-
-
Save tpetchel/7ee1687f570769938c1886a81b362cc6 to your computer and use it in GitHub Desktop.
Bootstrap Windows using --json-attributes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
PS C:\Users\Thomas\learn-chef> $public_ip = '{"cloud": {"public_ip": "54.84.99.135"}}' | ConvertTo-Json | |
PS C:\Users\Thomas\learn-chef> knife bootstrap windows winrm 54.84.99.135 --winrm-user Administrator --winrm-password 'masked' --node-name node1-windows --run-list 'recipe[learn_chef_iis]' --json-attributes $public_ip | |
C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/json-1.8.6/lib/json/common.rb:155:in `parse': 784: unexpected token at '"{\"cloud\": {\"public_ip\": \"54.84.99.135\"}}"' (JSON::ParserError) | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/json-1.8.6/lib/json/common.rb:155:in `parse' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/knife-windows-1.9.0/lib/chef/knife/bootstrap_windows_base.rb:117:in `block (2 levels) in included' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/mixlib-cli-1.7.0/lib/mixlib/cli.rb:290:in `block (3 levels) in opt_parser' | |
from C:/opscode/chefdk/embedded/lib/ruby/2.4.0/optparse.rb:1552:in `block in parse_in_order' | |
from C:/opscode/chefdk/embedded/lib/ruby/2.4.0/optparse.rb:1538:in `catch' | |
from C:/opscode/chefdk/embedded/lib/ruby/2.4.0/optparse.rb:1538:in `parse_in_order' | |
from C:/opscode/chefdk/embedded/lib/ruby/2.4.0/optparse.rb:1532:in `order!' | |
from C:/opscode/chefdk/embedded/lib/ruby/2.4.0/optparse.rb:1626:in `permute!' | |
from C:/opscode/chefdk/embedded/lib/ruby/2.4.0/optparse.rb:1648:in `parse!' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/mixlib-cli-1.7.0/lib/mixlib/cli.rb:230:in `parse_options' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/lib/chef/knife.rb:323:in `parse_options' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/lib/chef/knife.rb:303:in `initialize' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/lib/chef/knife/bootstrap.rb:268:in `initialize' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/lib/chef/knife.rb:217:in `new' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/lib/chef/knife.rb:217:in `run' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/lib/chef/application/knife.rb:156:in `run' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.4.0/gems/chef-13.2.20-universal-mingw32/bin/knife:25:in `<top (required)>' | |
from C:/opscode/chefdk/modules/chef/../../bin/knife:275:in `load' | |
from C:/opscode/chefdk/modules/chef/../../bin/knife:275:in `<main>' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
PS C:\Users\Thomas\learn-chef> $public_ip = '{"cloud": {"public_ip": "54.84.99.135"}}' | ConvertTo-Json | |
PS C:\Users\Thomas\learn-chef> knife bootstrap windows winrm 54.84.99.135 --winrm-user Administrator --winrm-password 'masked' --node-name node1-windows --run-list 'recipe[learn_chef_iis]' --json-attributes $public_ip | |
Creating new client for node1-windows | |
Creating new node for node1-windows | |
Waiting for remote response before bootstrap.54.84.99.135 . | |
54.84.99.135 Response received. | |
Remote node responded after 0.02 minutes. | |
Bootstrapping Chef on 54.84.99.135 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 1 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 2 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 3 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 4 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 5 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 6 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 7 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 8 | |
54.84.99.135 Rendering "C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap-7788-1508374197.bat" chunk 9 | |
54.84.99.135 Checking for existing directory "C:\chef"... | |
54.84.99.135 Existing directory found, skipping creation. | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 echo.url = WScript.Arguments.Named("url") | |
54.84.99.135 echo.path = WScript.Arguments.Named("path") | |
54.84.99.135 echo.proxy = null | |
54.84.99.135 echo.'* Vaguely attempt to handle file:// scheme urls by url unescaping and switching all | |
54.84.99.135 echo.'* / into . Also assume that file:/// is a local absolute path and that file://<foo> | |
54.84.99.135 echo.'* is possibly a network file path. | |
54.84.99.135 echo.If InStr(url, "file://") = 1 Then | |
54.84.99.135 echo.url = Unescape(url) | |
54.84.99.135 echo.If InStr(url, "file:///") = 1 Then | |
54.84.99.135 echo.sourcePath = Mid(url, Len("file:///") + 1) | |
54.84.99.135 echo.Else | |
54.84.99.135 echo.sourcePath = Mid(url, Len("file:") + 1) | |
54.84.99.135 echo.End If | |
54.84.99.135 echo.sourcePath = Replace(sourcePath, "/", "\") | |
54.84.99.135 echo. | |
54.84.99.135 echo.Set objFSO = CreateObject("Scripting.FileSystemObject") | |
54.84.99.135 echo.If objFSO.Fileexists(path) Then objFSO.DeleteFile path | |
54.84.99.135 echo.objFSO.CopyFile sourcePath, path, true | |
54.84.99.135 echo.Set objFSO = Nothing | |
54.84.99.135 echo. | |
54.84.99.135 echo.Else | |
54.84.99.135 echo.Set objXMLHTTP = CreateObject("MSXML2.ServerXMLHTTP") | |
54.84.99.135 echo.Set wshShell = CreateObject( "WScript.Shell" ) | |
54.84.99.135 echo.Set objUserVariables = wshShell.Environment("USER") | |
54.84.99.135 echo. | |
54.84.99.135 echo.rem http proxy is optional | |
54.84.99.135 echo.rem attempt to read from HTTP_PROXY env var first | |
54.84.99.135 echo.On Error Resume Next | |
54.84.99.135 echo. | |
54.84.99.135 echo.If NOT (objUserVariables("HTTP_PROXY") = "") Then | |
54.84.99.135 echo.proxy = objUserVariables("HTTP_PROXY") | |
54.84.99.135 echo. | |
54.84.99.135 echo.rem fall back to named arg | |
54.84.99.135 echo.ElseIf NOT (WScript.Arguments.Named("proxy") = "") Then | |
54.84.99.135 echo.proxy = WScript.Arguments.Named("proxy") | |
54.84.99.135 echo.End If | |
54.84.99.135 echo. | |
54.84.99.135 echo.If NOT isNull(proxy) Then | |
54.84.99.135 echo.rem setProxy method is only available on ServerXMLHTTP 6.0+ | |
54.84.99.135 echo.Set objXMLHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") | |
54.84.99.135 echo.objXMLHTTP.setProxy 2, proxy | |
54.84.99.135 echo.End If | |
54.84.99.135 echo. | |
54.84.99.135 echo.On Error Goto 0 | |
54.84.99.135 echo. | |
54.84.99.135 echo.objXMLHTTP.open "GET", url, false | |
54.84.99.135 echo.objXMLHTTP.send() | |
54.84.99.135 echo.If objXMLHTTP.Status = 200 Then | |
54.84.99.135 echo.Set objADOStream = CreateObject("ADODB.Stream") | |
54.84.99.135 echo.objADOStream.Open | |
54.84.99.135 echo.objADOStream.Type = 1 | |
54.84.99.135 echo.objADOStream.Write objXMLHTTP.ResponseBody | |
54.84.99.135 echo.objADOStream.Position = 0 | |
54.84.99.135 echo.Set objFSO = Createobject("Scripting.FileSystemObject") | |
54.84.99.135 echo.If objFSO.Fileexists(path) Then objFSO.DeleteFile path | |
54.84.99.135 echo.Set objFSO = Nothing | |
54.84.99.135 echo.objADOStream.SaveToFile path | |
54.84.99.135 echo.objADOStream.Close | |
54.84.99.135 echo.Set objADOStream = Nothing | |
54.84.99.135 echo.End If | |
54.84.99.135 echo.Set objXMLHTTP = Nothing | |
54.84.99.135 echo.End If | |
54.84.99.135 ) 1>C:\chef\wget.vbs | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 echo.param( | |
54.84.99.135 echo. [String] $remoteUrl, | |
54.84.99.135 echo. [String] $localPath | |
54.84.99.135 echo.) | |
54.84.99.135 echo. | |
54.84.99.135 echo.$ProxyUrl = $env:http_proxy; | |
54.84.99.135 echo.$webClient = new-object System.Net.WebClient; | |
54.84.99.135 echo. | |
54.84.99.135 echo.if ($ProxyUrl -ne '') { | |
54.84.99.135 echo. $WebProxy = New-Object System.Net.WebProxy($ProxyUrl,$true) | |
54.84.99.135 echo. $WebClient.Proxy = $WebProxy | |
54.84.99.135 echo.} | |
54.84.99.135 echo. | |
54.84.99.135 echo.$webClient.DownloadFile($remoteUrl, $localPath); | |
54.84.99.135 ) 1>C:\chef\wget.ps1 | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 | |
54.84.99.135 | |
54.84.99.135 | |
54.84.99.135 ) | |
54.84.99.135 Detected Windows Version 6.3 Build 9600 | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>goto Version6.3 | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>goto Version6.2 | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>goto architecture_select | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>IF "AMD64" == "x86" IF not defined PROCESSOR_ARCHITEW6432 | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>goto install | |
54.84.99.135 Checking for existing downloaded package at "C:\Users\ADMINI~1\AppData\Local\Temp\chef-client-latest.msi" | |
54.84.99.135 Found existing downloaded package, deleting. | |
54.84.99.135 Attempting to download client package using PowerShell if available... | |
54.84.99.135 powershell.exe -ExecutionPolicy Unrestricted -InputFormat None -NoProfile -NonInteractive -File C:\chef\wg | |
et.ps1 "https://www.chef.io/chef/download?p=windows&pv=2012&m=x86_64&DownloadContext=PowerShell&v=13" "C:\Users\ADMINI~1 | |
\AppData\Local\Temp\chef-client-latest.msi" | |
54.84.99.135 Download via PowerShell succeeded. | |
54.84.99.135 Installing downloaded client package... | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>msiexec /qn /log "C:\Users\ADMINI~1\AppData\Local\Temp\chef-client-msi29727.log" /i | |
"C:\Users\ADMINI~1\AppData\Local\Temp\chef-client-latest.msi" | |
54.84.99.135 Successfully installed Chef Client package. | |
54.84.99.135 A subdirectory or file C:\chef\trusted_certs already exists. | |
54.84.99.135 Installation completed successfully | |
54.84.99.135 Writing validation key... | |
54.84.99.135 Validation key written. | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>mkdir C:\chef\trusted_certs | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 echo.-----BEGIN CERTIFICATE----- | |
54.84.99.135 echo.MIIDxjCCAq6gAwIBAgIBADANBgkqhkiG9w0BAQsFADBPMQswCQYDVQQGEwJVUzEQ | |
54.84.99.135 echo.MA4GA1UECgwHWW91Q29ycDETMBEGA1UECwwKT3BlcmF0aW9uczEZMBcGA1UEAwwQ | |
54.84.99.135 echo.Y2hlZi1zZXJ2ZXIudGVzdDAeFw0xNzA0MDcyMTA3MzRaFw0yNzA0MDUyMTA3MzRa | |
54.84.99.135 echo.ME8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKDAdZb3VDb3JwMRMwEQYDVQQLDApPcGVy | |
54.84.99.135 echo.YXRpb25zMRkwFwYDVQQDDBBjaGVmLXNlcnZlci50ZXN0MIIBIjANBgkqhkiG9w0B | |
54.84.99.135 echo.AQEFAAOCAQ8AMIIBCgKCAQEAvhWy2uhVsYp+LW7KJb9Uwya2d7k3MokdWWINfACg | |
54.84.99.135 echo.QrOTqBTxAeptXZ7jd5cpRbsnBLRCaT7nxqx7evF/5Nj/v4pxRK8Yo3XjNBCakjCC | |
54.84.99.135 echo.hAwpM22yTIocBp4KJDAZ/nwibVV8dJ6DavxZ6m31Jl3c7onwiLm6QJYSnxqssvCG | |
54.84.99.135 echo./0h7Tv/V5VWWRi8QMcFyQpQMF8NB2Z3U0LbqRn/4cB2yGJyGbsx0UJXTAWYo991e | |
54.84.99.135 echo.CNXM26ucrkjkPTDy7/QyYsV/XLK2t3O/Ulpl8Hs+/HcooZ5FlrxtjHHQ47ap5yIn | |
54.84.99.135 echo.1sGm7lAf4Y2NTzKM5dKqWTHCvrOJITVuBLH1A2ETpmRciwIDAQABo4GsMIGpMA8G | |
54.84.99.135 echo.A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFA4AMpa/NUSwHOCQwk1LV4Z8SJLDMHcG | |
54.84.99.135 echo.A1UdIwRwMG6AFA4AMpa/NUSwHOCQwk1LV4Z8SJLDoVOkUTBPMQswCQYDVQQGEwJV | |
54.84.99.135 echo.UzEQMA4GA1UECgwHWW91Q29ycDETMBEGA1UECwwKT3BlcmF0aW9uczEZMBcGA1UE | |
54.84.99.135 echo.AwwQY2hlZi1zZXJ2ZXIudGVzdIIBADANBgkqhkiG9w0BAQsFAAOCAQEAqkQ2s8Dx | |
54.84.99.135 echo.kZjPqSovpYaceBCYGngv7Yvf/tIXjjWYu2scCvXFp1SUZGOEJAcFX6SJQG+yN5DT | |
54.84.99.135 echo.G7Kht+l52TZrUZ1lTlN49GKGEp5xRS9ueKVm/D6j7wkcEEc2pRca2QI1ha4PQ1Fa | |
54.84.99.135 echo.n95+0B9PxEC+mTnnvtRDCrCO03J0+I3keWkxN05Kw5/MMiF8tS8QjhBrdpejcnp2 | |
54.84.99.135 echo.sHn+v+2626JESej/3jcQMCMJ7dG1JNDJG4sXYCe4jB00uS1KOI+4qYrMLxFa5Hyx | |
54.84.99.135 echo.ixuhNxY39N3OmiXWDkl6mJBOVidvyIWhdmYkf+FFJSeWK52rkKnySeTmAHicUtAj | |
54.84.99.135 echo.NpQ6hHnrxa3lHg== | |
54.84.99.135 echo.-----END CERTIFICATE----- | |
54.84.99.135 ) 1>C:\chef/trusted_certs/chef-server_test.crt | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 echo.-----BEGIN CERTIFICATE----- | |
54.84.99.135 echo.MIIElDCCA3ygAwIBAgIQAf2j627KdciIQ4tyS8+8kTANBgkqhkiG9w0BAQsFADBh | |
54.84.99.135 echo.MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 | |
54.84.99.135 echo.d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD | |
54.84.99.135 echo.QTAeFw0xMzAzMDgxMjAwMDBaFw0yMzAzMDgxMjAwMDBaME0xCzAJBgNVBAYTAlVT | |
54.84.99.135 echo.MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxJzAlBgNVBAMTHkRpZ2lDZXJ0IFNIQTIg | |
54.84.99.135 echo.U2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB | |
54.84.99.135 echo.ANyuWJBNwcQwFZA1W248ghX1LFy949v/cUP6ZCWA1O4Yok3wZtAKc24RmDYXZK83 | |
54.84.99.135 echo.nf36QYSvx6+M/hpzTc8zl5CilodTgyu5pnVILR1WN3vaMTIa16yrBvSqXUu3R0bd | |
54.84.99.135 echo.KpPDkC55gIDvEwRqFDu1m5K+wgdlTvza/P96rtxcflUxDOg5B6TXvi/TC2rSsd9f | |
54.84.99.135 echo./ld0Uzs1gN2ujkSYs58O09rg1/RrKatEp0tYhG2SS4HD2nOLEpdIkARFdRrdNzGX | |
54.84.99.135 echo.kujNVA075ME/OV4uuPNcfhCOhkEAjUVmR7ChZc6gqikJTvOX6+guqw9ypzAO+sf0 | |
54.84.99.135 echo./RR3w6RbKFfCs/mC/bdFWJsCAwEAAaOCAVowggFWMBIGA1UdEwEB/wQIMAYBAf8C | |
54.84.99.135 echo.AQAwDgYDVR0PAQH/BAQDAgGGMDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYY | |
54.84.99.135 echo.aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMHsGA1UdHwR0MHIwN6A1oDOGMWh0dHA6 | |
54.84.99.135 echo.Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RDQS5jcmwwN6A1 | |
54.84.99.135 echo.oDOGMWh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbFJvb3RD | |
54.84.99.135 echo.QS5jcmwwPQYDVR0gBDYwNDAyBgRVHSAAMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8v | |
54.84.99.135 echo.d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwHQYDVR0OBBYEFA+AYRyCMWHVLyjnjUY4tCzh | |
54.84.99.135 echo.xtniMB8GA1UdIwQYMBaAFAPeUDVW0Uy7ZvCj4hsbw5eyPdFVMA0GCSqGSIb3DQEB | |
54.84.99.135 echo.CwUAA4IBAQAjPt9L0jFCpbZ+QlwaRMxp0Wi0XUvgBCFsS+JtzLHgl4+mUwnNqipl | |
54.84.99.135 echo.5TlPHoOlblyYoiQm5vuh7ZPHLgLGTUq/sELfeNqzqPlt/yGFUzZgTHbO7Djc1lGA | |
54.84.99.135 echo.8MXW5dRNJ2Srm8c+cftIl7gzbckTB+6WohsYFfZcTEDts8Ls/3HB40f/1LkAtDdC | |
54.84.99.135 echo.2iDJ6m6K7hQGrn2iWZiIqBtvLfTyyRRfJs8sjX7tN8Cp1Tm5gr8ZDOo0rwAhaPit | |
54.84.99.135 echo.c+LJMto4JQtV05od8GiG7S5BNO98pVAdvzr508EIDObtHopYJeS4d60tbvVS3bR0 | |
54.84.99.135 echo.j6tJLp07kzQoH3jOlOrHvdPJbRzeXDLz | |
54.84.99.135 echo.-----END CERTIFICATE----- | |
54.84.99.135 ) 1>C:\chef/trusted_certs/DigiCert_SHA2_Secure_Server_CA.crt | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 echo.-----BEGIN CERTIFICATE----- | |
54.84.99.135 echo.MIIFSTCCBDGgAwIBAgIQBCVFN8dFOOLtg1kcrPPyqjANBgkqhkiG9w0BAQsFADBN | |
54.84.99.135 echo.MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E | |
54.84.99.135 echo.aWdpQ2VydCBTSEEyIFNlY3VyZSBTZXJ2ZXIgQ0EwHhcNMTQwNjEwMDAwMDAwWhcN | |
54.84.99.135 echo.MTcwNjI2MTIwMDAwWjBpMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv | |
54.84.99.135 echo.bjEQMA4GA1UEBxMHU2VhdHRsZTEbMBkGA1UEChMSQ2hlZiBTb2Z0d2FyZSwgSW5j | |
54.84.99.135 | |
54.84.99.135 echo.MRYwFAYDVQQDDA0qLm9wc2NvZGUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A | |
54.84.99.135 echo.MIIBCgKCAQEA1qPl3xiZDks5vB7W/qsoYaGhk63/aov9vATpmiY0gJ0mznblKgvY | |
54.84.99.135 echo.MJLIcD5Rsyj+wC/c3ZL+NS4xEftvIgOETgqfLyOpNmTj/OqH8GoGgoaTLTsYrwFm | |
54.84.99.135 echo.f93lzYrBUzyq6/lkwtIrA4GAHLr0WEtvyPJJWON2LL5mLPQ5nZLcnRuqGSH0GATd | |
54.84.99.135 echo.n/DXurl26WKJKOR/ih8sPkwApLHAiKFzj/vbA6Fwq+IQHy6L8tlcFYFQJq5HPDWs | |
54.84.99.135 echo.CXm6JTUQ7NjEJqo0uqEESIO61l0eYPpj55zHSeIJLB7S6ZgOuY/u35Repi6Ww3mV | |
54.84.99.135 echo.ZU115VsurAa6T1zCAeP+IC108AotHrDYMwIDAQABo4ICBzCCAgMwHwYDVR0jBBgw | |
54.84.99.135 echo.FoAUD4BhHIIxYdUvKOeNRji0LOHG2eIwHQYDVR0OBBYEFJBENLnOJkpidkIU7vJv | |
54.84.99.135 echo.Gv4r/t86MFUGA1UdEQROMEyCDSoub3BzY29kZS5jb22CC29wc2NvZGUuY29tgg0q | |
54.84.99.135 echo.LmdldGNoZWYuY29tggtnZXRjaGVmLmNvbYIJKi5jaGVmLmlvggdjaGVmLmlvMA4G | |
54.84.99.135 echo.A1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwawYD | |
54.84.99.135 echo.VR0fBGQwYjAvoC2gK4YpaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL3NzY2Etc2hh | |
54.84.99.135 echo.Mi1nNC5jcmwwL6AtoCuGKWh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9zc2NhLXNo | |
54.84.99.135 echo.YTItZzQuY3JsMEIGA1UdIAQ7MDkwNwYJYIZIAYb9bAEBMCowKAYIKwYBBQUHAgEW | |
54.84.99.135 echo.HGh0dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwfAYIKwYBBQUHAQEEcDBuMCQG | |
54.84.99.135 echo.CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wRgYIKwYBBQUHMAKG | |
54.84.99.135 echo.Omh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFNIQTJTZWN1cmVT | |
54.84.99.135 echo.ZXJ2ZXJDQS5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAQEALquV | |
54.84.99.135 echo.R27k3KBd/qClitfyq8DzByauD3TLDaFshAJBeIIzX6Yg6vi8Ff1E3A7aqcl5Y6sV | |
54.84.99.135 echo.J2+GiW5/bsBGgu3CE/0aQtMly9vH9dHd4HxgfxdEYz3caXEY99SVjO3ckIhUtFeY | |
54.84.99.135 echo.e29/NgADwzzMoZA1IrwAfAb7ErCLTbhZsQSLJdh3JUtWGwV/6dAEO0YjsH8ppUnm | |
54.84.99.135 echo.8FHrSvOhpZfHm1MwIy1wZ9TeAReGrz2puvKxyj6KGB9E8KYJRXecfIoLgJTMIdpe | |
54.84.99.135 echo.speqZLJiNFBeiyhIGETEobreBhIjdfwpS/xbWJBkwRLNWruUDExTbawvOG72h8e9 | |
54.84.99.135 echo.nyDnani0Hfha68JjAQ== | |
54.84.99.135 echo.-----END CERTIFICATE----- | |
54.84.99.135 ) 1>C:\chef/trusted_certs/wildcard_opscode_com.crt | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>( | |
54.84.99.135 echo.chef_server_url "https://api.chef.io/organizations/learn-chef-2" | |
54.84.99.135 echo.validation_client_name "chef-validator" | |
54.84.99.135 echo.file_cache_path "c:/chef/cache" | |
54.84.99.135 echo.file_backup_path "c:/chef/backup" | |
54.84.99.135 echo.cache_options ({:path => "c:/chef/cache/checksums", :skip_expires => true}) | |
54.84.99.135 echo.node_name "node1-windows" | |
54.84.99.135 echo.log_level :info | |
54.84.99.135 echo.log_location STDOUT | |
54.84.99.135 echo.trusted_certs_dir "c:/chef/trusted_certs" | |
54.84.99.135 ) 1>C:\chef\client.rb | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>(echo.{"cloud":{"public_ip":"54.84.99.135"},"run_list":["recipe[learn_chef_iis]"]} ) | |
1>C:\chef\first-boot.json | |
54.84.99.135 Starting chef to bootstrap the node... | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>SET "PATH=C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System3 | |
2\WindowsPowerShell\v1.0\;C:\Program Files\Amazon\cfn-bootstrap\;C:\opscode\chef\bin\;C:\ruby\bin;C:\opscode\chef\bin;C: | |
\opscode\chef\embedded\bin" | |
54.84.99.135 | |
54.84.99.135 C:\Users\Administrator>chef-client -c c:/chef/client.rb -j c:/chef/first-boot.json | |
54.84.99.135 Starting Chef Client, version 13.5.3 | |
54.84.99.135 | |
54.84.99.135 [2017-10-19T00:50:19+00:00] INFO: *** Chef 13.5.3 *** | |
54.84.99.135 [2017-10-19T00:50:19+00:00] INFO: Platform: x64-mingw32 | |
54.84.99.135 [2017-10-19T00:50:19+00:00] INFO: Chef-client pid: 1600 | |
54.84.99.135 [2017-10-19T00:50:19+00:00] INFO: The plugin path C:\chef\ohai\plugins does not exist. Skipping... | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Setting the run_list to ["recipe[learn_chef_iis]"] from CLI options | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Run List is [recipe[learn_chef_iis]] | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Run List expands to [learn_chef_iis] | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Starting Chef Run for node1-windows | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Running start handlers | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Start handlers complete. | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Error while reporting run start to Data Collector. URL: https://api.chef. | |
io/organizations/learn-chef-2/data-collector Exception: 404 -- 404 "Not Found" (This is normal if you do not have Chef | |
Automate) | |
54.84.99.135 resolving cookbooks for run list: ["learn_chef_iis"] | |
54.84.99.135 | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Loading cookbooks [learn_chef_iis@0.1.0] | |
54.84.99.135 Synchronizing Cookbooks: | |
54.84.99.135 - learn_chef_iis (0.1.0) | |
54.84.99.135 Installing Cookbook Gems: | |
54.84.99.135 Compiling Cookbooks... | |
54.84.99.135 Converging 4 resources | |
54.84.99.135 | |
54.84.99.135 Recipe: learn_chef_iis::default | |
54.84.99.135 * powershell_script[Install IIS] action run[2017-10-19T00:50:47+00:00] INFO: Processing powershell_script | |
[Install IIS] action run (learn_chef_iis::default line 6) | |
54.84.99.135 [2017-10-19T00:50:47+00:00] INFO: Processing powershell_script[Guard resource] action run (dynamically defi | |
ned) | |
54.84.99.135 [2017-10-19T00:50:48+00:00] INFO: powershell_script[Guard resource] ran successfully | |
54.84.99.135 (skipped due to not_if) | |
54.84.99.135 * windows_service[w3svc] action enable[2017-10-19T00:50:48+00:00] INFO: Processing windows_service[w3svc] | |
action enable (learn_chef_iis::default line 12) | |
54.84.99.135 (up to date) | |
54.84.99.135 * windows_service[w3svc] action start[2017-10-19T00:50:48+00:00] INFO: Processing windows_service[w3svc] | |
action start (learn_chef_iis::default line 12) | |
54.84.99.135 (up to date) | |
54.84.99.135 * directory[c:\inetpub\wwwroot] action create[2017-10-19T00:50:48+00:00] INFO: Processing directory[c:\in | |
etpub\wwwroot] action create (learn_chef_iis::default line 16) | |
54.84.99.135 (up to date) | |
54.84.99.135 * template[c:\inetpub\wwwroot\Default.htm] action create[2017-10-19T00:50:48+00:00] INFO: Processing temp | |
late[c:\inetpub\wwwroot\Default.htm] action create (learn_chef_iis::default line 22) | |
54.84.99.135 (up to date) | |
54.84.99.135 [2017-10-19T00:50:48+00:00] INFO: Chef Run complete in 1.33498 seconds | |
54.84.99.135 | |
54.84.99.135 Running handlers: | |
54.84.99.135 [2017-10-19T00:50:48+00:00] INFO: Running report handlers | |
54.84.99.135 Running handlers complete | |
54.84.99.135 [2017-10-19T00:50:48+00:00] INFO: Report handlers complete | |
54.84.99.135 Chef Client finished, 0/5 resources updated in 29 seconds | |
54.84.99.135 [2017-10-19T00:50:48+00:00] INFO: Sending resource update report (run-id: c2b40f52-0384-4cc4-b856-064fb73b5 | |
88a) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment