq\", \"acpi\", \"fma\", \"vme\", \"popcnt\", \"mmx\", \"osxsave\", \"cx8\", \"mce\", \"de\", \"rdtscp\", \"ht\", \"dca\", \"lahf_lm\", \"abm\", \"pdcm\", \"mca\", \"pdpe1gb\", \"apic\", \"sse\", \"f16c\", \"pse\", \"ds\", \"invtsc\", \"pni\", \"tm2\", \"avx2\", \"aes\", \"sse2\", \"ss\", \"ds_cpl\", \"arat\", \"bmi1\", \"bmi2\", \"ssse3\", \"fpu\", \"cx16\", \"pse36\", \"mtrr\", \"movbe\", \"rdrand\", \"cmt\", \"x2apic\"], \"topology\": {\"cores\": 4, \"cells\": 2, \"threads\": 2, \"sockets\": 1}}", "running_vms": 0, "free_disk_gb": 926, "hypervisor_version": 2006000, "disk_available_least": 831, "local_gb": 926, "free_ram_mb": 30454, "id": 3}, {"status": "enabled", "service": {"host": "overcloud-novacompute-1.opnfvlf.org", "disabled_reason": null, "id": 144}, "vcpus_used": 0, "hypervisor_type": "QEMU", "local_gb_used": 0, "vcpus": 16, "hypervisor_hostname": "overcloud-novacompute-1.opnfvlf.org", "memory_mb_used": 2048, "memory_mb": 32502, "current_workload": 0, "state": "up", "host_ip": "192.30.9.6", "cpu_info": "{\"vendor\": \"Intel\", \"model\": \"Haswell-noTSX\", \"arch\": \"x86_64\", \"features\": [\"pge\", \"avx\", \"xsaveopt\", \"clflush\", \"sep\", \"syscall\", \"tsc_adjust\", \"tsc-deadline\", \"dtes64\", \"invpcid\", \"tsc\", \"fsgsbase\", \"xsave\", \"vmx\", \"erms\", \"xtpr\", \"cmov\", \"smep\", \"pcid\", \"est\", \"pat\", \"monitor\", \"smx\", \"pbe\", \"lm\", \"msr\", \"nx\", \"fxsr\", \"tm\", \"sse4.1\", \"pae\", \"sse4.2\", \"pclmuldq\", \"acpi\", \"fma\", \"vme\", \"popcnt\", \"mmx\", \"osxsave\", \"cx8\", \"mce\", \"de\", \"rdtscp\", \"ht\", \"dca\", \"lahf_lm\", \"abm\", \"pdcm\", \"mca\", \"pdpe1gb\", \"apic\", \"sse\", \"f16c\", \"pse\", \"ds\", \"invtsc\", \"pni\", \"tm2\", \"avx2\", \"aes\", \"sse2\", \"ss\", \"ds_cpl\", \"arat\", \"bmi1\", \"bmi2\", \"ssse3\", \"fpu\", \"cx16\", \"pse36\", \"mtrr\", \"movbe\", \"rdrand\", \"cmt\", \"x2apic\"], \"topology\": {\"cores\": 4, \"cells\": 2, \"threads\": 2, \"sockets\": 1}}", "running_vms": 0, "free_disk_gb": 926, "hypervisor_version": 2006000, "disk_available_least": 827, "local_gb": 926, "free_ram_mb": 30454, "id": 6}]} 2018-02-15 18:33:26,206 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/os-hypervisors/detail used request id req-738b2d2b-cf5b-43e1-8d67-4e8a40e5aab2 2018-02-15 18:33:26,208 - sfc.lib.topology_shuffler- INFO - Creating enpoint and VNF topology on the compute hosts 2018-02-15 18:33:26,208 - sfc.lib.topology_shuffler- INFO - All endpoints and VNFs are on a single host. This is the baseline test. 2018-02-15 18:33:26,208 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - This test is run with the topology CLIENT_SERVER_VNF_SAME_HOST 2018-02-15 18:33:26,209 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - Topology description: All endpoints and VNFs are on a single host. This is the baseline test. 2018-02-15 18:33:26,209 - sfc.lib.utils- INFO - Creating instance 'client'... 2018-02-15 18:33:26,209 - sfc.lib.utils- DEBUG - Configuration: name=client flavor=custom image=e12fe53d-ed3b-4ba7-8b20-8bd4773186da network=1a9afbd0-9e88-41e5-8e79-54ef2af32b01 secgroup=4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71 hypervisor=nova::overcloud-novacompute-0.opnfvlf.org fixed_ip=None files=None userdata= None 2018-02-15 18:33:26,209 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:33:26,209 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:33:26,209 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:33:26,209 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:33:26,209 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:33:26,209 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:33:26,210 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:33:26,211 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:33:26,211 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:33:26,211 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:33:26,211 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:33:26,211 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:33:26,211 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:33:26,213 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:33:26,213 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:33:26,213 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:33:26,214 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:33:26,215 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:33:26,218 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:33:26,225 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:33:26 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-30007fb5-3e31-428f-a7f2-7a29088e14a4 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:33:26,225 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-30007fb5-3e31-428f-a7f2-7a29088e14a4 2018-02-15 18:33:26,225 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:33:26,369 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:33:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["2med4MWpSvenw-V0wX6X9g"], "issued_at": "2018-02-15T18:33:26.000000Z"}} 2018-02-15 18:33:26,370 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/flavors -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}89185edce58ab901d79b7653969161c3ddc3e410" 2018-02-15 18:33:26,541 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 574 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-9f36cf98-9722-4482-8362-a3bb78b7ffd7 Date: Thu, 15 Feb 2018 18:33:26 GMT RESP BODY: {"flavors": [{"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}], "name": "custom"}, {"id": "80b10048-8bc5-44d6-bfb8-68a21e26b784", "links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/80b10048-8bc5-44d6-bfb8-68a21e26b784", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/80b10048-8bc5-44d6-bfb8-68a21e26b784", "rel": "bookmark"}], "name": "m1.tiny"}]} 2018-02-15 18:33:26,541 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/flavors used request id req-9f36cf98-9722-4482-8362-a3bb78b7ffd7 2018-02-15 18:33:26,542 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}89185edce58ab901d79b7653969161c3ddc3e410" 2018-02-15 18:33:26,565 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 462 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-d300d572-69c1-4472-9f28-16ba4755ce6e Date: Thu, 15 Feb 2018 18:33:26 GMT RESP BODY: {"flavor": {"links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}], "ram": 1500, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "name": "custom", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2018-02-15 18:33:26,565 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0 used request id req-d300d572-69c1-4472-9f28-16ba4755ce6e 2018-02-15 18:33:26,566 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:8774/v2.1/servers -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}89185edce58ab901d79b7653969161c3ddc3e410" -d '{"server": {"name": "client", "imageRef": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "availability_zone": "nova::overcloud-novacompute-0.opnfvlf.org", "flavorRef": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "max_count": 1, "min_count": 1, "networks": [{"uuid": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01"}]}}' 2018-02-15 18:33:28,182 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 374 Location: http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-e6dd1933-9726-47a3-84a0-06dd53b7ac31 Date: Thu, 15 Feb 2018 18:33:28 GMT RESP BODY: {"server": {"security_groups": [{"name": "default"}], "OS-DCF:diskConfig": "MANUAL", "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "adminPass": "eTcmZ6Ft9Ler"}} 2018-02-15 18:33:28,182 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.22:8774/v2.1/servers used request id req-e6dd1933-9726-47a3-84a0-06dd53b7ac31 2018-02-15 18:33:28,183 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:33:28,190 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:33:28 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-ee5c061c-3807-4ec6-b40e-4a3c8d0d8a25 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:33:28,190 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-ee5c061c-3807-4ec6-b40e-4a3c8d0d8a25 2018-02-15 18:33:28,190 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:33:28,334 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:33:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["qUVGlsHqT3mhOaxD_8PDVw"], "issued_at": "2018-02-15T18:33:28.000000Z"}} 2018-02-15 18:33:28,335 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:28,813 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1344 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-059c60d8-87da-4c34-b85c-1b056a60c00a Date: Thu, 15 Feb 2018 18:33:28 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "scheduling", "addresses": {}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:28Z", "hostId": "", "OS-EXT-SRV-ATTR:host": null, "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:28,813 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-059c60d8-87da-4c34-b85c-1b056a60c00a 2018-02-15 18:33:31,818 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:32,689 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1523 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-63db7751-5eec-41a9-b594-4481f8acb2e7 Date: Thu, 15 Feb 2018 18:33:32 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:32,689 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-63db7751-5eec-41a9-b594-4481f8acb2e7 2018-02-15 18:33:35,693 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:36,174 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-8d1c1a99-37d7-471e-9639-65f674e9e4de Date: Thu, 15 Feb 2018 18:33:36 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:36,174 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-8d1c1a99-37d7-471e-9639-65f674e9e4de 2018-02-15 18:33:39,179 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:39,802 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-3701bd96-ab90-45cc-a7fd-2e521c9618a6 Date: Thu, 15 Feb 2018 18:33:39 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:39,802 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-3701bd96-ab90-45cc-a7fd-2e521c9618a6 2018-02-15 18:33:42,807 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:43,273 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-3af47ef5-4242-4b5e-aa0c-2a697e027d26 Date: Thu, 15 Feb 2018 18:33:43 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:43,273 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-3af47ef5-4242-4b5e-aa0c-2a697e027d26 2018-02-15 18:33:46,278 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:46,909 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-a4a5f086-cb53-4eee-b045-0eca1f2296ce Date: Thu, 15 Feb 2018 18:33:46 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:46,910 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-a4a5f086-cb53-4eee-b045-0eca1f2296ce 2018-02-15 18:33:49,914 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:50,569 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-1fac8768-db2f-49fb-a0a6-ec47010e8127 Date: Thu, 15 Feb 2018 18:33:50 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:50,569 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-1fac8768-db2f-49fb-a0a6-ec47010e8127 2018-02-15 18:33:53,574 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:54,392 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-1a9bb76c-473f-4ebc-9536-f5d83be4a568 Date: Thu, 15 Feb 2018 18:33:54 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:54,392 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-1a9bb76c-473f-4ebc-9536-f5d83be4a568 2018-02-15 18:33:57,397 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:33:57,986 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-7df77aac-32c9-4761-98ae-b44670ed6595 Date: Thu, 15 Feb 2018 18:33:57 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:33:57,986 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-7df77aac-32c9-4761-98ae-b44670ed6595 2018-02-15 18:34:00,990 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:34:01,755 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-292dc57c-3462-4bcf-89ae-0a8d195509f5 Date: Thu, 15 Feb 2018 18:34:01 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:01,756 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-292dc57c-3462-4bcf-89ae-0a8d195509f5 2018-02-15 18:34:04,760 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:34:05,455 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1650 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-d03eea5c-3420-4e5c-a468-568fa9089daa Date: Thu, 15 Feb 2018 18:34:05 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:33:29Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:05,455 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-d03eea5c-3420-4e5c-a468-568fa9089daa 2018-02-15 18:34:08,459 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}9f025ba319bc9e47929cd225ff768733e7e1562d" 2018-02-15 18:34:09,121 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1667 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-704da7d7-e2dc-4499-8d53-1cee99db5e39 Date: Thu, 15 Feb 2018 18:34:09 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": "2018-02-15T18:28:42.000000", "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-15T18:34:04Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:09,121 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-704da7d7-e2dc-4499-8d53-1cee99db5e39 2018-02-15 18:34:09,122 - sfc.lib.utils- DEBUG - Adding 'client' to security group '4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71'... 2018-02-15 18:34:09,122 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:34:09,128 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:34:09 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-66e8c7d8-36e1-4766-a613-f67d70f3cbc4 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:34:09,129 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-66e8c7d8-36e1-4766-a613-f67d70f3cbc4 2018-02-15 18:34:09,129 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:34:09,281 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:34:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["gYOaLCWERlSe5mm6eNK7qg"], "issued_at": "2018-02-15T18:34:09.000000Z"}} 2018-02-15 18:34:09,282 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25/action -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}dd804b244d02bc1f1a88930afd1ffa02c8beb541" -d '{"addSecurityGroup": {"name": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:34:10,671 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 0 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-616e8633-bc7e-478d-8150-a50f5fa47399 Date: Thu, 15 Feb 2018 18:34:10 GMT 2018-02-15 18:34:10,671 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25/action used request id req-616e8633-bc7e-478d-8150-a50f5fa47399 2018-02-15 18:34:10,671 - sfc.lib.utils- INFO - Creating instance 'server'... 2018-02-15 18:34:10,671 - sfc.lib.utils- DEBUG - Configuration: name=server flavor=custom image=e12fe53d-ed3b-4ba7-8b20-8bd4773186da network=1a9afbd0-9e88-41e5-8e79-54ef2af32b01 secgroup=4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71 hypervisor=nova::overcloud-novacompute-0.opnfvlf.org fixed_ip=None files=None userdata= None 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:34:10,672 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:34:10,673 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:34:10,674 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:34:10,674 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:34:10,676 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 2018-02-15 18:34:10,676 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token_endpoint = openstackclient.api.auth_plugin:TokenEndpoint') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 2018-02-15 18:34:10,677 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-basic = gnocchiclient.auth:GnocchiBasicLoader') 2018-02-15 18:34:10,678 - stevedore.extension- DEBUG - found extension EntryPoint.parse('gnocchi-noauth = gnocchiclient.auth:GnocchiNoAuthLoader') 2018-02-15 18:34:10,681 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:34:10,687 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:34:10 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-3735f250-ccb0-4a23-afda-05268e0422e1 Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:34:10,688 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-3735f250-ccb0-4a23-afda-05268e0422e1 2018-02-15 18:34:10,688 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:34:10,843 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:34:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["-9PynNrvRquA3E_FCFKbqA"], "issued_at": "2018-02-15T18:34:10.000000Z"}} 2018-02-15 18:34:10,844 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/flavors -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}60f2be7ff5ffd118fbddd20ce31474f6b54d50ca" 2018-02-15 18:34:10,967 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 574 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-7b50ebe5-462c-4f14-8013-5208782845c4 Date: Thu, 15 Feb 2018 18:34:10 GMT RESP BODY: {"flavors": [{"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}], "name": "custom"}, {"id": "80b10048-8bc5-44d6-bfb8-68a21e26b784", "links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/80b10048-8bc5-44d6-bfb8-68a21e26b784", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/80b10048-8bc5-44d6-bfb8-68a21e26b784", "rel": "bookmark"}], "name": "m1.tiny"}]} 2018-02-15 18:34:10,967 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/flavors used request id req-7b50ebe5-462c-4f14-8013-5208782845c4 2018-02-15 18:34:10,968 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}60f2be7ff5ffd118fbddd20ce31474f6b54d50ca" 2018-02-15 18:34:10,989 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 462 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-325fa00a-7a06-49e5-aa5a-169a527763be Date: Thu, 15 Feb 2018 18:34:10 GMT RESP BODY: {"flavor": {"links": [{"href": "http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "self"}, {"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}], "ram": 1500, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "name": "custom", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2018-02-15 18:34:10,989 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0 used request id req-325fa00a-7a06-49e5-aa5a-169a527763be 2018-02-15 18:34:10,990 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:8774/v2.1/servers -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}60f2be7ff5ffd118fbddd20ce31474f6b54d50ca" -d '{"server": {"name": "server", "imageRef": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "availability_zone": "nova::overcloud-novacompute-0.opnfvlf.org", "flavorRef": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "max_count": 1, "min_count": 1, "networks": [{"uuid": "1a9afbd0-9e88-41e5-8e79-54ef2af32b01"}]}}' 2018-02-15 18:34:12,621 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 374 Location: http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-507d505b-7996-4208-954e-98f020275246 Date: Thu, 15 Feb 2018 18:34:12 GMT RESP BODY: {"server": {"security_groups": [{"name": "default"}], "OS-DCF:diskConfig": "MANUAL", "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "adminPass": "g6YJVKgKMmyS"}} 2018-02-15 18:34:12,622 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.22:8774/v2.1/servers used request id req-507d505b-7996-4208-954e-98f020275246 2018-02-15 18:34:12,623 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:34:12,629 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:34:12 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-4a99c373-1d3d-4a7c-8585-0f0e8622dcfd Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:34:12,629 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-4a99c373-1d3d-4a7c-8585-0f0e8622dcfd 2018-02-15 18:34:12,630 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:34:12,813 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:34:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["mNQTEx0_TLeRA-4ybuCZwQ"], "issued_at": "2018-02-15T18:34:12.000000Z"}} 2018-02-15 18:34:12,814 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:13,219 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1344 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-0a077fe5-5b92-4a06-b936-165fe82a216e Date: Thu, 15 Feb 2018 18:34:13 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "scheduling", "addresses": {}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:34:12Z", "hostId": "", "OS-EXT-SRV-ATTR:host": null, "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:13,219 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-0a077fe5-5b92-4a06-b936-165fe82a216e 2018-02-15 18:34:16,223 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:17,033 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1523 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-cc79eb52-e0c9-4a0b-9cba-b28e3e14f207 Date: Thu, 15 Feb 2018 18:34:17 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:34:13Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:17,033 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-cc79eb52-e0c9-4a0b-9cba-b28e3e14f207 2018-02-15 18:34:20,035 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:20,731 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-f90ac914-6292-4266-b714-35bd714e094c Date: Thu, 15 Feb 2018 18:34:20 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4f:cb:b0", "version": 4, "addr": "11.0.0.12", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:34:13Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:20,731 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-f90ac914-6292-4266-b714-35bd714e094c 2018-02-15 18:34:23,733 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:24,497 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-5a50988a-4d0b-4533-8844-eb022c4b2708 Date: Thu, 15 Feb 2018 18:34:24 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4f:cb:b0", "version": 4, "addr": "11.0.0.12", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:34:13Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:24,497 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-5a50988a-4d0b-4533-8844-eb022c4b2708 2018-02-15 18:34:27,501 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:28,259 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-cb87d962-3bff-4d74-b300-1b1d5ef61e0a Date: Thu, 15 Feb 2018 18:34:28 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4f:cb:b0", "version": 4, "addr": "11.0.0.12", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:34:13Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:28,259 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-cb87d962-3bff-4d74-b300-1b1d5ef61e0a 2018-02-15 18:34:31,264 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:31,747 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1651 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-46a01dbe-09e4-4c7a-8b4a-61b934136807 Date: Thu, 15 Feb 2018 18:34:31 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": "spawning", "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4f:cb:b0", "version": 4, "addr": "11.0.0.12", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "building", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": null, "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 0, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "BUILD", "updated": "2018-02-15T18:34:13Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:31,747 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-46a01dbe-09e4-4c7a-8b4a-61b934136807 2018-02-15 18:34:34,751 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}b3c5a741a17bc091c7def86ebc901f9a293faca2" 2018-02-15 18:34:35,407 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1668 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-ba784a7b-1a52-4035-a203-b429be4df5dc Date: Thu, 15 Feb 2018 18:34:35 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4f:cb:b0", "version": 4, "addr": "11.0.0.12", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": "2018-02-15T18:29:09.000000", "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-15T18:34:32Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:35,408 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-ba784a7b-1a52-4035-a203-b429be4df5dc 2018-02-15 18:34:35,408 - sfc.lib.utils- DEBUG - Adding 'server' to security group '4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71'... 2018-02-15 18:34:35,409 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f/action -H "User-Agent: python-novaclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}dd804b244d02bc1f1a88930afd1ffa02c8beb541" -d '{"addSecurityGroup": {"name": "4f89ed94-2cd6-4f6b-8ea3-afa1b603ed71"}}' 2018-02-15 18:34:37,054 - novaclient.v2.client- DEBUG - RESP: [202] Content-Length: 0 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-9481e35d-cbd7-4391-949a-abe727c9c522 Date: Thu, 15 Feb 2018 18:34:37 GMT 2018-02-15 18:34:37,054 - novaclient.v2.client- DEBUG - POST call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f/action used request id req-9481e35d-cbd7-4391-949a-abe727c9c522 2018-02-15 18:34:37,055 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}89185edce58ab901d79b7653969161c3ddc3e410" 2018-02-15 18:34:37,898 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1691 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-49d84545-d47e-4bab-b73e-9a3d1b6582f2 Date: Thu, 15 Feb 2018 18:34:37 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:6e:f4:4f", "version": 4, "addr": "11.0.0.6", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000105", "OS-SRV-USG:launched_at": "2018-02-15T18:28:42.000000", "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25", "security_groups": [{"name": "example-sg"}, {"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-15T18:34:04Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "client", "created": "2018-02-15T18:33:28Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:37,898 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/ef44f4d9-7d41-4e87-aae2-45e6b4ab7c25 used request id req-49d84545-d47e-4bab-b73e-9a3d1b6582f2 2018-02-15 18:34:37,899 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - Client instance received private ip [11.0.0.6] 2018-02-15 18:34:37,900 - novaclient.v2.client- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f -H "User-Agent: python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}60f2be7ff5ffd118fbddd20ce31474f6b54d50ca" 2018-02-15 18:34:38,703 - novaclient.v2.client- DEBUG - RESP: [200] Content-Length: 1692 Content-Type: application/json Openstack-Api-Version: compute 2.1 X-Openstack-Nova-Api-Version: 2.1 Vary: OpenStack-API-Version, X-OpenStack-Nova-API-Version X-Compute-Request-Id: req-dfcb6b19-894f-40cf-a88a-b7ef753c5f05 Date: Thu, 15 Feb 2018 18:34:38 GMT RESP BODY: {"server": {"OS-EXT-STS:task_state": null, "addresses": {"example-net": [{"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:4f:cb:b0", "version": 4, "addr": "11.0.0.12", "OS-EXT-IPS:type": "fixed"}]}, "links": [{"href": "http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "self"}, {"href": "http://172.30.9.22:8774/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "rel": "bookmark"}], "image": {"id": "e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "links": [{"href": "http://172.30.9.22:8774/images/e12fe53d-ed3b-4ba7-8b20-8bd4773186da", "rel": "bookmark"}]}, "OS-EXT-STS:vm_state": "active", "OS-EXT-SRV-ATTR:instance_name": "instance-00000108", "OS-SRV-USG:launched_at": "2018-02-15T18:29:09.000000", "flavor": {"id": "6c0217d4-ee28-4ea9-b136-c356f048afb0", "links": [{"href": "http://172.30.9.22:8774/flavors/6c0217d4-ee28-4ea9-b136-c356f048afb0", "rel": "bookmark"}]}, "id": "6339d5b0-df1a-4cea-8bb0-aa30d908cc7f", "security_groups": [{"name": "example-sg"}, {"name": "default"}], "user_id": "b87d83ee66474639bdd188e89fa20586", "OS-DCF:diskConfig": "MANUAL", "accessIPv4": "", "accessIPv6": "", "progress": 0, "OS-EXT-STS:power_state": 1, "OS-EXT-AZ:availability_zone": "nova", "metadata": {}, "status": "ACTIVE", "updated": "2018-02-15T18:34:32Z", "hostId": "d5dab52cb283cccabd73226568305297cb58e4049f42ee5e27be399d", "OS-EXT-SRV-ATTR:host": "overcloud-novacompute-0.opnfvlf.org", "OS-SRV-USG:terminated_at": null, "key_name": null, "OS-EXT-SRV-ATTR:hypervisor_hostname": "overcloud-novacompute-0.opnfvlf.org", "name": "server", "created": "2018-02-15T18:34:12Z", "tenant_id": "43a3651d794746998b740a442f92ccfd", "os-extended-volumes:volumes_attached": [], "config_drive": ""}} 2018-02-15 18:34:38,703 - novaclient.v2.client- DEBUG - GET call to compute for http://172.30.9.22:8774/v2.1/servers/6339d5b0-df1a-4cea-8bb0-aa30d908cc7f used request id req-dfcb6b19-894f-40cf-a88a-b7ef753c5f05 2018-02-15 18:34:38,703 - sfc.tests.functest.sfc_one_chain_two_service_functions- INFO - Server instance received private ip [11.0.0.12] 2018-02-15 18:34:38,712 - sfc.lib.openstack_tacker- INFO - VIM template: {u'vim': {u'auth_cred': {u'username': u'admin', u'user_domain_name': u'Default', u'password': u'9kKG3eh3Kbxsk64AVbF3m9TDC', u'user_id': u''}, u'auth_url': u'http://172.30.9.22:5000/v3', u'type': u'openstack', u'vim_project': {u'project_domain_name': u'Default', u'id': u'', u'name': u'admin'}, u'name': u'test-vim'}} 2018-02-15 18:34:38,713 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:5000/v3 -H "Accept: application/json" -H "User-Agent: run_sfc_tests.py keystoneauth1/2.18.0 python-requests/2.13.0 CPython/2.7.13" 2018-02-15 18:34:38,720 - keystoneauth.session- DEBUG - RESP: [200] Date: Thu, 15 Feb 2018 18:34:38 GMT Server: Apache Vary: X-Auth-Token,Accept-Encoding x-openstack-request-id: req-d207eb91-9545-43a3-ac92-0a4541c3ae1f Content-Encoding: gzip Content-Length: 194 Content-Type: application/json RESP BODY: {"version": {"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://172.30.9.22:5000/v3/", "rel": "self"}]}} 2018-02-15 18:34:38,721 - keystoneauth.session- DEBUG - GET call to None for http://172.30.9.22:5000/v3 used request id req-d207eb91-9545-43a3-ac92-0a4541c3ae1f 2018-02-15 18:34:38,721 - keystoneauth.identity.v3.base- DEBUG - Making authentication request to http://172.30.9.22:5000/v3/auth/tokens 2018-02-15 18:34:38,881 - keystoneauth.identity.v3.base- DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "20cc3ca49cd84595b26f2adbe61e4e47", "name": "admin"}], "expires_at": "2018-02-15T19:34:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "43a3651d794746998b740a442f92ccfd", "name": "admin"}, "catalog": [{"endpoints": [{"url": "http://172.30.9.22:8778/placement", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "566bf618ebdd4d8b89ec2d09dd678a55"}, {"url": "http://192.30.9.3:8778/placement", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b6f8dd25a0254b759c8d15b524e068d9"}, {"url": "http://192.30.9.3:8778/placement", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d7f7f954df30404b9a15b2d7ef763cd4"}], "type": "placement", "id": "1acbe9d4f8a24e6b8641c98d99f818a7", "name": "placement"}, {"endpoints": [{"url": "http://192.30.9.3:8000/v1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "351a379c1e9e4a99825c72f555c8e60b"}, {"url": "http://192.30.9.3:8000/v1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4d79732931734a19ac4d5508508e44d9"}, {"url": "http://172.30.9.22:8000/v1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "ce48ee04222e46c9af2c09b316d1d7fd"}], "type": "cloudformation", "id": "1e457bc58f9a4cfeb08806f94181953e", "name": "heat-cfn"}, {"endpoints": [{"url": "http://192.30.9.3:9890", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "05f89c53c5704164ae0a6db1df3c2a0c"}, {"url": "http://192.30.9.3:9890", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "27fe9c3f57c147d3bacca1c10458eb16"}, {"url": "http://172.30.9.22:9890", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "91c8a22ee50a4af4b0b979bfa35fbb41"}], "type": "nfv-orchestration", "id": "2a7fbbcbd68046d488e1a977aeb176cc", "name": "tacker"}, {"endpoints": [{"url": "http://192.30.9.3:9292", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bf9f42b965db41658f11a383fd6665fb"}, {"url": "http://172.30.9.22:9292", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "d42650f884d9406fb6611ddb96678ec8"}, {"url": "http://192.30.9.3:9292", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e1fe1f6f7ede47d584997c0a25126712"}], "type": "image", "id": "34a93bbcf26848ce91006b5d77760706", "name": "glance"}, {"endpoints": [{"url": "http://172.30.9.22:8041", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "347e21d783f949ca9e0d5ff01a83e298"}, {"url": "http://192.30.9.3:8041", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "6a9d2f878c5f480eaee58b159061afbc"}, {"url": "http://192.30.9.3:8041", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "d8f553e022504afba506a657f4bc7eee"}], "type": "metric", "id": "3c4ad189809d4a5a952d9ad83a77b9d3", "name": "gnocchi"}, {"endpoints": [{"url": "http://172.30.9.22:8777", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "1fb48c5be03f497488d41de637f5acc6"}, {"url": "http://192.30.9.3:8777", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "316fda9eed3c4827a361fbf6ceee2e7f"}, {"url": "http://192.30.9.3:8777", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "5d9714502afd46818903e3ac316284fb"}], "type": "metering", "id": "491adc8edd83411a902546645e8163c0", "name": "ceilometer"}, {"endpoints": [{"url": "http://172.30.9.22:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "29dd2802140448cfbfb52d90fa070b5a"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "4af86441229a4c8298036738090e9407"}, {"url": "http://192.30.9.3:8776/v3/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "bb34ebeb6c934341b9b11cd865190d77"}], "type": "volumev3", "id": "582dd9cfd8604c4e889e359f6b17fd1f", "name": "cinderv3"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "8a4361390a7d481a8c3dc2acd0516b69"}, {"url": "http://172.30.9.22:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "c87f7cf0a3034ea2861ed65667d344ba"}, {"url": "http://192.30.9.3:8776/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "d916a64f28844a4dbedcbd757b174840"}], "type": "volume", "id": "6a2f441268a74af9a7517c6284562ba7", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.9.22:8774/v2.1", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "72ea5971fa044c229954aebea6c2e0e0"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "92606707cd1b4f309c89acb4ca95cf01"}, {"url": "http://192.30.9.3:8774/v2.1", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "98c98139f60e4f9e8554ca98cb997570"}], "type": "compute", "id": "8038f12b6dac44b89190a51bde1a5cf8", "name": "nova"}, {"endpoints": [{"url": "http://192.30.9.3:1789", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "481f8d3de74840f1895879a902d01a81"}, {"url": "http://172.30.9.22:1789", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "a45dc5b03a5e4695930d66826c3874c0"}, {"url": "http://192.30.9.3:1789", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ab518baa9c5141978045ba31e94f9ab9"}], "type": "policy", "id": "af451a2a22154408ab53a53285b4afaa", "name": "congress"}, {"endpoints": [{"url": "http://172.30.9.22:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "b38703b1eae2453faddc7fce336bae29"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "b5606881a7d442d18aee248c04439697"}, {"url": "http://192.30.9.3:8004/v1/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "ea9874f9485347b4baa9e63ec847530e"}], "type": "orchestration", "id": "d527b12ac2794cc38d679ffa341ee91f", "name": "heat"}, {"endpoints": [{"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "28d7ee8dcc354a67b561ed5ec96b7621"}, {"url": "http://172.30.9.22:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "49cc3434aff44c52aa16371217a3d603"}, {"url": "http://192.30.9.3:8776/v2/43a3651d794746998b740a442f92ccfd", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "c0cc6b0d713d4eee95fccfa4772a6561"}], "type": "volumev2", "id": "d6af7a9a59fc4047ae57aa20cf4da9aa", "name": "cinderv2"}, {"endpoints": [{"url": "http://192.30.9.3:8042", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "221345ad5bcb4d00b9d99f7f3306a7ca"}, {"url": "http://172.30.9.22:8042", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "bdb5583fffa04a45b7e0b416fbf4b4d8"}, {"url": "http://192.30.9.3:8042", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "e6536e3283ed4be8b0d3376425556c05"}], "type": "alarming", "id": "d6f1de3945764814a3a668fe146c6eda", "name": "aodh"}, {"endpoints": [{"url": "http://192.30.9.3:5000", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "3a6c4d7a80ed4c18ac39df09dd1adb56"}, {"url": "http://192.30.9.3:35357", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "46f4080b684f48128d6157dff4aec37b"}, {"url": "http://172.30.9.22:5000", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "7cad23afacfa4955a06cc3c4289bdba6"}], "type": "identity", "id": "da60b7f8118b46d2bcf2d0d156f6a6f9", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.9.22:9696", "interface": "public", "region": "regionOne", "region_id": "regionOne", "id": "07f5d2d244e44167868fbb9c1243172e"}, {"url": "http://192.30.9.3:9696", "interface": "internal", "region": "regionOne", "region_id": "regionOne", "id": "aafb41ac53ce44ecbc946d80a79d58c3"}, {"url": "http://192.30.9.3:9696", "interface": "admin", "region": "regionOne", "region_id": "regionOne", "id": "bc5335f3dceb4252954fd1ccc35894ed"}], "type": "network", "id": "ea1b38dae2674b9cab6a5e5df59a39e3", "name": "neutron"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "admin", "id": "b87d83ee66474639bdd188e89fa20586"}, "audit_ids": ["JWVOUOGjQmuS_vdsULhApg"], "issued_at": "2018-02-15T18:34:38.000000Z"}} 2018-02-15 18:34:38,882 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9890/v1.0/vims.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" -d '{"vim": {"auth_cred": {"username": "admin", "user_domain_name": "Default", "password": "9kKG3eh3Kbxsk64AVbF3m9TDC", "user_id": ""}, "auth_url": "http://172.30.9.22:5000/v3", "type": "openstack", "vim_project": {"project_domain_name": "Default", "id": "", "name": "admin"}, "name": "test-vim"}}' 2018-02-15 18:34:39,555 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 773 X-Openstack-Request-Id: req-3fe0aed2-6d7e-4484-ba9c-e3a275488699 Date: Thu, 15 Feb 2018 18:34:39 GMT RESP BODY: {"vim": {"status": "REACHABLE", "description": "", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15 18:34:39.473511", "updated_at": null, "name": "test-vim", "is_default": false, "auth_url": "http://172.30.9.22:5000/v3", "placement_attr": {"regions": ["regionOne", "tempest-region-1689528796", "tempest-region-1988422939", "tempest-region-2024084102", "tempest-region-411526050"]}, "auth_cred": {"username": "admin", "project_name": "admin", "user_id": "", "user_domain_name": "Default", "project_id": "", "auth_url": "http://172.30.9.22:5000/v3", "password": "***", "project_domain_name": "Default"}, "type": "openstack", "id": "512ff921-6886-43a2-ad95-1eae39664caf", "vim_project": {"id": "", "name": "admin", "project_domain_name": "Default"}}} 2018-02-15 18:34:39,555 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vims.json used request id req-3fe0aed2-6d7e-4484-ba9c-e3a275488699 2018-02-15 18:34:39,571 - sfc.lib.openstack_tacker- INFO - VNFD template: --- tosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0 description: firewall1-example metadata: template_name: test-vnfd1 topology_template: inputs: zone: type: string node_templates: VDU1: type: tosca.nodes.nfv.VDU.Tacker capabilities: nfv_compute: properties: num_cpus: 1 mem_size: 2 GB disk_size: 10 GB properties: image: sfc_nsh_euphrates availability_zone: {get_input: zone} mgmt_driver: noop config: | param0: key1 param1: key2 service_type: firewall monitoring_policy: name: ping parameters: monitoring_delay: 10 count: 3 interval: 2 timeout: 2 action: failure: respawn retry: 5 port: 22 CP1: type: tosca.nodes.nfv.CP.Tacker properties: management: true order: 0 anti_spoofing_protection: false requirements: - virtualLink: node: VL1 - virtualBinding: node: VDU1 VL1: type: tosca.nodes.nfv.VL properties: network_name: example-net vendor: Tacker 2018-02-15 18:34:39,573 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9890/v1.0/vnfds.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" -d '{"vnfd": {"attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall1-example\nmetadata:\n template_name: test-vnfd1\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key1\n param1: key2\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "service_types": [{"service_type": "vnfd"}], "name": "test-vnfd1"}}' 2018-02-15 18:34:39,987 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 1633 X-Openstack-Request-Id: req-f0dc4671-a365-4113-94be-8dcc382d38ef Date: Thu, 15 Feb 2018 18:34:39 GMT RESP BODY: {"vnfd": {"template_source": "onboarded", "service_types": ["vnfd"], "description": "firewall1-example", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15 18:34:39.950950", "updated_at": null, "attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall1-example\nmetadata:\n template_name: test-vnfd1\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key1\n param1: key2\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "id": "b32d9b95-7d5a-4211-b81c-d66d379d7212", "name": "test-vnfd1"}} 2018-02-15 18:34:39,987 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfds.json used request id req-f0dc4671-a365-4113-94be-8dcc382d38ef 2018-02-15 18:34:39,988 - sfc.lib.openstack_tacker- INFO - VNFD template: --- tosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0 description: firewall2-example metadata: template_name: test-vnfd2 topology_template: inputs: zone: type: string node_templates: VDU1: type: tosca.nodes.nfv.VDU.Tacker capabilities: nfv_compute: properties: num_cpus: 1 mem_size: 2 GB disk_size: 10 GB properties: image: sfc_nsh_euphrates availability_zone: {get_input: zone} mgmt_driver: noop config: | param0: key0 param1: key1 service_type: firewall monitoring_policy: name: ping parameters: monitoring_delay: 10 count: 3 interval: 2 timeout: 2 action: failure: respawn retry: 5 port: 22 CP1: type: tosca.nodes.nfv.CP.Tacker properties: management: true order: 0 anti_spoofing_protection: false requirements: - virtualLink: node: VL1 - virtualBinding: node: VDU1 VL1: type: tosca.nodes.nfv.VL properties: network_name: example-net vendor: Tacker 2018-02-15 18:34:39,989 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9890/v1.0/vnfds.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" -d '{"vnfd": {"attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall2-example\nmetadata:\n template_name: test-vnfd2\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key0\n param1: key1\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "service_types": [{"service_type": "vnfd"}], "name": "test-vnfd2"}}' 2018-02-15 18:34:40,458 - keystoneauth.session- DEBUG - RESP: [201] Content-Type: application/json Content-Length: 1633 X-Openstack-Request-Id: req-28adfe69-d7a7-4970-be16-6a2d5a55162d Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"vnfd": {"template_source": "onboarded", "service_types": ["vnfd"], "description": "firewall2-example", "tenant_id": "43a3651d794746998b740a442f92ccfd", "created_at": "2018-02-15 18:34:40.393938", "updated_at": null, "attributes": {"vnfd": "---\ntosca_definitions_version: tosca_simple_profile_for_nfv_1_0_0\ndescription: firewall2-example\nmetadata:\n template_name: test-vnfd2\n\ntopology_template:\n inputs:\n zone:\n type: string\n node_templates:\n VDU1:\n type: tosca.nodes.nfv.VDU.Tacker\n capabilities:\n nfv_compute:\n properties:\n num_cpus: 1\n mem_size: 2 GB\n disk_size: 10 GB\n properties:\n image: sfc_nsh_euphrates\n availability_zone: {get_input: zone}\n mgmt_driver: noop\n config: |\n param0: key0\n param1: key1\n service_type: firewall\n monitoring_policy:\n name: ping\n parameters:\n monitoring_delay: 10\n count: 3\n interval: 2\n timeout: 2\n action:\n failure: respawn\n retry: 5\n port: 22\n\n CP1:\n type: tosca.nodes.nfv.CP.Tacker\n properties:\n management: true\n order: 0\n anti_spoofing_protection: false\n requirements:\n - virtualLink:\n node: VL1\n - virtualBinding:\n node: VDU1\n\n VL1:\n type: tosca.nodes.nfv.VL\n properties:\n network_name: example-net\n vendor: Tacker\n"}, "id": "dfe6c616-eeb6-4caf-8047-eb01269aab12", "name": "test-vnfd2"}} 2018-02-15 18:34:40,459 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfds.json used request id req-28adfe69-d7a7-4970-be16-6a2d5a55162d 2018-02-15 18:34:40,461 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfds.json?fields=id&name=test-vnfd1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:40,475 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 59 X-Openstack-Request-Id: req-a5bdcc42-67ae-47a5-8548-04716713e54c Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"vnfds": [{"id": "b32d9b95-7d5a-4211-b81c-d66d379d7212"}]} 2018-02-15 18:34:40,475 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfds.json?fields=id&name=test-vnfd1 used request id req-a5bdcc42-67ae-47a5-8548-04716713e54c 2018-02-15 18:34:40,476 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vims.json?fields=id&name=test-vim -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:40,488 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 58 X-Openstack-Request-Id: req-e4f2b259-15a6-4848-9632-9efb6acc1298 Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"vims": [{"id": "512ff921-6886-43a2-ad95-1eae39664caf"}]} 2018-02-15 18:34:40,489 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vims.json?fields=id&name=test-vim used request id req-e4f2b259-15a6-4848-9632-9efb6acc1298 2018-02-15 18:34:40,490 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9890/v1.0/vnfs.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" -d '{"vnf": {"attributes": {"param_values": "{\"zone\": \"nova::overcloud-novacompute-0.opnfvlf.org\"}"}, "vim_id": "512ff921-6886-43a2-ad95-1eae39664caf", "name": "testVNF1", "vnfd_id": "b32d9b95-7d5a-4211-b81c-d66d379d7212"}}' 2018-02-15 18:34:40,523 - keystoneauth.session- DEBUG - RESP: [500] Content-Type: application/json Content-Length: 87 X-Openstack-Request-Id: req-b5a074b6-2261-4b78-960a-fa138eb6aed0 Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-15 18:34:40,523 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json used request id req-b5a074b6-2261-4b78-960a-fa138eb6aed0 2018-02-15 18:34:40,523 - tackerclient.v1_0.client- DEBUG - Error message: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-15 18:34:40,524 - sfc.lib.openstack_tacker- ERROR - error [create_vnf(tacker_client, 'testVNF1', 'None', 'test-vnfd1')]: Request Failed: internal server error while processing your request. 2018-02-15 18:34:40,525 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfds.json?fields=id&name=test-vnfd2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:40,538 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 59 X-Openstack-Request-Id: req-93fdd458-dcac-4541-93a4-320996bfb7e1 Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"vnfds": [{"id": "dfe6c616-eeb6-4caf-8047-eb01269aab12"}]} 2018-02-15 18:34:40,538 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfds.json?fields=id&name=test-vnfd2 used request id req-93fdd458-dcac-4541-93a4-320996bfb7e1 2018-02-15 18:34:40,540 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vims.json?fields=id&name=test-vim -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:40,550 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 58 X-Openstack-Request-Id: req-bfd9e079-baa5-4942-9f8a-2e1426aceefd Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"vims": [{"id": "512ff921-6886-43a2-ad95-1eae39664caf"}]} 2018-02-15 18:34:40,550 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vims.json?fields=id&name=test-vim used request id req-bfd9e079-baa5-4942-9f8a-2e1426aceefd 2018-02-15 18:34:40,551 - keystoneauth.session- DEBUG - REQ: curl -g -i -X POST http://172.30.9.22:9890/v1.0/vnfs.json -H "User-Agent: python-tackerclient" -H "Content-Type: application/json" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" -d '{"vnf": {"attributes": {"param_values": "{\"zone\": \"nova::overcloud-novacompute-0.opnfvlf.org\"}"}, "vim_id": "512ff921-6886-43a2-ad95-1eae39664caf", "name": "testVNF2", "vnfd_id": "dfe6c616-eeb6-4caf-8047-eb01269aab12"}}' 2018-02-15 18:34:40,566 - keystoneauth.session- DEBUG - RESP: [500] Content-Type: application/json Content-Length: 87 X-Openstack-Request-Id: req-adb4b779-61a2-4017-90e8-d4a449d7f53c Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-15 18:34:40,566 - keystoneauth.session- DEBUG - POST call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json used request id req-adb4b779-61a2-4017-90e8-d4a449d7f53c 2018-02-15 18:34:40,566 - tackerclient.v1_0.client- DEBUG - Error message: {"TackerError": "Request Failed: internal server error while processing your request."} 2018-02-15 18:34:40,567 - sfc.lib.openstack_tacker- ERROR - error [create_vnf(tacker_client, 'testVNF2', 'None', 'test-vnfd2')]: Request Failed: internal server error while processing your request. 2018-02-15 18:34:40,568 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:40,577 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-42c3e40e-b544-4fff-9108-59b5df06544b Date: Thu, 15 Feb 2018 18:34:40 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:40,577 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-42c3e40e-b544-4fff-9108-59b5df06544b 2018-02-15 18:34:40,578 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:40,578 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-15 18:34:41,580 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:41,590 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-4eb76d0b-63fb-4792-ae59-9f25b5b32822 Date: Thu, 15 Feb 2018 18:34:41 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:41,590 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-4eb76d0b-63fb-4792-ae59-9f25b5b32822 2018-02-15 18:34:41,591 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:41,591 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-15 18:34:42,593 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:42,603 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-03bd87bb-9307-44dd-961f-850294e2c92d Date: Thu, 15 Feb 2018 18:34:42 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:42,603 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-03bd87bb-9307-44dd-961f-850294e2c92d 2018-02-15 18:34:42,603 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:42,603 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-15 18:34:43,606 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:43,616 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-57570c2f-8771-4a55-a3ef-456572ae2400 Date: Thu, 15 Feb 2018 18:34:43 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:43,616 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-57570c2f-8771-4a55-a3ef-456572ae2400 2018-02-15 18:34:43,616 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:43,616 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-15 18:34:44,619 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:44,629 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-72c3683f-1c86-4d94-bf31-0dd9131e3073 Date: Thu, 15 Feb 2018 18:34:44 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:44,629 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-72c3683f-1c86-4d94-bf31-0dd9131e3073 2018-02-15 18:34:44,629 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:44,630 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-15 18:34:45,632 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:45,642 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-ebf0529c-85a7-4fb1-af45-4840a9e93c8c Date: Thu, 15 Feb 2018 18:34:45 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:45,642 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF1 used request id req-ebf0529c-85a7-4fb1-af45-4840a9e93c8c 2018-02-15 18:34:45,643 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:45,643 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF1]. Retrying. 2018-02-15 18:34:46,644 - sfc.lib.openstack_tacker- ERROR - Could not retrieve VNF [vnf_id=None, vnf_name=testVNF1] - Could not retrieve ID from name [testVNF1] 2018-02-15 18:34:46,644 - sfc.lib.openstack_tacker- ERROR - error [wait_for_vnf(tacker_client, 'None', 'testVNF1')]: not enough arguments for format string 2018-02-15 18:34:46,645 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:46,655 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-bf7cf40a-0bd7-42e4-b25c-04275e619838 Date: Thu, 15 Feb 2018 18:34:46 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:46,655 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-bf7cf40a-0bd7-42e4-b25c-04275e619838 2018-02-15 18:34:46,656 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:46,656 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-15 18:34:47,657 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:47,667 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-43e99d6e-bef0-4993-97c5-02ac6c140623 Date: Thu, 15 Feb 2018 18:34:47 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:47,667 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-43e99d6e-bef0-4993-97c5-02ac6c140623 2018-02-15 18:34:47,667 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:47,667 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-15 18:34:48,670 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:48,679 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-5e5a7fda-6224-43df-b100-a5f178a88428 Date: Thu, 15 Feb 2018 18:34:48 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:48,679 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-5e5a7fda-6224-43df-b100-a5f178a88428 2018-02-15 18:34:48,680 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:48,680 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-15 18:34:49,682 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:49,692 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-09809564-36db-426f-aa5d-c87d04993292 Date: Thu, 15 Feb 2018 18:34:49 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:49,692 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-09809564-36db-426f-aa5d-c87d04993292 2018-02-15 18:34:49,692 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:49,692 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-15 18:34:50,695 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:50,704 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-e9dd4779-c382-4637-b680-0c0819a8c9e6 Date: Thu, 15 Feb 2018 18:34:50 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:50,704 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-e9dd4779-c382-4637-b680-0c0819a8c9e6 2018-02-15 18:34:50,704 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:50,705 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-15 18:34:51,707 - keystoneauth.session- DEBUG - REQ: curl -g -i -X GET http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 -H "User-Agent: python-tackerclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}a12c814eba15026dac6dc03ac953f5512dea17df" 2018-02-15 18:34:51,716 - keystoneauth.session- DEBUG - RESP: [200] Content-Type: application/json Content-Length: 12 X-Openstack-Request-Id: req-c17572a5-435d-4912-a840-922a8892f5ec Date: Thu, 15 Feb 2018 18:34:51 GMT RESP BODY: {"vnfs": []} 2018-02-15 18:34:51,717 - keystoneauth.session- DEBUG - GET call to nfv-orchestration for http://172.30.9.22:9890/v1.0/vnfs.json?fields=id&name=testVNF2 used request id req-c17572a5-435d-4912-a840-922a8892f5ec 2018-02-15 18:34:51,717 - sfc.lib.openstack_tacker- ERROR - Error [get_id_from_name(tacker_client, resource_type, resource_name)]: list index out of range 2018-02-15 18:34:51,717 - sfc.lib.openstack_tacker- INFO - Could not retrieve ID for vnf with name [testVNF2]. Retrying. 2018-02-15 18:34:52,718 - sfc.lib.openstack_tacker- ERROR - Could not retrieve VNF [vnf_id=None, vnf_name=testVNF2] - Could not retrieve ID from name [testVNF2] 2018-02-15 18:34:52,718 - sfc.lib.openstack_tacker- ERROR - error [wait_for_vnf(tacker_client, 'None', 'testVNF2')]: not enough arguments for format string 2018-02-15 18:34:52,718 - sfc.tests.functest.sfc_one_chain_two_service_functions- ERROR - ERROR while booting vnfs 2018-02-15 18:34:52,761 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:52,841 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:52,889 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:52,961 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,061 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,162 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,263 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,361 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,464 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,564 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,663 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,763 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,865 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:53,963 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,066 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,164 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,264 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,364 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,466 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,493 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,561 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,566 - paramiko.transport- DEBUG - EOF in transport thread 2018-02-15 18:34:54,653 - functest.core.feature - INFO - Test result is stored in '/home/opnfv/functest/results/functest-odl-sfc.log' 2018-02-15 18:35:14,858 - functest.core.feature - INFO - Test result is stored in '/home/opnfv/functest/results/domino-multinode.log'