HCK > WindowsFilteringPlatform_Tests > SupportPowerManagedStates fails with "HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]" - driver-signing

We have a callout driver that we want to get signed by Microsoft. We were able to run the HLK tests successfully on Windows 10 and Windows 11. But when we run HCK test on Windows 8.1 & 7 client, in "WindowsFilteringPlatform_Tests > REQ - WFP-based products must ensure network connectivity upon recovering from power managed states -> SupportPowerManagedStates" test, many tests failed with "HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]" with a few successes in between.
The relevant info is listed below:
==============================================
Context Index: 384048256
Current: WTTLOG
Parent: ROOT
[Enable Driver Verifier: TRUE]
[Use Answer File: TRUE]
[Has a callout driver: TRUE]
[Is a firewall: FALSE]
[Layered on Microsoft Windows Firewall: FALSE]
[Does MAC Filtering: FALSE]
[Does Virtual Switch Filtering: FALSE]
[Does Packet Injection: TRUE]
[Does Stream Injection: FALSE]
[Does Proxying: TRUE]
[Supports Modern Applications: TRUE]
[Uninstalls cleanly: TRUE]
[Proxies without deadlocking: TRUE]
[Has an identifying Provider: TRUE]
[Associates Provider with all objects: TRUE]
[Has at least 1 filter: TRUE]
[Uses only built-in or their own private SubLayer: TRUE]
[Has an NDF Helper Class: TRUE]
[Does not AV: TRUE]
[Does not alter other's WFP Objects: TRUE]
[Injects without deadlocking: TRUE]
[Injects at STREAM without starvation: TRUE]
[Supports Power Managed States: TRUE]
[ACLs objects so other's can enum them: TRUE]
[Uses latest WinSock specifications: TRUE]
[Properly disabled Windows Firewall: TRUE]
[Uses granular filtering: TRUE]
[Can filter by 5 tuples: TRUE]
[Can filter by application name: TRUE]
[Can filter by Physical Addresses: TRUE]
[Uses WFP for filtering and packet maniplulation: TRUE]
[Supports IPv4 Address Resolution - ARP: TRUE]
[Supports IPv6 Address Resolution - Neighbor Discovery: TRUE]
[Supports Dynamic IP Addressing: TRUE]
[Supports IPv4: TRUE]
[Supports IPv6: TRUE]
[Supports Name Resolution: TRUE]
[Supports 6TO4: TRUE]
[Supports Automatic Updates: TRUE]
[Supports Basic Website Browsing: TRUE]
[Supports File and Printer Sharing: TRUE]
[Supports ICMP Error Messages: TRUE]
[Supports Internet Streaming: TRUE]
[Supports Media Extender Streaming: TRUE]
[Supports MobileBroadband: TRUE]
[Supports Peer Name Resolution Protocol: TRUE]
[Supports Remote Assistance: TRUE]
[Supports Remote Desktop: TRUE]
[Supports Teredo: TRUE]
[Supports Virtual Private Networking: TRUE]
[Interops with other Virtual Switch Extensions: TRUE]
[Does not modify at Egress: TRUE]
[Supports Live Migration: TRUE]
[Supports Removal of Virtual Switch Extensions: TRUE]
[Supports Reordering of Virtual Switch Extension: TRUE]
[Performed interop testing with the WFPSampler TRUE]
Message 10/12/2022 2:50:54.461 PM [Configuration Timer: 15 seconds]
[Number of Packet Injection Commands: 0]
Runtime 10/12/2022 2:50:55.180 PM _
Runtime Index: 2546921180
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 4752
Message 10/12/2022 2:50:56.180 PM
Context _ _
Context Index: 1944523683
Current: ArchitecturalDesign\SupportPowerManagedStates
Parent: WTTLOG
Start Test 10/12/2022 2:50:57.180 PM ArchitecturalDesign\SupportPowerManagedStates
Message 10/12/2022 2:50:57.180 PM Priority: 0, Owner: WFP#Microsoft.com
Message 10/12/2022 2:50:59.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add Rule Name="WFPLogo" Description="Permit Outbound IPv4 with Power States" Dir=Out Action=allow Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=6 Enable=Yes Profile=Any"
Message 10/12/2022 2:51:14.180 PM +VAR+INFO+ 0 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT]
Message 10/12/2022 2:52:49.180 PM LocalTCP::SocketBind : bind() [Local Bound Address: 1.0.0.1][Local Bound Port: 0xa59c] [status: 0]
Runtime 10/12/2022 2:52:45.250 PM _
Runtime Index: 3287206800
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 4140
Message 10/12/2022 2:54:40.250 PM VirtualTCP::AnalyzePacket() [IP Version: 0x4][IP Protocol: 0x6][Source Address: 0x1000001][DestinationAddress: 0x10000fe][Source Port: 0xa59c][Destination Port:0xbdb1]
Message 10/12/2022 2:52:50.180 PM LocalTCP::SocketConnect : connect() [status: 0]
Message 10/12/2022 2:54:40.250 PM VirtualTCP::RxPackets() : Exit
Message 10/12/2022 2:52:50.180 PM LocalTCP::SocketSend : send() [bytes sent: 1000] [status: 0]
Runtime 10/12/2022 2:52:45.656 PM _
Runtime Index: 4000363241
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 3660
Message 10/12/2022 2:54:41.656 PM VirtualTCP::AnalyzePacket() [IP Version: 0x4][IP Protocol: 0x6][Source Address: 0x1000001][DestinationAddress: 0x10000fe][Source Port: 0xa59c][Destination Port:0xbdb1]
Message 10/12/2022 2:54:41.656 PM VirtualTCP::RxPackets() : Exit
Message 10/12/2022 2:52:51.180 PM LocalTCP::SocketSend : send() [status: 0]
Message 10/12/2022 2:52:51.180 PM AnalyzeTrafficResults() [Analysis: Permitted][local Error: 0][peer Error: 0][packet(s) Rx'd: Yes][packet(s) Tx'd: Yes]
Message 10/12/2022 2:52:51.180 PM LocalTCP::SocketSetOptions() [Option Level: 0xffff][Option Name: 0xffffff7f][Option Length: 0x4]
Message 10/12/2022 2:52:51.180 PM LocalTCP::SocketShutdown : shutdown() [status: 0]
Runtime 10/12/2022 2:52:46.203 PM _
Runtime Index: 577400067
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 1768
Message 10/12/2022 2:54:42.203 PM VirtualTCP::AnalyzePacket() [IP Version: 0x4][IP Protocol: 0x6][Source Address: 0x1000001][DestinationAddress: 0x10000fe][Source Port: 0xa59c][Destination Port:0xbdb1]
Message 10/12/2022 2:54:42.203 PM VirtualTCP::RxPackets() : Exit
Message 10/12/2022 2:52:51.180 PM LocalTCP::SocketSetOptions() [Option Level: 0xffff][Option Name: 0x80][Option Length: 0x4]
Message 10/12/2022 2:52:51.180 PM LocalTCP::SocketClose : closesocket() [status: 0]
Runtime 10/12/2022 2:53:12.085 PM _
Runtime Index: 1513411261
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 3624
Context _ _
Context Index: 4136458679
Current: +SUB_VAR+ 1 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
Parent: WTTLOG
**Start Test 10/12/2022 2:55:34.085 PM +SUB_VAR+ 1 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
End Test 10/12/2022 2:55:34.085 PM +SUB_VAR+ 1 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
Result: Fail**
Context _ _
Context Index: 1296590021
Current: +SUB_VAR+ 2 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT] PowerStates [status:0][IPv4][Outbound][From: 1.0.0.1][To: 1.0.0.254][PERMIT]
Parent: ArchitecturalDesign\SupportPowerManagedStates
**Start Test 10/12/2022 2:54:03.180 PM +SUB_VAR+ 2 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT] PowerStates [status:0][IPv4][Outbound][From: 1.0.0.1][To: 1.0.0.254][PERMIT]
End Test 10/12/2022 2:54:03.180 PM +SUB_VAR+ 2 : [IPVersion: IPv4][Direction: Outbound][Protocol: TCP (6)][Source / Local Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local Port: 42396][Destination / Remote Port: 48561][Action: PERMIT] PowerStates [status:0][IPv4][Outbound][From: 1.0.0.1][To: 1.0.0.254][PERMIT]
Result: Pass**
Message 10/12/2022 2:54:05.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo" Dir=Out Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=6 Profile=Any"
Message 10/12/2022 2:54:21.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add Rule Name="WFPLogo" Description="Permit Inbound IPv4 with Power States" Dir=In Action=allow Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=17 Enable=Yes Profile=Any"
Message 10/12/2022 2:54:36.180 PM +VAR+INFO+ 1 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT]
Message 10/12/2022 2:56:34.180 PM LocalRawUDP::SocketBind : bind() [Local Bound Address: 1.0.0.1][Local Bound Port: 0xb055] [status: 0]
Message 10/12/2022 2:56:35.180 PM LocalRawUDP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
Message 10/12/2022 2:56:35.180 PM [IPv4][ipProtocol: 17][ipHeaderLength: 20][totalLength: 1028][sourceAddress: 0x10000fe][destinationAddress: 0x1000001]
Message 10/12/2022 2:56:35.180 PM [sourcePort: 0xa742][destinationPort: 0xb055]
Message 10/12/2022 2:56:35.180 PM IsExpectedDataBuffer() [pBuffer: 0X00000041EF167BF0][size: 1028][isExpected: TRUE]
Message 10/12/2022 2:56:36.180 PM LocalRawUDP::SocketRecv : recv() [bytes received: 1028] [status: 0]
Message 10/12/2022 2:56:36.180 PM LocalRawUDP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
Message 10/12/2022 2:56:36.180 PM AnalyzeTrafficResults() [Analysis: Permitted][local Error: 0][peer Error: 0][packet(s) Rx'd: Yes][packet(s) Tx'd: Yes]
Message 10/12/2022 2:56:36.180 PM LocalRawUDP::SocketClose : closesocket() [status: 0]
Context _ _
Context Index: 2630202630
Current: +SUB_VAR+ 1 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
Parent: WTTLOG
**Start Test 10/12/2022 2:59:15.085 PM +SUB_VAR+ 1 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
End Test 10/12/2022 2:59:15.085 PM +SUB_VAR+ 1 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
Result: Fail**
Context _ _
Context Index: 2825241481
Current: +SUB_VAR+ 2 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT] PowerStates [status:0][IPv4][Inbound][From: 1.0.0.254][To: 1.0.0.1][PERMIT]
Parent: ArchitecturalDesign\SupportPowerManagedStates
**Start Test 10/12/2022 2:57:58.180 PM +SUB_VAR+ 2 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT] PowerStates [status:0][IPv4][Inbound][From: 1.0.0.254][To: 1.0.0.1][PERMIT]
End Test 10/12/2022 2:57:58.180 PM +SUB_VAR+ 2 : [IPVersion: IPv4][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local Address: 1.0.0.1][Source / Remote Port: 42818][Destination / Local Port: 45141][Action: PERMIT] PowerStates [status:0][IPv4][Inbound][From: 1.0.0.254][To: 1.0.0.1][PERMIT]
Result: Pass**
Message 10/12/2022 2:57:59.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo" Dir=In Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=17 Profile=Any"
Message 10/12/2022 2:58:15.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add Rule Name="WFPLogo" Description="Permit Outbound IPv6 with Power States" Dir=Out Action=allow Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::6010:68f4:c68a:795c RemoteIP=fe80::1:0:0:FE Protocol=17 Enable=Yes Profile=Any"
Message 10/12/2022 2:58:30.180 PM +VAR+INFO+ 2 : [IPVersion: IPv6][Direction: Outbound][Protocol: UDP (17)][Source / Local Address: fe80::6010:68f4:c68a:795c][Destination / Remote Address: fe80::1:0:0:FE][Source / Local Port: 43363][Destination / Remote Port: 48605][Action: PERMIT]
Message 10/12/2022 3:00:07.180 PM LocalUDP::SocketBind : bind() [Local Bound Address: fe80::6010:68f4:c68a:795c][Local Bound Port: 0xa963] [status: 0]
Message 10/12/2022 3:00:07.180 PM LocalUDP::SocketSendTo : sendto() [bytes sent: 1000] [status: 0]
Runtime 10/12/2022 2:59:54.077 PM _
Runtime Index: 148845850
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 2452
Message 10/12/2022 3:09:06.077 PM VirtualUDP::AnalyzePacket() [IP Version: 0x6][IP Protocol: 0x11][Source Address: fe80::6010:68f4:c68a:795c][DestinationAddress: fe80::1:0:0:fe][Source Port: 0xa963][Destination Port: 0xbddd]
Message 10/12/2022 3:09:06.077 PM VirtualUDP::RxPackets() : Exit
Message 10/12/2022 3:00:08.180 PM LocalUDP::SocketSendTo : sendto() [bytes sent: 1000] [status: 0]
Runtime 10/12/2022 2:59:54.484 PM _
Runtime Index: 2423474273
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 4668
Message 10/12/2022 3:09:07.484 PM VirtualUDP::AnalyzePacket() [IP Version: 0x6][IP Protocol: 0x11][Source Address: fe80::6010:68f4:c68a:795c][DestinationAddress: fe80::1:0:0:fe][Source Port: 0xa963][Destination Port: 0xbddd]
Message 10/12/2022 3:09:07.484 PM VirtualUDP::RxPackets() : Exit
Message 10/12/2022 3:00:08.180 PM AnalyzeTrafficResults() [Analysis: Permitted][local Error: 0][peer Error: 0][packet(s) Rx'd: Yes][packet(s) Tx'd: Yes]
Message 10/12/2022 3:00:08.180 PM LocalUDP::SocketShutdown : shutdown() [status: 0]
Message 10/12/2022 3:00:08.180 PM LocalUDP::SocketClose : closesocket() [status: 0]
Context _ _
Context Index: 3646449111
Current: +SUB_VAR+ 1 : [IPVersion: IPv6][Direction: Outbound][Protocol: UDP (17)][Source / Local Address: fe80::6010:68f4:c68a:795c][Destination / Remote Address: fe80::1:0:0:FE][Source / Local Port: 43363][Destination / Remote Port: 48605][Action: PERMIT] PowerStates [status:0][IPv6][Outbound][From: fe80::6010:68f4:c68a:795c][To: fe80::1:0:0:FE][PERMIT]
Parent: ArchitecturalDesign\SupportPowerManagedStates
**Start Test 10/12/2022 3:01:28.180 PM +SUB_VAR+ 1 : [IPVersion: IPv6][Direction: Outbound][Protocol: UDP (17)][Source / Local Address: fe80::6010:68f4:c68a:795c][Destination / Remote Address: fe80::1:0:0:FE][Source / Local Port: 43363][Destination / Remote Port: 48605][Action: PERMIT] PowerStates [status:0][IPv6][Outbound][From: fe80::6010:68f4:c68a:795c][To: fe80::1:0:0:FE][PERMIT]
End Test 10/12/2022 3:01:28.180 PM +SUB_VAR+ 1 : [IPVersion: IPv6][Direction: Outbound][Protocol: UDP (17)][Source / Local Address: fe80::6010:68f4:c68a:795c][Destination / Remote Address: fe80::1:0:0:FE][Source / Local Port: 43363][Destination / Remote Port: 48605][Action: PERMIT] PowerStates [status:0][IPv6][Outbound][From: fe80::6010:68f4:c68a:795c][To: fe80::1:0:0:FE][PERMIT]
Result: Pass**
Message 10/12/2022 3:01:29.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo" Dir=Out Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::6010:68f4:c68a:795c RemoteIP=fe80::1:0:0:FE Protocol=17 Profile=Any"
Message 10/12/2022 3:01:45.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add Rule Name="WFPLogo" Description="Permit Inbound IPv6 with Power States" Dir=In Action=allow Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::6010:68f4:c68a:795c RemoteIP=fe80::1:0:0:FE Protocol=6 Enable=Yes Profile=Any"
Message 10/12/2022 3:02:00.180 PM +VAR+INFO+ 3 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT]
Context _ _
Context Index: 208905465
Current: +SUB_VAR+ 1 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
Parent: WTTLOG
**Start Test 10/12/2022 3:04:26.085 PM +SUB_VAR+ 1 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
End Test 10/12/2022 3:04:26.085 PM +SUB_VAR+ 1 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT] HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]
Result: Fail**
Message 10/12/2022 3:03:38.180 PM LocalTCP::SocketBind : bind() [Local Bound Address: fe80::6010:68f4:c68a:795c][Local Bound Port: 0xbc90] [status: 0]
Message 10/12/2022 3:03:38.180 PM LocalTCP::SocketListen : listen() [status: 0]
Message 10/12/2022 3:03:38.180 PM LocalTCP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
Runtime 10/12/2022 3:03:20.766 PM _
Runtime Index: 3303498572
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 5164
Message 10/12/2022 3:16:03.766 PM VirtualTCP::AnalyzePacket() [IP Version: 0x6][IP Protocol: 0x6][Source Address: fe80::6010:68f4:c68a:795c][DestinationAddress: fe80::1:0:0:fe][Source Port: 0xbc90][Destination Port: 0xacc3]
Message 10/12/2022 3:03:38.180 PM LocalTCP::SocketAccept : accept() [status: 0]
Message 10/12/2022 3:03:38.180 PM LocalTCP::SocketSetToNonBlocking : ioctlsocket() [status: 0x2726]
Message 10/12/2022 3:03:38.180 PM LocalTCP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
Message 10/12/2022 3:03:39.180 PM IsExpectedDataBuffer() [pBuffer: 0X00000041EF17EF60][size: 1000][isExpected: TRUE]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketRecv : recv() [bytes received: 1000] [status: 0]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketSetToNonBlocking : ioctlsocket() [status: 0x2726]
Message 10/12/2022 3:03:40.180 PM AnalyzeTrafficResults() [Analysis: Permitted][local Error: 0][peer Error: 0][packet(s) Rx'd: Yes][packet(s) Tx'd: Yes]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketSetOptions() [Option Level: 0xffff][Option Name: 0xffffff7f][Option Length: 0x4]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketShutdown : shutdown() [status: 0]
Runtime 10/12/2022 3:03:22.688 PM _
Runtime Index: 2441991038
Machine: ADMIN
Process Name: C:\Windows\System32\WFPLogo.Exe
Process ID: 4120
Thread ID: 2772
Message 10/12/2022 3:16:07.688 PM VirtualTCP::AnalyzePacket() [IP Version: 0x6][IP Protocol: 0x6][Source Address: fe80::6010:68f4:c68a:795c][DestinationAddress: fe80::1:0:0:fe][Source Port: 0xbc90][Destination Port: 0xacc3]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketShutdown : shutdown() [status: 0x2749]
Message 10/12/2022 3:16:07.688 PM VirtualTCP::RxPackets() : Exit
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketSetOptions() [Option Level: 0xffff][Option Name: 0x80][Option Length: 0x4]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketClose : closesocket() [status: 0]
Message 10/12/2022 3:03:40.180 PM LocalTCP::SocketSetOptions() [Option Level: 0xffff][Option Name: 0x80][Option Length: 0x4]
Message 10/12/2022 3:03:41.180 PM LocalTCP::SocketClose : closesocket() [status: 0]
Context _ _
Context Index: 1679150077
Current: +SUB_VAR+ 2 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT] PowerStates [status:0][IPv6][Inbound][From: fe80::1:0:0:FE][To: fe80::6010:68f4:c68a:795c][PERMIT]
Parent: ArchitecturalDesign\SupportPowerManagedStates
**Start Test 10/12/2022 3:04:59.180 PM +SUB_VAR+ 2 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT] PowerStates [status:0][IPv6][Inbound][From: fe80::1:0:0:FE][To: fe80::6010:68f4:c68a:795c][PERMIT]
End Test 10/12/2022 3:04:59.180 PM +SUB_VAR+ 2 : [IPVersion: IPv6][Direction: Inbound][Protocol: TCP (6)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local Address: fe80::6010:68f4:c68a:795c][Source / Remote Port: 44227][Destination / Local Port: 48272][Action: PERMIT] PowerStates [status:0][IPv6][Inbound][From: fe80::1:0:0:FE][To: fe80::6010:68f4:c68a:795c][PERMIT]
Result: Pass**
Message 10/12/2022 3:05:00.180 PM Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo" Dir=In Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::6010:68f4:c68a:795c RemoteIP=fe80::1:0:0:FE Protocol=6 Profile=Any"
End Test 10/12/2022 3:05:15.180 PM ArchitecturalDesign\SupportPowerManagedStates
Result: Fail
Message 10/12/2022 3:05:15.180 PM
==============================================
All the "PowerStates" tests passes but all the "HlprNSIGetInterfaceProfile: NsiGetAllParametersEx() [status: 0x103]" tests fails. Couldn't find any relevant information regarding NsiGetAllParametersEx() that could help.
Here is what we have tried so far:
Tried to check prerequisites, couldn't find anything in particular that we are missing.
Tried with/without using Answer File
Tried running test on a different client machine
All the other WFP test cases except for this "SupportPowerManagedStates" were able to pass successfully.
Any help or direction would be appreciated.

Related

Can't able to create a room in ejabberd through REST API

I'm trying to create a room in ejabberd with REST API.
I'm using /create_room API to create room as mentioned in the documentation.
When I tried to hit the API, I receive the response as 0 which means success (as mentioned in the documentation).
When I checked the list of rooms in Pidgin or in Admin interface, I didn't see any new rooms created.
When I try to delete the room with destroy_room API, It says, Room not available.
Data I send with create_room API:
{
"name": "room1",
"service": "conference.localhost",
"host": "localhost"
}
My ejabberd.yml file:
###
### ejabberd configuration file
###
### The parameters used in this configuration file are explained at
###
### https://docs.ejabberd.im/admin/configuration
###
### The configuration file is written in YAML.
### *******************************************************
### ******* !!! WARNING !!! *******
### ******* YAML IS INDENTATION SENSITIVE *******
### ******* MAKE SURE YOU INDENT SECTIONS CORRECTLY *******
### *******************************************************
### Refer to http://en.wikipedia.org/wiki/YAML for the brief description.
###
hosts:
- localhost
loglevel: 4
log_rotate_size: 10485760
log_rotate_date: ""
log_rotate_count: 1
log_rate_limit: 100
certfiles:
- /home/ejabberd/conf/server.pem
ca_file: "/home/ejabberd/conf/cacert.pem"
## When using let's encrypt to generate certificates
##certfiles:
## - /etc/letsencrypt/live/localhost/fullchain.pem
## - /etc/letsencrypt/live/localhost/privkey.pem
##
##ca_file: "/etc/letsencrypt/live/localhost/fullchain.pem"
listen:
-
port: 5222
ip: "::"
module: ejabberd_c2s
max_stanza_size: 262144
shaper: c2s_shaper
access: c2s
starttls_required: true
-
port: 5269
ip: "::"
module: ejabberd_s2s_in
max_stanza_size: 524288
-
port: 5443
ip: "::"
module: ejabberd_http
tls: false
request_handlers:
"/admin": ejabberd_web_admin
"/api": mod_http_api
"/bosh": mod_bosh
"/captcha": ejabberd_captcha
"/upload": mod_http_upload
"/ws": ejabberd_http_ws
"/oauth": ejabberd_oauth
-
port: 5280
ip: "::"
module: ejabberd_http
request_handlers:
"/admin": ejabberd_web_admin
-
port: 5281
module: ejabberd_http
ip: 127.0.0.1
request_handlers:
/api: mod_http_api
-
port: 1883
ip: "::"
module: mod_mqtt
backlog: 1000
##
## https://docs.ejabberd.im/admin/configuration/#stun-and-turn
## ejabberd_stun: Handles STUN Binding requests
##
##-
## port: 3478
## ip: "0.0.0.0"
## transport: udp
## module: ejabberd_stun
## use_turn: true
## turn_ip: "{{ IP }}"
## auth_type: user
## auth_realm: "example.com"
##-
## port: 3478
## ip: "0.0.0.0"
## module: ejabberd_stun
## use_turn: true
## turn_ip: "{{ IP }}"
## auth_type: user
## auth_realm: "example.com"
##-
## port: 5349
## ip: "0.0.0.0"
## module: ejabberd_stun
## certfile: "/home/ejabberd/conf/server.pem"
## tls: true
## use_turn: true
## turn_ip: "{{ IP }}"
## auth_type: user
## auth_realm: "example.com"
##
## https://docs.ejabberd.im/admin/configuration/#sip
## To handle SIP (VOIP) requests:
##
##-
## port: 5060
## ip: "0.0.0.0"
## transport: udp
## module: ejabberd_sip
##-
## port: 5060
## ip: "0.0.0.0"
## module: ejabberd_sip
##-
## port: 5061
## ip: "0.0.0.0"
## module: ejabberd_sip
## tls: true
s2s_use_starttls: optional
acl:
local:
user_regexp: ""
loopback:
ip:
- 127.0.0.0/8
- ::1/128
- ::FFFF:127.0.0.1/128
admin:
user:
- "admin#localhost"
apicommands:
user:
- "admin#localhost"
access_rules:
local:
allow: local
c2s:
deny: blocked
allow: all
announce:
allow: admin
configure:
allow: admin
muc_create:
allow: local
pubsub_createnode:
allow: local
trusted_network:
allow: loopback
api_permissions:
"API used from localhost allows all calls":
who:
ip: 127.0.0.1/8
what:
- "*"
- "!stop"
- "!start"
"console commands":
from:
- ejabberd_ctl
who: all
what: "*"
"admin access":
who:
access:
allow:
acl: loopback
acl: admin
oauth:
scope: "ejabberd:admin"
access:
allow:
acl: loopback
acl: admin
what:
- "*"
- "!stop"
- "!start"
"public commands":
who:
ip: 127.0.0.1/8
what:
- status
- connected_users_number
"some playing":
from:
- ejabberd_ctl
- mod_http_api
who:
acl: apicommands
what: "*"
shaper:
normal: 1000
fast: 50000
shaper_rules:
max_user_sessions: 10
max_user_offline_messages:
5000: admin
100: all
c2s_shaper:
none: admin
normal: all
s2s_shaper: fast
max_fsm_queue: 10000
acme:
contact: "mailto:example-admin#example.com"
ca_url: "https://acme-staging-v02.api.letsencrypt.org/directory"
modules:
mod_adhoc: {}
mod_admin_extra: {}
mod_announce:
access: announce
mod_avatar: {}
mod_blocking: {}
mod_bosh: {}
mod_caps: {}
mod_carboncopy: {}
mod_client_state: {}
mod_configure: {}
mod_disco: {}
mod_fail2ban: {}
mod_http_api: {}
mod_http_upload:
put_url: https://#HOST#:5443/upload
mod_last: {}
mod_mam:
## Mnesia is limited to 2GB, better to use an SQL backend
## For small servers SQLite is a good fit and is very easy
## to configure. Uncomment this when you have SQL configured:
## db_type: sql
assume_mam_usage: true
default: never
mod_mqtt: {}
mod_muc:
access:
- allow
access_admin:
- allow: admin
access_create: muc_create
access_persistent: muc_create
access_mam:
- allow
default_room_options:
allow_subscription: true # enable MucSub
mam: false
mod_muc_admin: {}
mod_offline:
access_max_user_messages: max_user_offline_messages
mod_ping: {}
mod_privacy: {}
mod_private: {}
mod_proxy65:
access: local
max_connections: 5
mod_pubsub:
access_createnode: pubsub_createnode
plugins:
- flat
- pep
force_node_config:
## Avoid buggy clients to make their bookmarks public
storage:bookmarks:
access_model: whitelist
mod_push: {}
mod_push_keepalive: {}
mod_register:
## Only accept registration requests from the "trusted"
## network (see access_rules section above).
## Think twice before enabling registration from any
## address. See the Jabber SPAM Manifesto for details:
## https://github.com/ge0rg/jabber-spam-fighting-manifesto
ip_access: trusted_network
mod_roster:
versioning: true
mod_sip: {}
mod_s2s_dialback: {}
mod_shared_roster: {}
mod_stream_mgmt:
resend_on_timeout: if_offline
mod_vcard: {}
mod_vcard_xupdate: {}
mod_version:
show_os: false
### Local Variables:
### mode: yaml
### End:
### vim: set filetype=yaml tabstop=8
I have a configuration similar to yours. I didn't care to set exactly the same, because the problem I imagine is that you create room with default options, that means, a temporary room: if it has no occupants, it is destroyed a few seconds later.
I use this script:
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
import requests
from requests.auth import HTTPBasicAuth
url = "http://localhost:5280/api/create_room"
data = {
"name": "room1",
"service": "conference.localhost",
"host": "localhost"
}
res = requests.post(url, json=data, auth=HTTPBasicAuth("admin#localhost", "asd"))
print(res)
Create the room and check it exists:
$ python3 create-room.py
<Response [200]>
$ ejabberdctl muc_online_rooms conference.localhost
room1#conference.localhost
The ejabberd log file shows the API query, and 30 seconds later the room is destroyed due to inactivity:
2022-07-18 11:53:05.327862+02:00 [info] (<0.1317.0>) Accepted connection [::1]:43856 -> [::1]:5280
2022-07-18 11:53:05.328232+02:00 [info] API call create_room [{<<"name">>,<<"room1">>},
{<<"service">>,<<"conference.localhost">>},
{<<"host">>,<<"localhost">>}] from ::1:43856
2022-07-18 11:53:35.329246+02:00 [info] Destroyed MUC room room1#conference.localhost because it's temporary and empty
2022-07-18 11:53:35.330000+02:00 [info] Stopping MUC room room1#conference.localhost
If you now check the list of online rooms, there is none now:
$ ejabberdctl muc_online_rooms conference.localhost
$
There are three solutions:
A) When creating a room, it's temporary by default, join some occupant before it gets destroyed (30 seconds)
B) Configure in ejabberd.yml that mod_muc rooms newly created are persistent by default:
modules:
mod_muc:
default_room_options:
persistent: true
C) When creating a room, configure it to be persistent:
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
import requests
from requests.auth import HTTPBasicAuth
url = "http://localhost:5280/api/create_room_with_opts"
data = {
"name": "room1",
"service": "conference.localhost",
"host": "localhost",
"options": [{
"name": "persistent",
"value": "true",
}]
}
res = requests.post(url, json=data, auth=HTTPBasicAuth("admin#localhost", "asd"))
print(res)

server closed the stream without sending trailers

I’m trying o communicate from Envoy to Envoy using gRPC for Kubernetes(Amazon EKS).
I have an envoy in my sidecar and I am using grpcurl to validate the request.
The request is delivered to the application container and there are no errors, but the console returns the following results
server closed the stream without sending trailers
I don’t know what the reason for the above problem is, and what could be the reason for this result??
I was able to confirm that the response came back fine when I hit a single service before connecting with envoy.
this my envoy config
admin:
access_log_path: /tmp/admin_access.log
address:
socket_address:
protocol: TCP
address: 127.0.0.1
port_value: 10000
static_resources:
listeners:
- name: listener_secure_grpc
address:
socket_address:
protocol: TCP
address: 0.0.0.0
port_value: 8443
traffic_direction: INBOUND
filter_chains:
- filters:
- name: envoy.http_connection_manager
typed_config:
"#type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager"
codec_type: auto
stat_prefix: ingress_http
route_config:
name: local_route
virtual_hosts:
- name: service_grpc
domains:
- "*"
routes:
- match:
prefix: "/"
route:
cluster: cluster_grpc
max_stream_duration:
grpc_timeout_header_max: 30s
tracing: {}
http_filters:
- name: envoy.filters.http.health_check
typed_config:
"#type": "type.googleapis.com/envoy.extensions.filters.http.health_check.v3.HealthCheck"
pass_through_mode: false
headers:
- name: ":path"
exact_match: "/healthz"
- name: envoy.filters.http.router
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"#type": "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext"
common_tls_context:
tls_certificates:
- certificate_chain:
filename: /etc/ssl/grpc/tls.crt
private_key:
filename: /etc/ssl/grpc/tls.key
- name: listener_stats
address:
socket_address:
protocol: TCP
address: 0.0.0.0
port_value: 10001
traffic_direction: INBOUND
filter_chains:
- filters:
- name: envoy.http_connection_manager
typed_config:
"#type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager"
codec_type: AUTO
stat_prefix: ingress_http
route_config:
virtual_hosts:
- name: backend
domains:
- "*"
routes:
- match:
prefix: /stats
route:
cluster: cluster_admin
http_filters:
- name: envoy.filters.http.router
- name: listener_healthcheck
address:
socket_address:
protocol: TCP
address: 0.0.0.0
port_value: 10010
traffic_direction: INBOUND
filter_chains:
- filters:
- name: envoy.http_connection_manager
typed_config:
"#type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager"
codec_type: AUTO
stat_prefix: ingress_http
route_config: {}
http_filters:
- name: envoy.filters.http.health_check
typed_config:
"#type": "type.googleapis.com/envoy.extensions.filters.http.health_check.v3.HealthCheck"
pass_through_mode: false
headers:
- name: ":path"
exact_match: "/healthz"
- name: envoy.filters.http.router
clusters:
- name: cluster_grpc
connect_timeout: 1s
type: STATIC
http2_protocol_options: {}
upstream_connection_options:
tcp_keepalive: {}
load_assignment:
cluster_name: cluster_grpc
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: 127.0.0.1
port_value: 1443
- name: cluster_admin
connect_timeout: 1s
type: STATIC
load_assignment:
cluster_name: cluster_grpc
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: 127.0.0.1
port_value: 10000
P.S 2021.03.19
Here's what else I found out.
When I request from the ingress host, I get the above failure, but when I request from the service, I get a normal response!

Room creating fail when using Ejabberd REST API

When I try to create a MUC room (as described in the official docs) using Postman with the following call:
POST /api/create_room
{
"name": "testRoom",
"service": "conference.xmpp.localhost",
"host": "xmpp.localhost"
}
The server returns 0, but when calling for the second time it returns 1.
The token used has all the scopes and when I call other methods the call succeeds.
mod_muc_admin module is enabled.
EDIT 25 Jul 2020
The configuration i'm using is as follow:
###
### ejabberd configuration file
###
### The parameters used in this configuration file are explained at
###
### https://docs.ejabberd.im/admin/configuration
###
### The configuration file is written in YAML.
### *******************************************************
### ******* !!! WARNING !!! *******
### ******* YAML IS INDENTATION SENSITIVE *******
### ******* MAKE SURE YOU INDENT SECTIONS CORRECTLY *******
### *******************************************************
### Refer to http://en.wikipedia.org/wiki/YAML for the brief description.
###
hosts:
- localhost
- xmpp.localhost
- conference.xmpp.localhost
loglevel: 5
log_rotate_size: 10485760
log_rotate_date: ""
log_rotate_count: 1
log_rate_limit: 100
certfiles:
- /home/ejabberd/conf/server.pem
ca_file: "/home/ejabberd/conf/cacert.pem"
listen:
-
port: 5222
ip: "::"
module: ejabberd_c2s
max_stanza_size: 262144
shaper: c2s_shaper
access: c2s
starttls_required: true
-
port: 5269
ip: "::"
module: ejabberd_s2s_in
max_stanza_size: 524288
-
port: 5443
ip: "::"
module: ejabberd_http
tls: true
request_handlers:
"/admin": ejabberd_web_admin
"/api": mod_http_api
"/bosh": mod_bosh
"/captcha": ejabberd_captcha
"/upload": mod_http_upload
"/ws": ejabberd_http_ws
"/oauth": ejabberd_oauth
-
port: 5280
ip: "::"
module: ejabberd_http
request_handlers:
"/admin": ejabberd_web_admin
-
port: 1883
ip: "::"
module: mod_mqtt
backlog: 1000
s2s_use_starttls: optional
acl:
local:
user_regexp: ""
loopback:
ip:
- 127.0.0.0/8
- ::1/128
- ::FFFF:127.0.0.1/128
admin:
user:
- "admin#localhost"
- "admin#xmpp.localhost"
access_rules:
local:
allow: local
c2s:
deny: blocked
allow: all
announce:
allow: admin
configure:
allow: admin
muc_create:
allow: local
pubsub_createnode:
allow: local
trusted_network:
allow: loopback
api_permissions:
"console commands":
from:
- ejabberd_ctl
who: all
what: "*"
"admin access":
who:
access:
allow:
acl: loopback
acl: admin
oauth:
scope: "ejabberd:admin"
access:
allow:
acl: admin
what:
- "*"
- "!stop"
- "!start"
"public commands":
who:
ip: 127.0.0.1/8
what:
- status
- connected_users_number
shaper:
normal: 1000
fast: 50000
shaper_rules:
max_user_sessions: 10
max_user_offline_messages:
5000: admin
100: all
c2s_shaper:
none: admin
normal: all
s2s_shaper: fast
max_fsm_queue: 10000
acme:
contact: "mailto:example-admin#example.com"
ca_url: "https://acme-v01.api.letsencrypt.org"
sql_type: pgsql
sql_server: "postgres"
sql_database: "ejabberd"
sql_username: "ejabberd"
sql_password: "*************"
auth_method: sql
auth_password_format: scram
default_db: sql
commands_admin_access: configure
commands:
- add_commands:
- user
oauth_expire: 3600
oauth_access: all
modules:
mod_adhoc: {}
mod_admin_extra: {}
mod_announce:
access: announce
mod_avatar: {}
mod_blocking: {}
mod_bosh: {}
mod_caps: {}
mod_carboncopy: {}
mod_client_state: {}
mod_configure: {}
mod_disco: {}
mod_fail2ban: {}
mod_http_api: {}
mod_http_upload:
put_url: https://#HOST#:5443/upload
mod_last: {}
mod_mam:
compress_xml: true
db_type: sql
assume_mam_usage: true
default: always
mod_mqtt: {}
mod_muc:
access:
- allow
access_admin:
- allow: admin
access_create: muc_create
access_persistent: muc_create
access_mam:
- allow
default_room_options:
allow_subscription: true # enable MucSub
allow_private_messages: false
allow_user_invites: true
mam: true
persistent: true
mod_muc_admin: {}
mod_offline:
access_max_user_messages: max_user_offline_messages
mod_ping: {}
mod_privacy: {}
mod_private: {}
mod_proxy65:
access: local
max_connections: 5
mod_pubsub:
access_createnode: pubsub_createnode
plugins:
- flat
- pep
force_node_config:
## Avoid buggy clients to make their bookmarks public
storage:bookmarks:
access_model: whitelist
mod_push: {}
mod_push_keepalive: {}
mod_register:
## Only accept registration requests from the "trusted"
## network (see access_rules section above).
## Think twice before enabling registration from any
## address. See the Jabber SPAM Manifesto for details:
## https://github.com/ge0rg/jabber-spam-fighting-manifesto
ip_access: trusted_network
mod_roster:
versioning: true
mod_sip: {}
mod_s2s_dialback: {}
mod_shared_roster: {}
mod_stream_mgmt:
resend_on_timeout: if_offline
mod_vcard: {}
mod_vcard_xupdate: {}
mod_version:
show_os: false
### Local Variables:
### mode: yaml
### End:
### vim: set filetype=yaml tabstop=8
That was the expected behavior. According to the docs:
Result:
res :: integer : Status code (0 on success, 1 otherwise)
0 stand for success and 1 stand for failure, not the opposite.

SERVICE UNAVAILABLE - No raft leader when trying to create channel in Hyperledger fabric setup in Kubernetes

Start_orderer.sh file:
#edit *values.yaml file to be used with helm chart and deploy orderer through it
consensus_type=etcdraft
#change below instantiated variable for changing configuration of persistent volume sizes
persistence_status=true
persistent_volume_size=2Gi
while getopts "i:o:O:d:" c
do
case $c in
i) network_id=$OPTARG ;;
o) number=$OPTARG ;;
O) org_name=$OPTARG ;;
d) domain=$OPTARG ;;
esac
done
network_path=/etc/zeeve/fabric/${network_id}
source status.sh
cp ../yaml-files/orderer.yaml $network_path/yaml-files/orderer-${number}${org_name}_values.yaml
sed -i "s/persistence_status/$persistence_status/; s/persistent_volume_size/$persistent_volume_size/; s/consensus_type/$consensus_type/; s/number/$number/g; s/org_name/${org_name}/; s/domain/$domain/; " $network_path/yaml-files/orderer-${number}${org_name}_values.yaml
helm install orderer-${number}${org_name} --namespace blockchain-${org_name} -f $network_path/yaml-files/orderer-${number}${org_name}_values.yaml `pwd`/../helm-charts/hlf-ord
cmd_success $? orderer-${number}${org_name}
#update state of deployed componenet, used for pod level operations like start, stop, restart etc
update_statusfile helm orderer_${number}${org_name} orderer-${number}${org_name}
update_statusfile persistence orderer_${number}${org_name} $persistence_status
Configtx.yaml:
# Copyright IBM Corp. All Rights Reserved.
#
# SPDX-License-Identifier: Apache-2.0
Organizations:
- &Orginvestor
Name: investor
ID: investorMSP
MSPDir: ./crypto-config/investor/msp
AnchorPeers:
- Host: peer1.investor.demointainabs.emulya.com
Port: 443
- &Orgtrustee
Name: trustee
ID: trusteeMSP
MSPDir: ./crypto-config/trustee/msp
AnchorPeers:
- Host: peer1.trustee.demointainabs.emulya.com
Port: 443
- &Orgwhlender
Name: whlender
ID: whlenderMSP
MSPDir: ./crypto-config/whlender/msp
AnchorPeers:
- Host: peer1.whlender.demointainabs.emulya.com
Port: 443
- &Orgservicer
Name: servicer
ID: servicerMSP
MSPDir: ./crypto-config/servicer/msp
AnchorPeers:
- Host: peer1.servicer.demointainabs.emulya.com
Port: 443
- &Orgissuer
Name: issuer
ID: issuerMSP
MSPDir: ./crypto-config/issuer/msp
AnchorPeers:
- Host: peer1.issuer.demointainabs.emulya.com
Port: 443
- &Orgoriginator
Name: originator
ID: originatorMSP
MSPDir: ./crypto-config/originator/msp
AnchorPeers:
- Host: peer1.originator.demointainabs.emulya.com
Port: 443
- &Orginvestor
Name: investor
ID: investorMSP
MSPDir: ./crypto-config/investor/msp
AnchorPeers:
- Host: peer1.investor.intainabs.emulya.com
Port: 443
- &Orgtrustee
Name: trustee
ID: trusteeMSP
MSPDir: ./crypto-config/trustee/msp
AnchorPeers:
- Host: peer1.trustee.intainabs.emulya.com
Port: 443
- &Orgwhlender
Name: whlender
ID: whlenderMSP
MSPDir: ./crypto-config/whlender/msp
AnchorPeers:
- Host: peer1.whlender.intainabs.emulya.com
Port: 443
- &Orgservicer
Name: servicer
ID: servicerMSP
MSPDir: ./crypto-config/servicer/msp
AnchorPeers:
- Host: peer1.servicer.intainabs.emulya.com
Port: 443
- &Orgissuer
Name: issuer
ID: issuerMSP
MSPDir: ./crypto-config/issuer/msp
AnchorPeers:
- Host: peer1.issuer.intainabs.emulya.com
Port: 443
- &Orgoriginator
Name: originator
ID: originatorMSP
MSPDir: ./crypto-config/originator/msp
AnchorPeers:
- Host: peer1.originator.intainabs.emulya.com
Port: 443
Orderer: &OrdererDefaults
OrdererType: etcdraft
Addresses:
- orderer1.originator.demointainabs.emulya.com:443
- orderer2.trustee.demointainabs.emulya.com:443
- orderer2.issuer.demointainabs.emulya.com:443
- orderer1.trustee.demointainabs.emulya.com:443
- orderer1.issuer.demointainabs.emulya.com:443
- orderer1.originator.intainabs.emulya.com:443
- orderer2.trustee.intainabs.emulya.com:443
- orderer2.issuer.intainabs.emulya.com:443
- orderer1.trustee.intainabs.emulya.com:443
- orderer1.issuer.intainabs.emulya.com:443
BatchTimeout: 2s
BatchSize:
MaxMessageCount: 10
AbsoluteMaxBytes: 99 MB
PreferredMaxBytes: 512 KB
Kafka:
Brokers:
- kafka-hlf.blockchain-kz.svc.cluster.local:9092
EtcdRaft:
Consenters:
- Host: orderer1.originator.demointainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/originator/orderer-1originator/tls/server.crt
ServerTLSCert: crypto-config/originator/orderer-1originator/tls/server.crt
- Host: orderer2.trustee.demointainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/trustee/orderer-2trustee/tls/server.crt
ServerTLSCert: crypto-config/trustee/orderer-2trustee/tls/server.crt
- Host: orderer2.issuer.demointainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/issuer/orderer-2issuer/tls/server.crt
ServerTLSCert: crypto-config/issuer/orderer-2issuer/tls/server.crt
- Host: orderer1.trustee.demointainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/trustee/orderer-1trustee/tls/server.crt
ServerTLSCert: crypto-config/trustee/orderer-1trustee/tls/server.crt
- Host: orderer1.issuer.demointainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/issuer/orderer-1issuer/tls/server.crt
ServerTLSCert: crypto-config/issuer/orderer-1issuer/tls/server.crt
- Host: orderer1.originator.intainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/originator/orderer-1originator/tls/server.crt
ServerTLSCert: crypto-config/originator/orderer-1originator/tls/server.crt
- Host: orderer2.trustee.intainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/trustee/orderer-2trustee/tls/server.crt
ServerTLSCert: crypto-config/trustee/orderer-2trustee/tls/server.crt
- Host: orderer2.issuer.intainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/issuer/orderer-2issuer/tls/server.crt
ServerTLSCert: crypto-config/issuer/orderer-2issuer/tls/server.crt
- Host: orderer1.trustee.intainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/trustee/orderer-1trustee/tls/server.crt
ServerTLSCert: crypto-config/trustee/orderer-1trustee/tls/server.crt
- Host: orderer1.issuer.intainabs.emulya.com
Port: 443
ClientTLSCert: crypto-config/issuer/orderer-1issuer/tls/server.crt
ServerTLSCert: crypto-config/issuer/orderer-1issuer/tls/server.crt
Organizations:
Application: &ApplicationDefaults
Organizations:
Profiles:
BaseGenesis:
Orderer:
<<: *OrdererDefaults
Organizations:
- *Orgoriginator
- *Orgtrustee
- *Orgissuer
- *Orgoriginator
- *Orgtrustee
- *Orgissuer
Consortiums:
MyConsortium:
Organizations:
- *Orginvestor
- *Orgtrustee
- *Orgwhlender
- *Orgservicer
- *Orgissuer
- *Orgoriginator
- *Orginvestor
- *Orgtrustee
- *Orgwhlender
- *Orgservicer
- *Orgissuer
- *Orgoriginator
BaseChannel:
Consortium: MyConsortium
Application:
<<: *ApplicationDefaults
Organizations:
- *Orgoriginator
- *Orgissuer
- *Orgservicer
- *Orgwhlender
- *Orgtrustee
- *Orginvestor
- *Orgoriginator
- *Orgissuer
- *Orgservicer
- *Orgwhlender
- *Orgtrustee
- *Orginvestor
I am currently doing hyperledger fabric network setup in Kubernetes. My network includes, 6 organizations and 5 orderer nodes. Our orderers are made to follow raft consensus. I have done the following:
Setup ca and tlsca servers
Setup ingress controller
Generated crypto-materials for peers, orderer
Generated channel artifacts
-- Started peers and orderers
Next step is to create the channel on orderer for each orgs and join the peers in each org to the channel. I am unable to create the channel. When requesting to create the channel, getting the following error:
SERVICE UNAVAILABLE - No raft leader.
How to fix this issue??
Can anyone please guide me on this. Thanks in advance.

Pod crash CrashLoopBackOff

I am getting after run "CrashLoopBackOff"
kubectl get pods
This is my yml file.
---
kind: Deployment
apiVersion: extensions/v1beta1
metadata:
name: cloudtrail-pipe
spec:
template:
metadata:
labels:
app: cloudtrail-pipe
spec:
hostname: cloudtrail-pipe
containers:
- name: cloudtrail-pipe
ports:
- containerPort: 5047
name: filebeat
- containerPort: 9600
name: logstash
image: docker.elastic.co/logstash/logstash:6.5.4
volumeMounts:
- name: cloudtrail-pipe-config
mountPath: /usr/share/logstash/pipeline/
- name: logstash-jvm-options
mountPath: /usr/share/logstash/config/
command:
- logstash
volumes:
- name: cloudtrail-pipe-config
configMap:
name: cloudtrail-pipe
items:
- key: cloudtrail.conf
path: cloudtrail.conf
- name: logstash-output-log
configMap:
name: logstash-output-log
items:
- key: cloudtrail.log
path: cloudtrail.log
- name: logstash-jvm-options
configMap:
name: logstash-jvm-options
items:
- key: jvm.options
path: jvm.options
---
kind: Service
apiVersion: v1
metadata:
name: cloudtrail-pipe
spec:
type: NodePort
selector:
app: cloudtrail-pipe
ports:
- protocol: TCP
port: 5047
targetPort: 5047
nodePort: 30104
name: filebeat
- protocol: TCP
port: 9600
targetPort: 9600
name: logstash
And this is the output of
kubectl --v=8 logs cloudtrail-pipe-59bbd75b44-5wcgv --namespace=default -p
I0826 09:17:00.060776 28458 round_trippers.go:416] GET https://xx.xx.xx.xx:6443/api/v1/namespaces/default/pods/cloudtrail-pipe-59bbd75b44-5wcgv
I0826 09:17:00.060800 28458 round_trippers.go:423] Request Headers:
I0826 09:17:00.060811 28458 round_trippers.go:426] Accept: application/json, */*
I0826 09:17:00.060821 28458 round_trippers.go:426] User-Agent: kubectl/v1.15.3 (linux/amd64) kubernetes/2d3c76f
I0826 09:17:00.067284 28458 round_trippers.go:441] Response Status: 200 OK in 6 milliseconds
I0826 09:17:00.067300 28458 round_trippers.go:444] Response Headers:
I0826 09:17:00.067307 28458 round_trippers.go:447] Content-Type: application/json
I0826 09:17:00.067313 28458 round_trippers.go:447] Content-Length: 3772
I0826 09:17:00.067319 28458 round_trippers.go:447] Date: Mon, 26 Aug 2019 09:17:00 GMT
I0826 09:17:00.067356 28458 request.go:947] Response Body: {"kind":"Pod","apiVersion":"v1","metadata":{"name":"cloudtrail-pipe-59bbd75b44-5wcgv","generateName":"cloudtrail-pipe-59bbd75b44-","namespace":"default","selfLink":"/api/v1/namespaces/default/pods/cloudtrail-pipe-59bbd75b44-5wcgv","uid":"ebb671b8-0840-4874-9a03-15bf6a01da62","resourceVersion":"97628","creationTimestamp":"2019-08-26T09:12:45Z","labels":{"app":"cloudtrail-pipe","pod-template-hash":"59bbd75b44"},"annotations":{"kubernetes.io/limit-ranger":"LimitRanger plugin set: memory request for container cloudtrail-pipe; memory limit for container cloudtrail-pipe"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cloudtrail-pipe-59bbd75b44","uid":"697b2314-921b-416f-91ea-0cc295916283","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cloudtrail-pipe-config","configMap":{"name":"cloudtrail-pipe","items":[{"key":"cloudtrail.conf","path":"cloudtrail.conf"}],"defaultMode":420}},{"name":"logstash-output-log","configMap":{"name":"logstash-output-log","items":[{"key":" [truncated 2748 chars]
I0826 09:17:00.071390 28458 round_trippers.go:416] GET https://xx.xx.xx.xx:6443/api/v1/namespaces/default/pods/cloudtrail-pipe-59bbd75b44-5wcgv/log?previous=true
I0826 09:17:00.071408 28458 round_trippers.go:423] Request Headers:
I0826 09:17:00.071415 28458 round_trippers.go:426] Accept: application/json, */*
I0826 09:17:00.071422 28458 round_trippers.go:426] User-Agent: kubectl/v1.15.3 (linux/amd64) kubernetes/2d3c76f
I0826 09:17:30.073747 28458 round_trippers.go:441] Response Status: 500 Internal Server Error in 30002 milliseconds
I0826 09:17:30.073775 28458 round_trippers.go:444] Response Headers:
I0826 09:17:30.073785 28458 round_trippers.go:447] Content-Type: application/json
I0826 09:17:30.073792 28458 round_trippers.go:447] Content-Length: 252
I0826 09:17:30.073799 28458 round_trippers.go:447] Date: Mon, 26 Aug 2019 09:17:30 GMT
I0826 09:17:30.073834 28458 request.go:947] Response Body: {"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"Get https://xx.xx.xx.xx:10250/containerLogs/default/cloudtrail-pipe-59bbd75b44-5wcgv/cloudtrail-pipe?previous=true: dial tcp xx.xx.xx.xx:10250: i/o timeout","code":500}
I0826 09:17:30.074166 28458 helpers.go:199] server response object: [{
"metadata": {},
"status": "Failure",
"message": "Get https://xx.xx.xx.xxx:10250/containerLogs/default/cloudtrail-pipe-59bbd75b44-5wcgv/cloudtrail-pipe?previous=true: dial tcp xx.xx.xx.xx:10250: i/o timeout",
"code": 500
}]
F0826 09:17:30.074198 28458 helpers.go:114] Error from server: Get https://xx.xx.xx.xx:10250/containerLogs/default/cloudtrail-pipe-59bbd75b44-5wcgv/cloudtrail-pipe?previous=true: dial tcp xx.xx.xx.xx:10250: i/o timeout
Could you help to found the error, please?
EDIT
Below is the config map logstash-jvm-options which maps the file jvm.options. After comment the line with the volume logstash-jvm-options of the yml the deployment works ok.
-Xms2g
-Xmx2g
-XX:+UseParNewGC
-XX:+UseConcMarkSweepGC
-XX:CMSInitiatingOccupancyFraction=75
-XX:+UseCMSInitiatingOccupancyOnly
-Djava.awt.headless=true
-Dfile.encoding=UTF-8
-Djruby.compile.invokedynamic=true
-Djruby.jit.threshold=0
-Djava.security.egd=file:/dev/urandom
-XX:+HeapDumpOnOutOfMemoryError
I solved this problem I increased memory resource
resources:
limits:
cpu: 1
memory: 1Gi
requests:
cpu: 100m
memory: 250Mi
memory