Skip to content

Instantly share code, notes, and snippets.

@ishustava
Last active February 2, 2016 22:12
Show Gist options
  • Save ishustava/2fa9158a23bd294172c8 to your computer and use it in GitHub Desktop.
Save ishustava/2fa9158a23bd294172c8 to your computer and use it in GitHub Desktop.
etcd_ctl.err.log
ap/jobs/etcd/config/certs/server.crt --key-file /var/vcap/jobs/etcd/config/certs/server.key'
[2016-02-02 22:08:35+0000] ++ peer_ca_cert_file=/var/vcap/jobs/etcd/config/certs/peer-ca.crt
[2016-02-02 22:08:35+0000] ++ peer_cert_file=/var/vcap/jobs/etcd/config/certs/peer.crt
[2016-02-02 22:08:35+0000] ++ peer_key_file=/var/vcap/jobs/etcd/config/certs/peer.key
[2016-02-02 22:08:35+0000] ++ etcd_peer_sec_flags=' --peer-client-cert-auth --peer-trusted-ca-file /var/vcap/jobs/etcd/config/certs/peer-ca.crt --peer-cert-file /var/vcap/jobs/etcd/config/certs/peer.crt --peer-key-file /var/vcap/jobs/etcd/config/certs/peer.key'
[2016-02-02 22:08:35+0000] ++ etcd_sec_flags=' --client-cert-auth --trusted-ca-file /var/vcap/jobs/etcd/config/certs/server-ca.crt --cert-file /var/vcap/jobs/etcd/config/certs/server.crt --key-file /var/vcap/jobs/etcd/config/certs/server.key --peer-client-cert-auth --peer-trusted-ca-file /var/vcap/jobs/etcd/config/certs/peer-ca.crt --peer-cert-file /var/vcap/jobs/etcd/config/certs/peer.crt --peer-key-file /var/vcap/jobs/etcd/config/certs/peer.key'
[2016-02-02 22:08:35+0000] + case in
[2016-02-02 22:08:35+0000] + trap handle_orphaned_etcd TERM
[2016-02-02 22:08:35+0000] + set +e
[2016-02-02 22:08:35+0000] + host consul.service.cf.internal
[2016-02-02 22:08:35+0000] + [[ 0 != ]]
[2016-02-02 22:08:35+0000] + echo 'DNS is not up'
[2016-02-02 22:08:35+0000] + exit 1
[2016-02-02 22:10:14+0000] + source /var/vcap/jobs/etcd/bin/etcd_bosh_utils.sh
[2016-02-02 22:10:14+0000] ++ LOG_DIR=/var/vcap/sys/log/etcd
[2016-02-02 22:10:14+0000] ++ STORE_DIR=/var/vcap/store
[2016-02-02 22:10:14+0000] ++ DATA_DIR=/var/vcap/store/etcd
[2016-02-02 22:10:14+0000] ++ node_name=database-z1-0
[2016-02-02 22:10:14+0000] ++ client_protocol=https
[2016-02-02 22:10:14+0000] ++ peer_protocol=https
[2016-02-02 22:10:14+0000] ++ listen_peer_url=https://0.0.0.0:7001
[2016-02-02 22:10:14+0000] ++ advertise_peer_url=https://database-z1-0.etcd.service.cf.internal:7001
[2016-02-02 22:10:14+0000] ++ advertise_client_url=https://database-z1-0.etcd.service.cf.internal:4001
[2016-02-02 22:10:14+0000] ++ listen_client_url=https://0.0.0.0:4001
[2016-02-02 22:10:14+0000] ++ this_node=database-z1-0=https://database-z1-0.etcd.service.cf.internal:7001
[2016-02-02 22:10:14+0000] ++ CERT_DIR=/var/vcap/jobs/etcd/config/certs
[2016-02-02 22:10:14+0000] ++ ca_cert_file=/var/vcap/jobs/etcd/config/certs/server-ca.crt
[2016-02-02 22:10:14+0000] ++ server_cert_file=/var/vcap/jobs/etcd/config/certs/server.crt
[2016-02-02 22:10:14+0000] ++ server_key_file=/var/vcap/jobs/etcd/config/certs/server.key
[2016-02-02 22:10:14+0000] ++ client_cert_file=/var/vcap/jobs/etcd/config/certs/client.crt
[2016-02-02 22:10:14+0000] ++ client_key_file=/var/vcap/jobs/etcd/config/certs/client.key
[2016-02-02 22:10:14+0000] ++ etcdctl_sec_flags=' -ca-file=/var/vcap/jobs/etcd/config/certs/server-ca.crt -cert-file=/var/vcap/jobs/etcd/config/certs/client.crt -key-file=/var/vcap/jobs/etcd/config/certs/client.key'
[2016-02-02 22:10:14+0000] ++ etcd_sec_flags=' --client-cert-auth --trusted-ca-file /var/vcap/jobs/etcd/config/certs/server-ca.crt --cert-file /var/vcap/jobs/etcd/config/certs/server.crt --key-file /var/vcap/jobs/etcd/config/certs/server.key'
[2016-02-02 22:10:14+0000] ++ peer_ca_cert_file=/var/vcap/jobs/etcd/config/certs/peer-ca.crt
[2016-02-02 22:10:14+0000] ++ peer_cert_file=/var/vcap/jobs/etcd/config/certs/peer.crt
[2016-02-02 22:10:14+0000] ++ peer_key_file=/var/vcap/jobs/etcd/config/certs/peer.key
[2016-02-02 22:10:14+0000] ++ etcd_peer_sec_flags=' --peer-client-cert-auth --peer-trusted-ca-file /var/vcap/jobs/etcd/config/certs/peer-ca.crt --peer-cert-file /var/vcap/jobs/etcd/config/certs/peer.crt --peer-key-file /var/vcap/jobs/etcd/config/certs/peer.key'
[2016-02-02 22:10:14+0000] ++ etcd_sec_flags=' --client-cert-auth --trusted-ca-file /var/vcap/jobs/etcd/config/certs/server-ca.crt --cert-file /var/vcap/jobs/etcd/config/certs/server.crt --key-file /var/vcap/jobs/etcd/config/certs/server.key --peer-client-cert-auth --peer-trusted-ca-file /var/vcap/jobs/etcd/config/certs/peer-ca.crt --peer-cert-file /var/vcap/jobs/etcd/config/certs/peer.crt --peer-key-file /var/vcap/jobs/etcd/config/certs/peer.key'
[2016-02-02 22:10:14+0000] + case in
[2016-02-02 22:10:14+0000] + trap handle_orphaned_etcd TERM
[2016-02-02 22:10:14+0000] + set +e
[2016-02-02 22:10:14+0000] + host consul.service.cf.internal
[2016-02-02 22:10:14+0000] + [[ 0 != ]]
[2016-02-02 22:10:14+0000] + echo 'DNS is not up'
[2016-02-02 22:10:14+0000] + exit 1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment