Skip to content

Instantly share code, notes, and snippets.

@mogman1
Last active August 29, 2015 14:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mogman1/2fc9b1c5115238c9815d to your computer and use it in GitHub Desktop.
Save mogman1/2fc9b1c5115238c9815d to your computer and use it in GitHub Desktop.
... (further input from 'salt-run jobs.list_jobs')
'20140718194125116830':
Arguments: []
Function: test.ping
StartTime: 2014, Jul 18 19:41:25.116830
Target: minion1
Target-type: glob
User: sudo_sigma
'20140718194130133475':
Arguments:
- '20140718194125116830'
Function: saltutil.find_job
StartTime: 2014, Jul 18 19:41:30.133475
Target: minion1
Target-type: glob
User: sudo_sigma
[root@saltmaster jobs]# salt-run jobs.lookup_jid 20140718194125116830
[root@saltmaster jobs]# salt-run jobs.lookup_jid 20140718193641789332
test:
True
[root@saltmaster jobs]#
[DEBUG ] Updating fileserver cache
[DEBUG ] diff_mtime_map: the maps are the same
[DEBUG ] This salt-master instance has accepted 2 minion keys.
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] AES payload received with command _pillar
[INFO ] AES payload received with command _minion_event
[INFO ] AES payload received with command _minion_event
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] AES payload received with command _mine
[DEBUG ] Updating fileserver cache
[DEBUG ] diff_mtime_map: the maps are the same
[DEBUG ] This salt-master instance has accepted 2 minion keys.
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] AES payload received with command _pillar
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] AES payload received with command _pillar
[INFO ] AES payload received with command _minion_event
[INFO ] AES payload received with command _minion_event
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] Clear payload received with command _auth
[INFO ] Authentication request from test
[INFO ] Authentication accepted from test
[INFO ] AES payload received with command _mine
[INFO ] Clear payload received with command publish
[INFO ] User sudo_sigma Published command test.ping with jid 20140718193641789332
[DEBUG ] Published command details {'tgt_type': 'glob', 'jid': '20140718193641789332', 'tgt': '*', 'ret': '', 'user': 'sudo_sigma', 'arg': [], 'fun': 'test.ping'}
[INFO ] AES payload received with command _return
[INFO ] Got return from test for job 20140718193641789332
[INFO ] AES payload received with command _return
[INFO ] Got return from test for job 20140718193641789332
[ERROR ] An extra return was detected from minion test, please verify the minion, this could be a replay attack
[DEBUG ] Updating fileserver cache
[DEBUG ] diff_mtime_map: the maps are the same
[DEBUG ] This salt-master instance has accepted 2 minion keys.
[DEBUG ] Updating fileserver cache
[DEBUG ] diff_mtime_map: the maps are the same
[DEBUG ] This salt-master instance has accepted 2 minion keys.
[INFO ] Clear payload received with command publish
[INFO ] User sudo_sigma Published command test.ping with jid 20140718193759432498
[DEBUG ] Published command details {'tgt_type': 'glob', 'jid': '20140718193759432498', 'tgt': 'minion1', 'ret': '', 'user': 'sudo_sigma', 'arg': [], 'fun': 'test.ping'}
[INFO ] Clear payload received with command publish
[INFO ] User sudo_sigma Published command saltutil.find_job with jid 20140718193804472666
[DEBUG ] Published command details {'tgt_type': 'glob', 'jid': '20140718193804472666', 'tgt': 'minion1', 'ret': '', 'user': 'sudo_sigma', 'arg': ['20140718193759432498'], 'fun': 'saltutil.find_job'}
2014-06-06 21:41:35,960 [salt ][INFO ] Setting up the Salt Minion "test"
2014-06-06 21:41:36,668 [salt.minion ][INFO ] Authentication with master successful!
2014-06-06 21:41:37,818 [salt.minion ][INFO ] Minion is starting as user 'root'
2014-06-06 21:41:58,917 [salt.minion ][INFO ] User root Executing command test.ping with jid 20140606214157582116
2014-06-06 21:41:58,973 [salt.minion ][INFO ] Returning information for job: 20140606214157582116
2014-07-18 19:36:03,783 [salt ][INFO ] Setting up the Salt Minion "test"
2014-07-18 19:36:05,004 [salt.minion ][INFO ] Authentication with master successful!
2014-07-18 19:36:07,999 [salt.minion ][INFO ] Minion is starting as user 'root'
2014-07-18 19:36:55,471 [salt ][INFO ] Setting up the Salt Minion "test"
2014-07-18 19:36:56,499 [salt.minion ][INFO ] Authentication with master successful!
2014-07-18 19:36:57,447 [salt ][INFO ] Setting up the Salt Minion "test"
2014-07-18 19:36:58,203 [salt.minion ][INFO ] Authentication with master successful!
2014-07-18 19:36:59,110 [salt.modules.cmdmod ][INFO ] Executing command 'iptables --help' in directory '/root'
2014-07-18 19:36:59,134 [salt.modules.cmdmod ][INFO ] output: iptables v1.4.7
Usage: iptables -[AD] chain rule-specification [options]
iptables -I chain [rulenum] rule-specification [options]
iptables -R chain rulenum rule-specification [options]
iptables -D chain rulenum [options]
iptables -[LS] [chain [rulenum]] [options]
iptables -[FZ] [chain] [options]
iptables -[NX] chain
iptables -E old-chain-name new-chain-name
iptables -P chain target [options]
iptables -h (print this help information)
Commands:
Either long or short options are allowed.
--append -A chain Append to chain
--delete -D chain Delete matching rule from chain
--delete -D chain rulenum
Delete rule rulenum (1 = first) from chain
--insert -I chain [rulenum]
Insert in chain as rulenum (default 1=first)
--replace -R chain rulenum
Replace rule rulenum (1 = first) in chain
--list -L [chain [rulenum]]
List the rules in a chain or all chains
--list-rules -S [chain [rulenum]]
Print the rules in a chain or all chains
--flush -F [chain] Delete all rules in chain or all chains
--zero -Z [chain [rulenum]]
Zero counters in chain or all chains
--new -N chain Create a new user-defined chain
--delete-chain
-X [chain] Delete a user-defined chain
--policy -P chain target
Change policy on chain to target
--rename-chain
-E old-chain new-chain
Change chain name, (moving any references)
Options:
[!] --proto -p proto protocol: by number or name, eg. `tcp'
[!] --source -s address[/mask][...]
source specification
[!] --destination -d address[/mask][...]
destination specification
[!] --in-interface -i input name[+]
network interface name ([+] for wildcard)
--jump -j target
target for rule (may load target extension)
--goto -g chain
jump to chain with no return
--match -m match
extended match (may load extension)
--numeric -n numeric output of addresses and ports
[!] --out-interface -o output name[+]
network interface name ([+] for wildcard)
--table -t table table to manipulate (default: `filter')
--verbose -v verbose mode
--line-numbers print line numbers when listing
--exact -x expand numbers (display exact values)
[!] --fragment -f match second or further fragments only
--modprobe=<command> try to insert modules using this command
--set-counters PKTS BYTES set the counter during insert/append
[!] --version -V print package version.
2014-07-18 19:36:59,217 [salt.minion ][INFO ] Minion is starting as user 'root'
2014-07-18 19:37:32,961 [salt.minion ][INFO ] User sudo_sigma Executing command test.ping with jid 20140718193641789332
2014-07-18 19:37:33,025 [salt.minion ][INFO ] Returning information for job: 20140718193641789332
[root@saltmaster sigma]# salt -l debug minion1 test.ping
[DEBUG ] Reading configuration from /etc/salt/master
[DEBUG ] Missing configuration file: /root/.salt
[DEBUG ] Configuration file path: /etc/salt/master
[DEBUG ] Reading configuration from /etc/salt/master
[DEBUG ] Missing configuration file: /root/.salt
[DEBUG ] LocalClientEvent PUB socket URI: ipc:///var/run/salt/master/master_event_pub.ipc
[DEBUG ] LocalClientEvent PULL socket URI: ipc:///var/run/salt/master/master_event_pull.ipc
[DEBUG ] Checking whether jid 20140718194125116830 is still running
[DEBUG ] get_returns for jid 20140718194130133475 sent to set(['minion1']) will timeout at 19:41:32
[INFO ] jid 20140718194130133475 minions set(['minion1']) did not return in time
[root@ip-172-31-20-102 ~]# salt-call test.ping
[INFO ] Executing command 'iptables --help' in directory '/root'
[INFO ] output: iptables v1.4.7
Usage: iptables -[AD] chain rule-specification [options]
iptables -I chain [rulenum] rule-specification [options]
iptables -R chain rulenum rule-specification [options]
iptables -D chain rulenum [options]
iptables -[LS] [chain [rulenum]] [options]
iptables -[FZ] [chain] [options]
iptables -[NX] chain
iptables -E old-chain-name new-chain-name
iptables -P chain target [options]
iptables -h (print this help information)
Commands:
Either long or short options are allowed.
--append -A chain Append to chain
--delete -D chain Delete matching rule from chain
--delete -D chain rulenum
Delete rule rulenum (1 = first) from chain
--insert -I chain [rulenum]
Insert in chain as rulenum (default 1=first)
--replace -R chain rulenum
Replace rule rulenum (1 = first) in chain
--list -L [chain [rulenum]]
List the rules in a chain or all chains
--list-rules -S [chain [rulenum]]
Print the rules in a chain or all chains
--flush -F [chain] Delete all rules in chain or all chains
--zero -Z [chain [rulenum]]
Zero counters in chain or all chains
--new -N chain Create a new user-defined chain
--delete-chain
-X [chain] Delete a user-defined chain
--policy -P chain target
Change policy on chain to target
--rename-chain
-E old-chain new-chain
Change chain name, (moving any references)
Options:
[!] --proto -p proto protocol: by number or name, eg. `tcp'
[!] --source -s address[/mask][...]
source specification
[!] --destination -d address[/mask][...]
destination specification
[!] --in-interface -i input name[+]
network interface name ([+] for wildcard)
--jump -j target
target for rule (may load target extension)
--goto -g chain
jump to chain with no return
--match -m match
extended match (may load extension)
--numeric -n numeric output of addresses and ports
[!] --out-interface -o output name[+]
network interface name ([+] for wildcard)
--table -t table table to manipulate (default: `filter')
--verbose -v verbose mode
--line-numbers print line numbers when listing
--exact -x expand numbers (display exact values)
[!] --fragment -f match second or further fragments only
--modprobe=<command> try to insert modules using this command
--set-counters PKTS BYTES set the counter during insert/append
[!] --version -V print package version.
local:
True
[root@ip-172-31-20-102 ~]#
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment