Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Pre-requisite

Update below webpa URL in Webpa URL is configured in /etc/partners_defaults.json, for community profile update webpa URL - httpfor community profile from https://webpagithub.com/rdkcentral.com:8080/tr69hostif/blob/develop/partners_defaults.json#L60


Code Block
"Device.X_RDK_WebPA_Server.URL" : "https://
Code Block
"Device.X_RDK_WebPA_Server.URL" : "http://webpa.rdkcentral.com:8080",

...

Steps to validate

Restart tr69hostif or reboot the device once you made the above changes.

Restart parodus

Code Block
Sysetmctlsysetmctl restart parodus

Success Logs

Go to /opt/logs/parodus.log to see the logs

root@raspberrypi4-64-rdke:/opt/logs# ls -l parodus.log
-rw-rw-r--    1 root     root         13662 Dec 20 09:32 parodus.log

Code Block
Code Block
2024-12-05T11:21:38.296Z "parodus"[14903]:  241205-11:21:38.296193 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: webpa_backoff_max is 9
2024-12-05T11:21:38.296Z "parodus"[14903]:  241205-11:21:38.296228 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: cert_path is /etc/ssl/certs/ca-certificates.crt
2024-12-05T11:21:38.296Z "parodus"[14903]:  241205-11:21:38.296263 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: acquire jwt option is 1
2024-12-05T11:21:38.296Z "parodus"[14903]:  241205-11:21:38.296299 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: parodus dns-txt-url is webpa.rdkcentral.com
2024-12-05T11:21:38.297Z "parodus"[14903]:  241205-11:21:38.296395 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: 451 bytes read
2024-12-05T11:21:38.297Z "parodus"[14903]:  241205-11:21:38.296434 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: jwt_key is -----BEGIN PUBLIC KEY-----
2024-12-05T11:21:38.297Z "parodus"[14903]:  MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkZeQUMqDkMu/dQgTcycJ
2024-12-05T11:21:38.297Z "parodus"[14903]:  /rrgqfKQkoYFTMO7GnK87/OWiftHmtDJYPgktlcHheOPfkGln5ay1WJSitmtWNaH
2024-12-05T11:21:38.297Z "parodus"[14903]:  +RvBFK/ZsXpIuGm7R6wdSc7e6g9fTaSAfNX/+a8VxHUo58AinXxcq4LnHbuaGjEz
2024-12-05T11:21:38.297Z "parodus"[14903]:  jw77TLuZGyUuHiany8O8tc+DbnYKvRquScsccI6z/QwZKFtXUjJZ91hJ97zC8o7N
2024-12-05T11:21:38.297Z "parodus"[14903]:  Ae7n/Jg+Bs0uz9c1/bf/Jqbu6OidFbCr2FN42UupuAZ8DiPp2fWD5Q9qmp1ADk+V
2024-12-05T11:21:38.297Z "parodus"[14903]:  +TeZPxTCq/WB4dzSCd5v/FvFmO8tH6Ptkltij4pke7Dsi80TVRlcMDXAWxSFXOQV
2024-12-05T11:21:38.297Z "parodus"[14903]:  qwIDAQAB
2024-12-05T11:21:38.297Z "parodus"[14903]:  -----END PUBLIC KEY-----
2024-12-05T11:21:38.297Z "parodus"[14903]:  241205-11:21:38.296494 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: jwt_algo is 1024
2024-12-05T11:21:38.297Z "parodus"[14903]:  241205-11:21:38.296535 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: record_jwt_file is /tmp/xmidt-jwt-payload.json
2024-12-05T11:21:38.297Z "parodus"[14903]:  241205-11:21:38.296571 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: crud_config_file is /opt/parodus_cfg.json
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296605 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: hw_manufacturer is RaspberryPi
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296639 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: fw_name is lib32-middleware-test-image-RPI4-20241205084445
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296673 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: hw-model is RPI4
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296709 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: hw_serial_number is 100000001ab96f17
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296744 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: boot_time is 1733395663
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296778 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: hw_last_reboot_reason is HARD_POWER
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296813 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: client_cert_path is
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.296848 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: token_server_url is
2024-12-05T11:21:38.298Z "parodus"[14903]:  241205-11:21:38.298823 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: Received reboot_reason as:HARD_POWER
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.298883 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: Received reconnect_reason as:webpa_process_starts
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.298926 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: User-Agent: PARODUS-2.0-2.0.0-109-g7a3ebc6 (lib32-middleware-test-image-RPI4-20241205084445; RPI4/RaspberryPi;)
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299013 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: X-WebPA-Convey Header: [312]{"hw-model":"RPI4","hw-serial-number":"100000001ab96f17","hw-manufacturer":"RaspberryPi","fw-name
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299120 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: Device_id mac:d83add0aaa30
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299158 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: full url: httphttps://webpa.rdkcentral.com:8080
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299191 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: server address copied from url
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299233 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: server webpa.rdkcentral.com, port 8080, http_match 1
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299267 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: default server_Address webpa.rdkcentral.com
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299300 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: default port 8080
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299356 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: dns_txt_record_id d83add0aaa30.webpa.rdkcentral.com
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299404 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: nsbuf (1) 0x1287af0
2024-12-05T11:21:38.299Z "parodus"[14903]:  241205-11:21:38.299561 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: nquery: domain : d83add0aaa30.webpa.rdkcentral.com
2024-12-05T11:21:38.303Z "parodus"[14903]:  241205-11:21:38.303765 [mod=PARODUS, lvl=ERROR] [tid=14909] PARODUS: Error in res_nquery: No address associated with name
2024-12-05T11:21:38.303Z "parodus"[14903]:  241205-11:21:38.303821 [mod=PARODUS, lvl=ERROR] [tid=14909] PARODUS: nquery returns error: l value is -1
2024-12-05T11:21:38.304Z "parodus"[14903]:  241205-11:21:38.303858 [mod=PARODUS, lvl=ERROR] [tid=14909] PARODUS: Failed in DNS query
2024-12-05T11:21:38.307Z "parodus"[14903]:  241205-11:21:38.306810 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: ../../git/src/nopoll_conn.c:336 IPv4 address of webpa.rdkcentral.com is 52.88.248.43
2024-12-05T11:21:38.307Z "parodus"[14903]:
2024-12-05T11:21:38.307Z "parodus"[14903]:  241205-11:21:38.306984 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: ../../git/src/nopoll_conn.c:382 Create socket with non blocking-mode
2024-12-05T11:21:38.564Z "parodus"[14903]:  241205-11:21:38.563771 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: ../../git/src/nopoll_conn.c:263 Result of wait after connect EINPROGRESS = 0
2024-12-05T11:21:38.564Z "parodus"[14903]:
2024-12-05T11:21:38.825Z "parodus"[14903]:  241205-11:21:38.825398 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: ../../git/src/nopoll_conn.c:5397 *****End nopoll_conn_wait_for_status_until_connection_ready ****
2024-12-05T11:21:38.825Z "parodus"[14903]:  241205-11:21:38.825469 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: Connected to server
2024-12-05T11:21:38.825Z "parodus"[14903]:  241205-11:21:38.825526 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: connect_time-diff-boot_time=2035
2024-12-05T11:21:38.826Z "parodus"[14903]:  241205-11:21:38.825722 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: cloud_status set as online after successful connection
2024-12-05T11:21:38.826Z "parodus"[14903]:  241205-11:21:38.825760 [mod=PARODUS, lvl=INFO] [tid=14913] PARODUS: Received cloud status signal proceed to event processing
2024-12-05T11:21:38.827Z "parodus"[14903]:  241205-11:21:38.827338 [mod=PARODUS, lvl=INFO] [tid=14922] PARODUS: No clients are registered, waiting ..
2024-12-05T11:21:38.827Z "parodus"[14903]:  241205-11:21:38.827371 [mod=PARODUS, lvl=INFO] [tid=14909] PARODUS: libseshat disabled, Hence proceeding without registration
2024-12-05T11:21:38.827Z "parodus"[14903]:  241205-11:21:38.827478 [mod=PARODUS, lvl=INFO] [tid=14918] PARODUS: nanomsg server gone into the listening mode...
2024-12-05T11:21:39.526Z "parodus"[14903]:  241205-11:21:39.524831 [mod=PARODUS, lvl=INFO] [tid=14918] PARODUS: Upstream message received from nanomsg client
2024-12-05T11:21:39.526Z "parodus"[14903]:  241205-11:21:39.525052 [mod=PARODUS, lvl=INFO] [tid=14919] PARODUS:
2024-12-05T11:21:39.526Z "parodus"[14903]:   Nanomsg client Registration for Upstream
2024-12-05T11:21:39.526Z "parodus"[14903]:  241205-11:21:39.526034 [mod=PARODUS, lvl=INFO] [tid=14919] PARODUS: Adding first client to list
2024-12-05T11:21:39.526Z "parodus"[14903]:  241205-11:21:39.526087 [mod=PARODUS, lvl=INFO] [tid=14919] PARODUS: client service config is added to list with url: tcp://127.0.0.1:6667
2024-12-05T11:21:39.526Z "parodus"[14903]:  241205-11:21:39.526124 [mod=PARODUS, lvl=INFO] [tid=14919] PARODUS: sending auth status to reg client
2024-12-05T11:21:39.526Z "parodus"[14903]:  241205-11:21:39.526181 [mod=PARODUS, lvl=INFO] [tid=14919] PARODUS: Client config Registered successfully. Sending Acknowledgement...
2024-12-05T11:21:39.526Z "parodus"[14903]:   241205-11:21:39.526267 [mod=PARODUS, lvl=INFO] [tid=14919] PARODUS: Sending ack:new_node->sock 1 service:config


Example for Get parameter

...

Code Block

Dependencies - Enable maintanence manager, legacy network plugin dependency

...

curl -H 'Authorization:Basic d3B1c2VyOndlYnBhQDEyMzQ1Njc4OTAK' -i 'https://

...

webpa.rdkcentral.com:9003/

...

api/v2/device/mac:D83ADD0AAA30/config?names=Device.DeviceInfo.ModelName'
HTTP/1.1 200 OK
Content-Type: application/json
X-Midt-Server: tr1d1um
X-Midt-Version: development
X-Scytale-Build: 0.1.4
X-Scytale-Flavor: mint
X-Scytale-Region: east
X-Scytale-Server: webpa.rdkcentral.com
X-Scytale-Start-Time: 24 Sep 25 06:02 UTC
X-Talaria-Build: 0.1.4
X-Talaria-Flavor: mint
X-Talaria-Region: east
X-Talaria-Server: webpa.rdkcentral.com
X-Talaria-Start-Time: 09 Oct 25 12:01 UTC
X-Webpa-Transaction-Id: DDcTL6_TZTJa2C0azW0Jrg
X-Xmidt-Span: "https://webpa.rdkcentral.com:8080/api/v3/device/send","2025-11-27T05:57:25Z","263.74122ms"
Date: Thu, 27 Nov 2025 05:57:25 GMT
Content-Length: 143

{"parameters":[{"name":"Device.DeviceInfo.ModelName","value":"RDKERPi4","dataType":0,"parameterCount":1,"message":"Success"}],"statusCode":200}


Example for set parameter

Code Block
 curl -X PATCH https://webpa.rdkcentral.com:9003/api/v2/device/mac:D83ADD0AAA30/config -d '{"parameters": [ {"dataType": 3, "name": "Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.AppHibernate.Enable", "value": "true"}]}' -H 'Authorization:Basic d3B1c2VyOndlYnBhQDEyMzQ1Njc4OTAK'
{"parameters":[{"name":"Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.AppHibernate.Enable","message":"Success"}],"statusCode":200}


...

Enable rfcmgr distro - https://github.com/rdk-e/meta-rdk-video/pull/1828

In the partners_defaults.json, for community profile 

update xconf URL- "https://xconf.rdkcentral.com:19092"

CL : https://github.com/rdkcentral/tr69hostif/pull/1/files#diff-15f25a9d7e2978c0ad9de88995354f8bf2ab964b4d5c16fa516fe1440a9a5682R49

Update the configurations in XCONF server, when rfcMgr is invoked it updates the RFC parameter with value

manual validation can be possible by launching rfcMgr binary as well.

Code Block
/usr/bin/rfcMgr
Conf file /etc/debug.ini open success
root@raspberrypi4-64-rdke:~# rdk_dyn_log_initg_dl_socket = 3 __progname = rfcMgr
rdk_logger_init /etc/debug.ini Already Stack Level Logging processed... not processing again.
IARM_Bus_IsConnected invalid state
IARM_Init group name = com.comcast.rdk.iarm.bus member name = RDKVRFCMgrEvent
setting init done
Registering RDKVRFCMgrEvent
241206-12:22:36.124430 [mod=FWUPG, lvl=INFO] [tid=13480] doCurlInit: curl init success
 
241206-12:22:36.124880 [mod=FWUPG, lvl=INFO] [tid=13480] getJsonRpcData : CURL: Setting For jsonrpc_auth_token
 
241206-12:22:36.126891 [mod=FWUPG, lvl=INFO] [tid=13480] Curl Connected to http://127.0.0.1:9998/jsonrpc (127.0.0.1) port 9998
 
241206-12:22:36.127123 [mod=FWUPG, lvl=INFO] [tid=13480] Curl return code =0, http code=202
 
241206-12:22:36.127291 [mod=FWUPG, lvl=INFO] [tid=13480] In performRequest curl_ret_status =0
 
241206-12:22:36.127457 [mod=FWUPG, lvl=INFO] [tid=13480] getJsonRpcData : Bytes Downloaded=73 and curl ret status=0 and http code=202
 
241206-12:22:36.127623 [mod=FWUPG, lvl=INFO] [tid=13480] getJsonRpcData : data received ={"jsonrpc":"2.0","id":3,"error":{"code":2,"message":"ERROR_UNAVAILABLE"}}
 
241206-12:22:36.127798 [mod=FWUPG, lvl=INFO] [tid=13480] doStopDownload : CURL: free resources
 
241206-12:22:36.153992 [mod=RFCMGR, lvl=INFO] [tid=13480] XconfUrl: = https://xconf.rdkcentral.com:19092
241206-12:22:36.154129 [mod=RFCMGR, lvl=ERROR] [tid=13480] [ProcessRuntimeFeatureControlReq][619] Setting URL to https://xconf.rdkcentral.com:19092/featureControl/getSettings from Bootstrap config XCONF_BS_URL:https://xconf.rdkcentral.com:19092
241206-12:22:36.154301 [mod=RFCMGR, lvl=ERROR] [tid=13480] [DownloadRuntimeFeatutres][821] MTLS  certification Failed
241206-12:22:36.161206 [mod=FWUPG, lvl=INFO] [tid=13480] doCurlInit: curl init success
 
241206-12:22:36.161353 [mod=FWUPG, lvl=INFO] [tid=13480] doHttpFileDownload : CURL: setCommonCurlOpt Success
 
241206-12:22:36.161451 [mod=FWUPG, lvl=INFO] [tid=13480] urlHelperDownloadToMem: Header Data Request Set
 
241206-12:22:37.417594 [mod=FWUPG, lvl=INFO] [tid=13480] Curl Connected to https://xconf.rdkcentral.com:19092/featureControl/getSettings?estbMacAddress=D8:3A:DD:0A:AA:30&firmwareVersion=lib32-middleware-test-image-RPI4-20241205084445&env=dev&model=RPI4&controllerId=2504&channelMapId=2345&VodId=15660&partnerId=community&osClass=&accountId=&Experience=X1&version=2 (35.161.239.220) port 19092
 
241206-12:22:37.417735 [mod=FWUPG, lvl=INFO] [tid=13480] Curl return code =0, http code=200
 
241206-12:22:37.417828 [mod=FWUPG, lvl=INFO] [tid=13480] In performRequest curl_ret_status =0
 
241206-12:22:37.417921 [mod=FWUPG, lvl=INFO] [tid=13480] doHttpFileDownload : After curl operation no of bytes Downloaded=303 and curl ret status=0 and http code=200
 
241206-12:22:37.418013 [mod=FWUPG, lvl=INFO] [tid=13480] doStopDownload : CURL: free resources
 
241206-12:22:37.422727 [mod=RFCMGR, lvl=INFO] [tid=13480] [ProcessRuntimeFeatureControlReq][659] Continue processing RFC response.
241206-12:22:37.467785 [mod=RFCMGR, lvl=INFO] [tid=13480] [processXconfResponseConfigDataPart][1279] updated for Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Airplay.Enable from value old=false, to new=true
241206-12:22:37.484783 [mod=RFCMGR, lvl=INFO] [tid=13480] [processXconfResponseConfigDataPart][1279] updated for Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.SHORTS.Enable from value old=true, to new=false
241206-12:22:37.485773 [mod=RFCMGR, lvl=INFO] [tid=13480] [Features Enabled]-[STAGING]: RDKE_Feature_Testing=true,
241206-12:22:37.504350 [mod=RFCMGR, lvl=INFO] [tid=13480] [ProcessRuntimeFeatureControlReq][662] RFC processing Successfully.
241206-12:22:37.519361 [mod=RFCMGR, lvl=INFO] [tid=13480] [ProcessRuntimeFeatureControlReq][672] COMPLETED RFC PASS
RFC Settings for SNMPv3 is : true .
RFC Settings for SNMPv2 is : false .
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
iptables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip6tables: Chain already exists.
ip: RTNETLINK answers: No such file or directory
iptables v1.8.7 (legacy): invalid port/service `xxxx' specified
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.7 (legacy): Port "xxxx" does not resolve to anything.
 
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.7 (legacy): Port "xxxx" does not resolve to anything.
 
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.7 (legacy): Port "xxxx" does not resolve to anything.
 
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.7 (legacy): Port "xxxx" does not resolve to anything.
 
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.7 (legacy): invalid port/service `xxxx' specified
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.8.7 (legacy): invalid port/service `yyyy' specified
Try `iptables -h' or 'iptables --help' for more information.
241206-12:22:38.251043 [mod=RFCMGR, lvl=INFO] [tid=13480] [RFCManagerProcess][354] RFC:Post Processing Successfully Completed

iptable issue also observed created an issue request for this https://github.com/rdkcentral/rfc/issues/6

Telemetry 2.0
----------------

Set the following RFCs

tr181 -s -t boolean -v true Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.Enable
tr181 -s -t string -v 2.0.1 Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.Version
tr181 -s -t string -v https://xconf.rdkcentral.com:19092/loguploader/getT2Settings Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.ConfigURL

Confirm the values we set are returned

tr181 -g Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.Enable
tr181 -g Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.Version
tr181 -g Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.ConfigURL

set Multiprofile using rbuscli

rbuscli setvalues Device.X_RDKCENTRAL-COM_T2.ReportProfiles string '{
  "profiles": [
    {
      "name": "RDKV_LAKSHMI_Profile",
      "hash": "hash1",
      "value": {
        "Name": "RDKV_LAKSHMI_Profile",
        "Description": "Report to check Parameters",
        "Version": "1",
        "Protocol": "HTTP",
        "EncodingType": "JSON",
        "ReportingInterval": 60,
        "TimeReference": "0001-01-01T00:00:00Z",
        "Parameter": [
          {
            "type": "event",
            "eventName": "FREE_MEM_split",
            "component": "sysint",
            "use": "absolute"
          },
          {
            "type": "event",
            "eventName": "Xi_wifiMAC_split",
            "component": "sysint",
            "use": "absolute"
          },
          {
            "type": "event",
            "eventName": "INFO_ICMP_RFC",
            "component": "sysint",
            "use": "absolute"
          },
          {
            "type": "dataModel",
            "name": "mac",
            "reference": "Device.DeviceInfo.X_COMCAST-COM_STB_MAC"
          },
          {
            "type": "dataModel",
            "name": "TelemetryEnabled",
            "reference": "Device.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.Telemetry.Enable"
          },
          {
            "type": "dataModel",
            "name": "CpuUsage",
            "reference": "Device.DeviceInfo.ProcessStatus.CPUUsage"
          },
          {
            "type": "dataModel",
            "name": "Uptime",
            "reference": "Device.DeviceInfo.UpTime"
          },
          {
            "type": "dataModel",
            "name": "FreeMem",
            "reference": "Device.DeviceInfo.MemoryStatus.Total"
          },
          {
            "type": "dataModel",
            "name": "TotalMem",
            "reference": "Device.DeviceInfo.MemoryStatus.Free"
          }
        ],
        "HTTP": {
          "URL": "https://xconf.rdkcentral.com/xconf/logupload.php",
          "Compression": "None",
          "Method": "POST",
          "RequestURIParameter": [
            {
              "Name": "deviceId",
              "Reference": "Device.DeviceInfo.X_COMCAST-COM_STB_MAC"
            },
            {
              "Name": "reportName",
              "Reference": "Profile.Name"
            },
            {
              "Name": "reportVersion",
              "Reference": "Profile.Version"
            }
          ]
        },
        "JSONEncoding": {
          "ReportFormat": "NameValuePair",
          "ReportTimestamp": "Unix-Epoch"
        }
      }
    }
  ]
}' 

7. To get  "Xi_wifiMAC_split" event, reconnect ethernet to Wi-Fi or vice versa.

Logs:

Code Block
2024-11-07T10:39:51.023Z telemetry2_0[3676]:  LOG.RDK.T2: prepareJSONReport --Out
2024-11-07T10:39:51.023Z telemetry2_0[3676]:  LOG.RDK.T2: cJSON Report = {"Report":[{"mac":"D83ADD0AAA30"},{"TelemetryEnabled":"true"},{"CpuUsage":"2"},{"Uptime":"1752"
2024-11-07T10:39:51.023Z telemetry2_0[3676]:  LOG.RDK.T2: Report Size = 143
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: prepareHttpUrl: Default URL: https://xconf.rdkcentral.com/xconf/logupload.php
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: getParameterValue ++in
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: getRbusParameterVal ++in
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3305 Calling rbus_invokeRemoteMethod2 for [Device.DeviceInfo.X_COMCAST-COM_STB_MAC]
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3325 Received response for remote method invocation!
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3329 Response from the remote method is [0]!
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3336 Received valid response!
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: Device.DeviceInfo.X_COMCAST-COM_STB_MAC = D83ADD0AAA30
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: getRbusParameterVal --out
2024-11-07T10:39:51.024Z telemetry2_0[3676]:  LOG.RDK.T2: getParameterValue --out
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: prepareHttpUrl: Modified URL: https://xconf.rdkcentral.com/xconf/logupload.php?deviceId=D83ADD0AAA30&reportNam
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: sendReportOverHTTP ++in
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: getParameterValue ++in
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: getRbusParameterVal ++in
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3305 Calling rbus_invokeRemoteMethod2 for [Device.DeviceInfo.X_RDKCENTRAL-COM_Syndication.PartnerId]
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3325 Received response for remote method invocation!
2024-11-07T10:39:51.837Z telemetry2_0[3676]:  LOG.RDK.T2: rbus.c:3329 Response from the remote method is [1]!
2024-11-07T10:39:51.838Z telemetry2_0[3676]:  LOG.RDK.T2: Unable to get Device.DeviceInfo.X_RDKCENTRAL-COM_Syndication.PartnerId
2024-11-07T10:39:51.838Z telemetry2_0[3676]:  LOG.RDK.T2: getParameterValue --out

DCM

device.properties dependency is removed from the code. Log is not proceeding after this https://github.com/rdkcentral/dcm-agent/blob/082fd0adbab86423e0b4e5c6278a2659b427821d/dcm.c#L321

Enabled debug logs identified it is not returning properly from here https://github.com/rdkcentral/dcm-agent/blob/082fd0adbab86423e0b4e5c6278a2659b427821d/dcm_rbus.c#L382

I have updated the file dcm.properties with these values

LOG_SERVER=xconf.rdkcentral.com
DCM_LOG_SERVER=https://xconf.rdkcentral.com/xconf/logupload.php
DCM_LOG_SERVER_URL=https://xconf.rdkcentral.com:19092/loguploader/getSettings
DCM_SCP_SERVER=xconf.rdkcentral.com
HTTP_UPLOAD_LINK=https://xconf.rdkcentral.com/xconf/upload
DCA_UPLOAD_URL=https://stbrtl.r53.example.com

Still I am not getting logs after this https://github.com/rdkcentral/dcm-agent/blob/082fd0adbab86423e0b4e5c6278a2659b427821d/dcm.c#L321. I am not seeing any dependency of dcm.properties file in the latest code.

Attaching the log file here -

View file
namedcmscript.log
height250

Observations

1) dcm-log.service is not available in our side

2) Log rotate service is missing

Code Block
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: logrotate.service: Service hold-off time over, scheduling restart.
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: Stopped Log Rotation Timer Service (R).
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: Starting Log Rotation Timer Service (R)...
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[28661]: logrotate.service: Failed at step EXEC spawning /usr/sbin/logrotate: No such file or directory
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: logrotate.service: Control process exited, code=exited status=203
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: Failed to start Log Rotation Timer Service (R).
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: logrotate.service: Unit entered failed state.
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: logrotate.service: Failed with result 'exit-code'.
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: logrotate.service: Service hold-off time over, scheduling restart.
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: ctrlm-main.service: Main process exited, code=killed, status=11/SEGV
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: Stopped Log Rotation Timer Service (R).
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: logrotate.service: Start request repeated too quickly.
Dec 17 11:27:32 raspberrypi4-64-rdke systemd[1]: Failed to start Log Rotation Timer Service (R).