Running lsw-postinstall scripts ==> Running /opt/lsw-postinstall.d/01-rename-interface + echo 'Fix /etc/netplan/01-netcfg.yaml on first boot' Fix /etc/netplan/01-netcfg.yaml on first boot + uname -a Linux s10817424 5.15.0-117-generic #127-Ubuntu SMP Fri Jul 5 20:13:28 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux + date Thu Aug 1 08:54:57 AM UTC 2024 ++ ip -o -4 link ++ grep -i 20:67:7C:F0:3D:FC ++ awk '{print $2}' ++ tr -d : + sed -i -e s#eno1#eno1# /etc/netplan/01-netcfg.yaml + '[' '!' -z eno2 ']' ++ ip -o -4 link ++ grep -i 20:67:7C:F0:3D:FD ++ awk '{print $2}' ++ tr -d : + sed -i -e s#eno2#eno2# /etc/netplan/01-netcfg.yaml + netplan apply ** (generate:2773): WARNING **: 08:54:57.775: Permissions for /etc/netplan/01-netcfg.yaml are too open. Netplan configuration should NOT be accessible by others. WARNING:root:Cannot call Open vSwitch: ovsdb-server.service is not running. ** (process:2770): WARNING **: 08:54:58.151: Permissions for /etc/netplan/01-netcfg.yaml are too open. Netplan configuration should NOT be accessible by others. ** (process:2770): WARNING **: 08:54:58.602: Permissions for /etc/netplan/01-netcfg.yaml are too open. Netplan configuration should NOT be accessible by others. ** (process:2770): WARNING **: 08:54:58.603: Permissions for /etc/netplan/01-netcfg.yaml are too open. Netplan configuration should NOT be accessible by others. + sleep 10 + rm -f /opt/lsw-postinstall.d/01-rename-interface ==> Done Running /opt/lsw-postinstall.d/01-rename-interface with exit code 0 ==> Running /opt/lsw-postinstall.d/20-booted-in-os PING mirror.leaseweb.com (5.79.108.33) 56(84) bytes of data. 64 bytes from mirror.ams1.nl.leaseweb.net (5.79.108.33): icmp_seq=1 ttl=61 time=0.249 ms --- mirror.leaseweb.com ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.249/0.249/0.249/0.000 ms We have connectivity! Letting bmp-api know the server booted successfully * Trying 82.192.89.1:443... * Connected to api.leaseweb.com (82.192.89.1) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [4690 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=auth.leaseweb.com * start date: Apr 23 00:00:00 2024 GMT * expire date: Apr 24 23:59:59 2025 GMT * subjectAltName: host "api.leaseweb.com" matched cert's "api.leaseweb.com" * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x564d0ad10eb0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > POST /v1/lswasp/nodes/20:67:7c:f0:3d:fc!CZ291309LX/callback HTTP/2 > Host: api.leaseweb.com > user-agent: curl/7.81.0 > accept: */* > x-lsw-task-uuid: b56c9ac5-29dd-4df5-b266-3c6023e3561b > x-lsw-task-status: FINISHED > x-lsw-task-message: Server booted into installed os. > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: LeaseWeb API Gateway < content-type: text/plain; charset=UTF-8 < cache-control: no-cache, private < date: Thu, 01 Aug 2024 08:55:08 GMT < apigw-correlation-id: d25669d3-689e-471c-bc41-ccf05f287134 < x-envoy-upstream-service-time: 26 < strict-transport-security: max-age=63072000; includeSubdomains; preload < content-security-policy: frame-ancestors 'none' < x-content-type-options: nosniff < x-power-by: LeaseWeb API Gateway < { [2 bytes data] * Connection #0 to host api.leaseweb.com left intact okDone ==> Done Running /opt/lsw-postinstall.d/20-booted-in-os with exit code 0 All done!