Last active
January 7, 2019 10:10
-
-
Save HugoKuo/5d854ed905fe44ddbcbcd74214451328 to your computer and use it in GitHub Desktop.
keystone middleware
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jan 7 15:50:36 platform-ssnode2 keystoneauth.identity.v3.base: {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "9fe2ff9ee4384b1894a90878d3e92bab", "name": "_member_"}, {"id": "5d6fec4a03734ea89c4c7b6e5860aac9", "name": "admin"}], "expires_at": "2019-01-07T08:50:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "41e9b677f7b74d2f874aa2b226603f97", "name": "service"}, "catalog": [{"endpoints": [{"url": "http://127.0.0.1:35357", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "88a554d433d54b2db3f495b957f15cd0"}, {"url": "http://127.0.0.1:5000", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "2691cf24505b4c5bb564c747e63e78d6"}, {"url": "http://127.0.0.1:5000", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "17837d8b78634f4fa8ebca588dee264d"}], "type": "identity", "id": "ad88f33de0cc4394864e9609776f2578", "name": "keystone"}, {"endpoints": [{"url": "http://192.168.56.70/v1/KEY_41e9b677f7b74d2f874aa2b226603f97", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "478f3bc772724eb7b5e2773ce67d8eca"}, {"url": "http://192.168.56.70/v1/KEY_41e9b677f7b74d2f874aa2b226603f97", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "b8179752363545a5944ed0cb61675d22"}, {"url": "http://192.168.56.70/v1/KEY_41e9b677f7b74d2f874aa2b226603f97", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "d2f690de2aad44eeb62efedbb4656cce"}], "type": "object-store", "id": "acbe023c90ac4de89f10a036a1eade5e", "name": "swift"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "swift", "id": "1b696df5a4684448b48b0aee7dd9fb90"}, "audit_ids": ["uoavMiPRTsS8xyWdFGub8g"], "issued_at": "2019-01-07T07:50:36.000000Z"}} | |
Jan 7 15:50:36 platform-ssnode2 keystoneauth.session: REQ: curl -g -i -X GET http://127.0.0.1:35357 -H "Accept: application/json" -H "User-Agent: keystonemiddleware.auth_token/5.2.0 keystoneauth1/3.10.0 python-requests/2.19.1 CPython/2.7.15" | |
Jan 7 15:50:36 platform-ssnode2 keystoneauth.discover: Failed to contact the endpoint at http://127.0.0.1:35357 for discovery. Fallback to using that endpoint as the base url. | |
Jan 7 15:50:36 platform-ssnode2 proxy-server:authtoken: Auth Token confirmed use of None apis (txn: tx3dd3b77df22a4f92b17a7-005c3304cc) | |
Jan 7 15:50:36 platform-ssnode2 keystoneauth.session: REQ: curl -g -i -X GET http://127.0.0.1:35357 -H "Accept: application/json" -H "User-Agent: keystonemiddleware.auth_token/5.2.0 keystoneauth1/3.10.0 python-requests/2.19.1 CPython/2.7.15" | |
Jan 7 15:50:36 platform-ssnode2 keystoneauth.discover: Failed to contact the endpoint at http://127.0.0.1:35357 for discovery. Fallback to using that endpoint as the base url. | |
Jan 7 15:50:36 platform-ssnode2 keystoneauth.session: REQ: curl -g -i -X GET http://127.0.0.1:35357/auth/tokens?nocatalog -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA1}588f230d4b72bf4a393e029b0eb839c266cb45d1" -H "X-Subject-Token: {SHA1}8f459e0ab5098f231465ce4faf2340ad01ed6fd5" | |
Jan 7 15:50:36 platform-ssnode2 keystoneauth.session: Failure: Unable to establish connection to http://127.0.0.1:35357/auth/tokens?nocatalog: HTTPConnectionPool(host='127.0.0.1', port=35357): Max retries exceeded with url: /auth/tokens?nocatalog (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7f7cff53f750>: Failed to establish a new connection: [Errno 111] ECONNREFUSED',)). Retrying in 0.5s. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jan 7 18:04:34 platform-ssnode2 keystoneauth.session: REQ: curl -g -i -X GET http://keystone:35357/ -H "Accept: application/json" -H "User-Agent: keystonemiddleware.auth_token/5.2.0 keystoneauth1/3.10.0 python-requests/2.19.1 CPython/2.7.15" | |
Jan 7 18:04:34 platform-ssnode2 keystoneauth.session: RESP: [300] Content-Length: 592 Content-Type: application/json Date: Mon, 07 Jan 2019 10:04:34 GMT Server: WSGIServer/0.1 Python/2.7.5 Vary: X-Auth-Token | |
Jan 7 18:04:34 platform-ssnode2 keystoneauth.session: RESP BODY: {"versions": {"values": [{"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://keystone:35357/v3/", "rel": "self"}]}, {"status": "deprecated", "updated": "2016-08-04T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v2.0+json"}], "id": "v2.0", "links": [{"href": "http://keystone:35357/v2.0/", "rel": "self"}, {"href": "https://docs.openstack.org/", "type": "text/html", "rel": "describedby"}]}]}} | |
Jan 7 18:04:34 platform-ssnode2 keystoneauth.identity.v3.base: Making authentication request to http://keystone:35357/v3/auth/tokens | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.identity.v3.base: {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "9fe2ff9ee4384b1894a90878d3e92bab", "name": "_member_"}, {"id": "5d6fec4a03734ea89c4c7b6e5860aac9", "name": "admin"}], "expires_at": "2019-01-07T11:04:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "41e9b677f7b74d2f874aa2b226603f97", "name": "service"}, "catalog": [{"endpoints": [{"url": "http://192.168.56.1:35357", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "88a554d433d54b2db3f495b957f15cd0"}, {"url": "http://192.168.56.1:5000", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "2691cf24505b4c5bb564c747e63e78d6"}, {"url": "http://192.168.56.1:5000", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "17837d8b78634f4fa8ebca588dee264d"}], "type": "identity", "id": "ad88f33de0cc4394864e9609776f2578", "name": "keystone"}, {"endpoints": [{"url": "http://192.168.56.71/v1/KEY_41e9b677f7b74d2f874aa2b226603f97", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "3df101c140ab4f6b8ec57bd5f8b38a0a"}, {"url": "http://192.168.56.71/v1/KEY_41e9b677f7b74d2f874aa2b226603f97", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "5c3a563190724275bcd3a200136878b5"}, {"url": "http://192.168.56.71/v1/KEY_41e9b677f7b74d2f874aa2b226603f97", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "7e130f257fdb49668e9ee40345ef450e"}], "type": "object-store", "id": "acbe023c90ac4de89f10a036a1eade5e", "name": "swift"}], "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "swift", "id": "1b696df5a4684448b48b0aee7dd9fb90"}, "audit_ids": ["47UuxfzmSPuKZkWeyoUlLA"], "issued_at": "2019-01-07T10:04:35.000000Z"}} | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: REQ: curl -g -i -X GET http://192.168.56.1:35357 -H "Accept: application/json" -H "User-Agent: keystonemiddleware.auth_token/5.2.0 keystoneauth1/3.10.0 python-requests/2.19.1 CPython/2.7.15" | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: RESP: [300] Content-Length: 600 Content-Type: application/json Date: Mon, 07 Jan 2019 10:04:35 GMT Server: WSGIServer/0.1 Python/2.7.5 Vary: X-Auth-Token | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: RESP BODY: {"versions": {"values": [{"status": "stable", "updated": "2017-02-22T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.8", "links": [{"href": "http://192.168.56.1:35357/v3/", "rel": "self"}]}, {"status": "deprecated", "updated": "2016-08-04T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v2.0+json"}], "id": "v2.0", "links": [{"href": "http://192.168.56.1:35357/v2.0/", "rel": "self"}, {"href": "https://docs.openstack.org/", "type": "text/html", "rel": "describedby"}]}]}} | |
Jan 7 18:04:35 platform-ssnode2 proxy-server:authtoken: Auth Token confirmed use of None apis (txn: tx79804aa7ff1a4cc481acc-005c332432) | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: REQ: curl -g -i -X GET http://192.168.56.1:35357/v3/auth/tokens?nocatalog -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA1}d98cae08adb20259e152e76c56052eb7f2ac4282" -H "X-Subject-Token: {SHA1}52ba382fb9372b063e0e76e7ae915f4b7f767b2f" | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: RESP: [200] Content-Length: 590 Content-Type: application/json Date: Mon, 07 Jan 2019 10:04:35 GMT Server: WSGIServer/0.1 Python/2.7.5 Vary: X-Auth-Token X-Subject-Token: {SHA1}52ba382fb9372b063e0e76e7ae915f4b7f767b2f x-openstack-request-id: req-2dcaebed-3c29-401f-8ddb-ed2e82a6e31b | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: RESP BODY: {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "9fe2ff9ee4384b1894a90878d3e92bab", "name": "_member_"}, {"id": "5d6fec4a03734ea89c4c7b6e5860aac9", "name": "admin"}], "expires_at": "2019-01-07T11:04:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "41e9b677f7b74d2f874aa2b226603f97", "name": "service"}, "user": {"domain": {"id": "default", "name": "Default"}, "password_expires_at": null, "name": "swift", "id": "1b696df5a4684448b48b0aee7dd9fb90"}, "audit_ids": ["ONC8OtQTRi-IqbQNTH_9Cg"], "issued_at": "2019-01-07T10:04:34.000000Z"}} | |
Jan 7 18:04:35 platform-ssnode2 keystoneauth.session: GET call to identity for http://192.168.56.1:35357/v3/auth/tokens?nocatalog used request id req-2dcaebed-3c29-401f-8ddb-ed2e82a6e31b | |
Jan 7 18:04:35 platform-ssnode2 proxy-server:authtoken: Received request from user: user_id 1b696df5a4684448b48b0aee7dd9fb90, project_id 41e9b677f7b74d2f874aa2b226603f97, roles _member_,admin (txn: tx79804aa7ff1a4cc481acc-005c332432) | |
Jan 7 18:04:35 platform-ssnode2 proxy-server: Using identity: {'service_roles': [], 'roles': [u'_member_', u'admin'], 'project_domain': (u'default', u'Default'), 'auth_version': 3, 'user': (u'1b696df5a4684448b48b0aee7dd9fb90', u'swift'), 'user_domain': (u'default', u'Default'), 'tenant': (u'41e9b677f7b74d2f874aa2b226603f97', u'service')} (txn: tx79804aa7ff1a4cc481acc-005c332432) | |
Jan 7 18:04:35 platform-ssnode2 proxy-server: allow user with role(s) admin,_member_ as account admin (txn: tx79804aa7ff1a4cc481acc-005c332432) (client_ip: 192.168.56.1) | |
Jan 7 18:04:35 platform-ssnode2 proxy-server: Node error limited 192.168.56.71:6002 (d3) (txn: tx79804aa7ff1a4cc481acc-005c332432) (client_ip: 192.168.56.1) | |
Jan 7 18:04:35 platform-ssnode2 proxy-server: Node error limited 192.168.56.70:6002 (d2) (txn: tx79804aa7ff1a4cc481acc-005c332432) (client_ip: 192.168.56.1) | |
Jan 7 18:04:35 platform-ssnode2 account-server: 192.168.56.71 - - [07/Jan/2019:10:04:35 +0000] "HEAD /d5/56795/KEY_41e9b677f7b74d2f874aa2b226603f97" 404 - "HEAD http://192.168.56.71/v1/KEY_41e9b677f7b74d2f874aa2b226603f97?format=json" "tx79804aa7ff1a4cc481acc-005c332432" "proxy-server 27911" 0.0005 "-" 32634 - |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment