-
-
Save ChrisLundquist/8c9d9093ada98cb139b07de29fcdbbc8 to your computer and use it in GitHub Desktop.
vault step-down sig quit
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@vault-1:~# sudo -u vault /usr/local/bin/vault server -config=/etc/vault.d | |
_t: _p: 15954 _n: __logxi _l: ERR _m: Could not get working directory | |
==> Vault server configuration: | |
Backend: consul (HA available) | |
Cluster Address: https://10.170.131.69:8201 | |
Listener 1: tcp (addr: "0.0.0.0:8200", cluster address: "", tls: "disabled") | |
Log Level: info | |
Mlock: supported: true, enabled: false | |
Redirect Address: http://10.170.131.69:8200 | |
Version: Vault v0.6.2 | |
==> Vault server started! Log data will stream in below: | |
2016/11/11 19:14:32.877847 [WARN ] physical/consul: appending trailing forward slash to path | |
2016/11/11 19:15:23.495920 [INFO ] core: vault is unsealed | |
2016/11/11 19:15:23.495948 [WARN ] physical/consul: Concurrent sealed state change notify dropped | |
2016/11/11 19:15:23.496039 [INFO ] core: entering standby mode | |
2016/11/11 19:15:29.387718 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 19:15:29.484186 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 19:15:29.484214 [INFO ] core: post-unseal setup starting | |
2016/11/11 19:15:29.488202 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 19:15:29.488268 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 19:15:29.488317 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 19:15:29.488360 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 19:15:29.488408 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 19:15:29.488463 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 19:15:29.488525 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 19:15:29.488643 [INFO ] rollback: starting rollback manager | |
2016/11/11 19:15:29.506607 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 19:15:29.507890 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 19:15:29.507938 [INFO ] core: pre-seal teardown starting | |
2016/11/11 19:15:29.507955 [INFO ] core/stopClusterListener: stopping listeners | |
SIGQUIT: quit | |
PC=0x45a983 m=1 | |
goroutine 0 [idle]: | |
runtime.futex(0x1df4058, 0x0, 0xc42003de80, 0x0, 0xc400000000, 0x45a6a6, 0x3c, 0x0, 0xc42003dec8, 0x40d5cb, ...) | |
/goroot/src/runtime/sys_linux_amd64.s:388 +0x23 | |
runtime.futexsleep(0x1df4058, 0x0, 0xdf8475800) | |
/goroot/src/runtime/os_linux.go:62 +0xd7 | |
runtime.notetsleep_internal(0x1df4058, 0xdf8475800, 0x1) | |
/goroot/src/runtime/lock_futex.go:174 +0xeb | |
runtime.notetsleep(0x1df4058, 0xdf8475800, 0x52f39369ce301) | |
/goroot/src/runtime/lock_futex.go:194 +0x56 | |
runtime.sysmon() | |
/goroot/src/runtime/proc.go:3618 +0x14c | |
runtime.mstart1() | |
/goroot/src/runtime/proc.go:1126 +0x11e | |
runtime.mstart() | |
/goroot/src/runtime/proc.go:1096 +0x64 | |
goroutine 1 [select, 1 minutes]: | |
github.com/hashicorp/vault/command.(*ServerCommand).Run(0xc4201880f0, 0xc42000a110, 0x1, 0x1, 0x0) | |
/gopath/src/github.com/hashicorp/vault/command/server.go:576 +0x34c9 | |
github.com/hashicorp/vault/vendor/github.com/mitchellh/cli.(*CLI).Run(0xc4202bc0c0, 0xc4202bc0c0, 0x27, 0x15ecaa0) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/mitchellh/cli/cli.go:154 +0x24e | |
github.com/hashicorp/vault/cli.RunCustom(0xc42000a100, 0x2, 0x2, 0xc4202ba900, 0x0) | |
/gopath/src/github.com/hashicorp/vault/cli/main.go:44 +0x4e7 | |
github.com/hashicorp/vault/cli.Run(0xc42000a100, 0x2, 0x2, 0xc4200001a0) | |
/gopath/src/github.com/hashicorp/vault/cli/main.go:11 +0x56 | |
main.main() | |
/gopath/src/github.com/hashicorp/vault/main.go:10 +0x66 | |
goroutine 5 [syscall, 1 minutes]: | |
os/signal.signal_recv(0x0) | |
/goroot/src/runtime/sigqueue.go:116 +0x157 | |
os/signal.loop() | |
/goroot/src/os/signal/signal_unix.go:22 +0x22 | |
created by os/signal.init.1 | |
/goroot/src/os/signal/signal_unix.go:28 +0x41 | |
goroutine 27 [IO wait]: | |
net.runtime_pollWait(0x7f427d317d80, 0x72, 0x0) | |
/goroot/src/runtime/netpoll.go:160 +0x59 | |
net.(*pollDesc).wait(0xc420250290, 0x72, 0xc4201f9db0, 0xc4200141b0) | |
/goroot/src/net/fd_poll_runtime.go:73 +0x38 | |
net.(*pollDesc).waitRead(0xc420250290, 0x1db2bc0, 0xc4200141b0) | |
/goroot/src/net/fd_poll_runtime.go:78 +0x34 | |
net.(*netFD).accept(0xc420250230, 0x0, 0x1dafc40, 0xc4206c4b60) | |
/goroot/src/net/fd_unix.go:419 +0x238 | |
net.(*TCPListener).accept(0xc4204fa140, 0x29e8d60800, 0x0, 0x0) | |
/goroot/src/net/tcpsock_posix.go:132 +0x2e | |
net.(*TCPListener).AcceptTCP(0xc4204fa140, 0xc4201f9ed8, 0xc4201f9ee0, 0xc4201f9ed0) | |
/goroot/src/net/tcpsock.go:209 +0x49 | |
github.com/hashicorp/vault/command/server.tcpKeepAliveListener.Accept(0xc4204fa140, 0x15ef780, 0xc420089780, 0x1db9cc0, 0xc4200ba990) | |
/gopath/src/github.com/hashicorp/vault/command/server/listener_tcp.go:38 +0x2f | |
net/http.(*Server).Serve(0xc420186a80, 0x1db8c00, 0xc4204fa140, 0x0, 0x0) | |
/goroot/src/net/http/server.go:2273 +0x1ce | |
created by github.com/hashicorp/vault/command.(*ServerCommand).Run | |
/gopath/src/github.com/hashicorp/vault/command/server.go:558 +0x3104 | |
goroutine 26 [select]: | |
github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer(0xc4201e2160, 0xc42024f9e0, 0xc42006e360, 0xc420151c80, 0x19, 0xc42024f9f0, 0xc42024fa00) | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:478 +0x7e3 | |
created by github.com/hashicorp/vault/physical.(*ConsulBackend).RunServiceDiscovery | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:444 +0xd1 | |
goroutine 34 [select, 1 minutes, locked to thread]: | |
runtime.gopark(0x15efde8, 0x0, 0x14e8d6a, 0x6, 0x18, 0x2) | |
/goroot/src/runtime/proc.go:259 +0x13a | |
runtime.selectgoImpl(0xc420248730, 0x0, 0x18) | |
/goroot/src/runtime/select.go:423 +0x11d9 | |
runtime.selectgo(0xc420248730) | |
/goroot/src/runtime/select.go:238 +0x1c | |
runtime.ensureSigM.func1() | |
/goroot/src/runtime/signal1_unix.go:304 +0x2f3 | |
runtime.goexit() | |
/goroot/src/runtime/asm_amd64.s:2086 +0x1 | |
goroutine 35 [chan receive, 1 minutes]: | |
github.com/hashicorp/vault/command.MakeShutdownCh.func1(0xc42006e3c0, 0xc42006e360) | |
/gopath/src/github.com/hashicorp/vault/command/server.go:954 +0x40 | |
created by github.com/hashicorp/vault/command.MakeShutdownCh | |
/gopath/src/github.com/hashicorp/vault/command/server.go:956 +0x143 | |
goroutine 36 [chan receive, 1 minutes]: | |
github.com/hashicorp/vault/command.MakeSighupCh.func1(0xc42006e5a0, 0xc42006e540) | |
/gopath/src/github.com/hashicorp/vault/command/server.go:970 +0x40 | |
created by github.com/hashicorp/vault/command.MakeSighupCh | |
/gopath/src/github.com/hashicorp/vault/command/server.go:973 +0x119 | |
goroutine 37 [semacquire, 1 minutes]: | |
sync.runtime_notifyListWait(0xc4202bc1c0, 0x0) | |
/goroot/src/runtime/sema.go:267 +0x122 | |
sync.(*Cond).Wait(0xc4202bc1b0) | |
/goroot/src/sync/cond.go:57 +0x80 | |
io.(*pipe).read(0xc4202bc180, 0xc4201d0000, 0x1000, 0x1000, 0x0, 0x0, 0x0) | |
/goroot/src/io/pipe.go:47 +0x102 | |
io.(*PipeReader).Read(0xc420166220, 0xc4201d0000, 0x1000, 0x1000, 0x1000, 0x1000, 0x101010101020302) | |
/goroot/src/io/pipe.go:129 +0x4c | |
bufio.(*Scanner).Scan(0xc420168a00, 0x0) | |
/goroot/src/bufio/scan.go:208 +0x50f | |
github.com/hashicorp/vault/meta.(*Meta).FlagSet.func1(0xc420168a00, 0xc420188120) | |
/gopath/src/github.com/hashicorp/vault/meta/meta.go:151 +0x2f | |
created by github.com/hashicorp/vault/meta.(*Meta).FlagSet | |
/gopath/src/github.com/hashicorp/vault/meta/meta.go:154 +0x49b | |
goroutine 38 [select, 1 minutes]: | |
github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*InmemSignal).run(0xc42024b480) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:63 +0x10b | |
created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.NewInmemSignal | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:37 +0x1c5 | |
goroutine 39 [sleep]: | |
time.Sleep(0x3b9aca00) | |
/goroot/src/runtime/time.go:59 +0xe1 | |
github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*Metrics).collectStats(0xc420013e50) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/metrics.go:67 +0x2f | |
created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.New | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/start.go:61 +0xf4 | |
goroutine 45 [select]: | |
github.com/hashicorp/vault/vault.(*RollbackManager).run(0xc4203f2480) | |
/gopath/src/github.com/hashicorp/vault/vault/rollback.go:97 +0x21c | |
created by github.com/hashicorp/vault/vault.(*RollbackManager).Start | |
/gopath/src/github.com/hashicorp/vault/vault/rollback.go:74 +0x3f | |
goroutine 32 [IO wait]: | |
net.runtime_pollWait(0x7f427d317e40, 0x72, 0x5) | |
/goroot/src/runtime/netpoll.go:160 +0x59 | |
net.(*pollDesc).wait(0xc42063a990, 0x72, 0xc42064e9d0, 0xc4200141b0) | |
/goroot/src/net/fd_poll_runtime.go:73 +0x38 | |
net.(*pollDesc).waitRead(0xc42063a990, 0x1db2bc0, 0xc4200141b0) | |
/goroot/src/net/fd_poll_runtime.go:78 +0x34 | |
net.(*netFD).Read(0xc42063a930, 0xc420430000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc4200141b0) | |
/goroot/src/net/fd_unix.go:243 +0x1a1 | |
net.(*conn).Read(0xc42002c0a8, 0xc420430000, 0x1000, 0x1000, 0x0, 0x0, 0x0) | |
/goroot/src/net/net.go:173 +0x70 | |
net/http.(*persistConn).Read(0xc42016a300, 0xc420430000, 0x1000, 0x1000, 0xb486c0, 0xc42064eb58, 0x40363d) | |
/goroot/src/net/http/transport.go:1261 +0x154 | |
bufio.(*Reader).fill(0xc42017ab40) | |
/goroot/src/bufio/bufio.go:97 +0x10c | |
bufio.(*Reader).Peek(0xc42017ab40, 0x1, 0xc42064ebbd, 0x1, 0x0, 0xc42069f3e0, 0x0) | |
/goroot/src/bufio/bufio.go:129 +0x62 | |
net/http.(*persistConn).readLoop(0xc42016a300) | |
/goroot/src/net/http/transport.go:1418 +0x1a1 | |
created by net/http.(*Transport).dialConn | |
/goroot/src/net/http/transport.go:1062 +0x4e9 | |
goroutine 15 [semacquire]: | |
sync.runtime_Semacquire(0xc42007278c) | |
/goroot/src/runtime/sema.go:47 +0x30 | |
sync.(*RWMutex).RLock(0xc420072780) | |
/goroot/src/sync/rwmutex.go:43 +0x5d | |
github.com/hashicorp/vault/vault.(*Core).periodicCheckKeyUpgrade(0xc420072700, 0xc4201a8ae0, 0xc4201a8b40) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:1339 +0x10c | |
created by github.com/hashicorp/vault/vault.(*Core).runStandby | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:1217 +0x15f | |
goroutine 78 [semacquire]: | |
sync.runtime_Semacquire(0xc42007278c) | |
/goroot/src/runtime/sema.go:47 +0x30 | |
sync.(*RWMutex).RLock(0xc420072780) | |
/goroot/src/sync/rwmutex.go:43 +0x5d | |
github.com/hashicorp/vault/vault.(*Core).Leader(0xc420072700, 0xc4201e0e00, 0x0, 0x0, 0x0, 0x0) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:614 +0x9e | |
github.com/hashicorp/vault/command.(*ServerCommand).Run.func4(0xe) | |
/gopath/src/github.com/hashicorp/vault/command/server.go:494 +0x2a | |
github.com/hashicorp/vault/physical.(*ConsulBackend).reconcileConsul(0xc4201e2160, 0xc4204be680, 0x18, 0xc42024f9f0, 0xc42024fa00, 0x0, 0x20002, 0xc4201e0fa4, 0xc4201e0fa0) | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:568 +0x3f | |
github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func1(0xc42024fb20, 0xc42024fab4, 0xc4201e2160, 0xc42024fb10, 0xc42024f9f0, 0xc42024fa00) | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:496 +0xc7 | |
created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:511 +0x637 | |
goroutine 59 [chan send]: | |
github.com/hashicorp/vault/vault.(*Core).stopClusterListener(0xc420072700) | |
/gopath/src/github.com/hashicorp/vault/vault/cluster.go:323 +0xf4 | |
github.com/hashicorp/vault/vault.(*Core).preSeal(0xc420072700, 0x0, 0x0) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:1178 +0x6c9 | |
github.com/hashicorp/vault/vault.(*Core).postUnseal.func1(0xc420749d00, 0xc420072700) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:1100 +0x42 | |
github.com/hashicorp/vault/vault.(*Core).postUnseal(0xc420072700, 0x1dac7c0, 0xc420165120) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:1147 +0x4e5 | |
github.com/hashicorp/vault/vault.(*Core).runStandby(0xc420072700, 0xc42017b680, 0xc42017b6e0, 0xc42017b740) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:1277 +0x7d5 | |
created by github.com/hashicorp/vault/vault.(*Core).Unseal | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:822 +0x58f | |
goroutine 61 [semacquire]: | |
sync.runtime_Semacquire(0xc42007278c) | |
/goroot/src/runtime/sema.go:47 +0x30 | |
sync.(*RWMutex).RLock(0xc420072780) | |
/goroot/src/sync/rwmutex.go:43 +0x5d | |
github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420072700, 0xae6400, 0x0, 0x0) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
github.com/hashicorp/vault/command.(*ServerCommand).Run.func5(0x20) | |
/gopath/src/github.com/hashicorp/vault/command/server.go:501 +0x2a | |
github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func2(0xc42024fab8, 0xc42024fab4, 0xc42024fa00, 0xc4201e2160) | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:522 +0x7f | |
created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer | |
/gopath/src/github.com/hashicorp/vault/physical/consul.go:532 +0x73b | |
goroutine 60 [select]: | |
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Session).RenewPeriodic(0xc420174338, 0x14e538d, 0x3, 0xc4202eede0, 0x24, 0x0, 0xc42017baa0, 0x10, 0x410165) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/session.go:161 +0x31f | |
created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:151 +0xa18 | |
goroutine 28 [select, 1 minutes]: | |
net/http.(*persistConn).roundTrip(0xc42016a900, 0xc420326240, 0x0, 0x0, 0x0) | |
/goroot/src/net/http/transport.go:1840 +0x93b | |
net/http.(*Transport).RoundTrip(0xc4201884b0, 0xc4203f4000, 0xc4201884b0, 0x0, 0x0) | |
/goroot/src/net/http/transport.go:380 +0x4ee | |
net/http.send(0xc4203f4000, 0x1daf4c0, 0xc4201884b0, 0x0, 0x0, 0x0, 0x8, 0xc4204efb00, 0xc420166460) | |
/goroot/src/net/http/client.go:256 +0x15f | |
net/http.(*Client).send(0xc4202bb620, 0xc4203f4000, 0x0, 0x0, 0x0, 0xc420166460, 0x0, 0x1) | |
/goroot/src/net/http/client.go:146 +0x102 | |
net/http.(*Client).doFollowingRedirects(0xc4202bb620, 0xc4203f4000, 0x15ef928, 0x3, 0x58261801, 0x172ace3b) | |
/goroot/src/net/http/client.go:528 +0x5e5 | |
net/http.(*Client).Do(0xc4202bb620, 0xc4203f4000, 0x1df3c20, 0x0, 0x1) | |
/goroot/src/net/http/client.go:184 +0x1ea | |
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Client).doRequest(0xc42006ef60, 0xc42015f0e0, 0xc4204efdf0, 0xc420326180, 0x16, 0xc42015f0e0) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/api.go:475 +0x8e | |
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).getInternal(0xc4204eff20, 0xc4201ff3f0, 0xf, 0x0, 0xc4204eff28, 0xc42011e240, 0xc420322060, 0x0, 0x0) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:163 +0x233 | |
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).Get(0xc4204eff20, 0xc4201ff3f0, 0xf, 0xc4204eff28, 0x0, 0x0, 0x0, 0x0) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:97 +0x8c | |
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).monitorLock(0xc4202312c0, 0xc4202eede0, 0x24, 0xc4202366c0) | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:362 +0xd8 | |
created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock | |
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:239 +0x5ae | |
goroutine 71 [IO wait, 1 minutes]: | |
net.runtime_pollWait(0x7f427d317c00, 0x72, 0x7) | |
/goroot/src/runtime/netpoll.go:160 +0x59 | |
net.(*pollDesc).wait(0xc42025ee60, 0x72, 0xc4202fc9d0, 0xc4200141b0) | |
/goroot/src/net/fd_poll_runtime.go:73 +0x38 | |
net.(*pollDesc).waitRead(0xc42025ee60, 0x1db2bc0, 0xc4200141b0) | |
/goroot/src/net/fd_poll_runtime.go:78 +0x34 | |
net.(*netFD).Read(0xc42025ee00, 0xc4202f6000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc4200141b0) | |
/goroot/src/net/fd_unix.go:243 +0x1a1 | |
net.(*conn).Read(0xc420174370, 0xc4202f6000, 0x1000, 0x1000, 0x0, 0x0, 0x0) | |
/goroot/src/net/net.go:173 +0x70 | |
net/http.(*persistConn).Read(0xc42016a900, 0xc4202f6000, 0x1000, 0x1000, 0xb486c0, 0xc4202fcb58, 0x40363d) | |
/goroot/src/net/http/transport.go:1261 +0x154 | |
bufio.(*Reader).fill(0xc420236540) | |
/goroot/src/bufio/bufio.go:97 +0x10c | |
bufio.(*Reader).Peek(0xc420236540, 0x1, 0xc4202fcbbd, 0x1, 0x0, 0xc4201a9620, 0x0) | |
/goroot/src/bufio/bufio.go:129 +0x62 | |
net/http.(*persistConn).readLoop(0xc42016a900) | |
/goroot/src/net/http/transport.go:1418 +0x1a1 | |
created by net/http.(*Transport).dialConn | |
/goroot/src/net/http/transport.go:1062 +0x4e9 | |
goroutine 72 [select, 1 minutes]: | |
net/http.(*persistConn).writeLoop(0xc42016a900) | |
/goroot/src/net/http/transport.go:1646 +0x3bd | |
created by net/http.(*Transport).dialConn | |
/goroot/src/net/http/transport.go:1063 +0x50e | |
goroutine 81 [select]: | |
net/http.(*persistConn).writeLoop(0xc42016a300) | |
/goroot/src/net/http/transport.go:1646 +0x3bd | |
created by net/http.(*Transport).dialConn | |
/goroot/src/net/http/transport.go:1063 +0x50e | |
goroutine 79 [semacquire]: | |
sync.runtime_Semacquire(0xc42007278c) | |
/goroot/src/runtime/sema.go:47 +0x30 | |
sync.(*RWMutex).RLock(0xc420072780) | |
/goroot/src/sync/rwmutex.go:43 +0x5d | |
github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420072700, 0x0, 0x0, 0x0) | |
/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420072700, 0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
net/http.HandlerFunc.ServeHTTP(0xc42024fa30, 0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/goroot/src/net/http/server.go:1726 +0x44 | |
net/http.(*ServeMux).ServeHTTP(0xc4200ba8a0, 0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/goroot/src/net/http/server.go:2022 +0x7f | |
github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
net/http.HandlerFunc.ServeHTTP(0xc42011c2c0, 0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/goroot/src/net/http/server.go:1726 +0x44 | |
net/http.serverHandler.ServeHTTP(0xc420186a80, 0x1db8a40, 0xc42067ea90, 0xc420660870) | |
/goroot/src/net/http/server.go:2202 +0x7d | |
net/http.(*conn).serve(0xc420089780, 0x1db9c00, 0xc42022ee40) | |
/goroot/src/net/http/server.go:1579 +0x4b7 | |
created by net/http.(*Server).Serve | |
/goroot/src/net/http/server.go:2293 +0x44d | |
rax 0xfffffffffffffffc | |
rbx 0x0 | |
rcx 0x45a983 | |
rdx 0x0 | |
rdi 0x1df4058 | |
rsi 0x0 | |
rbp 0xc42003de90 | |
rsp 0xc42003de48 | |
r8 0x0 | |
r9 0x0 | |
r10 0xc42003de80 | |
r11 0x246 | |
r12 0x42da00 | |
r13 0xf3 | |
r14 0x30 | |
r15 0x3 | |
rip 0x45a983 | |
rflags 0x246 | |
cs 0x33 | |
fs 0x0 | |
gs 0x0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@vault-1:~/go/src/github.com/hashicorp/vault# sudo -u vault /usr/local/bin/vault server -config=/etc/vault.d | |
==> Vault server configuration: | |
Backend: consul (HA available) | |
Cluster Address: https://10.170.131.69:8201 | |
Listener 1: tcp (addr: "0.0.0.0:8200", cluster address: "", tls: "disabled") | |
Log Level: info | |
Mlock: supported: true, enabled: false | |
Redirect Address: http://10.170.131.69:8200 | |
Version: Vault v0.6.2 | |
==> Vault server started! Log data will stream in below: | |
2016/11/11 21:31:38.216102 [WARN ] physical/consul: appending trailing forward slash to path | |
2016/11/11 21:31:44.725644 [INFO ] core: vault is unsealed | |
2016/11/11 21:31:44.725690 [WARN ] physical/consul: Concurrent sealed state change notify dropped | |
2016/11/11 21:31:44.725791 [INFO ] core: entering standby mode | |
2016/11/11 21:32:03.849120 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:03.971987 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:03.972022 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:03.980978 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:03.981028 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:03.981098 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:03.981160 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:03.981283 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:03.981430 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:03.981536 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:03.981678 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:04.003086 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:04.004799 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:04.004842 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:04.004860 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:04.004909 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:04.004959 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:04.005011 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:04.331195 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:04.447182 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:04.447227 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:04.452113 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:04.452155 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:04.452217 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:04.452264 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:04.452346 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:04.452404 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:04.452455 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:04.452608 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:04.472462 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:04.474315 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:04.474346 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:04.474356 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:04.474378 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:04.474409 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:04.474440 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:04.750671 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:04.859331 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:04.859367 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:04.864044 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:04.864089 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:04.864125 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:04.864175 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:04.864232 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:04.864270 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:04.864321 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:04.864412 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:04.886311 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:04.888215 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:04.888266 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:04.888289 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:04.888350 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:04.888401 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:04.888446 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:05.157961 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:05.280781 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:05.280820 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:05.285645 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:05.285699 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:05.285761 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:05.285801 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:05.285867 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:05.285906 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:05.285979 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:05.286089 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:05.306861 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:05.308842 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:05.308886 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:05.308899 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:05.308921 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:05.308953 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:05.308971 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:05.580404 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:05.701274 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:05.701299 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:05.706445 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:05.706479 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:05.706513 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:05.706539 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:05.706572 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:05.706620 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:05.706678 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:05.706781 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:05.728614 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:05.730727 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:05.730769 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:05.730799 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:05.730837 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:05.730867 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:05.730890 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:05.975635 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:06.084132 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:06.084158 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:06.090157 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:06.090203 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:06.090249 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:06.090286 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:06.090342 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:06.090391 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:06.090436 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:06.090555 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:06.111169 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:06.113060 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:06.113088 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:06.113102 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:06.113125 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:06.113166 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:06.113199 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:06.393183 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:06.498188 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:06.498222 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:06.503276 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:06.503320 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:06.503365 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:06.503400 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:06.503474 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:06.503537 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:06.503604 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:06.503718 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:06.522924 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:06.524764 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:06.524807 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:06.524829 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:06.524865 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:06.524914 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:06.524943 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:06.792855 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:06.901628 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:06.901659 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:06.907236 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:06.907286 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:06.907332 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:06.907370 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:06.907418 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:06.907469 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:06.907551 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:06.907682 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:06.930282 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:06.932169 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:06.932209 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:06.932229 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:06.932256 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:06.932293 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:06.932316 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:07.226526 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:07.346688 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:07.346719 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:07.350856 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:07.350902 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:07.350946 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:07.350984 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:07.351021 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:07.351058 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:07.351102 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:07.351159 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:07.369244 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:07.371028 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:07.371069 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:07.371082 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:07.371112 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:07.371150 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:07.371172 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:07.627816 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:07.765988 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:07.766010 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:07.772715 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:07.772832 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:07.773025 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:07.773134 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:07.773274 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:07.773402 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:07.773495 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:07.773586 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:07.796576 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:07.798670 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:07.798708 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:07.798725 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:07.798755 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:07.798784 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:07.798808 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:08.066911 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:08.178004 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:08.178042 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:08.183682 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:08.183719 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:08.183755 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:08.183792 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:08.183838 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:08.183881 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:08.183949 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:08.184066 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:08.202323 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:08.204381 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:08.204408 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:08.204417 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:08.204438 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:08.204468 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:08.204486 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:08.472658 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:08.585298 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:08.585326 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:08.590293 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:08.590397 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:08.590482 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:08.590540 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:08.590625 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:08.590749 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:08.590872 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:08.591027 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:08.613419 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:08.615807 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:08.615830 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:08.615838 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:08.615853 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:08.615872 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:08.615888 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:08.838031 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:08.938503 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:08.938554 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:08.943786 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:08.943830 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:08.943875 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:08.943908 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:08.943970 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:08.944045 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:08.944105 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:08.944232 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:08.963955 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:08.966013 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:08.966049 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:08.966063 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:08.966092 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:08.966128 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:08.966148 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:09.261155 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:09.386290 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:09.386337 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:09.392069 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:09.392119 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:09.392172 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:09.392222 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:09.392305 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:09.392383 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:09.392447 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:09.392581 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:09.413503 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:09.415404 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:09.415437 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:09.415450 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:09.415476 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:09.415512 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:09.415536 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:09.684939 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:09.800808 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:09.800845 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:09.808958 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:09.808998 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:09.809032 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:09.809060 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:09.809098 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:09.809135 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:09.809166 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:09.809273 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:09.828184 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:09.830087 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:09.830132 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:09.830151 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:09.830179 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:09.830215 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:09.830243 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:10.110530 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:10.239271 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:10.239302 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:10.244559 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:10.244601 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:10.244645 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:10.244677 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:10.244719 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:10.244756 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:10.244801 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:10.244929 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:10.261159 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:10.262644 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:10.262667 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:10.262674 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:10.262691 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:10.262723 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:10.262744 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:10.534976 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:10.655900 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:10.655941 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:10.660563 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:10.660606 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:10.660646 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:10.660695 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:10.660763 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:10.660826 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:10.660891 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:10.661014 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:10.681732 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:10.683842 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:10.683877 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:10.683892 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:10.683919 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:10.683965 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:10.683989 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:10.962020 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:11.067962 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:11.068001 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:11.073683 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:11.073730 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:11.073777 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:11.073813 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:11.073868 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:11.073940 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:11.074001 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:11.074115 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:11.099147 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:11.101221 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:11.101268 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:11.101292 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:11.101318 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:11.101359 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:11.101392 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:11.367472 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:11.487590 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:11.487620 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:11.492234 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:11.492281 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:11.492354 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:11.492418 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:11.492474 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:11.492513 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:11.492565 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:11.492676 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:11.510792 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:11.512401 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:11.512434 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:11.512459 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:11.512508 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:11.512560 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:11.512578 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:11.787332 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:11.886308 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:11.886338 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:11.890085 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:11.890123 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:11.890164 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:11.890202 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:11.890249 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:11.890290 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:11.890329 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:11.890389 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:11.904492 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:11.905882 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:11.905909 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:11.905949 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:11.905976 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:11.906004 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:11.906026 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:12.191713 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:12.297408 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:12.297457 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:12.303110 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:12.303159 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:12.303232 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:12.303272 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:12.303325 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:12.303368 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:12.303414 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:12.303514 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:12.325830 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:12.327537 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:12.327565 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:12.327576 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:12.327598 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:12.327627 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:12.327645 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:12.663149 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:12.787833 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:12.787858 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:12.794276 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:12.794314 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:12.794351 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:12.794395 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:12.794453 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:12.794541 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:12.794623 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:12.794762 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:12.815183 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:12.816960 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:12.816995 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:12.817009 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:12.817034 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:12.817063 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:12.817087 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:13.102452 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:13.212733 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:13.212763 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:13.218601 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:13.218659 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:13.218727 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:13.218790 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:13.218862 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:13.218922 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:13.218993 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:13.219129 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:13.243331 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:13.245414 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:13.245451 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:13.245465 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:13.245492 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:13.245521 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:13.245543 [ERROR] core: post-unseal setup failed: error=failed to setup audit table | |
2016/11/11 21:32:13.484876 [INFO ] core: acquired lock, enabling active operation | |
2016/11/11 21:32:13.612940 [WARN ] physical/consul: Concurrent state change notify dropped | |
2016/11/11 21:32:13.612985 [INFO ] core: post-unseal setup starting | |
2016/11/11 21:32:13.618747 [INFO ] core: successfully mounted backend: type=system path=sys/ | |
2016/11/11 21:32:13.618795 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/ | |
2016/11/11 21:32:13.618841 [INFO ] core: successfully mounted backend: type=consul path=consul/ | |
2016/11/11 21:32:13.618882 [INFO ] core: successfully mounted backend: type=generic path=secret/ | |
2016/11/11 21:32:13.618934 [INFO ] core: successfully mounted backend: type=mysql path=mysql/ | |
2016/11/11 21:32:13.618991 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/ | |
2016/11/11 21:32:13.619044 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/ | |
2016/11/11 21:32:13.619155 [INFO ] rollback: starting rollback manager | |
2016/11/11 21:32:13.640089 [INFO ] expire: leases restored: restored_lease_count=4 | |
2016/11/11 21:32:13.642003 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied | |
2016/11/11 21:32:13.642038 [INFO ] core: pre-seal teardown starting | |
2016/11/11 21:32:13.642054 [INFO ] core/stopClusterListener: listeners not running | |
2016/11/11 21:32:13.642079 [INFO ] rollback: stopping rollback manager | |
2016/11/11 21:32:13.642108 [INFO ] core: pre-seal teardown complete | |
2016/11/11 21:32:13.642126 [ERROR] core: post-unseal setup failed: error=failed to setup audit table |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 11 03:34:01 vault-2 vault[8535]: SIGQUIT: quit | |
Nov 11 03:34:01 vault-2 vault[8535]: PC=0x45a983 m=1 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 0 [idle]: | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.futex(0x1df4058, 0x0, 0xc42002de80, 0x0, 0xc400000000, 0x45a6a6, 0x3c, 0x0, 0xc42002dec8, 0x40d5cb, ...) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sys_linux_amd64.s:388 +0x23 | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.futexsleep(0x1df4058, 0x0, 0xdf8475800) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/os_linux.go:62 +0xd7 | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.notetsleep_internal(0x1df4058, 0xdf8475800, 0x1) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/lock_futex.go:174 +0xeb | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.notetsleep(0x1df4058, 0xdf8475800, 0x4fbe120db7301) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/lock_futex.go:194 +0x56 | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.sysmon() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:3618 +0x14c | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.mstart1() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:1126 +0x11e | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.mstart() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:1096 +0x64 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 1 [select, 72 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.(*ServerCommand).Run(0xc4201100f0, 0xc42000a140, 0x1, 0x1, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:576 +0x34c9 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/mitchellh/cli.(*CLI).Run(0xc4202480c0, 0xc4202480c0, 0x27, 0x15ecaa0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/mitchellh/cli/cli.go:154 +0x24e | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/cli.RunCustom(0xc42000a130, 0x2, 0x2, 0xc4201b9380, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/cli/main.go:44 +0x4e7 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/cli.Run(0xc42000a130, 0x2, 0x2, 0xc4200001a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/cli/main.go:11 +0x56 | |
Nov 11 03:34:01 vault-2 vault[8535]: main.main() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/main.go:10 +0x66 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 17 [syscall, 72 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: os/signal.signal_recv(0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sigqueue.go:116 +0x157 | |
Nov 11 03:34:01 vault-2 vault[8535]: os/signal.loop() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/os/signal/signal_unix.go:22 +0x22 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by os/signal.init.1 | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/os/signal/signal_unix.go:28 +0x41 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 9 [chan receive, 72 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.MakeShutdownCh.func1(0xc420074420, 0xc4200743c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:954 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/command.MakeShutdownCh | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:956 +0x143 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 8 [select, 72 minutes, locked to thread]: | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.gopark(0x15efde8, 0x0, 0x14e8d6a, 0x6, 0x18, 0x2) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:259 +0x13a | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.selectgoImpl(0xc4201ff730, 0x0, 0x18) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/select.go:423 +0x11d9 | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.selectgo(0xc4201ff730) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/select.go:238 +0x1c | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.ensureSigM.func1() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/signal1_unix.go:304 +0x2f3 | |
Nov 11 03:34:01 vault-2 vault[8535]: runtime.goexit() | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/asm_amd64.s:2086 +0x1 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 10 [chan receive, 72 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.MakeSighupCh.func1(0xc420074600, 0xc4200745a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:970 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/command.MakeSighupCh | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:973 +0x119 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 11 [semacquire, 72 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_notifyListWait(0xc4202481c0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:267 +0x122 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*Cond).Wait(0xc4202481b0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/cond.go:57 +0x80 | |
Nov 11 03:34:01 vault-2 vault[8535]: io.(*pipe).read(0xc420248180, 0xc4200aa000, 0x1000, 0x1000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/io/pipe.go:47 +0x102 | |
Nov 11 03:34:01 vault-2 vault[8535]: io.(*PipeReader).Read(0xc4200a8250, 0xc4200aa000, 0x1000, 0x1000, 0x1000, 0x1000, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/io/pipe.go:129 +0x4c | |
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Scanner).Scan(0xc4200b8a00, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/scan.go:208 +0x50f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/meta.(*Meta).FlagSet.func1(0xc4200b8a00, 0xc420110120) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/meta/meta.go:151 +0x2f | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/meta.(*Meta).FlagSet | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/meta/meta.go:154 +0x49b | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 12 [select, 72 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*InmemSignal).run(0xc4203a56c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:63 +0x10b | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.NewInmemSignal | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:37 +0x1c5 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 13 [sleep]: | |
Nov 11 03:34:01 vault-2 vault[8535]: time.Sleep(0x3b9aca00) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/time.go:59 +0xe1 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*Metrics).collectStats(0xc4200ac230) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/metrics.go:67 +0x2f | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.New | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/start.go:61 +0xf4 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 61 [semacquire, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206aea90, 0xc420676d20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc420069b80, 0x1db9c00, 0xc4204f9f00) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 76 [select, 5 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).roundTrip(0xc420170700, 0xc420525ea0, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1840 +0x93b | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Transport).RoundTrip(0xc4201104b0, 0xc42066f0e0, 0xc4201104b0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:380 +0x4ee | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.send(0xc42066f0e0, 0x1daf4c0, 0xc4201104b0, 0x0, 0x0, 0x0, 0x8, 0xc420395b00, 0xc42001c388) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:256 +0x15f | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Client).send(0xc4201bc0c0, 0xc42066f0e0, 0x0, 0x0, 0x0, 0xc42001c388, 0x0, 0x1) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:146 +0x102 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Client).doFollowingRedirects(0xc4201bc0c0, 0xc42066f0e0, 0x15ef928, 0x3, 0x58253b01, 0x22669fe9) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:528 +0x5e5 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Client).Do(0xc4201bc0c0, 0xc42066f0e0, 0x1df3c20, 0x0, 0x1) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:184 +0x1ea | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Client).doRequest(0xc420075020, 0xc4204fceb0, 0xc420395df0, 0xc420525de0, 0x16, 0xc4204fceb0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/api.go:475 +0x8e | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).getInternal(0xc420395f20, 0xc4204fac20, 0xf, 0x0, 0xc420395f28, 0xc4201c0870, 0xc420126bd0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:163 +0x233 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).Get(0xc420395f20, 0xc4204fac20, 0xf, 0xc420395f28, 0x0, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:97 +0x8c | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).monitorLock(0xc4203c8400, 0xc4203c0f00, 0x24, 0xc4203c3f80) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:362 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:239 +0x5ae | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 22 [select]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer(0xc4200b6580, 0xc4201e65d0, 0xc4200743c0, 0xc4201f1840, 0x19, 0xc4201e65e0, 0xc4201e65f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:478 +0x7e3 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/physical.(*ConsulBackend).RunServiceDiscovery | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:444 +0xd1 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 23 [IO wait, 3 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: net.runtime_pollWait(0x7f8f32dd4d80, 0x72, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/netpoll.go:160 +0x59 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).wait(0xc4201ea290, 0x72, 0xc420499db0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:73 +0x38 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).waitRead(0xc4201ea290, 0x1db2bc0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:78 +0x34 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*netFD).accept(0xc4201ea230, 0x0, 0x1dafc40, 0xc4204f2180) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_unix.go:419 +0x238 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*TCPListener).accept(0xc42001c2c0, 0x29e8d60800, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/tcpsock_posix.go:132 +0x2e | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*TCPListener).AcceptTCP(0xc42001c2c0, 0xc420499ed8, 0xc420499ee0, 0xc420499ed0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/tcpsock.go:209 +0x49 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command/server.tcpKeepAliveListener.Accept(0xc42001c2c0, 0x15ef780, 0xc4203c5080, 0x1db9cc0, 0xc4200c6030) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server/listener_tcp.go:38 +0x2f | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Server).Serve(0xc420069280, 0x1db8c00, 0xc42001c2c0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2273 +0x1ce | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/command.(*ServerCommand).Run | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:558 +0x3104 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 67 [select]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Session).RenewPeriodic(0xc42001c550, 0x14e538d, 0x3, 0xc4203c0f00, 0x24, 0x0, 0xc4203c2f60, 0x10, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/session.go:161 +0x31f | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:151 +0xa18 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 46 [semacquire, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).periodicCheckKeyUpgrade(0xc420052000, 0xc4203c27e0, 0xc4203c2840) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1339 +0x10c | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vault.(*Core).runStandby | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1217 +0x15f | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 52 [chan send, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).stopClusterListener(0xc420052000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/cluster.go:323 +0xf4 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).preSeal(0xc420052000, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1178 +0x6c9 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).postUnseal.func1(0xc420393d10, 0xc420052000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1100 +0x42 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).postUnseal(0xc420052000, 0x1dac7c0, 0xc4202f72f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1147 +0x4e5 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).runStandby(0xc420052000, 0xc4203ce240, 0xc4203ce2a0, 0xc4203ce300) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1277 +0x7d5 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vault.(*Core).Unseal | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:822 +0x58f | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 60 [semacquire, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0xae6400, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.(*ServerCommand).Run.func5(0x20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:501 +0x2a | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func2(0xc4200935d0, 0xc420093528, 0xc4201e65f0, 0xc4200b6580) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:522 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:532 +0x73b | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 81 [select]: | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*RollbackManager).run(0xc4200b8c80) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/rollback.go:97 +0x21c | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vault.(*RollbackManager).Start | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/rollback.go:74 +0x3f | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 62 [semacquire, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Leader(0xc420052000, 0xc4203df900, 0x0, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:614 +0x9e | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.(*ServerCommand).Run.func4(0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:494 +0x2a | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).reconcileConsul(0xc4200b6580, 0xc4203ca000, 0x18, 0xc4201e65e0, 0xc4201e65f0, 0x0, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:568 +0x3f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func1(0xc4200935d8, 0xc420093528, 0xc4200b6580, 0xc4200935e0, 0xc4201e65e0, 0xc4201e65f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:496 +0xc7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:511 +0x637 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 82 [semacquire, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206aec30, 0xc420677770) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5880, 0x1db9c00, 0xc4203c9dc0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 104 [semacquire, 69 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4280, 0x1db9c00, 0xc420522840) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 103 [semacquire, 71 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Leader(0xc420052000, 0x1512700, 0x0, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:614 +0x9e | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleRequestForwarding.func1(0x1db8a40, 0xc4206aed00, 0xc420677d10) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/handler.go:138 +0xd7 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e40, 0x1db8a40, 0xc4206aed00, 0xc420677d10) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206aed00, 0xc420677d10) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206aed00, 0xc420677d10) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206aed00, 0xc420677d10) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206aed00, 0xc420677d10) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5d00, 0x1db9c00, 0xc4205232c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 669 [IO wait]: | |
Nov 11 03:34:01 vault-2 vault[8535]: net.runtime_pollWait(0x7f8f32dd4c00, 0x72, 0x7) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/netpoll.go:160 +0x59 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).wait(0xc420536bc0, 0x72, 0xc4204989d0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:73 +0x38 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).waitRead(0xc420536bc0, 0x1db2bc0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:78 +0x34 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*netFD).Read(0xc420536b60, 0xc420505000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_unix.go:243 +0x1a1 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*conn).Read(0xc42001c408, 0xc420505000, 0x1000, 0x1000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/net.go:173 +0x70 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).Read(0xc420170500, 0xc420505000, 0x1000, 0x1000, 0xb486c0, 0xc420498b58, 0x40363d) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1261 +0x154 | |
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).fill(0xc420509140) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:97 +0x10c | |
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).Peek(0xc420509140, 0x1, 0xc420498bbd, 0x1, 0x0, 0xc4205091a0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:129 +0x62 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).readLoop(0xc420170500) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1418 +0x1a1 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1062 +0x4e9 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 593 [semacquire, 17 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc42011d110, 0xc42066f4a0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5800, 0x1db9c00, 0xc42007db40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 556 [semacquire, 17 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b9380, 0x1db9c00, 0xc4203c9000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 628 [IO wait, 5 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: net.runtime_pollWait(0x7f8f32dd4e40, 0x72, 0x8) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/netpoll.go:160 +0x59 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).wait(0xc4205423e0, 0x72, 0xc4203bc9d0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:73 +0x38 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).waitRead(0xc4205423e0, 0x1db2bc0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:78 +0x34 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*netFD).Read(0xc420542380, 0xc420501000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc42000e150) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_unix.go:243 +0x1a1 | |
Nov 11 03:34:01 vault-2 vault[8535]: net.(*conn).Read(0xc42001c318, 0xc420501000, 0x1000, 0x1000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/net.go:173 +0x70 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).Read(0xc420170700, 0xc420501000, 0x1000, 0x1000, 0xb486c0, 0xc4203bcb58, 0x40363d) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1261 +0x154 | |
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).fill(0xc4203ceba0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:97 +0x10c | |
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).Peek(0xc4203ceba0, 0x1, 0xc4203bcbbd, 0x1, 0x0, 0xc4203cf860, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:129 +0x62 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).readLoop(0xc420170700) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1418 +0x1a1 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1062 +0x4e9 | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 500 [semacquire, 25 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc420694410, 0xc42066eb40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4e00, 0x1db9c00, 0xc4204f9400) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 520 [semacquire, 23 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc420694340, 0xc42066e3c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b8c00, 0x1db9c00, 0xc420583dc0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 471 [semacquire, 25 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d1e10, 0xc42066e000) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b8180, 0x1db9c00, 0xc4206c2440) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 453 [semacquire, 29 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4180, 0x1db9c00, 0xc420583f40) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 472 [semacquire, 25 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4400, 0x1db9c00, 0xc4206c32c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 486 [semacquire, 27 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206940d0, 0xc4206c0960) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b9000, 0x1db9c00, 0xc4204ff700) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 670 [select]: | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).writeLoop(0xc420170500) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1646 +0x3bd | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1063 +0x50e | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 686 [semacquire, 3 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206945b0, 0xc42066f590) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5080, 0x1db9c00, 0xc42007c1c0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 629 [select, 5 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).writeLoop(0xc420170700) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1646 +0x3bd | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1063 +0x50e | |
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 594 [semacquire, 15 minutes]: | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40 | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f | |
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44 | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d | |
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b9680, 0x1db9c00, 0xc4204ff180) | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7 | |
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve | |
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d | |
Nov 11 03:34:01 vault-2 vault[8535]: rax 0xfffffffffffffffc | |
Nov 11 03:34:01 vault-2 vault[8535]: rbx 0x0 | |
Nov 11 03:34:01 vault-2 vault[8535]: rcx 0x45a983 | |
Nov 11 03:34:01 vault-2 vault[8535]: rdx 0x0 | |
Nov 11 03:34:01 vault-2 vault[8535]: rdi 0x1df4058 | |
Nov 11 03:34:01 vault-2 vault[8535]: rsi 0x0 | |
Nov 11 03:34:01 vault-2 vault[8535]: rbp 0xc42002de90 | |
Nov 11 03:34:01 vault-2 vault[8535]: rsp 0xc42002de48 | |
Nov 11 03:34:01 vault-2 vault[8535]: r8 0x0 | |
Nov 11 03:34:01 vault-2 vault[8535]: r9 0x0 | |
Nov 11 03:34:01 vault-2 vault[8535]: r10 0xc42002de80 | |
Nov 11 03:34:01 vault-2 vault[8535]: r11 0x246 | |
Nov 11 03:34:01 vault-2 vault[8535]: r12 0x42da00 | |
Nov 11 03:34:01 vault-2 vault[8535]: r13 0xf3 | |
Nov 11 03:34:01 vault-2 vault[8535]: r14 0x30 | |
Nov 11 03:34:01 vault-2 vault[8535]: r15 0x3 | |
Nov 11 03:34:01 vault-2 vault[8535]: rip 0x45a983 | |
Nov 11 03:34:01 vault-2 vault[8535]: rflags 0x246 | |
Nov 11 03:34:01 vault-2 vault[8535]: cs 0x33 | |
Nov 11 03:34:01 vault-2 vault[8535]: fs 0x0 | |
Nov 11 03:34:01 vault-2 vault[8535]: gs 0x0 | |
Nov 11 03:34:01 vault-2 systemd[1]: vault.service: Main process exited, code=exited, status=2/INVALIDARGUMENT | |
Nov 11 03:34:01 vault-2 systemd[1]: vault.service: Unit entered failed state. | |
Nov 11 03:34:01 vault-2 systemd[1]: vault.service: Failed with result 'exit-code'. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment