Skip to content

Instantly share code, notes, and snippets.

@trentster
Last active August 29, 2015 14:06
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save trentster/cbf8652c08bea8d39aa5 to your computer and use it in GitHub Desktop.
Save trentster/cbf8652c08bea8d39aa5 to your computer and use it in GitHub Desktop.
[root@smartosn2 ~]# vmadm get adb341dd-2ed7-4f31-b5ae-9e873324b820
{
"zonename": "adb341dd-2ed7-4f31-b5ae-9e873324b820",
"autoboot": true,
"brand": "joyent",
"limit_priv": "default",
"v": 1,
"create_timestamp": "2014-09-06T15:55:03.690Z",
"image_uuid": "c1200fbc-35d2-11e4-a5cc-f73f4cb16f6e",
"cpu_shares": 64,
"zfs_io_priority": 64,
"max_lwps": 2000,
"max_physical_memory": 2048,
"max_locked_memory": 2048,
"max_swap": 4096,
"cpu_cap": 100,
"billing_id": "00000000-0000-0000-0000-000000000000",
"tmpfs": 2048,
"hostname": "fusion-mibe-pgsql-pass",
"dns_domain": "local",
"resolvers": [
"10.1.1.1",
"8.8.8.8"
],
"alias": "fusion-mibe-pgsql-pass",
"nics": [
{
"interface": "net0",
"mac": "62:c3:2e:c4:cd:d3",
"nic_tag": "admin",
"gateway": "10.1.1.1",
"ip": "10.1.1.222",
"netmask": "255.255.255.0",
"primary": true
}
],
"uuid": "adb341dd-2ed7-4f31-b5ae-9e873324b820",
"zone_state": "running",
"zonepath": "/zones/adb341dd-2ed7-4f31-b5ae-9e873324b820",
"zoneid": 24,
"last_modified": "2014-09-06T15:55:37.000Z",
"firewall_enabled": false,
"server_uuid": "002590ae-b1a0-0607-0025-90aeb1a00e0f",
"platform_buildstamp": "20140515T211957Z",
"state": "running",
"customer_metadata": {
"pgsql_pw": "secretpass",
"root_authorized_keys": "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAlK0ev0x6F9Ss2bD+L/5GNGU20+Xbdq7PeSMrW0lvRFsk0EdMHUQSfr2Op2DW2lLzIWPavixC6PCF6Hq0Xwg5jtTyVSgXbJ83MkRZe0tUFBfjR7HX9Ig5PIJyU8YYBSi+CSLK9L6kzC7vATeKCo4HnE7Kx/TsMq9Yymp5E6kfJo1LP8tPoPfBNCjFuGNRGPRFKRH+1gjuNBiCA3MI+mxt0Swzlkn3Ac9SlI4dXGVUmVgNMZ3v3zQnlD0mLQK7WpVCJDWhLsQNRglov9aI9RkWU3MTh9a38IiLM+m8KWN+vRNR9RKtuboPpCKYU//HsKtj5x5B/hmd1TT2S7H4kugR8Q== marktrent@onyxit\n"
},
"internal_metadata": {
"package": "2d39164e-51cc-416c-95c9-81c10da81dbd"
},
"routes": {},
"tags": {},
"quota": 100,
"zfs_root_recsize": 131072,
"zfs_filesystem": "zones/adb341dd-2ed7-4f31-b5ae-9e873324b820",
"zpool": "zones",
"snapshots": []
}
[ Sep 6 15:55:11 Enabled. ]
[ Sep 6 15:55:12 Executing start method ("/opt/local/lib/svc/method/zoneinit"). ]
+ . /lib/svc/share/smf_include.sh
++ SMF_EXIT_OK=0
++ SMF_EXIT_NODAEMON=94
++ SMF_EXIT_ERR_FATAL=95
++ SMF_EXIT_ERR_CONFIG=96
++ SMF_EXIT_MON_DEGRADE=97
++ SMF_EXIT_MON_OFFLINE=98
++ SMF_EXIT_ERR_NOSMF=99
++ SMF_EXIT_ERR_PERM=100
+ smf_is_globalzone
+ '[' adb341dd-2ed7-4f31-b5ae-9e873324b820 = global ']'
+ return 1
+ ZONEINIT_INCLUDES=/var/zoneinit/includes
+ ZONECONFIG=/root/zoneconfig
+ '[' -e /root/zoneconfig ']'
+ [[ ! start == \s\t\a\r\t ]]
+ [[ ! -e /var/svc/provisioning ]]
++ svcprop -p application/done zoneinit
+ [[ false =~ true ]]
+ trap 'exit_handler "received exit status" $?' EXIT
++ date +%s
+ START_TIME=1410018912
+ log '(start)'
++ basename zoneinit
+ local WHERE=zoneinit
+ echo 'zoneinit: (start)'
zoneinit: (start)
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/00-mdata.sh
+ local WHERE=00-mdata.sh
+ echo '00-mdata.sh: (start)'
00-mdata.sh: (start)
+ source /var/zoneinit/includes/00-mdata.sh
++ '[' -x /usr/sbin/mdata-get ']'
++ HAS_METADATA=yes
++ log 'waiting for metadata to show up'
+++ basename /var/zoneinit/includes/00-mdata.sh
++ local WHERE=00-mdata.sh
++ echo '00-mdata.sh: waiting for metadata to show up'
00-mdata.sh: waiting for metadata to show up
++ '[' -e /.zonecontrol/metadata.sock ']'
++ '[' -e /.zonecontrol/metadata.sock ']'
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/01-reboot-file.sh
+ local WHERE=01-reboot-file.sh
+ echo '01-reboot-file.sh: (start)'
01-reboot-file.sh: (start)
+ source /var/zoneinit/includes/01-reboot-file.sh
++ touch /tmp/.FIRST_REBOOT_NOT_YET_COMPLETE
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/02-config.sh
+ local WHERE=02-config.sh
+ echo '02-config.sh: (start)'
02-config.sh: (start)
+ source /var/zoneinit/includes/02-config.sh
++ log 'determine machine parameters and configuration'
+++ basename /var/zoneinit/includes/02-config.sh
++ local WHERE=02-config.sh
++ echo '02-config.sh: determine machine parameters and configuration'
02-config.sh: determine machine parameters and configuration
++ log 'checking for duplicate IPs'
+++ basename /var/zoneinit/includes/02-config.sh
++ local WHERE=02-config.sh
++ echo '02-config.sh: checking for duplicate IPs'
02-config.sh: checking for duplicate IPs
++ ifconfig -a
++ grep DUP
++ '[' yes ']'
++ mdata sdc:uuid
++ set -o pipefail
+++ mdata-get sdc:uuid
++ output=adb341dd-2ed7-4f31-b5ae-9e873324b820
++ echo -e adb341dd-2ed7-4f31-b5ae-9e873324b820
++ '[' '!' ']'
+++ mdata sdc:zonename
+++ set -o pipefail
++++ mdata-get sdc:zonename
+++ output=adb341dd-2ed7-4f31-b5ae-9e873324b820
+++ echo -e adb341dd-2ed7-4f31-b5ae-9e873324b820
++ ZONENAME=adb341dd-2ed7-4f31-b5ae-9e873324b820
+++ mdata sdc:hostname
+++ set -o pipefail
++++ mdata-get sdc:hostname
+++ output=fusion-mibe-pgsql-pass
+++ echo -e fusion-mibe-pgsql-pass
++ HOSTNAME=fusion-mibe-pgsql-pass
+++ mdata sdc:dns_domain
+++ set -o pipefail
++++ mdata-get sdc:dns_domain
+++ output=local
+++ echo -e local
++ DOMAINNAME=local
++ unset i
++ : -1
++ (( i++ ))
+++ mdata sdc:resolvers.0
+++ set -o pipefail
++++ mdata-get sdc:resolvers.0
+++ output=10.1.1.1
+++ echo -e 10.1.1.1
++ SERVER=10.1.1.1
++ '[' 10.1.1.1 ']'
++ RESOLVERS=(${RESOLVERS[@]} ${SERVER})
++ : 0
++ (( i++ ))
+++ mdata sdc:resolvers.1
+++ set -o pipefail
++++ mdata-get sdc:resolvers.1
+++ output=8.8.8.8
+++ echo -e 8.8.8.8
++ SERVER=8.8.8.8
++ '[' 8.8.8.8 ']'
++ RESOLVERS=(${RESOLVERS[@]} ${SERVER})
++ : 1
++ (( i++ ))
+++ mdata sdc:resolvers.2
+++ set -o pipefail
++++ mdata-get sdc:resolvers.2
+++ output=
+++ return 1
++ SERVER=
++ '[' ']'
+++ bc
++++ mdata sdc:max_physical_memory
++++ set -o pipefail
+++++ mdata-get sdc:max_physical_memory
++++ output=2048
++++ echo -e 2048
+++ echo '2048*1024^2'
++ RAM_IN_BYTES=2147483648
+++ bc
++++ mdata sdc:max_swap
++++ set -o pipefail
+++++ mdata-get sdc:max_swap
++++ output=4096
++++ echo -e 4096
+++ echo '4096*1024^2'
++ SWAP_IN_BYTES=4294967296
+++ mdata sdc:tmpfs
+++ set -o pipefail
++++ mdata-get sdc:tmpfs
+++ output=2048
+++ echo -e 2048
++ TMPFS=2048m
++ unset i
++ : -1
++ (( i++ ))
+++ mdata sdc:nics.0.interface
+++ set -o pipefail
++++ mdata-get sdc:nics.0.interface
+++ output=net0
+++ echo -e net0
++ IFACE=net0
++ '[' net0 ']'
++ NET_INTERFACES=(${NET_INTERFACES[@]} ${IFACE})
+++ mdata sdc:nics.0.ip
+++ set -o pipefail
++++ mdata-get sdc:nics.0.ip
+++ output=10.1.1.222
+++ echo -e 10.1.1.222
++ THIS_IP=10.1.1.222
++ [[ 10.1.1.222. =~ ^(([01]?[0-9]{1,2}|2[0-4][0-9]|25[0-5])\.){4}$ ]]
++ eval net0_IP=10.1.1.222
+++ net0_IP=10.1.1.222
++ case "$(mdata sdc:nics.${i}.nic_tag)" in
+++ mdata sdc:nics.0.nic_tag
+++ set -o pipefail
++++ mdata-get sdc:nics.0.nic_tag
+++ output=admin
+++ echo -e admin
++ PRIVATE_IPS=(${PRIVATE_IPS[@]} ${THIS_IP})
++ : 0
++ (( i++ ))
+++ mdata sdc:nics.1.interface
+++ set -o pipefail
++++ mdata-get sdc:nics.1.interface
+++ output=
+++ return 1
++ IFACE=
++ '[' ']'
++ PUBLIC_IP=
++ PRIVATE_IP=10.1.1.222
+++ ifconfig lo0
+++ awk '{if ($1=="inet") print $2}'
++ LOCAL_IP=127.0.0.1
++ '[' 2 -gt 0 ']'
++ : admin root
++ USERS=(${USERS})
++ for USER in '${USERS[@]}'
++ PASS_VAR_LOWER=admin_pw
+++ echo admin_pw
+++ tr '[a-z]' '[A-Z]'
++ PASS_VAR_UPPER=ADMIN_PW
++ '[' yes ']'
+++ mdata admin_pw
+++ set -o pipefail
++++ mdata-get admin_pw
+++ output=
+++ return 1
++ USER_PW=
++ unset USER_PW
++ '[' -n '' ']'
++ unset ADMIN_PW
++ for USER in '${USERS[@]}'
++ PASS_VAR_LOWER=root_pw
+++ echo root_pw
+++ tr '[a-z]' '[A-Z]'
++ PASS_VAR_UPPER=ROOT_PW
++ '[' yes ']'
+++ mdata root_pw
+++ set -o pipefail
++++ mdata-get root_pw
+++ output=
+++ return 1
++ USER_PW=
++ unset USER_PW
++ '[' -n '' ']'
++ unset ROOT_PW
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/04-mdata.sh
+ local WHERE=04-mdata.sh
+ echo '04-mdata.sh: (start)'
04-mdata.sh: (start)
+ source /var/zoneinit/includes/04-mdata.sh
++ '[' yes ']'
++ log 'enabling metadata agent'
+++ basename /var/zoneinit/includes/04-mdata.sh
++ local WHERE=04-mdata.sh
++ echo '04-mdata.sh: enabling metadata agent'
04-mdata.sh: enabling metadata agent
++ svcadm enable mdata:fetch
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/11-files.sh
+ local WHERE=11-files.sh
+ echo '11-files.sh: (start)'
11-files.sh: (start)
+ source /var/zoneinit/includes/11-files.sh
++ log 'cleaning files'
+++ basename /var/zoneinit/includes/11-files.sh
++ local WHERE=11-files.sh
++ echo '11-files.sh: cleaning files'
11-files.sh: cleaning files
++ '[' -e /var/log/auth.log ']'
++ cp /dev/null /var/log/authlog
++ log 'substituting placeholders for real data in config files'
+++ basename /var/zoneinit/includes/11-files.sh
++ local WHERE=11-files.sh
++ echo '11-files.sh: substituting placeholders for real data in config files'
11-files.sh: substituting placeholders for real data in config files
++ substitute_files=($(find /etc /opt/local/etc -type f | sort | xargs /usr/bin/egrep -l '@(PUBLIC_IP|PRIVATE_IP|LOCAL_IP|DOMAINNAME|HOSTNAME|ZONENAME)@' || true))
+++ find /etc /opt/local/etc -type f
+++ sort
+++ xargs /usr/bin/egrep -l '@(PUBLIC_IP|PRIVATE_IP|LOCAL_IP|DOMAINNAME|HOSTNAME|ZONENAME)@'
+++ true
++ sed -e '/tmpfs/s/-$/size=2048m/' /etc/vfstab
++ mv /etc/vfstab.tmp /etc/vfstab
++ rm -f /etc/vfstab.tmp
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/12-network.sh
+ local WHERE=12-network.sh
+ echo '12-network.sh: (start)'
12-network.sh: (start)
+ source /var/zoneinit/includes/12-network.sh
++ log 'setting hostname, IPs and resolvers'
+++ basename /var/zoneinit/includes/12-network.sh
++ local WHERE=12-network.sh
++ echo '12-network.sh: setting hostname, IPs and resolvers'
12-network.sh: setting hostname, IPs and resolvers
++ echo fusion-mibe-pgsql-pass
++ /bin/hostname fusion-mibe-pgsql-pass
++ /bin/sed /nameserver/d /etc/resolv.conf
++ for HOST in '${RESOLVERS[@]}'
++ echo 'nameserver 10.1.1.1'
++ for HOST in '${RESOLVERS[@]}'
++ echo 'nameserver 8.8.8.8'
++ mv /etc/resolv.conf.tmp /etc/resolv.conf
++ sed '/^127\.0\.0\.1/s/$/ fusion-mibe-pgsql-pass/' /etc/inet/hosts
++ mv /etc/inet/hosts.tmp /etc/inet/hosts
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/31-postgresql.sh
+ local WHERE=31-postgresql.sh
+ echo '31-postgresql.sh: (start)'
31-postgresql.sh: (start)
+ source /var/zoneinit/includes/31-postgresql.sh
++ log 'getting pgsql_pw'
+++ basename /var/zoneinit/includes/31-postgresql.sh
++ local WHERE=31-postgresql.sh
++ echo '31-postgresql.sh: getting pgsql_pw'
31-postgresql.sh: getting pgsql_pw
+++ mdata-get pgsql_pw
++ PGSQL_PW=
++ PGSQL_PW=postgres
++ echo postgres
++ [[ -d /var/pgsql/data ]]
++ rm -rf /var/pgsql/data
++ log 'initializing PostgreSQL'
+++ basename /var/zoneinit/includes/31-postgresql.sh
++ local WHERE=31-postgresql.sh
++ echo '31-postgresql.sh: initializing PostgreSQL'
31-postgresql.sh: initializing PostgreSQL
++ su - postgres -c '/opt/local/bin/initdb --pgdata=/var/pgsql/data --encoding=UTF8 --locale=en_US.UTF-8 --auth=password --pwfile=/tmp/pgpasswd'
++ rm /tmp/pgpasswd
++ log 'starting PostgreSQL'
+++ basename /var/zoneinit/includes/31-postgresql.sh
++ local WHERE=31-postgresql.sh
++ echo '31-postgresql.sh: starting PostgreSQL'
31-postgresql.sh: starting PostgreSQL
++ svcadm enable -s postgresql
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/32-fusionpbx.sh
+ local WHERE=32-fusionpbx.sh
+ echo '32-fusionpbx.sh: (start)'
32-fusionpbx.sh: (start)
+ source /var/zoneinit/includes/32-fusionpbx.sh
++ log 'generating ssl certs'
+++ basename /var/zoneinit/includes/32-fusionpbx.sh
++ local WHERE=32-fusionpbx.sh
++ echo '32-fusionpbx.sh: generating ssl certs'
32-fusionpbx.sh: generating ssl certs
++ /opt/local/etc/nginx/sslgen.sh
Creating certificates
Generating RSA private key, 2048 bit long modulus
.............+++
......+++
unable to write 'random state'
e is 65537 (0x10001)
writing RSA key
Signature ok
subject=/C=AU/ST=Victoria/O=FusionPBX/L=Melbourne/CN=fusion/OU=Infrastructure/emailAddress=domains@fusionpbx.com
Getting Private key
unable to write 'random state'
++ log 'enabling http services'
+++ basename /var/zoneinit/includes/32-fusionpbx.sh
++ local WHERE=32-fusionpbx.sh
++ echo '32-fusionpbx.sh: enabling http services'
32-fusionpbx.sh: enabling http services
++ svcadm enable nginx
++ svcadm enable php-fpm
++ svcadm enable memcached
++ log 'enabling freeswitch'
+++ basename /var/zoneinit/includes/32-fusionpbx.sh
++ local WHERE=32-fusionpbx.sh
++ echo '32-fusionpbx.sh: enabling freeswitch'
32-fusionpbx.sh: enabling freeswitch
++ svcadm enable freeswitch
++ log 'determine the webui address for the motd'
+++ basename /var/zoneinit/includes/32-fusionpbx.sh
++ local WHERE=32-fusionpbx.sh
++ echo '32-fusionpbx.sh: determine the webui address for the motd'
32-fusionpbx.sh: determine the webui address for the motd
++ WEBUI_ADDRESS=10.1.1.222
++ [[ ! -z '' ]]
++ gsed -i s/%WEBUI_ADDRESS%/10.1.1.222/ /etc/motd
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/91-passwords.sh
+ local WHERE=91-passwords.sh
+ echo '91-passwords.sh: (start)'
91-passwords.sh: (start)
+ source /var/zoneinit/includes/91-passwords.sh
+++ type -p genbfpw
++ for _HASHTOOL in /usr/lib/cryptpass '$(type -p genbfpw)'
++ '[' -x /usr/lib/cryptpass ']'
++ HASHTOOL=/usr/lib/cryptpass
++ break
+++ type -p changepass
++ for _PASSTOOL in '$(type -p changepass)'
++ '[' -x /opt/local/sbin/changepass ']'
++ PASSTOOL=/opt/local/sbin/changepass
++ break
++ for USER in '${USERS[@]}'
++ log 'setting system password for user '\''admin'\'''
+++ basename /var/zoneinit/includes/91-passwords.sh
++ local WHERE=91-passwords.sh
++ echo '91-passwords.sh: setting system password for user '\''admin'\'''
91-passwords.sh: setting system password for user 'admin'
++ PASS_VAR_LOWER=admin_pw
+++ echo admin_pw
+++ tr '[a-z]' '[A-Z]'
++ PASS_VAR_UPPER=ADMIN_PW
++ USER_PW=
++ '[' '' ']'
++ passwd -N admin
++ for USER in '${USERS[@]}'
++ log 'setting system password for user '\''root'\'''
+++ basename /var/zoneinit/includes/91-passwords.sh
++ local WHERE=91-passwords.sh
++ echo '91-passwords.sh: setting system password for user '\''root'\'''
91-passwords.sh: setting system password for user 'root'
++ PASS_VAR_LOWER=root_pw
+++ echo root_pw
+++ tr '[a-z]' '[A-Z]'
++ PASS_VAR_UPPER=ROOT_PW
++ USER_PW=
++ '[' '' ']'
++ passwd -N root
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/92-sshd.sh
+ local WHERE=92-sshd.sh
+ echo '92-sshd.sh: (start)'
92-sshd.sh: (start)
+ source /var/zoneinit/includes/92-sshd.sh
++ awk '/^HostKey/ {print $2}' /etc/ssh/sshd_config
++ grep /etc/ssh
++ '[' ']'
+ for INC in '${ZONEINIT_INCLUDES}/*.sh'
+ log '(start)'
++ basename /var/zoneinit/includes/999-cleanup.sh
+ local WHERE=999-cleanup.sh
+ echo '999-cleanup.sh: (start)'
999-cleanup.sh: (start)
+ source /var/zoneinit/includes/999-cleanup.sh
++ log 'cleaning up'
+++ basename /var/zoneinit/includes/999-cleanup.sh
++ local WHERE=999-cleanup.sh
++ echo '999-cleanup.sh: cleaning up'
999-cleanup.sh: cleaning up
++ svccfg -s zoneinit 'setprop application/done = true'
++ svcadm refresh zoneinit
++ rm -f /root/zoneconfig
++ log 'scheduling an immediate reboot'
+++ basename /var/zoneinit/includes/999-cleanup.sh
++ local WHERE=999-cleanup.sh
++ echo '999-cleanup.sh: scheduling an immediate reboot'
999-cleanup.sh: scheduling an immediate reboot
++ echo 'reboot >/dev/null'
++ at now
commands will be executed using /usr/bin/sh
job 1410018918.a at Sat Sep 6 15:55:18 2014
+ unset INC
++ date +%s
+ END_TIME=1410018918
+ RUN_TIME=6
+ '[' 6 -gt 0 ']'
+ log 'total runtime 6 seconds'
++ basename zoneinit
+ local WHERE=zoneinit
+ echo 'zoneinit: total runtime 6 seconds'
zoneinit: total runtime 6 seconds
+ log '(finish)'
++ basename zoneinit
+ local WHERE=zoneinit
+ echo 'zoneinit: (finish)'
zoneinit: (finish)
+ exit 0
+ exit_handler 'received exit status' 0
++ basename zoneinit
+ local WHERE=zoneinit
+ local EXITCODE=0
+ '[' 0 -gt 0 ']'
[ Sep 6 15:55:18 Method "start" exited with status 0. ]
[ Sep 6 15:55:18 Rereading configuration. ]
[ Sep 6 15:55:18 No 'refresh' method defined. Treating as :true. ]
[ Sep 6 15:55:35 Enabled. ]
[ Sep 6 15:55:37 Executing start method ("/opt/local/lib/svc/method/zoneinit"). ]
+ . /lib/svc/share/smf_include.sh
++ SMF_EXIT_OK=0
++ SMF_EXIT_NODAEMON=94
++ SMF_EXIT_ERR_FATAL=95
++ SMF_EXIT_ERR_CONFIG=96
++ SMF_EXIT_MON_DEGRADE=97
++ SMF_EXIT_MON_OFFLINE=98
++ SMF_EXIT_ERR_NOSMF=99
++ SMF_EXIT_ERR_PERM=100
+ smf_is_globalzone
+ '[' adb341dd-2ed7-4f31-b5ae-9e873324b820 = global ']'
+ return 1
+ ZONEINIT_INCLUDES=/var/zoneinit/includes
+ ZONECONFIG=/root/zoneconfig
+ '[' -e /root/zoneconfig ']'
+ [[ ! start == \s\t\a\r\t ]]
+ [[ ! -e /var/svc/provisioning ]]
++ svcprop -p application/done zoneinit
+ [[ true =~ true ]]
+ exit 0
[ Sep 6 15:55:37 Method "start" exited with status 0. ]
[root@fusion-mibe-pgsql-pass ~]#
[root@fusion-mibe-pgsql-pass ~]# mdata-get root_authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAlK0ev0x6F9Ss2bD+L/9GQGU50+Xbdq7PeSMrW0lvRFsk0EdMHUQSfr2Op2DW2lLzIWPavixC6PCF6Hq0Xwg5jtTyVSgXbJ83MkRZe0tUFBfjR7HX9Ig5PIJyU8YYBSi+CSLK9L6kzC7vATeKCo4HnE7Kx/TsMq9Yymp5E6kfJo1LP8tPoPfBNCjFuGNRGPRFKRH+1gjuNBiCA3MI+mxt0Swzlkn3Ac9SlI4dXGVUmVgNMZ3v3zQnlD0mLQK7WpVCJDWhLsQNRglov9aI9RkWU3MTh9a38IiLM+m8KWN+vRNR9RKtuboPpCKYU//HsKtj5x5B/hmd1TT2S7H4kugR8Q== marktrent@onyxit
[root@fusion-mibe-pgsql-pass ~]# mdata-get pgsql_pw
No metadata for 'pgsql_pw'
[root@fusion-mibe-pgsql-pass ~]#
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment