BalenaSense - "Booted - Check your BalenaCloud dashboard." message despite wifi connection working

I’m fairly new to Pi messing about with Raspberry Pis, so please be gentle with me :o)

I am trying to get the BalenaSense project up and running but I am getting the balaneOS ASCII logo and a message to check the dashboard. From reading the troubleshooting page, I understand that this is indicative of connectivity issues (wifi problems etc). However, I can see the device on my balenaCloud dashboard and it claims that it’s “Online”. I have checked the wifi credentials in the config file and they’re correct.

Is there any logging that I can look at somewhere that might help? Or are there any suggestions of things to try?

I’m using a Pi Zero with an 8Gb MicroSD card if that helps :o)

Edit to say: I should say that the Pi is actually right next to the WIFI router as well so it shouldn’t be a dodgy signal :slight_smile:

I have re-imaged my SD card and whilst it still has that same message, it does get a little further in the startup it seems…

I am now getting:

{ OK ] Started Resin info on tty1.
[ OK ] Started Load balena healthcheck image.
[ OK ] Reached target Multi-User System.
Starting Update UTMP about System RunLevel Changes…
[ OK ] Started Update UTMP about System RunLevel Changes.
ADDRCONF(NETDEV_UP): supervisor0: link is not ready
ADDRCONF(NETDEV_UP): br-622e9e055a17: link is not ready

I can still see the device in my Balena dashboard and can make the LED blink from the dashboard so it doesn’t feel like a connectivity issue…

Hi there,
at first glance it seems to me a possible NetworkManager problem, but we need more information.
You can start by going to the device diagnostics page from the dashboard as described here and try to run checks from there. Then you can try to open the terminal “Host OS SSH” and try to view device logs via journalctl (e.g. running journalctl -f -n 1000). Here you can find all journalctl options journalctl. If you can copy/paste the information you can get from these two steps we can better analyse the problem.

Hi JSReds, thank you for the reply.

Here is the relevant (I think) bit of the Diagnostics log ( I can post the whole thing if necessary but it was very long…):

--- journalctl --no-pager --no-hostname -a -u ModemManager ---

2021-02-11 21:09:16.169781363+00:00
-- Logs begin at Tue 2020-08-04 14:05:38 UTC, end at Thu 2021-02-11 21:09:07 UTC. --
Aug 20 10:00:00 ModemManager[1291]: ModemManager (version 1.12.8) starting in system bus...
Aug 20 10:00:06 ModemManager[1291]: Couldn't check support for device '/sys/devices/platform/soc/20300000.mmcnr/mmc_host/mmc1/mmc1:0001/mmc1:0001:1': not supported by any plugin
real	0m 0.29s
user	0m 0.03s
sys	0m 0.01s

--- journalctl --no-pager --no-hostname -n 200 -a -u "openvpn*" ---

2021-02-11 21:09:16.712059363+00:00
-- Logs begin at Tue 2020-08-04 14:05:38 UTC, end at Thu 2021-02-11 21:09:07 UTC. --
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 WARNING: file '/var/volatile/vpn-auth' is group or others accessible
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun  2 2020
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]3.227.28.93:443
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:04:30 openvpn[1739]: Thu Feb 11 21:04:30 2021 Attempting to establish TCP connection with [AF_INET]3.227.28.93:443 [nonblock]
Feb 11 21:04:31 openvpn[1739]: Thu Feb 11 21:04:31 2021 TCP connection established with [AF_INET]3.227.28.93:443
Feb 11 21:04:31 openvpn[1739]: Thu Feb 11 21:04:31 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:04:31 openvpn[1739]: Thu Feb 11 21:04:31 2021 TCP_CLIENT link remote: [AF_INET]3.227.28.93:443
Feb 11 21:04:31 openvpn[1739]: Thu Feb 11 21:04:31 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:04:31 openvpn[1739]: Thu Feb 11 21:04:31 2021 TLS: Initial packet from [AF_INET]3.227.28.93:443, sid=a2c76ced ea795b1f
Feb 11 21:04:31 openvpn[1739]: Thu Feb 11 21:04:31 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Feb 11 21:04:32 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:04:32 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY KU OK
Feb 11 21:04:32 openvpn[1739]: Thu Feb 11 21:04:32 2021 Validating certificate extended key usage
Feb 11 21:04:32 openvpn[1739]: Thu Feb 11 21:04:32 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:04:32 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY EKU OK
Feb 11 21:04:32 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:04:33 openvpn[1739]: Thu Feb 11 21:04:33 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:04:33 openvpn[1739]: Thu Feb 11 21:04:33 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]3.227.28.93:443
Feb 11 21:04:34 openvpn[1739]: Thu Feb 11 21:04:34 2021 SENT CONTROL [vpn.balena-cloud.com]: 'PUSH_REQUEST' (status=1)
**Feb 11 21:04:34 openvpn[1739]: Thu Feb 11 21:04:34 2021 AUTH: Received control message: AUTH_FAILED**
Feb 11 21:04:34 openvpn[1739]: Thu Feb 11 21:04:34 2021 SIGTERM[soft,auth-failure] received, process exiting
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 WARNING: file '/var/volatile/vpn-auth' is group or others accessible
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun  2 2020
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]35.169.89.252:443
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:04:47 openvpn[1889]: Thu Feb 11 21:04:47 2021 Attempting to establish TCP connection with [AF_INET]35.169.89.252:443 [nonblock]
Feb 11 21:04:48 openvpn[1889]: Thu Feb 11 21:04:48 2021 TCP connection established with [AF_INET]35.169.89.252:443
Feb 11 21:04:48 openvpn[1889]: Thu Feb 11 21:04:48 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:04:48 openvpn[1889]: Thu Feb 11 21:04:48 2021 TCP_CLIENT link remote: [AF_INET]35.169.89.252:443
Feb 11 21:04:48 openvpn[1889]: Thu Feb 11 21:04:48 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:04:48 openvpn[1889]: Thu Feb 11 21:04:48 2021 TLS: Initial packet from [AF_INET]35.169.89.252:443, sid=af930ee1 eed51b7c
Feb 11 21:04:48 openvpn[1889]: Thu Feb 11 21:04:48 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY KU OK
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 Validating certificate extended key usage
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY EKU OK
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:04:49 openvpn[1889]: Thu Feb 11 21:04:49 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]35.169.89.252:443
Feb 11 21:04:50 openvpn[1889]: Thu Feb 11 21:04:50 2021 SENT CONTROL [vpn.balena-cloud.com]: 'PUSH_REQUEST' (status=1)
Feb 11 21:04:50 openvpn[1889]: Thu Feb 11 21:04:50 2021 AUTH: Received control message: AUTH_FAILED
Feb 11 21:04:50 openvpn[1889]: Thu Feb 11 21:04:50 2021 SIGTERM[soft,auth-failure] received, process exiting
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 WARNING: file '/var/volatile/vpn-auth' is group or others accessible
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun  2 2020
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]3.227.28.93:443
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:05:03 openvpn[1950]: Thu Feb 11 21:05:03 2021 Attempting to establish TCP connection with [AF_INET]3.227.28.93:443 [nonblock]
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 TCP connection established with [AF_INET]3.227.28.93:443
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 TCP_CLIENT link remote: [AF_INET]3.227.28.93:443
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 TLS: Initial packet from [AF_INET]3.227.28.93:443, sid=66f6e99f 868c3576
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY KU OK
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 Validating certificate extended key usage
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY EKU OK
Feb 11 21:05:04 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:05:05 openvpn[1950]: Thu Feb 11 21:05:05 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:05:05 openvpn[1950]: Thu Feb 11 21:05:05 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]3.227.28.93:443
Feb 11 21:05:06 openvpn[1950]: Thu Feb 11 21:05:06 2021 SENT CONTROL [vpn.balena-cloud.com]: 'PUSH_REQUEST' (status=1)
**Feb 11 21:05:06 openvpn[1950]: Thu Feb 11 21:05:06 2021 AUTH: Received control message: AUTH_FAILED**
Feb 11 21:05:06 openvpn[1950]: Thu Feb 11 21:05:06 2021 SIGTERM[soft,auth-failure] received, process exiting
Feb 11 21:05:20 openvpn[2012]: Thu Feb 11 21:05:20 2021 WARNING: file '/var/volatile/vpn-auth' is group or others accessible
Feb 11 21:05:20 openvpn[2012]: Thu Feb 11 21:05:20 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun  2 2020
Feb 11 21:05:20 openvpn[2012]: Thu Feb 11 21:05:20 2021 library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
Feb 11 21:05:20 openvpn[2012]: Thu Feb 11 21:05:20 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:05:21 openvpn[2012]: Thu Feb 11 21:05:21 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]3.227.28.93:443
Feb 11 21:05:21 openvpn[2012]: Thu Feb 11 21:05:21 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:05:21 openvpn[2012]: Thu Feb 11 21:05:21 2021 Attempting to establish TCP connection with [AF_INET]3.227.28.93:443 [nonblock]
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 TCP connection established with [AF_INET]3.227.28.93:443
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 TCP_CLIENT link remote: [AF_INET]3.227.28.93:443
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 TLS: Initial packet from [AF_INET]3.227.28.93:443, sid=cdc20f3c 49ea266f
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY KU OK
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 Validating certificate extended key usage
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY EKU OK
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:05:22 openvpn[2012]: Thu Feb 11 21:05:22 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]3.227.28.93:443
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 SENT CONTROL [vpn.balena-cloud.com]: 'PUSH_REQUEST' (status=1)
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 PUSH: Received control message: 'PUSH_REPLY,sndbuf 0,rcvbuf 0,route 52.4.252.97,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.240.58.252 52.4.252.97,peer-id 0,cipher AES-256-GCM'
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: timers and/or timeouts modified
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 Socket Buffers: R=[131072->131072] S=[44800->44800]
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: --socket-flags option modified
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 Socket flags: TCP_NODELAY=1 succeeded
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: --ifconfig/up options modified
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: route options modified
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: peer-id set
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: adjusting link_mtu to 1627
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: data channel crypto options modified
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=wlan0 HWADDR=b8:27:eb:99:4b:fe
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 TUN/TAP device resin-vpn opened
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 TUN/TAP TX queue length set to 100
Feb 11 21:05:23 openvpn[2012]: Thu Feb 11 21:05:23 2021 /sbin/ip link set dev resin-vpn up mtu 1500
Feb 11 21:05:24 openvpn[2012]: Thu Feb 11 21:05:24 2021 /sbin/ip addr add dev resin-vpn local 10.240.58.252 peer 52.4.252.97
Feb 11 21:05:24 openvpn[2012]: Thu Feb 11 21:05:24 2021 /etc/openvpn-misc/upscript.sh resin-vpn 1500 1555 10.240.58.252 52.4.252.97 init
Feb 11 21:05:26 openvpn[2012]: resin-ntp-config: Found config.json in /mnt/boot/config.json .
Feb 11 21:05:26 openvpn[2012]: Thu Feb 11 21:05:26 2021 /sbin/ip route add 52.4.252.97/32 via 52.4.252.97
Feb 11 21:05:26 openvpn[2012]: ip: RTNETLINK answers: File exists
**Feb 11 21:05:26 openvpn[2012]: Thu Feb 11 21:05:26 2021 ERROR: Linux route add command failed: external program exited with error status: 2**
Feb 11 21:05:26 openvpn[2012]: Thu Feb 11 21:05:26 2021 GID set to openvpn
Feb 11 21:05:26 openvpn[2012]: Thu Feb 11 21:05:26 2021 UID set to openvpn
Feb 11 21:05:26 openvpn[2012]: Thu Feb 11 21:05:26 2021 Initialization Sequence Completed
real	0m 0.40s
user	0m 0.04s
sys	0m 0.02s

The output of this is as below:

Feb 11 21:04:19 d717891 chronyd[1308]: 2020-08-20T10:00:42Z Selected source 81.21.65.168
Feb 11 21:04:19 d717891 chronyd[1308]: 2020-08-20T10:00:42Z System clock wrong by 15159817.212322 seconds, adjustment started
Feb 11 21:04:19 d717891 chronyd[1308]: 2021-02-11T21:04:19Z System clock was stepped by 15159817.212322 seconds
Feb 11 21:04:20 d717891 journalctl[1662]: Vacuuming done, freed 0B of archived journals from /run/log/journal/bd31dc40d2674fdaaf2724f41c01de32.
Feb 11 21:04:21 d717891 NetworkManager[1431]: <info>  [1613077461.3658] manager: NetworkManager state is now CONNECTED_GLOBAL
Feb 11 21:04:22 d717891 os-config[1437]: Service configuration retrieved
Feb 11 21:04:22 d717891 os-config[1437]: Stopping resin-supervisor.service...
Feb 11 21:04:22 d717891 os-config[1437]: Awaiting resin-supervisor.service to exit...
Feb 11 21:04:22 d717891 bash[1609]: Loaded image: balena-healthcheck-image:latest
**Feb 11 21:04:25 d717891 resin-supervisor[1675]: Error response from daemon: No such container: resin_supervisor**
Feb 11 21:04:25 d717891 systemd[1]: resin-supervisor.service: Main process exited, code=killed, status=15/TERM
Feb 11 21:04:26 d717891 nm-dispatcher[1452]: resin-ntp-config: Found config.json in /mnt/boot/config.json .
Feb 11 21:04:26 d717891 nm-dispatcher[1452]: 200 OK
Feb 11 21:04:26 d717891 os-config[1437]: Stopping prepare-openvpn.service...
Feb 11 21:04:26 d717891 os-config[1437]: Stopping openvpn.service...
Feb 11 21:04:26 d717891 os-config[1437]: Awaiting prepare-openvpn.service to exit...
Feb 11 21:04:26 d717891 os-config[1437]: Awaiting openvpn.service to exit...
Feb 11 21:04:26 d717891 os-config[1437]: /etc/openvpn/ca.crt updated
Feb 11 21:04:26 d717891 os-config[1437]: /etc/openvpn/openvpn.conf updated
Feb 11 21:04:26 d717891 os-config[1437]: Starting prepare-openvpn.service...
Feb 11 21:04:26 d717891 os-config[1437]: Starting openvpn.service...
Feb 11 21:04:26 d717891 os-config[1437]: /home/root/.ssh/authorized_keys_remote updated
Feb 11 21:04:26 d717891 os-config[1437]: Starting resin-supervisor.service...
Feb 11 21:04:27 d717891 balenad[1445]: time="2021-02-11T21:04:27.390379363Z" level=info msg="shim balena-engine-containerd-shim started" address=/containerd-shim/f54efec11e410dabe7fb8322570cb6c2d0d8d29838d7653f73fb676662c2de50.sock debug=false pid=1710
**Feb 11 21:04:28 d717891 resin-supervisor[1704]: Error response from daemon: No such container: resin_supervisor**
Feb 11 21:04:29 d717891 resin-supervisor[1718]: active
Feb 11 21:04:30 d717891 prepare-openvpn[1701]: prepare-openvpn: [INFO] Balena.io VPN authentication.
**Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 WARNING: file '/var/volatile/vpn-auth' is group or others accessible**
Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun  2 2020
Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]3.227.28.93:443
Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:04:30 d717891 openvpn[1739]: Thu Feb 11 21:04:30 2021 Attempting to establish TCP connection with [AF_INET]3.227.28.93:443 [nonblock]
Feb 11 21:04:31 d717891 openvpn[1739]: Thu Feb 11 21:04:31 2021 TCP connection established with [AF_INET]3.227.28.93:443
Feb 11 21:04:31 d717891 openvpn[1739]: Thu Feb 11 21:04:31 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:04:31 d717891 openvpn[1739]: Thu Feb 11 21:04:31 2021 TCP_CLIENT link remote: [AF_INET]3.227.28.93:443
Feb 11 21:04:31 d717891 openvpn[1739]: Thu Feb 11 21:04:31 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:04:31 d717891 openvpn[1739]: Thu Feb 11 21:04:31 2021 TLS: Initial packet from [AF_INET]3.227.28.93:443, sid=a2c76ced ea795b1f
Feb 11 21:04:31 d717891 openvpn[1739]: Thu Feb 11 21:04:31 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Feb 11 21:04:32 d717891 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:04:32 d717891 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY KU OK
Feb 11 21:04:32 d717891 openvpn[1739]: Thu Feb 11 21:04:32 2021 Validating certificate extended key usage
Feb 11 21:04:32 d717891 openvpn[1739]: Thu Feb 11 21:04:32 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:04:32 d717891 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY EKU OK
Feb 11 21:04:32 d717891 openvpn[1739]: Thu Feb 11 21:04:32 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:04:33 d717891 openvpn[1739]: Thu Feb 11 21:04:33 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:04:33 d717891 openvpn[1739]: Thu Feb 11 21:04:33 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]3.227.28.93:443
Feb 11 21:04:34 d717891 openvpn[1739]: Thu Feb 11 21:04:34 2021 SENT CONTROL [vpn.balena-cloud.com]: 'PUSH_REQUEST' (status=1)
**Feb 11 21:04:34 d717891 openvpn[1739]: Thu Feb 11 21:04:34 2021 AUTH: Received control message: AUTH_FAILED**

** Feb 11 21:04:34 d717891 openvpn[1739]: Thu Feb 11 21:04:34 2021 SIGTERM[soft,auth-failure] received, process exiting**
Feb 11 21:04:37 d717891 resin-supervisor[1719]: Error: No such object: resin_supervisor
** Feb 11 21:04:39 d717891 resin-supervisor[1719]: Error: No such container: resin_supervisor**
Feb 11 21:04:43 d717891 balenad[1445]: time=“2021-02-11T21:04:43.356474363Z” level=info msg=“shim balena-engine-containerd-shim started” address=/containerd-shim/4e98618b81625f7b221babe51300c2fc7bae6524ce190150095be691d30d4116.sock debug=false pid=1852
Feb 11 21:04:47 d717891 prepare-openvpn[1880]: prepare-openvpn: [INFO] Balena.io VPN authentication.
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 WARNING: file ‘/var/volatile/vpn-auth’ is group or others accessible
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 2 2020
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]35.169.89.252:443
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:04:47 d717891 openvpn[1889]: Thu Feb 11 21:04:47 2021 Attempting to establish TCP connection with [AF_INET]35.169.89.252:443 [nonblock]
Feb 11 21:04:48 d717891 openvpn[1889]: Thu Feb 11 21:04:48 2021 TCP connection established with [AF_INET]35.169.89.252:443
Feb 11 21:04:48 d717891 openvpn[1889]: Thu Feb 11 21:04:48 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:04:48 d717891 openvpn[1889]: Thu Feb 11 21:04:48 2021 TCP_CLIENT link remote: [AF_INET]35.169.89.252:443
Feb 11 21:04:48 d717891 openvpn[1889]: Thu Feb 11 21:04:48 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:04:48 d717891 openvpn[1889]: Thu Feb 11 21:04:48 2021 TLS: Initial packet from [AF_INET]35.169.89.252:443, sid=af930ee1 eed51b7c
Feb 11 21:04:48 d717891 openvpn[1889]: Thu Feb 11 21:04:48 2021 WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY KU OK
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 Validating certificate extended key usage
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY EKU OK
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:04:49 d717891 openvpn[1889]: Thu Feb 11 21:04:49 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]35.169.89.252:443
Feb 11 21:04:50 d717891 balenad[1445]: time=“2021-02-11T21:04:50.106698363Z” level=info msg=“shim reaped” id=24ed9d72986adcba8de57c454a2889b808ec03a5f6ffcd1d7a377e8a49611395
Feb 11 21:04:50 d717891 balenad[1445]: time=“2021-02-11T21:04:50.135351363Z” level=info msg=“ignoring event” module=libcontainerd namespace=moby topic=/tasks/delete type=“events.TaskDelete"
Feb 11 21:04:50 d717891 openvpn[1889]: Thu Feb 11 21:04:50 2021 SENT CONTROL [vpn.balena-cloud.com]: ‘PUSH_REQUEST’ (status=1)
Feb 11 21:04:50 d717891 openvpn[1889]: Thu Feb 11 21:04:50 2021 AUTH: Received control message: AUTH_FAILED
Feb 11 21:04:50 d717891 openvpn[1889]: Thu Feb 11 21:04:50 2021 SIGTERM[soft,auth-failure] received, process exiting
Feb 11 21:05:03 d717891 prepare-openvpn[1946]: prepare-openvpn: [INFO] Balena.io VPN authentication.
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 WARNING: file ‘/var/volatile/vpn-auth’ is group or others accessible
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 2 2020
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]3.227.28.93:443
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:05:03 d717891 openvpn[1950]: Thu Feb 11 21:05:03 2021 Attempting to establish TCP connection with [AF_INET]3.227.28.93:443 [nonblock]
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 TCP connection established with [AF_INET]3.227.28.93:443
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 TCP_CLIENT link remote: [AF_INET]3.227.28.93:443
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 TLS: Initial packet from [AF_INET]3.227.28.93:443, sid=66f6e99f 868c3576
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY KU OK
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 Validating certificate extended key usage
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY EKU OK
Feb 11 21:05:04 d717891 openvpn[1950]: Thu Feb 11 21:05:04 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:05:05 d717891 openvpn[1950]: Thu Feb 11 21:05:05 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:05:05 d717891 openvpn[1950]: Thu Feb 11 21:05:05 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]3.227.28.93:443
Feb 11 21:05:06 d717891 openvpn[1950]: Thu Feb 11 21:05:06 2021 SENT CONTROL [vpn.balena-cloud.com]: ‘PUSH_REQUEST’ (status=1)
Feb 11 21:05:06 d717891 openvpn[1950]: Thu Feb 11 21:05:06 2021 AUTH: Received control message: AUTH_FAILED
Feb 11 21:05:06 d717891 openvpn[1950]: Thu Feb 11 21:05:06 2021 SIGTERM[soft,auth-failure] received, process exiting
Feb 11 21:05:07 d717891 e5ceffc858dd[1445]: [info] Supervisor v11.12.4 starting up…
Feb 11 21:05:07 d717891 resin-supervisor[1719]: [info] Supervisor v11.12.4 starting up…
Feb 11 21:05:10 d717891 e5ceffc858dd[1445]: [info] Setting host to discoverable
Feb 11 21:05:10 d717891 resin-supervisor[1719]: [info] Setting host to discoverable
Feb 11 21:05:10 d717891 e5ceffc858dd[1445]: [warn] Invalid firewall mode: . Reverting to state: off
** Feb 11 21:05:10 d717891 resin-supervisor[1719]: [warn] Invalid firewall mode: . Reverting to state: off
*
Feb 11 21:05:10 d717891 e5ceffc858dd[1445]: [info] :fire: Applying firewall mode: off
Feb 11 21:05:10 d717891 resin-supervisor[1719]: [info] :fire: Applying firewall mode: off
Feb 11 21:05:10 d717891 e5ceffc858dd[1445]: [debug] Starting logging infrastructure
Feb 11 21:05:10 d717891 resin-supervisor[1719]: [debug] Starting logging infrastructure
Feb 11 21:05:11 d717891 e5ceffc858dd[1445]: [success] :fire: Firewall mode applied
Feb 11 21:05:11 d717891 resin-supervisor[1719]: [success] :fire: Firewall mode applied
Feb 11 21:05:11 d717891 e5ceffc858dd[1445]: [info] Starting firewall
Feb 11 21:05:11 d717891 resin-supervisor[1719]: [info] Starting firewall
Feb 11 21:05:11 d717891 e5ceffc858dd[1445]: [debug] Starting api binder
Feb 11 21:05:11 d717891 resin-supervisor[1719]: [debug] Starting api binder
Feb 11 21:05:11 d717891 e5ceffc858dd[1445]: [event] Event: Supervisor start {}
Feb 11 21:05:11 d717891 resin-supervisor[1719]: [event] Event: Supervisor start {}
Feb 11 21:05:12 d717891 e5ceffc858dd[1445]: [debug] Performing database cleanup for container log timestamps
Feb 11 21:05:12 d717891 resin-supervisor[1719]: [debug] Performing database cleanup for container log timestamps
Feb 11 21:05:12 d717891 e5ceffc858dd[1445]: [error] LogBackend: server responded with status code: 401
Feb 11 21:05:12 d717891 resin-supervisor[1719]: [error] LogBackend: server responded with status code: 401
Feb 11 21:05:12 d717891 e5ceffc858dd[1445]: [info] Previous engine snapshot was not stored. Skipping cleanup.
Feb 11 21:05:12 d717891 resin-supervisor[1719]: [info] Previous engine snapshot was not stored. Skipping cleanup.
Feb 11 21:05:12 d717891 e5ceffc858dd[1445]: [debug] Handling of local mode switch is completed
Feb 11 21:05:12 d717891 resin-supervisor[1719]: [debug] Handling of local mode switch is completed
Feb 11 21:05:12 d717891 e5ceffc858dd[1445]: (node:1) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead.
Feb 11 21:05:12 d717891 resin-supervisor[1719]: (node:1) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead.
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [debug] Connectivity check enabled: true
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [debug] Connectivity check enabled: true
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [debug] Starting periodic check for IP addresses
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [debug] Starting periodic check for IP addresses
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] Reporting initial state, supervisor version and API info
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] Reporting initial state, supervisor version and API info
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] Attempting to load any preloaded applications
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] Attempting to load any preloaded applications
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] VPN connection is not active.
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] VPN connection is not active.
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] Waiting for connectivity…
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] Waiting for connectivity…
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] Starting API server
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] Starting API server
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] Supervisor API successfully started on port 48484
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] Supervisor API successfully started on port 48484
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] Applying target state
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] Applying target state
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [debug] Ensuring device is provisioned
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [debug] Ensuring device is provisioned
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [event] Event: Device bootstrap {}
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [event] Event: Device bootstrap {}
Feb 11 21:05:13 d717891 e5ceffc858dd[1445]: [info] New device detected. Provisioning…
Feb 11 21:05:13 d717891 resin-supervisor[1719]: [info] New device detected. Provisioning…
Feb 11 21:05:14 d717891 e5ceffc858dd[1445]: [debug] Creating supervisor0 network
Feb 11 21:05:14 d717891 resin-supervisor[1719]: [debug] Creating supervisor0 network
Feb 11 21:05:14 d717891 systemd-udevd[1962]: Using default interface naming scheme ‘v240’.
Feb 11 21:05:14 d717891 systemd-udevd[1962]: link_config: autonegotiation is unset or enabled, the speed and duplex are not writable.
Feb 11 21:05:14 d717891 NetworkManager[1431]: [1613077514.5907] manager: (supervisor0): new Bridge device (/org/freedesktop/NetworkManager/Devices/5)
Feb 11 21:05:15 d717891 NetworkManager[1431]: [1613077515.9191] device (supervisor0): state change: unmanaged → unavailable (reason ‘connection-assumed’, sys-iface-state: ‘external’)
Feb 11 21:05:15 d717891 avahi-daemon[1422]: Joining mDNS multicast group on interface supervisor0.IPv4 with address 10.114.104.1.
Feb 11 21:05:15 d717891 kernel: IPv6: ADDRCONF(NETDEV_UP): supervisor0: link is not ready
Feb 11 21:05:15 d717891 avahi-daemon[1422]: New relevant interface supervisor0.IPv4 for mDNS.
Feb 11 21:05:15 d717891 avahi-daemon[1422]: Registering new address record for 10.114.104.1 on supervisor0.IPv4.
Feb 11 21:05:16 d717891 NetworkManager[1431]: [1613077516.1525] device (supervisor0): state change: unavailable → disconnected (reason ‘connection-assumed’, sys-iface-state: ‘external’)
Feb 11 21:05:16 d717891 NetworkManager[1431]: [1613077516.2383] device (supervisor0): Activation: starting connection ‘supervisor0’ (0292f38c-a6ab-45f5-b5bc-94e0806d975f)
Feb 11 21:05:16 d717891 NetworkManager[1431]: [1613077516.3661] device (supervisor0): state change: disconnected → prepare (reason ‘none’, sys-iface-state: ‘external’)
Feb 11 21:05:16 d717891 NetworkManager[1431]: [1613077516.4254] device (supervisor0): state change: prepare → config (reason ‘none’, sys-iface-state: ‘external’)
Feb 11 21:05:16 d717891 NetworkManager[1431]: [1613077516.4761] device (supervisor0): state change: config → ip-config (reason ‘none’, sys-iface-state: ‘external’)
Feb 11 21:05:16 d717891 NetworkManager[1431]: [1613077516.5072] device (supervisor0): state change: ip-config → ip-check (reason ‘none’, sys-iface-state: ‘external’)
Feb 11 21:05:16 d717891 dbus-daemon[1292]: [system] Activating via systemd: service name=‘org.freedesktop.nm_dispatcher’ unit=‘dbus-org.freedesktop.nm-dispatcher.service’ requested by ‘:1.6’ (uid=0 pid=1431 comm=”/usr/sbin/NetworkManager --no-daemon ")
Feb 11 21:05:17 d717891 dbus-daemon[1292]: [system] Successfully activated service ‘org.freedesktop.nm_dispatcher’
Feb 11 21:05:17 d717891 NetworkManager[1431]: [1613077517.1608] device (supervisor0): state change: ip-check → secondaries (reason ‘none’, sys-iface-state: ‘external’)
Feb 11 21:05:17 d717891 NetworkManager[1431]: [1613077517.1872] device (supervisor0): state change: secondaries → activated (reason ‘none’, sys-iface-state: ‘external’)
Feb 11 21:05:17 d717891 NetworkManager[1431]: [1613077517.3614] device (supervisor0): Activation: successful, device activated.
Feb 11 21:05:18 d717891 echo[2009]: config.json changed
Feb 11 21:05:18 d717891 echo[2010]: config.json changed
Feb 11 21:05:18 d717891 e5ceffc858dd[1445]: [event] Event: Device bootstrap success {}
Feb 11 21:05:18 d717891 resin-supervisor[1719]: [event] Event: Device bootstrap success {}
Feb 11 21:05:18 d717891 e5ceffc858dd[1445]: [info] Reporting initial configuration
Feb 11 21:05:18 d717891 resin-supervisor[1719]: [info] Reporting initial configuration
Feb 11 21:05:20 d717891 prepare-openvpn[1999]: prepare-openvpn: [INFO] Balena.io VPN authentication.
Feb 11 21:05:20 d717891 openvpn[2012]: Thu Feb 11 21:05:20 2021 WARNING: file ‘/var/volatile/vpn-auth’ is group or others accessible
Feb 11 21:05:20 d717891 openvpn[2012]: Thu Feb 11 21:05:20 2021 OpenVPN 2.4.7 arm-poky-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 2 2020
Feb 11 21:05:20 d717891 openvpn[2012]: Thu Feb 11 21:05:20 2021 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
Feb 11 21:05:20 d717891 openvpn[2012]: Thu Feb 11 21:05:20 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 11 21:05:21 d717891 openvpn[2012]: Thu Feb 11 21:05:21 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]3.227.28.93:443
Feb 11 21:05:21 d717891 openvpn[2012]: Thu Feb 11 21:05:21 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
Feb 11 21:05:21 d717891 openvpn[2012]: Thu Feb 11 21:05:21 2021 Attempting to establish TCP connection with [AF_INET]3.227.28.93:443 [nonblock]
Feb 11 21:05:21 d717891 nm-dispatcher[2000]: resin-ntp-config: Found config.json in /mnt/boot/config.json .
Feb 11 21:05:21 d717891 nm-dispatcher[2000]: 200 OK
Feb 11 21:05:21 d717891 e5ceffc858dd[1445]: [debug] Finished applying target state
Feb 11 21:05:21 d717891 resin-supervisor[1719]: [debug] Finished applying target state
Feb 11 21:05:21 d717891 resin-supervisor[1719]: [success] Device state apply success
Feb 11 21:05:21 d717891 e5ceffc858dd[1445]: [success] Device state apply success
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 TCP connection established with [AF_INET]3.227.28.93:443
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 TCP_CLIENT link local: (not bound)
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 TCP_CLIENT link remote: [AF_INET]3.227.28.93:443
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 TLS: Initial packet from [AF_INET]3.227.28.93:443, sid=cdc20f3c 49ea266f
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY OK: depth=1, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY KU OK
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 Validating certificate extended key usage
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY EKU OK
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 VERIFY OK: depth=0, C=US, ST=WA, O=balena.io, OU=balenaCloud, CN=vpn.balena-cloud.com
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Feb 11 21:05:22 d717891 openvpn[2012]: Thu Feb 11 21:05:22 2021 [vpn.balena-cloud.com] Peer Connection Initiated with [AF_INET]3.227.28.93:443
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 SENT CONTROL [vpn.balena-cloud.com]: ‘PUSH_REQUEST’ (status=1)
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 PUSH: Received control message: ‘PUSH_REPLY,sndbuf 0,rcvbuf 0,route 52.4.252.97,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.240.58.252 52.4.252.97,peer-id 0,cipher AES-256-GCM’
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: timers and/or timeouts modified
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: --sndbuf/–rcvbuf options modified
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 Socket Buffers: R=[131072->131072] S=[44800->44800]
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: --socket-flags option modified
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 Socket flags: TCP_NODELAY=1 succeeded
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: --ifconfig/up options modified
Feb 11 21:05:23 d717891 openvpn[2012]: Thu Feb 11 21:05:23 2021 OPTIONS IMPORT: route options modified

The rest of the log not pasted (too big). I can attach if that’s easier…

Hi there, if the device is online in the dashboard and you can open a terminal connection to the hostOS, then all you need to do is push a release as per the docs and the device will pick it up and run it…

You should probably delete the device from the dashboard, download a fresh image and then flash it with it using Etcher.

Hi. Were you able to reflash and deploy a release?