10:48:35 [DEBUG] Event before-parameter-build.s3.CreateBucket: calling handler 10:48:35 [DEBUG] Event before-parameter-build.s3.CreateBucket: calling handler > 10:48:35 [DEBUG] Event before-parameter-build.s3.CreateBucket: calling handler > 10:48:35 [DEBUG] Event before-parameter-build.s3.CreateBucket: calling handler 10:48:35 [DEBUG] Event before-call.s3.CreateBucket: calling handler 10:48:35 [DEBUG] Event before-call.s3.CreateBucket: calling handler > 10:48:35 [DEBUG] Event before-call.s3.CreateBucket: calling handler 10:48:35 [DEBUG] Making request for OperationModel(name=CreateBucket) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'query_string': {}, 'method': 'PUT', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:48:35 [DEBUG] Event request-created.s3.CreateBucket: calling handler > 10:48:35 [DEBUG] Event choose-signer.s3.CreateBucket: calling handler > 10:48:35 [DEBUG] Event choose-signer.s3.CreateBucket: calling handler 10:48:35 [DEBUG] Event before-sign.s3.CreateBucket: calling handler > 10:48:35 [DEBUG] Calculating signature using v4 auth. 10:48:35 [DEBUG] CanonicalRequest: PUT /2f7a6bad-44d7-4e32-9e8c-beedde077ede host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T104835Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:48:35 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T104835Z 20230314/us-east-1/s3/aws4_request fba4a5cff343a39a667428cc804a6cd5727d1e833dce6cf87c71e49ee5be7ddd 10:48:35 [DEBUG] Signature: 73cbcfd1f47916cd46b9d68f97d5398037887396594a26919a9a998d37f427a2 10:48:35 [DEBUG] Sending http request: 10:48:53 [DEBUG] http://172.26.160.16:8084 "PUT /2f7a6bad-44d7-4e32-9e8c-beedde077ede HTTP/1.1" 200 0 10:48:53 [DEBUG] Response headers: {'Accept-Ranges': 'bytes', 'Content-Length': '0', 'Server': 'FrostFS-S3-GW/v0.0.1-78-g0af06c3b', 'X-Amz-Request-Id': '4242505c-7104-4d3a-8c1e-96cbea4f9a3f', 'Date': 'Tue, 14 Mar 2023 10:49:42 GMT'} 10:48:53 [DEBUG] Response body: b'' 10:48:53 [DEBUG] Event needs-retry.s3.CreateBucket: calling handler > 10:48:53 [DEBUG] Not retrying request. 10:48:53 [DEBUG] Event needs-retry.s3.CreateBucket: calling handler > 10:48:53 [DEBUG] Event after-call.s3.CreateBucket: calling handler > 10:48:53 [INFO] Created S3 bucket 2f7a6bad-44d7-4e32-9e8c-beedde077ede: {'ResponseMetadata': {'RequestId': '4242505c-7104-4d3a-8c1e-96cbea4f9a3f', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'accept-ranges': 'bytes', 'content-length': '0', 'server': 'FrostFS-S3-GW/v0.0.1-78-g0af06c3b', 'x-amz-request-id': '4242505c-7104-4d3a-8c1e-96cbea4f9a3f', 'date': 'Tue, 14 Mar 2023 10:49:42 GMT'}, 'RetryAttempts': 0}} 10:48:58 [INFO] File with size 1000 bytes has been generated: /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/frostfs-testcases/TemporaryDir/2cd4cf47-6e02-41cd-8194-a92d2ed00428 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-call.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:48:58 [DEBUG] Making request for OperationModel(name=ListObjects) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'query_string': {'encoding-type': 'url'}, 'method': 'GET', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'encoding_type_auto_set': True, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:48:58 [DEBUG] Event request-created.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event choose-signer.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event choose-signer.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-sign.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Calculating signature using v4 auth. 10:48:58 [DEBUG] CanonicalRequest: GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede encoding-type=url host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T104858Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:48:58 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T104858Z 20230314/us-east-1/s3/aws4_request 6737bdf1ce952c1d2ccbd64cf736543526463acab772d09714bfdc0d1dcf84f0 10:48:58 [DEBUG] Signature: 2935b5f3f19d29d8ea502e72c095d3b1b52a86585da884ccce8028ed5196d952 10:48:58 [DEBUG] Sending http request: 10:48:58 [DEBUG] http://172.26.160.16:8084 "GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url HTTP/1.1" 200 294 10:48:58 [DEBUG] Response headers: {'X-Amz-Request-Id': '955c3a25-da1c-41cb-9bdc-41cc3fc81a9b', 'Date': 'Tue, 14 Mar 2023 10:49:47 GMT', 'Content-Length': '294', 'Content-Type': 'text/xml; charset=utf-8'} 10:48:58 [DEBUG] Response body: b'\nurlfalse10002f7a6bad-44d7-4e32-9e8c-beedde077ede' 10:48:58 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Not retrying request. 10:48:58 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event after-call.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event after-call.s3.ListObjects: calling handler > 10:48:58 [INFO] S3 List objects result: {'ResponseMetadata': {'RequestId': '955c3a25-da1c-41cb-9bdc-41cc3fc81a9b', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': '955c3a25-da1c-41cb-9bdc-41cc3fc81a9b', 'date': 'Tue, 14 Mar 2023 10:49:47 GMT', 'content-length': '294', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}, 'IsTruncated': False, 'Marker': '', 'Name': '2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'Prefix': '', 'MaxKeys': 1000, 'EncodingType': 'url'} 10:48:58 [INFO] Found s3 objects: [] 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler > 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler > 10:48:58 [DEBUG] Event before-parameter-build.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-call.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-call.s3.PutObject: calling handler 10:48:58 [DEBUG] Adding expect 100 continue header to request. 10:48:58 [DEBUG] Event before-call.s3.PutObject: calling handler > 10:48:58 [DEBUG] Event before-call.s3.PutObject: calling handler 10:48:58 [DEBUG] Making request for OperationModel(name=PutObject) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede/2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'query_string': {}, 'method': 'PUT', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33', 'Content-MD5': 'GdO1On2HWv6i/xfwTs3fRA==', 'Expect': '100-continue'}, 'body': <_io.BytesIO object at 0x7f2a6c2c6fc0>, 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede/2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': True, 'auth_type': None, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:48:58 [DEBUG] Event request-created.s3.PutObject: calling handler > 10:48:58 [DEBUG] Event choose-signer.s3.PutObject: calling handler > 10:48:58 [DEBUG] Event choose-signer.s3.PutObject: calling handler 10:48:58 [DEBUG] Event before-sign.s3.PutObject: calling handler > 10:48:58 [DEBUG] Calculating signature using v4 auth. 10:48:58 [DEBUG] CanonicalRequest: PUT /2f7a6bad-44d7-4e32-9e8c-beedde077ede/2cd4cf47-6e02-41cd-8194-a92d2ed00428 content-md5:GdO1On2HWv6i/xfwTs3fRA== host:172.26.160.16:8084 x-amz-content-sha256:e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474 x-amz-date:20230314T104858Z content-md5;host;x-amz-content-sha256;x-amz-date e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474 10:48:58 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T104858Z 20230314/us-east-1/s3/aws4_request 70fe4870f101c8af826edc8740aa8031ec0ff5b572fa5dcb6cfba30ae2eb6a96 10:48:58 [DEBUG] Signature: efd4e201988fbd6328d619a76a1f7c7f3c4208cf3221489bd0426b68e1ac0670 10:48:58 [DEBUG] Sending http request: 10:48:58 [DEBUG] Waiting for 100 Continue response. 10:48:58 [DEBUG] 100 Continue response seen, now sending request body. 10:48:58 [DEBUG] http://172.26.160.16:8084 "PUT /2f7a6bad-44d7-4e32-9e8c-beedde077ede/2cd4cf47-6e02-41cd-8194-a92d2ed00428 HTTP/1.1" 200 0 10:48:58 [DEBUG] Response headers: {'Accept-Ranges': 'bytes', 'Content-Length': '0', 'Etag': 'e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474', 'Server': 'FrostFS-S3-GW/v0.0.1-78-g0af06c3b', 'X-Amz-Request-Id': '868be2a5-6a92-4d23-a0fd-6c41a1c7e141', 'Date': 'Tue, 14 Mar 2023 10:49:47 GMT'} 10:48:58 [DEBUG] Response body: b'' 10:48:58 [DEBUG] Event needs-retry.s3.PutObject: calling handler > 10:48:58 [DEBUG] Not retrying request. 10:48:58 [DEBUG] Event needs-retry.s3.PutObject: calling handler > 10:48:58 [DEBUG] Event after-call.s3.PutObject: calling handler > 10:48:58 [INFO] S3 Put object result: {'ResponseMetadata': {'RequestId': '868be2a5-6a92-4d23-a0fd-6c41a1c7e141', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'accept-ranges': 'bytes', 'content-length': '0', 'etag': 'e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474', 'server': 'FrostFS-S3-GW/v0.0.1-78-g0af06c3b', 'x-amz-request-id': '868be2a5-6a92-4d23-a0fd-6c41a1c7e141', 'date': 'Tue, 14 Mar 2023 10:49:47 GMT'}, 'RetryAttempts': 0}, 'ETag': 'e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474'} 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-call.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:48:58 [DEBUG] Making request for OperationModel(name=ListObjects) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'query_string': {'encoding-type': 'url'}, 'method': 'GET', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'encoding_type_auto_set': True, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:48:58 [DEBUG] Event request-created.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event choose-signer.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event choose-signer.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event before-sign.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Calculating signature using v4 auth. 10:48:58 [DEBUG] CanonicalRequest: GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede encoding-type=url host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T104858Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:48:58 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T104858Z 20230314/us-east-1/s3/aws4_request 6737bdf1ce952c1d2ccbd64cf736543526463acab772d09714bfdc0d1dcf84f0 10:48:58 [DEBUG] Signature: 2935b5f3f19d29d8ea502e72c095d3b1b52a86585da884ccce8028ed5196d952 10:48:58 [DEBUG] Sending http request: 10:48:58 [DEBUG] http://172.26.160.16:8084 "GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url HTTP/1.1" 200 624 10:48:58 [DEBUG] Response headers: {'X-Amz-Request-Id': 'acc1cac0-2a44-4b56-a60c-e71e81b2faaf', 'Date': 'Tue, 14 Mar 2023 10:49:47 GMT', 'Content-Length': '624', 'Content-Type': 'text/xml; charset=utf-8'} 10:48:58 [DEBUG] Response body: b'\n2cd4cf47-6e02-41cd-8194-a92d2ed004282023-03-14T10:48:58Ze9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c6544741000NcrzbL1UnY52YxQhPvZaDuh8V14UrGYAe3NcrzbL1UnY52YxQhPvZaDuh8V14UrGYAe3urlfalse10002f7a6bad-44d7-4e32-9e8c-beedde077ede' 10:48:58 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Not retrying request. 10:48:58 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:48:58 [DEBUG] Event after-call.s3.ListObjects: calling handler 10:48:58 [DEBUG] Event after-call.s3.ListObjects: calling handler > 10:48:58 [INFO] S3 List objects result: {'ResponseMetadata': {'RequestId': 'acc1cac0-2a44-4b56-a60c-e71e81b2faaf', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': 'acc1cac0-2a44-4b56-a60c-e71e81b2faaf', 'date': 'Tue, 14 Mar 2023 10:49:47 GMT', 'content-length': '624', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}, 'IsTruncated': False, 'Marker': '', 'Contents': [{'Key': '2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'LastModified': datetime.datetime(2023, 3, 14, 10, 48, 58, tzinfo=tzlocal()), 'ETag': 'e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474', 'Size': 1000, 'Owner': {'DisplayName': 'NcrzbL1UnY52YxQhPvZaDuh8V14UrGYAe3', 'ID': 'NcrzbL1UnY52YxQhPvZaDuh8V14UrGYAe3'}}], 'Name': '2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'Prefix': '', 'MaxKeys': 1000, 'EncodingType': 'url'} 10:48:58 [INFO] Found s3 objects: ['2cd4cf47-6e02-41cd-8194-a92d2ed00428'] 10:48:58 [INFO] Execute command "sudo systemctl stop frostfs-storage.service" on "172.26.160.16" 10:48:58 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:48:58 [DEBUG] starting thread (client mode): 0x6c25dc30 10:48:58 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:48:58 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:48:58 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:48:58 [DEBUG] === Key exchange possibilities === 10:48:58 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:48:58 [DEBUG] server key: ssh-ed25519 10:48:58 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:48:58 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:48:58 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:48:58 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:48:58 [DEBUG] client compress: none, zlib@openssh.com 10:48:58 [DEBUG] server compress: none, zlib@openssh.com 10:48:58 [DEBUG] client lang: 10:48:58 [DEBUG] server lang: 10:48:58 [DEBUG] kex follows: False 10:48:58 [DEBUG] === Key exchange agreements === 10:48:58 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:48:58 [DEBUG] HostKey: ssh-ed25519 10:48:58 [DEBUG] Cipher: aes128-ctr 10:48:58 [DEBUG] MAC: hmac-sha2-256 10:48:58 [DEBUG] Compression: none 10:48:58 [DEBUG] === End of kex handshake === 10:48:58 [DEBUG] Got server p (3072 bits) 10:48:58 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:48:58 [DEBUG] Switch to new keys ... 10:48:58 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:48:58 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:48:59 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:48:59 [DEBUG] userauth is OK 10:48:59 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:48:59 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:48:59 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:48:59 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:48:59 [INFO] Authentication (publickey) successful! 10:48:59 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:48:59 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:48:59 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:48:59 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:48:59 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:48:59 [DEBUG] Secsh channel 0 opened. 10:48:59 [DEBUG] [chan 0] Sesch channel 0 request ok 10:48:59 [DEBUG] [chan 0] EOF received (0) 10:48:59 [DEBUG] [chan 0] EOF sent (0) 10:48:59 [INFO] HOST: 172.26.160.16 COMMAND: sudo systemctl stop frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:48:58.675557 / 10:48:59.620025 / 0:00:00.944468 10:48:59 [INFO] Start command output: 10:48:59 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.16" 10:48:59 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:48:59 [DEBUG] starting thread (client mode): 0x6c27ca90 10:48:59 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:48:59 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:48:59 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:48:59 [DEBUG] === Key exchange possibilities === 10:48:59 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:48:59 [DEBUG] server key: ssh-ed25519 10:48:59 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:48:59 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:48:59 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:48:59 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:48:59 [DEBUG] client compress: none, zlib@openssh.com 10:48:59 [DEBUG] server compress: none, zlib@openssh.com 10:48:59 [DEBUG] client lang: 10:48:59 [DEBUG] server lang: 10:48:59 [DEBUG] kex follows: False 10:48:59 [DEBUG] === Key exchange agreements === 10:48:59 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:48:59 [DEBUG] HostKey: ssh-ed25519 10:48:59 [DEBUG] Cipher: aes128-ctr 10:48:59 [DEBUG] MAC: hmac-sha2-256 10:48:59 [DEBUG] Compression: none 10:48:59 [DEBUG] === End of kex handshake === 10:48:59 [DEBUG] Got server p (3072 bits) 10:48:59 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:48:59 [DEBUG] Switch to new keys ... 10:48:59 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:48:59 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:48:59 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:48:59 [DEBUG] userauth is OK 10:48:59 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:48:59 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:48:59 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:48:59 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:48:59 [INFO] Authentication (publickey) successful! 10:48:59 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:48:59 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:00 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:00 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:00 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:00 [DEBUG] Secsh channel 0 opened. 10:49:00 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:00 [DEBUG] [chan 0] EOF received (0) 10:49:00 [DEBUG] [chan 0] EOF sent (0) 10:49:00 [INFO] HOST: 172.26.160.16 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 3 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: inactive (dead) since Tue 2023-03-14 10:49:48 UTC; 624ms ago Process: 11211 ExecStart=/usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml (code=exited, status=0/SUCCESS) Main PID: 11211 (code=exited, status=0/SUCCESS) CPU: 6.460s STDERR: Start / End / Elapsed 10:48:59.621448 / 10:49:00.253307 / 0:00:00.631859 10:49:00 [INFO] Execute command "sudo systemctl stop frostfs-storage.service" on "172.26.160.82" 10:49:00 [INFO] Trying to connect to host 172.26.160.82 as service using password (attempt 0) 10:49:00 [DEBUG] starting thread (client mode): 0x6c25d5d0 10:49:00 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:00 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:00 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:00 [DEBUG] === Key exchange possibilities === 10:49:00 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:00 [DEBUG] server key: ssh-ed25519 10:49:00 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:00 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:00 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:00 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:00 [DEBUG] client compress: none, zlib@openssh.com 10:49:00 [DEBUG] server compress: none, zlib@openssh.com 10:49:00 [DEBUG] client lang: 10:49:00 [DEBUG] server lang: 10:49:00 [DEBUG] kex follows: False 10:49:00 [DEBUG] === Key exchange agreements === 10:49:00 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:00 [DEBUG] HostKey: ssh-ed25519 10:49:00 [DEBUG] Cipher: aes128-ctr 10:49:00 [DEBUG] MAC: hmac-sha2-256 10:49:00 [DEBUG] Compression: none 10:49:00 [DEBUG] === End of kex handshake === 10:49:00 [DEBUG] Got server p (3072 bits) 10:49:00 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:00 [DEBUG] Switch to new keys ... 10:49:00 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:00 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.82]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:00 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:00 [DEBUG] userauth is OK 10:49:00 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:00 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:00 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:00 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:00 [INFO] Authentication (publickey) successful! 10:49:00 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:00 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:00 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:00 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:00 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:00 [DEBUG] Secsh channel 0 opened. 10:49:00 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:00 [DEBUG] [chan 0] EOF received (0) 10:49:00 [DEBUG] [chan 0] EOF sent (0) 10:49:01 [INFO] HOST: 172.26.160.82 COMMAND: sudo systemctl stop frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:49:00.254507 / 10:49:01.187360 / 0:00:00.932853 10:49:01 [INFO] Start command output: 10:49:01 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.82" 10:49:01 [INFO] Trying to connect to host 172.26.160.82 as service using password (attempt 0) 10:49:01 [DEBUG] starting thread (client mode): 0x6c0d2c50 10:49:01 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:01 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:01 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:01 [DEBUG] === Key exchange possibilities === 10:49:01 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:01 [DEBUG] server key: ssh-ed25519 10:49:01 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:01 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:01 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:01 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:01 [DEBUG] client compress: none, zlib@openssh.com 10:49:01 [DEBUG] server compress: none, zlib@openssh.com 10:49:01 [DEBUG] client lang: 10:49:01 [DEBUG] server lang: 10:49:01 [DEBUG] kex follows: False 10:49:01 [DEBUG] === Key exchange agreements === 10:49:01 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:01 [DEBUG] HostKey: ssh-ed25519 10:49:01 [DEBUG] Cipher: aes128-ctr 10:49:01 [DEBUG] MAC: hmac-sha2-256 10:49:01 [DEBUG] Compression: none 10:49:01 [DEBUG] === End of kex handshake === 10:49:01 [DEBUG] Got server p (3072 bits) 10:49:01 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:01 [DEBUG] Switch to new keys ... 10:49:01 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.82]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:01 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:01 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:01 [DEBUG] userauth is OK 10:49:01 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:01 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:01 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:01 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:01 [INFO] Authentication (publickey) successful! 10:49:01 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:01 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:01 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:01 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:01 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:01 [DEBUG] Secsh channel 0 opened. 10:49:01 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:01 [DEBUG] [chan 0] EOF received (0) 10:49:01 [DEBUG] [chan 0] EOF sent (0) 10:49:01 [INFO] HOST: 172.26.160.82 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 3 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: inactive (dead) since Tue 2023-03-14 10:49:49 UTC; 652ms ago Process: 41505 ExecStart=/usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml (code=exited, status=0/SUCCESS) Main PID: 41505 (code=exited, status=0/SUCCESS) CPU: 5.823s STDERR: Start / End / Elapsed 10:49:01.188350 / 10:49:01.800123 / 0:00:00.611773 10:49:01 [INFO] Execute command "sudo systemctl stop frostfs-storage.service" on "172.26.160.247" 10:49:01 [INFO] Trying to connect to host 172.26.160.247 as service using password (attempt 0) 10:49:01 [DEBUG] starting thread (client mode): 0x6c0d2020 10:49:01 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:01 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:01 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:01 [DEBUG] === Key exchange possibilities === 10:49:01 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:01 [DEBUG] server key: ssh-ed25519 10:49:01 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:01 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:01 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:01 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:01 [DEBUG] client compress: none, zlib@openssh.com 10:49:01 [DEBUG] server compress: none, zlib@openssh.com 10:49:01 [DEBUG] client lang: 10:49:01 [DEBUG] server lang: 10:49:01 [DEBUG] kex follows: False 10:49:01 [DEBUG] === Key exchange agreements === 10:49:01 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:01 [DEBUG] HostKey: ssh-ed25519 10:49:01 [DEBUG] Cipher: aes128-ctr 10:49:01 [DEBUG] MAC: hmac-sha2-256 10:49:01 [DEBUG] Compression: none 10:49:01 [DEBUG] === End of kex handshake === 10:49:01 [DEBUG] Got server p (3072 bits) 10:49:02 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:02 [DEBUG] Switch to new keys ... 10:49:02 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.247]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:02 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:02 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:02 [DEBUG] userauth is OK 10:49:02 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:02 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:02 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:02 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:02 [INFO] Authentication (publickey) successful! 10:49:02 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:02 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:02 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:02 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:02 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:02 [DEBUG] Secsh channel 0 opened. 10:49:02 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:02 [DEBUG] [chan 0] EOF received (0) 10:49:02 [DEBUG] [chan 0] EOF sent (0) 10:49:02 [INFO] HOST: 172.26.160.247 COMMAND: sudo systemctl stop frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:49:01.801105 / 10:49:02.519644 / 0:00:00.718539 10:49:02 [INFO] Start command output: 10:49:02 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.247" 10:49:02 [INFO] Trying to connect to host 172.26.160.247 as service using password (attempt 0) 10:49:02 [DEBUG] starting thread (client mode): 0x6c1275e0 10:49:02 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:02 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:02 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:02 [DEBUG] === Key exchange possibilities === 10:49:02 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:02 [DEBUG] server key: ssh-ed25519 10:49:02 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:02 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:02 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:02 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:02 [DEBUG] client compress: none, zlib@openssh.com 10:49:02 [DEBUG] server compress: none, zlib@openssh.com 10:49:02 [DEBUG] client lang: 10:49:02 [DEBUG] server lang: 10:49:02 [DEBUG] kex follows: False 10:49:02 [DEBUG] === Key exchange agreements === 10:49:02 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:02 [DEBUG] HostKey: ssh-ed25519 10:49:02 [DEBUG] Cipher: aes128-ctr 10:49:02 [DEBUG] MAC: hmac-sha2-256 10:49:02 [DEBUG] Compression: none 10:49:02 [DEBUG] === End of kex handshake === 10:49:02 [DEBUG] Got server p (3072 bits) 10:49:02 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:02 [DEBUG] Switch to new keys ... 10:49:02 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.247]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:02 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:02 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:02 [DEBUG] userauth is OK 10:49:02 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:02 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:02 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:02 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:02 [INFO] Authentication (publickey) successful! 10:49:02 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:02 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:02 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:02 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:02 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:02 [DEBUG] Secsh channel 0 opened. 10:49:02 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:02 [DEBUG] [chan 0] EOF received (0) 10:49:02 [DEBUG] [chan 0] EOF sent (0) 10:49:03 [INFO] HOST: 172.26.160.247 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 3 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: inactive (dead) since Tue 2023-03-14 10:49:50 UTC; 604ms ago Process: 10356 ExecStart=/usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml (code=exited, status=0/SUCCESS) Main PID: 10356 (code=exited, status=0/SUCCESS) CPU: 6.996s STDERR: Start / End / Elapsed 10:49:02.521106 / 10:49:03.101385 / 0:00:00.580279 10:49:03 [INFO] Execute command "sudo systemctl stop frostfs-storage.service" on "172.26.160.29" 10:49:03 [INFO] Trying to connect to host 172.26.160.29 as service using password (attempt 0) 10:49:03 [DEBUG] starting thread (client mode): 0x6c126f80 10:49:03 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:03 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:03 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:03 [DEBUG] === Key exchange possibilities === 10:49:03 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:03 [DEBUG] server key: ssh-ed25519 10:49:03 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:03 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:03 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:03 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:03 [DEBUG] client compress: none, zlib@openssh.com 10:49:03 [DEBUG] server compress: none, zlib@openssh.com 10:49:03 [DEBUG] client lang: 10:49:03 [DEBUG] server lang: 10:49:03 [DEBUG] kex follows: False 10:49:03 [DEBUG] === Key exchange agreements === 10:49:03 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:03 [DEBUG] HostKey: ssh-ed25519 10:49:03 [DEBUG] Cipher: aes128-ctr 10:49:03 [DEBUG] MAC: hmac-sha2-256 10:49:03 [DEBUG] Compression: none 10:49:03 [DEBUG] === End of kex handshake === 10:49:03 [DEBUG] Got server p (3072 bits) 10:49:03 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:03 [DEBUG] Switch to new keys ... 10:49:03 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.29]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:03 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:03 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:03 [DEBUG] userauth is OK 10:49:03 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:03 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:03 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:03 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:03 [INFO] Authentication (publickey) successful! 10:49:03 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:03 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:03 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:03 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:03 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:03 [DEBUG] Secsh channel 0 opened. 10:49:03 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:04 [DEBUG] [chan 0] EOF received (0) 10:49:04 [DEBUG] [chan 0] EOF sent (0) 10:49:04 [INFO] HOST: 172.26.160.29 COMMAND: sudo systemctl stop frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:49:03.102385 / 10:49:04.433665 / 0:00:01.331280 10:49:04 [INFO] Start command output: 10:49:04 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.29" 10:49:04 [INFO] Trying to connect to host 172.26.160.29 as service using password (attempt 0) 10:49:04 [DEBUG] starting thread (client mode): 0x6c3aa680 10:49:04 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:04 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:04 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:04 [DEBUG] === Key exchange possibilities === 10:49:04 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:04 [DEBUG] server key: ssh-ed25519 10:49:04 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:04 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:04 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:04 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:04 [DEBUG] client compress: none, zlib@openssh.com 10:49:04 [DEBUG] server compress: none, zlib@openssh.com 10:49:04 [DEBUG] client lang: 10:49:04 [DEBUG] server lang: 10:49:04 [DEBUG] kex follows: False 10:49:04 [DEBUG] === Key exchange agreements === 10:49:04 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:04 [DEBUG] HostKey: ssh-ed25519 10:49:04 [DEBUG] Cipher: aes128-ctr 10:49:04 [DEBUG] MAC: hmac-sha2-256 10:49:04 [DEBUG] Compression: none 10:49:04 [DEBUG] === End of kex handshake === 10:49:04 [DEBUG] Got server p (3072 bits) 10:49:04 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:04 [DEBUG] Switch to new keys ... 10:49:04 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.29]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:04 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:04 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:04 [DEBUG] userauth is OK 10:49:04 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:04 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:04 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:04 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:04 [INFO] Authentication (publickey) successful! 10:49:04 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:04 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:04 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:04 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:04 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:04 [DEBUG] Secsh channel 0 opened. 10:49:04 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:04 [DEBUG] [chan 0] EOF received (0) 10:49:04 [DEBUG] [chan 0] EOF sent (0) 10:49:05 [INFO] HOST: 172.26.160.29 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 3 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: inactive (dead) since Tue 2023-03-14 10:49:53 UTC; 609ms ago Process: 10336 ExecStart=/usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml (code=exited, status=0/SUCCESS) Main PID: 10336 (code=exited, status=0/SUCCESS) CPU: 6.220s STDERR: Start / End / Elapsed 10:49:04.434628 / 10:49:05.019728 / 0:00:00.585100 10:49:05 [INFO] Node (s01: 172.26.160.16:8080) netmap key: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 10:49:05 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24' " on "172.26.160.16" 10:49:05 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:05 [DEBUG] starting thread (client mode): 0x6c183b50 10:49:05 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:05 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:05 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:05 [DEBUG] === Key exchange possibilities === 10:49:05 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:05 [DEBUG] server key: ssh-ed25519 10:49:05 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:05 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:05 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:05 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:05 [DEBUG] client compress: none, zlib@openssh.com 10:49:05 [DEBUG] server compress: none, zlib@openssh.com 10:49:05 [DEBUG] client lang: 10:49:05 [DEBUG] server lang: 10:49:05 [DEBUG] kex follows: False 10:49:05 [DEBUG] === Key exchange agreements === 10:49:05 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:05 [DEBUG] HostKey: ssh-ed25519 10:49:05 [DEBUG] Cipher: aes128-ctr 10:49:05 [DEBUG] MAC: hmac-sha2-256 10:49:05 [DEBUG] Compression: none 10:49:05 [DEBUG] === End of kex handshake === 10:49:05 [DEBUG] Got server p (3072 bits) 10:49:06 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:06 [DEBUG] Switch to new keys ... 10:49:06 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:06 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:06 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:06 [DEBUG] userauth is OK 10:49:06 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:06 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:06 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:06 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:06 [INFO] Authentication (publickey) successful! 10:49:06 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:06 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:06 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:06 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:06 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:06 [DEBUG] Secsh channel 0 opened. 10:49:06 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:18 [DEBUG] [chan 0] EOF received (0) 10:49:18 [DEBUG] [chan 0] EOF sent (0) 10:49:18 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24' RC: 0 STDOUT: Current epoch: 80, increase to 81. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:49:05.826060 / 10:49:18.642341 / 0:00:12.816281 10:49:19 [INFO] Node (s02: 172.26.160.247:8080) netmap key: 0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87 10:49:19 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87' " on "172.26.160.16" 10:49:19 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:19 [DEBUG] starting thread (client mode): 0x6c182f20 10:49:19 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:19 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:19 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:19 [DEBUG] === Key exchange possibilities === 10:49:19 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:19 [DEBUG] server key: ssh-ed25519 10:49:19 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:19 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:19 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:19 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:19 [DEBUG] client compress: none, zlib@openssh.com 10:49:19 [DEBUG] server compress: none, zlib@openssh.com 10:49:19 [DEBUG] client lang: 10:49:19 [DEBUG] server lang: 10:49:19 [DEBUG] kex follows: False 10:49:19 [DEBUG] === Key exchange agreements === 10:49:19 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:19 [DEBUG] HostKey: ssh-ed25519 10:49:19 [DEBUG] Cipher: aes128-ctr 10:49:19 [DEBUG] MAC: hmac-sha2-256 10:49:19 [DEBUG] Compression: none 10:49:19 [DEBUG] === End of kex handshake === 10:49:19 [DEBUG] Got server p (3072 bits) 10:49:19 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:19 [DEBUG] Switch to new keys ... 10:49:19 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:19 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:19 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:19 [DEBUG] userauth is OK 10:49:19 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:19 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:19 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:19 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:19 [INFO] Authentication (publickey) successful! 10:49:19 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:19 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:19 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:19 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:19 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:19 [DEBUG] Secsh channel 0 opened. 10:49:19 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:26 [DEBUG] [chan 0] EOF received (0) 10:49:26 [DEBUG] [chan 0] EOF sent (0) 10:49:26 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87' RC: 0 STDOUT: Current epoch: 81, increase to 82. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:49:19.478079 / 10:49:26.318658 / 0:00:06.840579 10:49:27 [INFO] Node (s03: 172.26.160.29:8080) netmap key: 022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926 10:49:27 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926' " on "172.26.160.16" 10:49:27 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:27 [DEBUG] starting thread (client mode): 0x6c15b280 10:49:27 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:27 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:27 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:27 [DEBUG] === Key exchange possibilities === 10:49:27 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:27 [DEBUG] server key: ssh-ed25519 10:49:27 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:27 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:27 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:27 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:27 [DEBUG] client compress: none, zlib@openssh.com 10:49:27 [DEBUG] server compress: none, zlib@openssh.com 10:49:27 [DEBUG] client lang: 10:49:27 [DEBUG] server lang: 10:49:27 [DEBUG] kex follows: False 10:49:27 [DEBUG] === Key exchange agreements === 10:49:27 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:27 [DEBUG] HostKey: ssh-ed25519 10:49:27 [DEBUG] Cipher: aes128-ctr 10:49:27 [DEBUG] MAC: hmac-sha2-256 10:49:27 [DEBUG] Compression: none 10:49:27 [DEBUG] === End of kex handshake === 10:49:27 [DEBUG] Got server p (3072 bits) 10:49:27 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:27 [DEBUG] Switch to new keys ... 10:49:27 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:27 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:27 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:27 [DEBUG] userauth is OK 10:49:27 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:27 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:27 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:27 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:27 [INFO] Authentication (publickey) successful! 10:49:27 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:27 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:27 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:27 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:27 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:27 [DEBUG] Secsh channel 0 opened. 10:49:27 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:34 [DEBUG] [chan 0] EOF received (0) 10:49:34 [DEBUG] [chan 0] EOF sent (0) 10:49:34 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926' RC: 0 STDOUT: Current epoch: 82, increase to 83. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:49:27.115792 / 10:49:34.952418 / 0:00:07.836626 10:49:35 [INFO] Node (s04: 172.26.160.82:8080) netmap key: 02335a424ef18791441de69840aa16a7800c38993792ce4da8aaa9083f93158d84 10:49:35 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '02335a424ef18791441de69840aa16a7800c38993792ce4da8aaa9083f93158d84' " on "172.26.160.16" 10:49:35 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:35 [DEBUG] starting thread (client mode): 0x6c15a740 10:49:35 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:35 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:35 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:35 [DEBUG] === Key exchange possibilities === 10:49:35 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:35 [DEBUG] server key: ssh-ed25519 10:49:35 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:35 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:35 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:35 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:35 [DEBUG] client compress: none, zlib@openssh.com 10:49:35 [DEBUG] server compress: none, zlib@openssh.com 10:49:35 [DEBUG] client lang: 10:49:35 [DEBUG] server lang: 10:49:35 [DEBUG] kex follows: False 10:49:35 [DEBUG] === Key exchange agreements === 10:49:35 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:35 [DEBUG] HostKey: ssh-ed25519 10:49:35 [DEBUG] Cipher: aes128-ctr 10:49:35 [DEBUG] MAC: hmac-sha2-256 10:49:35 [DEBUG] Compression: none 10:49:35 [DEBUG] === End of kex handshake === 10:49:35 [DEBUG] Got server p (3072 bits) 10:49:35 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:35 [DEBUG] Switch to new keys ... 10:49:35 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:35 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:36 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:36 [DEBUG] userauth is OK 10:49:36 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:36 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:36 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:36 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:36 [INFO] Authentication (publickey) successful! 10:49:36 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:36 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:36 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:36 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:36 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:36 [DEBUG] Secsh channel 0 opened. 10:49:36 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:42 [DEBUG] [chan 0] EOF received (0) 10:49:42 [DEBUG] [chan 0] EOF sent (0) 10:49:42 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph remove-nodes '02335a424ef18791441de69840aa16a7800c38993792ce4da8aaa9083f93158d84' RC: 0 STDOUT: Current epoch: 83, increase to 84. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:49:35.754421 / 10:49:42.582482 / 0:00:06.828061 10:49:42 [INFO] Execute command "sudo systemctl start frostfs-storage.service" on "172.26.160.16" 10:49:42 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:42 [DEBUG] starting thread (client mode): 0x6c15a7d0 10:49:42 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:42 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:42 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:42 [DEBUG] === Key exchange possibilities === 10:49:42 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:42 [DEBUG] server key: ssh-ed25519 10:49:42 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:42 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:42 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:42 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:42 [DEBUG] client compress: none, zlib@openssh.com 10:49:42 [DEBUG] server compress: none, zlib@openssh.com 10:49:42 [DEBUG] client lang: 10:49:42 [DEBUG] server lang: 10:49:42 [DEBUG] kex follows: False 10:49:42 [DEBUG] === Key exchange agreements === 10:49:42 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:42 [DEBUG] HostKey: ssh-ed25519 10:49:42 [DEBUG] Cipher: aes128-ctr 10:49:42 [DEBUG] MAC: hmac-sha2-256 10:49:42 [DEBUG] Compression: none 10:49:42 [DEBUG] === End of kex handshake === 10:49:42 [DEBUG] Got server p (3072 bits) 10:49:42 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:42 [DEBUG] Switch to new keys ... 10:49:42 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:42 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:42 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:42 [DEBUG] userauth is OK 10:49:42 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:42 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:42 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:42 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:42 [INFO] Authentication (publickey) successful! 10:49:42 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:42 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:42 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:42 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:42 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:42 [DEBUG] Secsh channel 0 opened. 10:49:42 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:42 [DEBUG] [chan 0] EOF received (0) 10:49:42 [DEBUG] [chan 0] EOF sent (0) 10:49:43 [INFO] HOST: 172.26.160.16 COMMAND: sudo systemctl start frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:49:42.583698 / 10:49:43.184552 / 0:00:00.600854 10:49:43 [INFO] Start command output: 10:49:43 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.16" 10:49:43 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:43 [DEBUG] starting thread (client mode): 0x6c168190 10:49:43 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:43 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:43 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:43 [DEBUG] === Key exchange possibilities === 10:49:43 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:43 [DEBUG] server key: ssh-ed25519 10:49:43 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:43 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:43 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:43 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:43 [DEBUG] client compress: none, zlib@openssh.com 10:49:43 [DEBUG] server compress: none, zlib@openssh.com 10:49:43 [DEBUG] client lang: 10:49:43 [DEBUG] server lang: 10:49:43 [DEBUG] kex follows: False 10:49:43 [DEBUG] === Key exchange agreements === 10:49:43 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:43 [DEBUG] HostKey: ssh-ed25519 10:49:43 [DEBUG] Cipher: aes128-ctr 10:49:43 [DEBUG] MAC: hmac-sha2-256 10:49:43 [DEBUG] Compression: none 10:49:43 [DEBUG] === End of kex handshake === 10:49:43 [DEBUG] Got server p (3072 bits) 10:49:43 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:43 [DEBUG] Switch to new keys ... 10:49:43 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:43 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:43 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:43 [DEBUG] userauth is OK 10:49:43 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:43 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:43 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:43 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:43 [INFO] Authentication (publickey) successful! 10:49:43 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:43 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:43 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:43 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:43 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:43 [DEBUG] Secsh channel 0 opened. 10:49:43 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:43 [DEBUG] [chan 0] EOF received (0) 10:49:43 [DEBUG] [chan 0] EOF sent (0) 10:49:43 [INFO] HOST: 172.26.160.16 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 0 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2023-03-14 10:50:32 UTC; 591ms ago Main PID: 11723 (frostfs-node) Tasks: 30 (limit: 38490) Memory: 29.0M CPU: 814ms CGroup: /system.slice/frostfs-storage.service └─11723 /usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml STDERR: Start / End / Elapsed 10:49:43.185583 / 10:49:43.785724 / 0:00:00.600141 10:49:43 [INFO] Execute command "sudo echo 'password: "gGMC6Pe4"' > /tmp/s01-config.yaml" on "172.26.160.16" 10:49:43 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:49:43 [DEBUG] starting thread (client mode): 0x6c169240 10:49:43 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:49:43 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:49:43 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:49:43 [DEBUG] === Key exchange possibilities === 10:49:43 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:49:43 [DEBUG] server key: ssh-ed25519 10:49:43 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:43 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:49:43 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:43 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:49:43 [DEBUG] client compress: none, zlib@openssh.com 10:49:43 [DEBUG] server compress: none, zlib@openssh.com 10:49:43 [DEBUG] client lang: 10:49:43 [DEBUG] server lang: 10:49:43 [DEBUG] kex follows: False 10:49:43 [DEBUG] === Key exchange agreements === 10:49:43 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:49:43 [DEBUG] HostKey: ssh-ed25519 10:49:43 [DEBUG] Cipher: aes128-ctr 10:49:43 [DEBUG] MAC: hmac-sha2-256 10:49:43 [DEBUG] Compression: none 10:49:43 [DEBUG] === End of kex handshake === 10:49:43 [DEBUG] Got server p (3072 bits) 10:49:43 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:49:43 [DEBUG] Switch to new keys ... 10:49:43 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:49:43 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:49:44 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:49:44 [DEBUG] userauth is OK 10:49:44 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:49:44 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:49:44 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:49:44 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:49:44 [INFO] Authentication (publickey) successful! 10:49:44 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:49:44 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:49:44 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:49:44 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:49:44 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:49:44 [DEBUG] Secsh channel 0 opened. 10:49:44 [DEBUG] [chan 0] Sesch channel 0 request ok 10:49:44 [DEBUG] [chan 0] EOF received (0) 10:49:44 [DEBUG] [chan 0] EOF sent (0) 10:49:44 [INFO] HOST: 172.26.160.16 COMMAND: sudo echo 'password: "gGMC6Pe4"' > /tmp/s01-config.yaml RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:49:43.786918 / 10:49:44.673687 / 0:00:00.886769 10:49:44 [INFO] Execute command "sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s01-config.yaml" on "172.26.160.16" 10:49:44 [DEBUG] [chan 1] Max packet in: 32768 bytes 10:49:44 [DEBUG] [chan 1] Max packet out: 32768 bytes 10:49:44 [DEBUG] Secsh channel 1 opened. 10:49:44 [DEBUG] [chan 1] Sesch channel 1 request ok 10:49:50 [DEBUG] [chan 1] EOF received (1) 10:49:50 [DEBUG] [chan 1] EOF sent (1) 10:49:50 [INFO] HOST: 172.26.160.16 COMMAND: sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s01-config.yaml RC: 0 STDOUT: Network status: OFFLINE Health status: READY STDERR: Start / End / Elapsed 10:49:44.674598 / 10:49:50.422968 / 0:00:05.748370 10:49:51 [INFO] Node (s01: 172.26.160.16:8080) netmap key: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 10:49:51 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' 10:49:51 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' Success: return code: 0 Output: Epoch: 84 10:49:52 [INFO] Node (s02: 172.26.160.247:8080) netmap key: 0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87 10:49:52 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' 10:49:52 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' Success: return code: 0 Output: Epoch: 84 10:49:53 [INFO] Node (s03: 172.26.160.29:8080) netmap key: 022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926 10:49:53 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' 10:49:53 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' Success: return code: 0 Output: Epoch: 84 10:49:54 [INFO] Node (s04: 172.26.160.82:8080) netmap key: 02335a424ef18791441de69840aa16a7800c38993792ce4da8aaa9083f93158d84 10:49:54 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' 10:49:55 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' Success: return code: 0 Output: Epoch: 84 10:50:03 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch " on "172.26.160.16" 10:50:03 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:50:03 [DEBUG] starting thread (client mode): 0x48715960 10:50:03 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:03 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:03 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:03 [DEBUG] === Key exchange possibilities === 10:50:03 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:03 [DEBUG] server key: ssh-ed25519 10:50:03 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:03 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:03 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:03 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:03 [DEBUG] client compress: none, zlib@openssh.com 10:50:03 [DEBUG] server compress: none, zlib@openssh.com 10:50:03 [DEBUG] client lang: 10:50:03 [DEBUG] server lang: 10:50:03 [DEBUG] kex follows: False 10:50:03 [DEBUG] === Key exchange agreements === 10:50:03 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:03 [DEBUG] HostKey: ssh-ed25519 10:50:03 [DEBUG] Cipher: aes128-ctr 10:50:03 [DEBUG] MAC: hmac-sha2-256 10:50:03 [DEBUG] Compression: none 10:50:03 [DEBUG] === End of kex handshake === 10:50:03 [DEBUG] Got server p (3072 bits) 10:50:03 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:03 [DEBUG] Switch to new keys ... 10:50:03 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:03 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:03 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:03 [DEBUG] userauth is OK 10:50:03 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:03 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:03 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:03 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:03 [INFO] Authentication (publickey) successful! 10:50:03 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:03 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:03 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:03 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:03 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:03 [DEBUG] Secsh channel 0 opened. 10:50:03 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:14 [DEBUG] [chan 0] EOF received (0) 10:50:14 [DEBUG] [chan 0] EOF sent (0) 10:50:14 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch RC: 0 STDOUT: Current epoch: 84, increase to 85. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:50:03.147684 / 10:50:14.989302 / 0:00:11.841618 10:50:15 [INFO] Node (s01: 172.26.160.16:8080) netmap key: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 10:50:15 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' 10:50:16 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.16:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node1-storage.json' Success: return code: 0 Output: Epoch: 85 Node 1: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 ONLINE /ip4/172.26.160.16/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Moskva Node: 172.26.160.16 Price: 10 SubDiv: Moskva SubDivCode: MOW UN-LOCODE: RU MOW 10:50:16 [INFO] Execute command "sudo systemctl start frostfs-storage.service" on "172.26.160.247" 10:50:16 [INFO] Trying to connect to host 172.26.160.247 as service using password (attempt 0) 10:50:16 [DEBUG] starting thread (client mode): 0x48717550 10:50:16 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:16 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:16 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:16 [DEBUG] === Key exchange possibilities === 10:50:16 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:16 [DEBUG] server key: ssh-ed25519 10:50:16 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:16 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:16 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:16 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:16 [DEBUG] client compress: none, zlib@openssh.com 10:50:16 [DEBUG] server compress: none, zlib@openssh.com 10:50:16 [DEBUG] client lang: 10:50:16 [DEBUG] server lang: 10:50:16 [DEBUG] kex follows: False 10:50:16 [DEBUG] === Key exchange agreements === 10:50:16 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:16 [DEBUG] HostKey: ssh-ed25519 10:50:16 [DEBUG] Cipher: aes128-ctr 10:50:16 [DEBUG] MAC: hmac-sha2-256 10:50:16 [DEBUG] Compression: none 10:50:16 [DEBUG] === End of kex handshake === 10:50:16 [DEBUG] Got server p (3072 bits) 10:50:16 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:16 [DEBUG] Switch to new keys ... 10:50:16 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:16 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.247]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:16 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:16 [DEBUG] userauth is OK 10:50:16 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:16 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:16 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:16 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:16 [INFO] Authentication (publickey) successful! 10:50:16 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:16 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:16 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:16 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:16 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:16 [DEBUG] Secsh channel 0 opened. 10:50:16 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:16 [DEBUG] [chan 0] EOF received (0) 10:50:16 [DEBUG] [chan 0] EOF sent (0) 10:50:16 [INFO] HOST: 172.26.160.247 COMMAND: sudo systemctl start frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:50:16.164199 / 10:50:16.799833 / 0:00:00.635634 10:50:16 [INFO] Start command output: 10:50:16 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.247" 10:50:16 [INFO] Trying to connect to host 172.26.160.247 as service using password (attempt 0) 10:50:16 [DEBUG] starting thread (client mode): 0x48745000 10:50:16 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:16 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:16 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:16 [DEBUG] === Key exchange possibilities === 10:50:16 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:16 [DEBUG] server key: ssh-ed25519 10:50:16 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:16 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:16 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:16 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:16 [DEBUG] client compress: none, zlib@openssh.com 10:50:16 [DEBUG] server compress: none, zlib@openssh.com 10:50:16 [DEBUG] client lang: 10:50:16 [DEBUG] server lang: 10:50:16 [DEBUG] kex follows: False 10:50:16 [DEBUG] === Key exchange agreements === 10:50:16 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:16 [DEBUG] HostKey: ssh-ed25519 10:50:16 [DEBUG] Cipher: aes128-ctr 10:50:16 [DEBUG] MAC: hmac-sha2-256 10:50:16 [DEBUG] Compression: none 10:50:16 [DEBUG] === End of kex handshake === 10:50:16 [DEBUG] Got server p (3072 bits) 10:50:17 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:17 [DEBUG] Switch to new keys ... 10:50:17 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:17 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.247]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:17 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:17 [DEBUG] userauth is OK 10:50:17 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:17 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:17 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:17 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:17 [INFO] Authentication (publickey) successful! 10:50:17 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:17 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:17 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:17 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:17 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:17 [DEBUG] Secsh channel 0 opened. 10:50:17 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:17 [DEBUG] [chan 0] EOF received (0) 10:50:17 [DEBUG] [chan 0] EOF sent (0) 10:50:17 [INFO] HOST: 172.26.160.247 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 0 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2023-03-14 10:51:04 UTC; 588ms ago Main PID: 10512 (frostfs-node) Tasks: 32 (limit: 38490) Memory: 25.7M CPU: 677ms CGroup: /system.slice/frostfs-storage.service └─10512 /usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml STDERR: Start / End / Elapsed 10:50:16.800802 / 10:50:17.395673 / 0:00:00.594871 10:50:17 [INFO] Execute command "sudo echo 'password: "kkVIpc05"' > /tmp/s02-config.yaml" on "172.26.160.247" 10:50:17 [INFO] Trying to connect to host 172.26.160.247 as service using password (attempt 0) 10:50:17 [DEBUG] starting thread (client mode): 0x48744ee0 10:50:17 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:17 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:17 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:17 [DEBUG] === Key exchange possibilities === 10:50:17 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:17 [DEBUG] server key: ssh-ed25519 10:50:17 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:17 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:17 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:17 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:17 [DEBUG] client compress: none, zlib@openssh.com 10:50:17 [DEBUG] server compress: none, zlib@openssh.com 10:50:17 [DEBUG] client lang: 10:50:17 [DEBUG] server lang: 10:50:17 [DEBUG] kex follows: False 10:50:17 [DEBUG] === Key exchange agreements === 10:50:17 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:17 [DEBUG] HostKey: ssh-ed25519 10:50:17 [DEBUG] Cipher: aes128-ctr 10:50:17 [DEBUG] MAC: hmac-sha2-256 10:50:17 [DEBUG] Compression: none 10:50:17 [DEBUG] === End of kex handshake === 10:50:17 [DEBUG] Got server p (3072 bits) 10:50:17 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:17 [DEBUG] Switch to new keys ... 10:50:17 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.247]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:17 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:17 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:17 [DEBUG] userauth is OK 10:50:17 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:17 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:17 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:17 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:17 [INFO] Authentication (publickey) successful! 10:50:17 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:17 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:17 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:17 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:17 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:17 [DEBUG] Secsh channel 0 opened. 10:50:17 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:17 [DEBUG] [chan 0] EOF received (0) 10:50:17 [DEBUG] [chan 0] EOF sent (0) 10:50:17 [INFO] HOST: 172.26.160.247 COMMAND: sudo echo 'password: "kkVIpc05"' > /tmp/s02-config.yaml RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:50:17.396980 / 10:50:17.984504 / 0:00:00.587524 10:50:17 [INFO] Execute command "sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s02-config.yaml" on "172.26.160.247" 10:50:17 [DEBUG] [chan 1] Max packet in: 32768 bytes 10:50:17 [DEBUG] [chan 1] Max packet out: 32768 bytes 10:50:17 [DEBUG] Secsh channel 1 opened. 10:50:17 [DEBUG] [chan 1] Sesch channel 1 request ok 10:50:29 [DEBUG] [chan 1] EOF received (1) 10:50:29 [DEBUG] [chan 1] EOF sent (1) 10:50:30 [INFO] HOST: 172.26.160.247 COMMAND: sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s02-config.yaml RC: 0 STDOUT: Network status: OFFLINE Health status: READY STDERR: Start / End / Elapsed 10:50:17.985456 / 10:50:30.073380 / 0:00:12.087924 10:50:38 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch " on "172.26.160.16" 10:50:38 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:50:38 [DEBUG] starting thread (client mode): 0x48768a90 10:50:38 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:38 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:38 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:38 [DEBUG] === Key exchange possibilities === 10:50:38 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:38 [DEBUG] server key: ssh-ed25519 10:50:38 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:38 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:38 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:38 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:38 [DEBUG] client compress: none, zlib@openssh.com 10:50:38 [DEBUG] server compress: none, zlib@openssh.com 10:50:38 [DEBUG] client lang: 10:50:38 [DEBUG] server lang: 10:50:38 [DEBUG] kex follows: False 10:50:38 [DEBUG] === Key exchange agreements === 10:50:38 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:38 [DEBUG] HostKey: ssh-ed25519 10:50:38 [DEBUG] Cipher: aes128-ctr 10:50:38 [DEBUG] MAC: hmac-sha2-256 10:50:38 [DEBUG] Compression: none 10:50:38 [DEBUG] === End of kex handshake === 10:50:38 [DEBUG] Got server p (3072 bits) 10:50:38 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:38 [DEBUG] Switch to new keys ... 10:50:38 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:38 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:38 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:38 [DEBUG] userauth is OK 10:50:38 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:38 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:38 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:38 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:38 [INFO] Authentication (publickey) successful! 10:50:38 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:38 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:38 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:38 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:38 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:38 [DEBUG] Secsh channel 0 opened. 10:50:38 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:46 [DEBUG] [chan 0] EOF received (0) 10:50:46 [DEBUG] [chan 0] EOF sent (0) 10:50:46 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch RC: 0 STDOUT: Current epoch: 85, increase to 86. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:50:38.078545 / 10:50:46.920370 / 0:00:08.841825 10:50:47 [INFO] Node (s02: 172.26.160.247:8080) netmap key: 0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87 10:50:47 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node2-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.247:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node2-storage.json' 10:50:48 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node2-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.247:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node2-storage.json' Success: return code: 0 Output: Epoch: 86 Node 1: 0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87 ONLINE /ip4/172.26.160.247/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Saint Petersburg (ex Leningrad) Node: 172.26.160.247 Price: 10 SubDiv: Sankt-Peterburg SubDivCode: SPE UN-LOCODE: RU LED Node 2: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 ONLINE /ip4/172.26.160.16/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Moskva Node: 172.26.160.16 Price: 10 SubDiv: Moskva SubDivCode: MOW UN-LOCODE: RU MOW 10:50:48 [INFO] Execute command "sudo systemctl start frostfs-storage.service" on "172.26.160.29" 10:50:48 [INFO] Trying to connect to host 172.26.160.29 as service using password (attempt 0) 10:50:48 [DEBUG] starting thread (client mode): 0x4876b010 10:50:48 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:48 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:48 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:48 [DEBUG] === Key exchange possibilities === 10:50:48 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:48 [DEBUG] server key: ssh-ed25519 10:50:48 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:48 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:48 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:48 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:48 [DEBUG] client compress: none, zlib@openssh.com 10:50:48 [DEBUG] server compress: none, zlib@openssh.com 10:50:48 [DEBUG] client lang: 10:50:48 [DEBUG] server lang: 10:50:48 [DEBUG] kex follows: False 10:50:48 [DEBUG] === Key exchange agreements === 10:50:48 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:48 [DEBUG] HostKey: ssh-ed25519 10:50:48 [DEBUG] Cipher: aes128-ctr 10:50:48 [DEBUG] MAC: hmac-sha2-256 10:50:48 [DEBUG] Compression: none 10:50:48 [DEBUG] === End of kex handshake === 10:50:48 [DEBUG] Got server p (3072 bits) 10:50:48 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:48 [DEBUG] Switch to new keys ... 10:50:48 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.29]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:48 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:48 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:48 [DEBUG] userauth is OK 10:50:48 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:48 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:48 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:48 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:48 [INFO] Authentication (publickey) successful! 10:50:48 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:48 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:48 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:48 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:48 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:48 [DEBUG] Secsh channel 0 opened. 10:50:48 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:48 [DEBUG] [chan 0] EOF received (0) 10:50:48 [DEBUG] [chan 0] EOF sent (0) 10:50:48 [INFO] HOST: 172.26.160.29 COMMAND: sudo systemctl start frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:50:48.114199 / 10:50:48.704649 / 0:00:00.590450 10:50:48 [INFO] Start command output: 10:50:48 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.29" 10:50:48 [INFO] Trying to connect to host 172.26.160.29 as service using password (attempt 0) 10:50:48 [DEBUG] starting thread (client mode): 0x487951b0 10:50:48 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:48 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:48 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:48 [DEBUG] === Key exchange possibilities === 10:50:48 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:48 [DEBUG] server key: ssh-ed25519 10:50:48 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:48 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:48 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:48 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:48 [DEBUG] client compress: none, zlib@openssh.com 10:50:48 [DEBUG] server compress: none, zlib@openssh.com 10:50:48 [DEBUG] client lang: 10:50:48 [DEBUG] server lang: 10:50:48 [DEBUG] kex follows: False 10:50:48 [DEBUG] === Key exchange agreements === 10:50:48 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:48 [DEBUG] HostKey: ssh-ed25519 10:50:48 [DEBUG] Cipher: aes128-ctr 10:50:48 [DEBUG] MAC: hmac-sha2-256 10:50:48 [DEBUG] Compression: none 10:50:48 [DEBUG] === End of kex handshake === 10:50:48 [DEBUG] Got server p (3072 bits) 10:50:48 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:48 [DEBUG] Switch to new keys ... 10:50:48 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.29]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:48 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:49 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:49 [DEBUG] userauth is OK 10:50:49 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:49 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:49 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:49 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:49 [INFO] Authentication (publickey) successful! 10:50:49 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:49 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:49 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:49 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:49 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:49 [DEBUG] Secsh channel 0 opened. 10:50:49 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:49 [DEBUG] [chan 0] EOF received (0) 10:50:49 [DEBUG] [chan 0] EOF sent (0) 10:50:49 [INFO] HOST: 172.26.160.29 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 0 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2023-03-14 10:51:37 UTC; 595ms ago Main PID: 10495 (frostfs-node) Tasks: 30 (limit: 38490) Memory: 24.5M CPU: 695ms CGroup: /system.slice/frostfs-storage.service └─10495 /usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml STDERR: Start / End / Elapsed 10:50:48.705616 / 10:50:49.299009 / 0:00:00.593393 10:50:49 [INFO] Execute command "sudo echo 'password: "0xexHkpI"' > /tmp/s03-config.yaml" on "172.26.160.29" 10:50:49 [INFO] Trying to connect to host 172.26.160.29 as service using password (attempt 0) 10:50:49 [DEBUG] starting thread (client mode): 0x48795090 10:50:49 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:50:49 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:50:49 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:50:49 [DEBUG] === Key exchange possibilities === 10:50:49 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:50:49 [DEBUG] server key: ssh-ed25519 10:50:49 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:49 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:50:49 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:49 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:50:49 [DEBUG] client compress: none, zlib@openssh.com 10:50:49 [DEBUG] server compress: none, zlib@openssh.com 10:50:49 [DEBUG] client lang: 10:50:49 [DEBUG] server lang: 10:50:49 [DEBUG] kex follows: False 10:50:49 [DEBUG] === Key exchange agreements === 10:50:49 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:50:49 [DEBUG] HostKey: ssh-ed25519 10:50:49 [DEBUG] Cipher: aes128-ctr 10:50:49 [DEBUG] MAC: hmac-sha2-256 10:50:49 [DEBUG] Compression: none 10:50:49 [DEBUG] === End of kex handshake === 10:50:49 [DEBUG] Got server p (3072 bits) 10:50:49 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:50:49 [DEBUG] Switch to new keys ... 10:50:49 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.29]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:50:49 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:50:49 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:50:49 [DEBUG] userauth is OK 10:50:49 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:50:49 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:50:49 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:50:49 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:50:49 [INFO] Authentication (publickey) successful! 10:50:49 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:50:49 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:50:49 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:50:49 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:50:49 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:50:49 [DEBUG] Secsh channel 0 opened. 10:50:49 [DEBUG] [chan 0] Sesch channel 0 request ok 10:50:49 [DEBUG] [chan 0] EOF received (0) 10:50:49 [DEBUG] [chan 0] EOF sent (0) 10:50:49 [INFO] HOST: 172.26.160.29 COMMAND: sudo echo 'password: "0xexHkpI"' > /tmp/s03-config.yaml RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:50:49.300532 / 10:50:49.887622 / 0:00:00.587090 10:50:49 [INFO] Execute command "sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s03-config.yaml" on "172.26.160.29" 10:50:49 [DEBUG] [chan 1] Max packet in: 32768 bytes 10:50:49 [DEBUG] [chan 1] Max packet out: 32768 bytes 10:50:49 [DEBUG] Secsh channel 1 opened. 10:50:49 [DEBUG] [chan 1] Sesch channel 1 request ok 10:50:55 [DEBUG] [chan 1] EOF received (1) 10:50:55 [DEBUG] [chan 1] EOF sent (1) 10:50:55 [INFO] HOST: 172.26.160.29 COMMAND: sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s03-config.yaml RC: 0 STDOUT: Network status: OFFLINE Health status: READY STDERR: Start / End / Elapsed 10:50:49.888610 / 10:50:55.642976 / 0:00:05.754366 10:51:03 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch " on "172.26.160.16" 10:51:03 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:51:03 [DEBUG] starting thread (client mode): 0x487b4700 10:51:03 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:03 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:03 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:03 [DEBUG] === Key exchange possibilities === 10:51:03 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:03 [DEBUG] server key: ssh-ed25519 10:51:03 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:03 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:03 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:03 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:03 [DEBUG] client compress: none, zlib@openssh.com 10:51:03 [DEBUG] server compress: none, zlib@openssh.com 10:51:03 [DEBUG] client lang: 10:51:03 [DEBUG] server lang: 10:51:03 [DEBUG] kex follows: False 10:51:03 [DEBUG] === Key exchange agreements === 10:51:03 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:03 [DEBUG] HostKey: ssh-ed25519 10:51:03 [DEBUG] Cipher: aes128-ctr 10:51:03 [DEBUG] MAC: hmac-sha2-256 10:51:03 [DEBUG] Compression: none 10:51:03 [DEBUG] === End of kex handshake === 10:51:03 [DEBUG] Got server p (3072 bits) 10:51:03 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:03 [DEBUG] Switch to new keys ... 10:51:03 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:03 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:03 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:03 [DEBUG] userauth is OK 10:51:03 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:03 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:03 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:03 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:03 [INFO] Authentication (publickey) successful! 10:51:03 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:04 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:04 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:04 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:04 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:04 [DEBUG] Secsh channel 0 opened. 10:51:04 [DEBUG] [chan 0] Sesch channel 0 request ok 10:51:10 [DEBUG] [chan 0] EOF received (0) 10:51:10 [DEBUG] [chan 0] EOF sent (0) 10:51:10 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch RC: 0 STDOUT: Current epoch: 86, increase to 87. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:51:03.645567 / 10:51:10.449526 / 0:00:06.803959 10:51:11 [INFO] Node (s03: 172.26.160.29:8080) netmap key: 022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926 10:51:11 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node3-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.29:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node3-storage.json' 10:51:11 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node3-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.29:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node3-storage.json' Success: return code: 0 Output: Epoch: 87 Node 1: 0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87 ONLINE /ip4/172.26.160.247/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Saint Petersburg (ex Leningrad) Node: 172.26.160.247 Price: 10 SubDiv: Sankt-Peterburg SubDivCode: SPE UN-LOCODE: RU LED Node 2: 022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926 ONLINE /ip4/172.26.160.29/tcp/8080 Continent: Europe Country: Sweden CountryCode: SE Deployed: YACZROKH Location: Stockholm Node: 172.26.160.29 Price: 10 SubDiv: Stockholms l�n SubDivCode: AB UN-LOCODE: SE STO Node 3: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 ONLINE /ip4/172.26.160.16/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Moskva Node: 172.26.160.16 Price: 10 SubDiv: Moskva SubDivCode: MOW UN-LOCODE: RU MOW 10:51:11 [INFO] Execute command "sudo systemctl start frostfs-storage.service" on "172.26.160.82" 10:51:11 [INFO] Trying to connect to host 172.26.160.82 as service using password (attempt 0) 10:51:11 [DEBUG] starting thread (client mode): 0x487b6d40 10:51:11 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:11 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:11 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:11 [DEBUG] === Key exchange possibilities === 10:51:11 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:11 [DEBUG] server key: ssh-ed25519 10:51:11 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:11 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:11 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:11 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:11 [DEBUG] client compress: none, zlib@openssh.com 10:51:11 [DEBUG] server compress: none, zlib@openssh.com 10:51:11 [DEBUG] client lang: 10:51:11 [DEBUG] server lang: 10:51:11 [DEBUG] kex follows: False 10:51:11 [DEBUG] === Key exchange agreements === 10:51:11 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:11 [DEBUG] HostKey: ssh-ed25519 10:51:11 [DEBUG] Cipher: aes128-ctr 10:51:11 [DEBUG] MAC: hmac-sha2-256 10:51:11 [DEBUG] Compression: none 10:51:11 [DEBUG] === End of kex handshake === 10:51:11 [DEBUG] Got server p (3072 bits) 10:51:11 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:11 [DEBUG] Switch to new keys ... 10:51:11 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:11 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.82]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:11 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:11 [DEBUG] userauth is OK 10:51:11 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:11 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:11 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:11 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:12 [INFO] Authentication (publickey) successful! 10:51:12 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:12 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:12 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:12 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:12 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:12 [DEBUG] Secsh channel 0 opened. 10:51:12 [DEBUG] [chan 0] Sesch channel 0 request ok 10:51:12 [DEBUG] [chan 0] EOF received (0) 10:51:12 [DEBUG] [chan 0] EOF sent (0) 10:51:12 [INFO] HOST: 172.26.160.82 COMMAND: sudo systemctl start frostfs-storage.service RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:51:11.641298 / 10:51:12.243812 / 0:00:00.602514 10:51:12 [INFO] Start command output: 10:51:12 [INFO] Execute command "sudo systemctl status frostfs-storage.service --lines=0" on "172.26.160.82" 10:51:12 [INFO] Trying to connect to host 172.26.160.82 as service using password (attempt 0) 10:51:12 [DEBUG] starting thread (client mode): 0x487e4820 10:51:12 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:12 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:12 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:12 [DEBUG] === Key exchange possibilities === 10:51:12 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:12 [DEBUG] server key: ssh-ed25519 10:51:12 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:12 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:12 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:12 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:12 [DEBUG] client compress: none, zlib@openssh.com 10:51:12 [DEBUG] server compress: none, zlib@openssh.com 10:51:12 [DEBUG] client lang: 10:51:12 [DEBUG] server lang: 10:51:12 [DEBUG] kex follows: False 10:51:12 [DEBUG] === Key exchange agreements === 10:51:12 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:12 [DEBUG] HostKey: ssh-ed25519 10:51:12 [DEBUG] Cipher: aes128-ctr 10:51:12 [DEBUG] MAC: hmac-sha2-256 10:51:12 [DEBUG] Compression: none 10:51:12 [DEBUG] === End of kex handshake === 10:51:12 [DEBUG] Got server p (3072 bits) 10:51:12 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:12 [DEBUG] Switch to new keys ... 10:51:12 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.82]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:12 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:12 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:12 [DEBUG] userauth is OK 10:51:12 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:12 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:12 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:12 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:12 [INFO] Authentication (publickey) successful! 10:51:12 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:12 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:12 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:12 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:12 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:12 [DEBUG] Secsh channel 0 opened. 10:51:12 [DEBUG] [chan 0] Sesch channel 0 request ok 10:51:12 [DEBUG] [chan 0] EOF received (0) 10:51:12 [DEBUG] [chan 0] EOF sent (0) 10:51:12 [INFO] HOST: 172.26.160.82 COMMAND: sudo systemctl status frostfs-storage.service --lines=0 RC: 0 STDOUT: ● frostfs-storage.service - FrostFS Storage node Loaded: loaded (/lib/systemd/system/frostfs-storage.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2023-03-14 10:52:00 UTC; 595ms ago Main PID: 42891 (frostfs-node) Tasks: 29 (limit: 38490) Memory: 23.7M CPU: 524ms CGroup: /system.slice/frostfs-storage.service └─42891 /usr/bin/frostfs-node --config /etc/frostfs/storage/config.yml STDERR: Start / End / Elapsed 10:51:12.244816 / 10:51:12.838431 / 0:00:00.593615 10:51:12 [INFO] Execute command "sudo echo 'password: "d2Ctbyhz"' > /tmp/s04-config.yaml" on "172.26.160.82" 10:51:12 [INFO] Trying to connect to host 172.26.160.82 as service using password (attempt 0) 10:51:12 [DEBUG] starting thread (client mode): 0x487e4700 10:51:12 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:12 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:12 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:12 [DEBUG] === Key exchange possibilities === 10:51:12 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:12 [DEBUG] server key: ssh-ed25519 10:51:12 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:12 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:12 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:12 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:12 [DEBUG] client compress: none, zlib@openssh.com 10:51:12 [DEBUG] server compress: none, zlib@openssh.com 10:51:12 [DEBUG] client lang: 10:51:12 [DEBUG] server lang: 10:51:12 [DEBUG] kex follows: False 10:51:12 [DEBUG] === Key exchange agreements === 10:51:12 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:12 [DEBUG] HostKey: ssh-ed25519 10:51:12 [DEBUG] Cipher: aes128-ctr 10:51:12 [DEBUG] MAC: hmac-sha2-256 10:51:12 [DEBUG] Compression: none 10:51:12 [DEBUG] === End of kex handshake === 10:51:12 [DEBUG] Got server p (3072 bits) 10:51:13 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:13 [DEBUG] Switch to new keys ... 10:51:13 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:13 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.82]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:13 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:13 [DEBUG] userauth is OK 10:51:13 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:13 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:13 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:13 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:13 [INFO] Authentication (publickey) successful! 10:51:13 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:13 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:13 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:13 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:13 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:13 [DEBUG] Secsh channel 0 opened. 10:51:13 [DEBUG] [chan 0] Sesch channel 0 request ok 10:51:13 [DEBUG] [chan 0] EOF received (0) 10:51:13 [DEBUG] [chan 0] EOF sent (0) 10:51:13 [INFO] HOST: 172.26.160.82 COMMAND: sudo echo 'password: "d2Ctbyhz"' > /tmp/s04-config.yaml RC: 0 STDOUT: STDERR: Start / End / Elapsed 10:51:12.839598 / 10:51:13.427789 / 0:00:00.588191 10:51:13 [INFO] Execute command "sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s04-config.yaml" on "172.26.160.82" 10:51:13 [DEBUG] [chan 1] Max packet in: 32768 bytes 10:51:13 [DEBUG] [chan 1] Max packet out: 32768 bytes 10:51:13 [DEBUG] Secsh channel 1 opened. 10:51:13 [DEBUG] [chan 1] Sesch channel 1 request ok 10:51:19 [DEBUG] [chan 1] EOF received (1) 10:51:19 [DEBUG] [chan 1] EOF sent (1) 10:51:19 [INFO] HOST: 172.26.160.82 COMMAND: sudo /usr/bin/frostfs-cli control healthcheck --endpoint localhost:8091 --wallet /etc/frostfs/storage/wallet.json --config /tmp/s04-config.yaml RC: 0 STDOUT: Network status: OFFLINE Health status: READY STDERR: Start / End / Elapsed 10:51:13.428650 / 10:51:19.976762 / 0:00:06.548112 10:51:27 [INFO] Execute command "sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch " on "172.26.160.16" 10:51:27 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:51:27 [DEBUG] starting thread (client mode): 0x48610280 10:51:27 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:27 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:27 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:27 [DEBUG] === Key exchange possibilities === 10:51:27 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:27 [DEBUG] server key: ssh-ed25519 10:51:27 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:27 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:27 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:27 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:27 [DEBUG] client compress: none, zlib@openssh.com 10:51:27 [DEBUG] server compress: none, zlib@openssh.com 10:51:27 [DEBUG] client lang: 10:51:27 [DEBUG] server lang: 10:51:27 [DEBUG] kex follows: False 10:51:27 [DEBUG] === Key exchange agreements === 10:51:27 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:27 [DEBUG] HostKey: ssh-ed25519 10:51:27 [DEBUG] Cipher: aes128-ctr 10:51:27 [DEBUG] MAC: hmac-sha2-256 10:51:27 [DEBUG] Compression: none 10:51:27 [DEBUG] === End of kex handshake === 10:51:28 [DEBUG] Got server p (3072 bits) 10:51:28 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:28 [DEBUG] Switch to new keys ... 10:51:28 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:28 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:28 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:28 [DEBUG] userauth is OK 10:51:28 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:28 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:28 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:28 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:28 [INFO] Authentication (publickey) successful! 10:51:28 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:28 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:28 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:28 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:28 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:28 [DEBUG] Secsh channel 0 opened. 10:51:28 [DEBUG] [chan 0] Sesch channel 0 request ok 10:51:34 [DEBUG] [chan 0] EOF received (0) 10:51:34 [DEBUG] [chan 0] EOF sent (0) 10:51:34 [INFO] HOST: 172.26.160.16 COMMAND: sudo frostfs-adm --config /home/service/config.yaml morph force-new-epoch RC: 0 STDOUT: Current epoch: 87, increase to 88. Waiting for transactions to persist... STDERR: Start / End / Elapsed 10:51:27.984451 / 10:51:34.746810 / 0:00:06.762359 10:51:35 [INFO] Node (s04: 172.26.160.82:8080) netmap key: 02335a424ef18791441de69840aa16a7800c38993792ce4da8aaa9083f93158d84 10:51:35 [INFO] Executing command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node4-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.82:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node4-storage.json' 10:51:35 [INFO] Command: frostfs-cli --config /jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node4-storage-config.yml netmap snapshot --rpc-endpoint '172.26.160.82:8080' --wallet '/jenkins/workspace/sbercloud_test/tmp.p37ycodGrf/tatlin-object-testsetup/.setup/wallets/node4-storage.json' Success: return code: 0 Output: Epoch: 88 Node 1: 0205de5f893e55e2e06be2749f0a7ac1fade7d88cd1f0113515f8764f98facaa87 ONLINE /ip4/172.26.160.247/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Saint Petersburg (ex Leningrad) Node: 172.26.160.247 Price: 10 SubDiv: Sankt-Peterburg SubDivCode: SPE UN-LOCODE: RU LED Node 2: 022cf178dfbe8314a6ca3c88828cd9146a1b7cc2d0318d7144bcf1eb568e751926 ONLINE /ip4/172.26.160.29/tcp/8080 Continent: Europe Country: Sweden CountryCode: SE Deployed: YACZROKH Location: Stockholm Node: 172.26.160.29 Price: 10 SubDiv: Stockholms l�n SubDivCode: AB UN-LOCODE: SE STO Node 3: 02335a424ef18791441de69840aa16a7800c38993792ce4da8aaa9083f93158d84 ONLINE /ip4/172.26.160.82/tcp/8080 Continent: Europe Country: Finland CountryCode: FI Deployed: YACZROKH Location: Helsinki (Helsingfors) Node: 172.26.160.82 Price: 10 SubDiv: Uusimaa SubDivCode: 18 UN-LOCODE: FI HEL Node 4: 03a519ba6a6aaf8df02950c57b67d85638b049dcbaa345bcdcee3dc53026466d24 ONLINE /ip4/172.26.160.16/tcp/8080 Continent: Europe Country: Russia CountryCode: RU Deployed: YACZROKH Location: Moskva Node: 172.26.160.16 Price: 10 SubDiv: Moskva SubDivCode: MOW UN-LOCODE: RU MOW 10:51:35 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:51:35 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:51:35 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:51:35 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:51:35 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:51:35 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:51:35 [DEBUG] Event before-call.s3.ListObjects: calling handler > 10:51:35 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:51:35 [DEBUG] Making request for OperationModel(name=ListObjects) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'query_string': {'encoding-type': 'url'}, 'method': 'GET', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'encoding_type_auto_set': True, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:51:35 [DEBUG] Event request-created.s3.ListObjects: calling handler > 10:51:35 [DEBUG] Event choose-signer.s3.ListObjects: calling handler > 10:51:35 [DEBUG] Event choose-signer.s3.ListObjects: calling handler 10:51:35 [DEBUG] Event before-sign.s3.ListObjects: calling handler > 10:51:35 [DEBUG] Calculating signature using v4 auth. 10:51:35 [DEBUG] CanonicalRequest: GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede encoding-type=url host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T105135Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:51:35 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T105135Z 20230314/us-east-1/s3/aws4_request b912f5b19a5da79d5f465f650e8d7952e9df3d25f4eee9a65f26de74fda4155d 10:51:35 [DEBUG] Signature: d22b6d2b55736322225ae00c808feb3931926b31847b074e5815440e47a3855f 10:51:35 [DEBUG] Sending http request: 10:51:36 [DEBUG] http://172.26.160.16:8084 "GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url HTTP/1.1" 200 556 10:51:36 [DEBUG] Response headers: {'X-Amz-Request-Id': '08c2ae75-2b9a-4c8f-8cbe-12c78732ca68', 'Date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'Content-Length': '556', 'Content-Type': 'text/xml; charset=utf-8'} 10:51:36 [DEBUG] Response body: b'\n2cd4cf47-6e02-41cd-8194-a92d2ed004280001-01-01T00:00:00Ze9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c6544741000urlfalse10002f7a6bad-44d7-4e32-9e8c-beedde077ede' 10:51:36 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Not retrying request. 10:51:36 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event after-call.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event after-call.s3.ListObjects: calling handler > 10:51:36 [INFO] S3 List objects result: {'ResponseMetadata': {'RequestId': '08c2ae75-2b9a-4c8f-8cbe-12c78732ca68', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': '08c2ae75-2b9a-4c8f-8cbe-12c78732ca68', 'date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'content-length': '556', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}, 'IsTruncated': False, 'Marker': '', 'Contents': [{'Key': '2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'LastModified': datetime.datetime(1, 1, 1, 0, 0, tzinfo=tzlocal()), 'ETag': 'e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474', 'Size': 1000, 'Owner': {'DisplayName': '', 'ID': ''}}], 'Name': '2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'Prefix': '', 'MaxKeys': 1000, 'EncodingType': 'url'} 10:51:36 [INFO] Found s3 objects: ['2cd4cf47-6e02-41cd-8194-a92d2ed00428'] 10:51:36 [DEBUG] Event before-parameter-build.s3.GetBucketVersioning: calling handler 10:51:36 [DEBUG] Event before-parameter-build.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Event before-parameter-build.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Event before-parameter-build.s3.GetBucketVersioning: calling handler 10:51:36 [DEBUG] Event before-call.s3.GetBucketVersioning: calling handler 10:51:36 [DEBUG] Event before-call.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Event before-call.s3.GetBucketVersioning: calling handler 10:51:36 [DEBUG] Making request for OperationModel(name=GetBucketVersioning) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede?versioning', 'query_string': {}, 'method': 'GET', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?versioning', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:51:36 [DEBUG] Event request-created.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Event choose-signer.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Event choose-signer.s3.GetBucketVersioning: calling handler 10:51:36 [DEBUG] Event before-sign.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Calculating signature using v4 auth. 10:51:36 [DEBUG] CanonicalRequest: GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede versioning= host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T105136Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:51:36 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T105136Z 20230314/us-east-1/s3/aws4_request 10453fe3cd2ed31b2c1c2927a59dd7186637046df4965d268b4e859537eeb69a 10:51:36 [DEBUG] Signature: 8213964fc6743e6375eaeded5c9ed02fa866fad727cd5c02dd6b2212eeeb7280 10:51:36 [DEBUG] Sending http request: 10:51:36 [DEBUG] http://172.26.160.16:8084 "GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede?versioning HTTP/1.1" 200 138 10:51:36 [DEBUG] Response headers: {'X-Amz-Request-Id': 'be6a453f-1426-49e3-b9db-be963e403656', 'Date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'Content-Length': '138', 'Content-Type': 'text/xml; charset=utf-8'} 10:51:36 [DEBUG] Response body: b'\n' 10:51:36 [DEBUG] Event needs-retry.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Not retrying request. 10:51:36 [DEBUG] Event needs-retry.s3.GetBucketVersioning: calling handler > 10:51:36 [DEBUG] Event after-call.s3.GetBucketVersioning: calling handler > 10:51:36 [INFO] S3 Got bucket versioning status: {'ResponseMetadata': {'RequestId': 'be6a453f-1426-49e3-b9db-be963e403656', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': 'be6a453f-1426-49e3-b9db-be963e403656', 'date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'content-length': '138', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}} 10:51:36 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event before-parameter-build.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event before-call.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event before-call.s3.ListObjects: calling handler 10:51:36 [DEBUG] Making request for OperationModel(name=ListObjects) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'query_string': {'encoding-type': 'url'}, 'method': 'GET', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'encoding_type_auto_set': True, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:51:36 [DEBUG] Event request-created.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event choose-signer.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event choose-signer.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event before-sign.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Calculating signature using v4 auth. 10:51:36 [DEBUG] CanonicalRequest: GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede encoding-type=url host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T105136Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:51:36 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T105136Z 20230314/us-east-1/s3/aws4_request 8047a73d0d39ca64fcb35bc7ca93f167d90511320cbb5cfa17b187a249ebaea0 10:51:36 [DEBUG] Signature: 302738c8e3a92f2b5dbc361e54f1421b69741e7c58c30213c2448137ad74dfc0 10:51:36 [DEBUG] Sending http request: 10:51:36 [DEBUG] http://172.26.160.16:8084 "GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede?encoding-type=url HTTP/1.1" 200 556 10:51:36 [DEBUG] Response headers: {'X-Amz-Request-Id': '6449ac4d-899f-4bb8-8721-3de7b719a811', 'Date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'Content-Length': '556', 'Content-Type': 'text/xml; charset=utf-8'} 10:51:36 [DEBUG] Response body: b'\n2cd4cf47-6e02-41cd-8194-a92d2ed004280001-01-01T00:00:00Ze9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c6544741000urlfalse10002f7a6bad-44d7-4e32-9e8c-beedde077ede' 10:51:36 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Not retrying request. 10:51:36 [DEBUG] Event needs-retry.s3.ListObjects: calling handler > 10:51:36 [DEBUG] Event after-call.s3.ListObjects: calling handler 10:51:36 [DEBUG] Event after-call.s3.ListObjects: calling handler > 10:51:36 [INFO] S3 List objects result: {'ResponseMetadata': {'RequestId': '6449ac4d-899f-4bb8-8721-3de7b719a811', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': '6449ac4d-899f-4bb8-8721-3de7b719a811', 'date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'content-length': '556', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}, 'IsTruncated': False, 'Marker': '', 'Contents': [{'Key': '2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'LastModified': datetime.datetime(1, 1, 1, 0, 0, tzinfo=tzlocal()), 'ETag': 'e9a6a6f0d35879b291858ab2ef576ec4c9fedb2943083913d550223a7c654474', 'Size': 1000, 'Owner': {'DisplayName': '', 'ID': ''}}], 'Name': '2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'Prefix': '', 'MaxKeys': 1000, 'EncodingType': 'url'} 10:51:36 [INFO] Found s3 objects: ['2cd4cf47-6e02-41cd-8194-a92d2ed00428'] 10:51:36 [DEBUG] Event before-parameter-build.s3.DeleteObjects: calling handler 10:51:36 [DEBUG] Event before-parameter-build.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Event before-parameter-build.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Event before-parameter-build.s3.DeleteObjects: calling handler 10:51:36 [DEBUG] Event before-call.s3.DeleteObjects: calling handler 10:51:36 [DEBUG] Event before-call.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Event before-call.s3.DeleteObjects: calling handler 10:51:36 [DEBUG] Making request for OperationModel(name=DeleteObjects) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede?delete', 'query_string': {}, 'method': 'POST', 'headers': {'Content-MD5': 'JDiWwbUAocJ/YSGgkKGiwg==', 'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?delete', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:51:36 [DEBUG] Event request-created.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Event choose-signer.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Event choose-signer.s3.DeleteObjects: calling handler 10:51:36 [DEBUG] Event before-sign.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Calculating signature using v4 auth. 10:51:36 [DEBUG] CanonicalRequest: POST /2f7a6bad-44d7-4e32-9e8c-beedde077ede delete= content-md5:JDiWwbUAocJ/YSGgkKGiwg== host:172.26.160.16:8084 x-amz-content-sha256:1d43bae5348512c9fa34daf1de03bd9f4b8e26e0f36659e35ceb252c2bc28fe1 x-amz-date:20230314T105136Z content-md5;host;x-amz-content-sha256;x-amz-date 1d43bae5348512c9fa34daf1de03bd9f4b8e26e0f36659e35ceb252c2bc28fe1 10:51:36 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T105136Z 20230314/us-east-1/s3/aws4_request 04ded6df60c3938894cf28db8d02fac68baa8a9881d88a6f1530fadd61158dc0 10:51:36 [DEBUG] Signature: ecac34102c121db77e6631ef214979eff499284b8569cf556ffccc1b073ea310 10:51:36 [DEBUG] Sending http request: 10:51:36 [DEBUG] http://172.26.160.16:8084 "POST /2f7a6bad-44d7-4e32-9e8c-beedde077ede?delete HTTP/1.1" 200 400 10:51:36 [DEBUG] Response headers: {'X-Amz-Request-Id': 'bed61d19-c71f-4a46-8e54-b4fdc23e507a', 'Date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'Content-Length': '400', 'Content-Type': 'text/xml; charset=utf-8'} 10:51:36 [DEBUG] Response body: b'\nBadRequestmark object removal via connection pool: failed to collect relatives: failed to get raw object header: read object header via client: status: code = 2049 message = object not found2cd4cf47-6e02-41cd-8194-a92d2ed00428' 10:51:36 [DEBUG] Event needs-retry.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Not retrying request. 10:51:36 [DEBUG] Event needs-retry.s3.DeleteObjects: calling handler > 10:51:36 [DEBUG] Event after-call.s3.DeleteObjects: calling handler > 10:51:36 [INFO] S3 Delete objects result: {'ResponseMetadata': {'RequestId': 'bed61d19-c71f-4a46-8e54-b4fdc23e507a', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': 'bed61d19-c71f-4a46-8e54-b4fdc23e507a', 'date': 'Tue, 14 Mar 2023 10:52:25 GMT', 'content-length': '400', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}, 'Errors': [{'Key': '2cd4cf47-6e02-41cd-8194-a92d2ed00428', 'Code': 'BadRequest', 'Message': 'mark object removal via connection pool: failed to collect relatives: failed to get raw object header: read object header via client: status: code = 2049 message = object not found'}]} 10:51:41 [DEBUG] Event before-parameter-build.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Event before-parameter-build.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Event before-parameter-build.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Event before-parameter-build.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Event before-parameter-build.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Event before-call.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Event before-call.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Event before-call.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Making request for OperationModel(name=ListObjectVersions) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede?versions', 'query_string': {'encoding-type': 'url'}, 'method': 'GET', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede?versions&encoding-type=url', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'encoding_type_auto_set': True, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:51:41 [DEBUG] Event request-created.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Event choose-signer.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Event choose-signer.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Event before-sign.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Calculating signature using v4 auth. 10:51:41 [DEBUG] CanonicalRequest: GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede encoding-type=url&versions= host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T105141Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:51:41 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T105141Z 20230314/us-east-1/s3/aws4_request 5abd34a346fa1baf6de05877dba751a6008373ff603799b98dae152fe758317a 10:51:41 [DEBUG] Signature: 01dbc2f65c3d353824d8f1d73bd541ad3fa612216238ba26389445a1aea8b335 10:51:41 [DEBUG] Sending http request: 10:51:41 [DEBUG] http://172.26.160.16:8084 "GET /2f7a6bad-44d7-4e32-9e8c-beedde077ede?versions&encoding-type=url HTTP/1.1" 200 267 10:51:41 [DEBUG] Response headers: {'X-Amz-Request-Id': 'ab46a3b5-7dbe-43f0-895e-fac6afd5a8d3', 'Date': 'Tue, 14 Mar 2023 10:52:30 GMT', 'Content-Length': '267', 'Content-Type': 'text/xml; charset=utf-8'} 10:51:41 [DEBUG] Response body: b'\n2f7a6bad-44d7-4e32-9e8c-beedde077edefalse' 10:51:41 [DEBUG] Event needs-retry.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Not retrying request. 10:51:41 [DEBUG] Event needs-retry.s3.ListObjectVersions: calling handler > 10:51:41 [DEBUG] Event after-call.s3.ListObjectVersions: calling handler 10:51:41 [DEBUG] Event after-call.s3.ListObjectVersions: calling handler > 10:51:41 [INFO] S3 List objects delete markers result: {'ResponseMetadata': {'RequestId': 'ab46a3b5-7dbe-43f0-895e-fac6afd5a8d3', 'HostId': '', 'HTTPStatusCode': 200, 'HTTPHeaders': {'x-amz-request-id': 'ab46a3b5-7dbe-43f0-895e-fac6afd5a8d3', 'date': 'Tue, 14 Mar 2023 10:52:30 GMT', 'content-length': '267', 'content-type': 'text/xml; charset=utf-8'}, 'RetryAttempts': 0}, 'IsTruncated': False, 'KeyMarker': '', 'VersionIdMarker': '', 'Name': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'} 10:51:41 [DEBUG] Event before-parameter-build.s3.DeleteBucket: calling handler 10:51:41 [DEBUG] Event before-parameter-build.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Event before-parameter-build.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Event before-parameter-build.s3.DeleteBucket: calling handler 10:51:41 [DEBUG] Event before-call.s3.DeleteBucket: calling handler 10:51:41 [DEBUG] Event before-call.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Event before-call.s3.DeleteBucket: calling handler 10:51:41 [DEBUG] Making request for OperationModel(name=DeleteBucket) with params: {'url_path': '/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'query_string': {}, 'method': 'DELETE', 'headers': {'User-Agent': 'Boto3/1.16.33 Python/3.10.9 Linux/5.4.0-99-generic Botocore/1.19.33'}, 'body': b'', 'url': 'http://172.26.160.16:8084/2f7a6bad-44d7-4e32-9e8c-beedde077ede', 'context': {'client_region': 'us-east-1', 'client_config': , 'has_streaming_input': False, 'auth_type': None, 'signing': {'bucket': '2f7a6bad-44d7-4e32-9e8c-beedde077ede'}}} 10:51:41 [DEBUG] Event request-created.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Event choose-signer.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Event choose-signer.s3.DeleteBucket: calling handler 10:51:41 [DEBUG] Event before-sign.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Calculating signature using v4 auth. 10:51:41 [DEBUG] CanonicalRequest: DELETE /2f7a6bad-44d7-4e32-9e8c-beedde077ede host:172.26.160.16:8084 x-amz-content-sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 x-amz-date:20230314T105141Z host;x-amz-content-sha256;x-amz-date e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 10:51:41 [DEBUG] StringToSign: AWS4-HMAC-SHA256 20230314T105141Z 20230314/us-east-1/s3/aws4_request c325e58b8dda8b4a34c654b69277eea4685edd58b9a8117658cc9a1dc374a45b 10:51:41 [DEBUG] Signature: 49f6e0e3e70fa7ac09aa91b92d02ced1d1d33f84e706243231b6a3b92f29dec9 10:51:41 [DEBUG] Sending http request: 10:51:41 [DEBUG] http://172.26.160.16:8084 "DELETE /2f7a6bad-44d7-4e32-9e8c-beedde077ede HTTP/1.1" 409 374 10:51:41 [DEBUG] Response headers: {'Accept-Ranges': 'bytes', 'Content-Length': '374', 'Content-Type': 'application/xml', 'Server': 'FrostFS-S3-GW/v0.0.1-78-g0af06c3b', 'X-Amz-Request-Id': 'fe8534f3-d2ba-4e2e-b97d-038373470f21', 'Date': 'Tue, 14 Mar 2023 10:52:30 GMT'} 10:51:41 [DEBUG] Response body: b'\nBucketNotEmptyThe bucket you tried to delete is not empty2f7a6bad-44d7-4e32-9e8c-beedde077ede/2f7a6bad-44d7-4e32-9e8c-beedde077edefe8534f3-d2ba-4e2e-b97d-038373470f2199f44a1b-458f-4ba0-be50-44d36127afe6' 10:51:41 [DEBUG] Event needs-retry.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Not retrying request. 10:51:41 [DEBUG] Event needs-retry.s3.DeleteBucket: calling handler > 10:51:41 [DEBUG] Event after-call.s3.DeleteBucket: calling handler > 10:51:41 [INFO] S3 Delete bucket error: An error occurred (BucketNotEmpty) when calling the DeleteBucket operation: The bucket you tried to delete is not empty 10:51:41 [INFO] Execute command "sudo journalctl --no-pager --since '2023-03-14 10:35:47' --until '2023-03-14 10:51:41'" on "172.26.160.16" 10:51:41 [INFO] Trying to connect to host 172.26.160.16 as service using password (attempt 0) 10:51:41 [DEBUG] starting thread (client mode): 0x87125690 10:51:41 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:41 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:41 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:41 [DEBUG] === Key exchange possibilities === 10:51:41 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:41 [DEBUG] server key: ssh-ed25519 10:51:41 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:41 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:41 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:41 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:41 [DEBUG] client compress: none, zlib@openssh.com 10:51:41 [DEBUG] server compress: none, zlib@openssh.com 10:51:41 [DEBUG] client lang: 10:51:41 [DEBUG] server lang: 10:51:41 [DEBUG] kex follows: False 10:51:41 [DEBUG] === Key exchange agreements === 10:51:41 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:41 [DEBUG] HostKey: ssh-ed25519 10:51:41 [DEBUG] Cipher: aes128-ctr 10:51:41 [DEBUG] MAC: hmac-sha2-256 10:51:41 [DEBUG] Compression: none 10:51:41 [DEBUG] === End of kex handshake === 10:51:41 [DEBUG] Got server p (3072 bits) 10:51:41 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:41 [DEBUG] Switch to new keys ... 10:51:41 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.16]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:41 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:41 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:41 [DEBUG] userauth is OK 10:51:41 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:41 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:41 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:41 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:41 [INFO] Authentication (publickey) successful! 10:51:41 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:41 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:41 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:41 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:41 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:41 [DEBUG] Secsh channel 0 opened. 10:51:41 [DEBUG] [chan 0] Sesch channel 0 request ok 10:51:59 [DEBUG] [chan 0] EOF received (0) 10:51:59 [DEBUG] [chan 0] EOF sent (0) 10:51:59 [INFO] Execute command "sudo journalctl --no-pager --since '2023-03-14 10:35:47' --until '2023-03-14 10:51:41'" on "172.26.160.247" 10:51:59 [INFO] Trying to connect to host 172.26.160.247 as service using password (attempt 0) 10:51:59 [DEBUG] starting thread (client mode): 0x486706d0 10:51:59 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:51:59 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:51:59 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:51:59 [DEBUG] === Key exchange possibilities === 10:51:59 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:51:59 [DEBUG] server key: ssh-ed25519 10:51:59 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:59 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:51:59 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:59 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:51:59 [DEBUG] client compress: none, zlib@openssh.com 10:51:59 [DEBUG] server compress: none, zlib@openssh.com 10:51:59 [DEBUG] client lang: 10:51:59 [DEBUG] server lang: 10:51:59 [DEBUG] kex follows: False 10:51:59 [DEBUG] === Key exchange agreements === 10:51:59 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:51:59 [DEBUG] HostKey: ssh-ed25519 10:51:59 [DEBUG] Cipher: aes128-ctr 10:51:59 [DEBUG] MAC: hmac-sha2-256 10:51:59 [DEBUG] Compression: none 10:51:59 [DEBUG] === End of kex handshake === 10:51:59 [DEBUG] Got server p (3072 bits) 10:51:59 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:51:59 [DEBUG] Switch to new keys ... 10:51:59 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:51:59 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.247]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:51:59 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:51:59 [DEBUG] userauth is OK 10:51:59 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:51:59 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:51:59 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:51:59 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:51:59 [INFO] Authentication (publickey) successful! 10:51:59 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:51:59 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:51:59 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:51:59 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:51:59 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:51:59 [DEBUG] Secsh channel 0 opened. 10:51:59 [DEBUG] [chan 0] Sesch channel 0 request ok 10:52:16 [DEBUG] [chan 0] EOF received (0) 10:52:16 [DEBUG] [chan 0] EOF sent (0) 10:52:17 [INFO] Execute command "sudo journalctl --no-pager --since '2023-03-14 10:35:47' --until '2023-03-14 10:51:41'" on "172.26.160.29" 10:52:17 [INFO] Trying to connect to host 172.26.160.29 as service using password (attempt 0) 10:52:17 [DEBUG] starting thread (client mode): 0x6c1d7940 10:52:17 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:52:17 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:52:17 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:52:17 [DEBUG] === Key exchange possibilities === 10:52:17 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:52:17 [DEBUG] server key: ssh-ed25519 10:52:17 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:52:17 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:52:17 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:52:17 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:52:17 [DEBUG] client compress: none, zlib@openssh.com 10:52:17 [DEBUG] server compress: none, zlib@openssh.com 10:52:17 [DEBUG] client lang: 10:52:17 [DEBUG] server lang: 10:52:17 [DEBUG] kex follows: False 10:52:17 [DEBUG] === Key exchange agreements === 10:52:17 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:52:17 [DEBUG] HostKey: ssh-ed25519 10:52:17 [DEBUG] Cipher: aes128-ctr 10:52:17 [DEBUG] MAC: hmac-sha2-256 10:52:17 [DEBUG] Compression: none 10:52:17 [DEBUG] === End of kex handshake === 10:52:17 [DEBUG] Got server p (3072 bits) 10:52:17 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:52:17 [DEBUG] Switch to new keys ... 10:52:17 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.29]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:52:17 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:52:17 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:52:17 [DEBUG] userauth is OK 10:52:17 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:52:17 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:52:17 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:52:17 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:52:17 [INFO] Authentication (publickey) successful! 10:52:17 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:52:17 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:52:17 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:52:17 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:52:17 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:52:17 [DEBUG] Secsh channel 0 opened. 10:52:17 [DEBUG] [chan 0] Sesch channel 0 request ok 10:52:34 [DEBUG] [chan 0] EOF received (0) 10:52:34 [DEBUG] [chan 0] EOF sent (0) 10:52:34 [INFO] Execute command "sudo journalctl --no-pager --since '2023-03-14 10:35:47' --until '2023-03-14 10:51:41'" on "172.26.160.82" 10:52:34 [INFO] Trying to connect to host 172.26.160.82 as service using password (attempt 0) 10:52:34 [DEBUG] starting thread (client mode): 0x48671b70 10:52:34 [DEBUG] Local version/idstring: SSH-2.0-paramiko_3.1.0 10:52:34 [DEBUG] Remote version/idstring: SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u1 10:52:34 [INFO] Connected (version 2.0, client OpenSSH_8.4p1) 10:52:34 [DEBUG] === Key exchange possibilities === 10:52:34 [DEBUG] kex algos: diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 10:52:34 [DEBUG] server key: ssh-ed25519 10:52:34 [DEBUG] client encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:52:34 [DEBUG] server encrypt: aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes128-ctr 10:52:34 [DEBUG] client mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:52:34 [DEBUG] server mac: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, hmac-sha1 10:52:34 [DEBUG] client compress: none, zlib@openssh.com 10:52:34 [DEBUG] server compress: none, zlib@openssh.com 10:52:34 [DEBUG] client lang: 10:52:34 [DEBUG] server lang: 10:52:34 [DEBUG] kex follows: False 10:52:34 [DEBUG] === Key exchange agreements === 10:52:34 [DEBUG] Kex: diffie-hellman-group-exchange-sha256 10:52:34 [DEBUG] HostKey: ssh-ed25519 10:52:34 [DEBUG] Cipher: aes128-ctr 10:52:34 [DEBUG] MAC: hmac-sha2-256 10:52:34 [DEBUG] Compression: none 10:52:34 [DEBUG] === End of kex handshake === 10:52:34 [DEBUG] Got server p (3072 bits) 10:52:35 [DEBUG] kex engine KexGexSHA256 specified hash_algo 10:52:35 [DEBUG] Switch to new keys ... 10:52:35 [DEBUG] Adding ssh-ed25519 host key for [172.26.160.82]:22: b'1680eb4c7ace03449479b3e968f8de82' 10:52:35 [DEBUG] Got EXT_INFO: {'server-sig-algs': b'ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com'} 10:52:35 [DEBUG] Trying discovered key b'e655277ebbff1f5d0c36a2528a573872' in /root/.ssh/id_rsa 10:52:35 [DEBUG] userauth is OK 10:52:35 [DEBUG] Finalizing pubkey algorithm for key of type 'ssh-rsa' 10:52:35 [DEBUG] Our pubkey algorithm list: ['rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 10:52:35 [DEBUG] Server-side algorithm list: ['ssh-ed25519', 'sk-ssh-ed25519@openssh.com', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512', 'ssh-dss', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'sk-ecdsa-sha2-nistp256@openssh.com', 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com'] 10:52:35 [DEBUG] Agreed upon 'rsa-sha2-512' pubkey algorithm 10:52:35 [INFO] Authentication (publickey) successful! 10:52:35 [DEBUG] [chan 0] Max packet in: 32768 bytes 10:52:35 [DEBUG] Received global request "hostkeys-00@openssh.com" 10:52:35 [DEBUG] Rejecting "hostkeys-00@openssh.com" global request from server. 10:52:35 [DEBUG] Debug msg: b'/home/service/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding' 10:52:35 [DEBUG] [chan 0] Max packet out: 32768 bytes 10:52:35 [DEBUG] Secsh channel 0 opened. 10:52:35 [DEBUG] [chan 0] Sesch channel 0 request ok 10:52:49 [DEBUG] [chan 0] EOF received (0) 10:52:49 [DEBUG] [chan 0] EOF sent (0)