- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Software: Edge_Insights_for_Industrial_2.3.2
OS: Ubuntu 18.04.5 LTS
I follow the instructions of README.md and install tls-related images, but I fail to run all the tls containers.
Following are the logs of the exited containers.
$ sudo docker-compose ps
Name Command State Ports -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- tls_apiui ./webservices/start.sh Exit 0 tls_core ./start.sh Up tls_mongo docker-entrypoint.sh --ssl ... Up 127.0.0.1:27017->27017/tcp tls_openvino /bin/bash Exit 0 tls_proxy /docker-entrypoint.sh /bin ... Exit 0 tls_rabbitmq docker-entrypoint.sh /init ... Up 0.0.0.0:15672->15672/tcp, 0.0.0.0:1883->1883/tcp, 25672/tcp, 4369/tcp, 5671/tcp, 5672/tcp, 0.0.0.0:8883->8883/tcp tls_redis docker-entrypoint.sh sh st ... Up 127.0.0.1:6379->6379/tcp
$ sudo docker-compose logs tls_apiui
Attaching to tls_apiui tls_apiui | wait-for-it.sh: waiting for tls_mongo:27017 without a timeout tls_apiui | wait-for-it.sh: tls_mongo:27017 is available after 0 seconds tls_apiui | tls_apiui | > tls-ui@2020.6.11 start /home/tls/webservices/ui tls_apiui | > node tools/start tls_apiui | tls_apiui | tls_apiui | > apiserver@0.0.0 start /home/tls/webservices/apiserver tls_apiui | > NODE_ENV=production PRIVATEKEY=rsa.private node app.js --use_strict tls_apiui | tls_apiui | debug: Please note: since `sails.config.session.cookie.secure` is set to `true`, the session cookie tls_apiui | debug: will _only_ be sent over TLS connections (i.e. secure https:// requests). tls_apiui | debug: Requests made via http:// will not include a session cookie! tls_apiui | debug: tls_apiui | debug: For more help: tls_apiui | debug: • https://sailsjs.com/config/session#?the-secure-flag tls_apiui | debug: • https://sailsjs.com/config/session#?do-i-need-an-ssl-certificate tls_apiui | debug: • https://sailsjs.com/config/sails-config-http#?properties tls_apiui | debug: • https://sailsjs.com/support tls_apiui | debug: tls_apiui | Warning: connect.session() MemoryStore is not tls_apiui | designed for a production environment, as it will leak tls_apiui | memory, and will not scale past a single process. tls_apiui | Browserslist: caniuse-lite is outdated. Please run next command `npm update` tls_apiui | (node:40) DeprecationWarning: Tapable.plugin is deprecated. Use new API on `.hooks` instead tls_apiui | Starting the development server... tls_apiui | error: Bootstrap encountered an error: (see below) tls_apiui | error: Failed to lift app: Error: getaddrinfo EAI_AGAIN cvat cvat:8080. tls_apiui | at generateError (/home/tls/webservices/components/cvat/cvat-core/src/server-proxy.js:26:16) tls_apiui | at Object.login (/home/tls/webservices/components/cvat/cvat-core/src/server-proxy.js:158:27) tls_apiui | at process._tickCallback (internal/process/next_tick.js:68:7) tls_apiui | tls_apiui | ┌───────────────────────────────────────────────────────┐ tls_apiui | │ npm update check failed │ tls_apiui | │ Try running with sudo or get access │ tls_apiui | │ to the local update config store via │ tls_apiui | │ sudo chown -R $USER:$(id -gn $USER) /home/tls/.config │ tls_apiui | └───────────────────────────────────────────────────────┘
$ sudo docker-compose logs tls_openvino
Attaching to tls_openvino
$ sudo docker-compose logs tls_proxy
Attaching to tls_proxy
tls_proxy | 2020/11/05 08:58:46 [emerg] 11#11: host not found in upstream "cvat" in /etc/nginx/nginx.conf:52
tls_proxy | nginx: [emerg] host not found in upstream "cvat" in /etc/nginx/nginx.conf:52
tls_proxy | # Copyright (c) 2020 Intel Corporation.
tls_proxy |
tls_proxy | # Permission is hereby granted, free of charge, to any person obtaining a copy
tls_proxy | # of this software and associated documentation files (the "Software"), to deal
tls_proxy | # in the Software without restriction, including without limitation the rights
tls_proxy | # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
tls_proxy | # copies of the Software, and to permit persons to whom the Software is
tls_proxy | # furnished to do so, subject to the following conditions:
tls_proxy |
tls_proxy | # The above copyright notice and this permission notice shall be included in
tls_proxy | # all copies or substantial portions of the Software.
tls_proxy |
tls_proxy | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
tls_proxy | # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
tls_proxy | # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
tls_proxy | # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
tls_proxy | # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
tls_proxy | # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
tls_proxy | # SOFTWARE.
tls_proxy |
tls_proxy | worker_processes 4;
tls_proxy |
tls_proxy | events { worker_connections 1024; }
tls_proxy |
tls_proxy | pid /tmp/nginx.pid;
tls_proxy | http {
tls_proxy | proxy_buffering off;
tls_proxy | client_body_buffer_size 10m;
tls_proxy | client_max_body_size 10m;
tls_proxy |
tls_proxy | client_body_temp_path /tmp/client_temp;
tls_proxy | proxy_temp_path /tmp/proxy_temp_path;
tls_proxy | fastcgi_temp_path /tmp/fastcgi_temp;
tls_proxy | uwsgi_temp_path /tmp/uwsgi_temp;
tls_proxy | scgi_temp_path /tmp/scgi_temp;
tls_proxy |
tls_proxy | limit_req_zone $request_uri zone=by_uri:10m rate=30r/m;
tls_proxy |
tls_proxy | server {
tls_proxy | listen 443 ssl;
tls_proxy |
tls_proxy | add_header X-Content-Type-Options "nosniff";
tls_proxy |
tls_proxy | ssl_certificate /run/secrets/tlsserver_cert;
tls_proxy | ssl_certificate_key /run/secrets/tlsserver_key;
tls_proxy |
tls_proxy | ssl_session_cache shared:SSL:30m;
tls_proxy | ssl_session_timeout 30m;
tls_proxy | ssl_session_tickets on;
tls_proxy |
tls_proxy | location /cvatapi/ {
tls_proxy | proxy_pass http://cvat:8080/;
tls_proxy | proxy_pass_header X-CSRFToken;
tls_proxy | proxy_set_header Host $http_host;
tls_proxy | proxy_pass_header Set-Cookie;
tls_proxy |
tls_proxy | proxy_set_header Accept-Encoding "";
tls_proxy | sub_filter_types *;
tls_proxy | sub_filter /static/ /cvatapi/static/;
tls_proxy | sub_filter "/static/" "/cvatapi/static/";
tls_proxy | sub_filter "/dextr" "/cvatapi/dextr";
tls_proxy | sub_filter /api /cvatapi/api;
tls_proxy | sub_filter_once off;
tls_proxy | }
tls_proxy |
tls_proxy | location /api/v1 {
tls_proxy | proxy_pass http://cvat:8080;
tls_proxy | proxy_http_version 1.1;
tls_proxy | proxy_set_header Upgrade $http_upgrade;
tls_proxy | proxy_set_header Connection "Upgrade";
tls_proxy | proxy_set_header Host $host;
tls_proxy | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
tls_proxy | proxy_set_header X-Forwarded-Proto $scheme;
tls_proxy | }
tls_proxy |
tls_proxy | location /socket.io/ {
tls_proxy | proxy_pass https://tls_apiui:1337/socket.io/;
tls_proxy | proxy_http_version 1.1;
tls_proxy | proxy_set_header Upgrade $http_upgrade;
tls_proxy | proxy_set_header Connection "Upgrade";
tls_proxy | proxy_set_header Host $host;
tls_proxy | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
tls_proxy | proxy_set_header X-Forwarded-Proto $scheme;
tls_proxy | }
tls_proxy |
tls_proxy | location /api/ {
tls_proxy | proxy_pass https://tls_apiui:1337/api/;
tls_proxy | proxy_http_version 1.1;
tls_proxy | proxy_set_header Upgrade $http_upgrade;
tls_proxy | proxy_set_header Connection "Upgrade";
tls_proxy | proxy_set_header Host $host;
tls_proxy | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
tls_proxy | proxy_set_header X-Forwarded-Proto $scheme;
tls_proxy | }
tls_proxy |
tls_proxy | location / {
tls_proxy | proxy_pass http://tls_apiui:3000/;
tls_proxy | proxy_http_version 1.1;
tls_proxy | proxy_set_header Upgrade $http_upgrade;
tls_proxy | proxy_set_header Connection "Upgrade";
tls_proxy | proxy_set_header Host $host;
tls_proxy | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
tls_proxy | proxy_set_header X-Forwarded-Proto $scheme;
tls_proxy | }
tls_proxy | }
Link Copied
1 Reply
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @huang06 ,
In order to make the TLS2.0 running, there need to have 11 containers up and running. They are
tls_proxy, Tls_core, tls_apiui, tls_rabbitmq, tls_redis, tls_mongo, cvat_proxy, cvat_ui, cvat, cvat_db, cvat_redis.
You can invoke $ docker ps to check the container list.
May I know
- Was this the first time and fresh environment TLS2.0 installation? If it was setup the TLS application before, may I know did you execute below script before rerun the $ ./setup_TLS_docker.sh
- $ ./cleanup_docker.sh
- $ ./cleanup.sh
- Were you using sudoer to run the installation script?
Reply
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page