INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:01 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:01 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 96347 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ awk '{print $2}' ++ grep 'inet ' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.0G 4.8G 41M 17G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:06 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:06 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ cut -d / -f 1 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 96889 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:07 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:07 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 97144 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ grep -F 'inet 10.20.0.12/' ++++++ grep -m 1 vhost0 ++++++ awk '{print($NF)}' ++++++ ip address show +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:08 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:08 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 97348 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:09 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:09 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 97573 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.2G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:12 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:12 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 97917 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ head -n 1 ++ awk '{print $2}' Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.2G 18G 41M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.2G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:15 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:15 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 98456 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -m 1 vhost0 ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:23 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:23 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ cut -d / -f 1 +++ ip addr show dev ens3 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 99461 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ head -n 1 ++ awk '{print $2}' Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ grep -m 1 vhost0 ++++++ awk '{print($NF)}' +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' ++ grep inet + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + grep -q vrouter + lsmod + free -h total used free shared buff/cache available Mem: 31G 9.1G 18G 47M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 9.0G 18G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:25:36 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:25:36 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 +++ ip addr show dev ens3 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 100732 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.20.0.12 ++++++ cut -d , -f 1 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ awk '{print $2}' ++++++ grep -o 'dev.*' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ grep inet ++ ip addr show dev ens6 ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.9G 18G 41M 3.4G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.9G 19G 41M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:eb:14:9a vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:eb:14:9a Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 INFO: agent started in mode ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ mkdir -p /var/log/contrail/vrouter-agent ++ log_file=/var/log/contrail/vrouter-agent/console.log ++ touch /var/log/contrail/vrouter-agent/console.log ++ chmod 600 /var/log/contrail/vrouter-agent/console.log ++ exec +++ tee -a /var/log/contrail/vrouter-agent/console.log +++ date ++ echo 'INFO: =================== Mon Oct 21 02:26:03 UTC 2024 ===================' INFO: =================== Mon Oct 21 02:26:03 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 +++ cut -d / -f 1 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.32 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.32 ++ ANALYTICSDB_NODES=10.0.0.32 ++ ANALYTICS_SNMP_NODES=10.0.0.32 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8081 ' +++ '[' -n '10.0.0.32:8081 ' ']' +++ echo 10.0.0.32:8081 ++ ANALYTICS_SERVERS=10.0.0.32:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9042 ' +++ '[' -n '10.0.0.32:9042 ' ']' +++ echo 10.0.0.32:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.32:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.32 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8086 ' +++ '[' -n '10.0.0.32:8086 ' ']' +++ echo 10.0.0.32:8086 ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.32 ++ CONFIGDB_NODES=10.0.0.32 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:8082 ' +++ '[' -n '10.0.0.32:8082 ' ']' +++ echo 10.0.0.32:8082 ++ CONFIG_SERVERS=10.0.0.32:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9161 ' +++ '[' -n '10.0.0.32:9161 ' ']' +++ echo 10.0.0.32:9161 ++ CONFIGDB_SERVERS=10.0.0.32:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9041 ' +++ '[' -n '10.0.0.32:9041 ' ']' +++ echo 10.0.0.32:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.32:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.12 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.12 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.32 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:2181, +++ '[' -n 10.0.0.32:2181, ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS=10.0.0.32:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:2181 ' +++ '[' -n '10.0.0.32:2181 ' ']' +++ echo 10.0.0.32:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.32:2181 ++ RABBITMQ_NODES=10.0.0.32 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+=10.0.0.32:5673, +++ '[' -n 10.0.0.32:5673, ']' +++ echo 10.0.0.32:5673 ++ RABBITMQ_SERVERS=10.0.0.32:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:6379 ' +++ '[' -n '10.0.0.32:6379 ' ']' +++ echo 10.0.0.32:6379 ++ REDIS_SERVERS=10.0.0.32:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.32 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.32 +++ local server_address=10.0.0.32 +++ extended_server_list+='10.0.0.32:9092 ' +++ '[' -n '10.0.0.32:9092 ' ']' +++ echo 10.0.0.32:9092 ++ KAFKA_SERVERS=10.0.0.32:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.32 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.32 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 105669 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ awk '{print $2}' ++ grep 'inet ' Device "vhost0" does not exist. ++ head -n 1 + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ cut -d , -f 1 ++++++ echo 10.20.0.12 +++++ local first_item=10.20.0.12 +++++ resolve_host_ip 10.20.0.12 +++++ local name_or_ip=10.20.0.12 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' ++++ node_ip=10.20.0.12 +++++ get_gateway_nic_for_ip 10.20.0.12 +++++ command -v ip +++++ local ip=10.20.0.12 ++++++ ip route get 10.20.0.12 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.20.0.12/' ++++++ awk '{print($NF)}' +++++ iface=ens6 +++++ echo ens6 ++++ local iface=ens6 ++++ echo ens6 +++ iface=ens6 +++ [[ -z ens6 ]] +++ echo ens6 ++ nic=ens6 +++ get_iface_mac ens6 +++ local nic=ens6 +++ cat /sys/class/net/ens6/address ++ mac=fa:16:3e:eb:14:9a ++ [[ ens6 == '' ]] ++ [[ fa:16:3e:eb:14:9a == '' ]] ++ [[ ens6 == \v\h\o\s\t\0 ]] ++ echo ens6 fa:16:3e:eb:14:9a + '[' -z '' ']' ++ get_addrs_for_nic ens6 ++ local nic=ens6 ++ ip addr show dev ens6 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' ++ get_iface_mtu ens6 ++ local nic=ens6 ++ cat /sys/class/net/ens6/mtu + mtu=1500 ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' +++ grep default +++ ip route list dev ens6 ++ routes_list= ++ '[' -n '' ']' + routes='10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a' INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:eb:14:9a + create_vhost0 ens6 fa:16:3e:eb:14:9a + local phys_int=ens6 + local phys_int_mac=fa:16:3e:eb:14:9a + local vhost0_mac=fa:16:3e:eb:14:9a + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.3G 19G 40M 3.4G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.3G 19G 40M 3.1G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter insmod /lib/modules/5.15.0-100-generic/updates/dkms/vrouter.ko + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + declare q r s mask str i + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-0 ++ cut -d - -f2 + q=0 + r=0 + s=0 + (( mask=1<<0 )) + str=(`printf "%x" $mask`) ++ printf %x 1 + '[' 0 -gt 0 ']' + echo 1 ++ cat /sys/class/net/pkt1/queues/rx-0/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-0/rps_cpus\n01' INFO: /sys/class/net/pkt1/queues/rx-0/rps_cpus 01 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-1 ++ cut -d - -f2 + q=1 + r=1 + s=0 + (( mask=1<<1 )) + str=(`printf "%x" $mask`) ++ printf %x 2 + '[' 0 -gt 0 ']' + echo 2 ++ cat /sys/class/net/pkt1/queues/rx-1/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-1/rps_cpus\n02' INFO: /sys/class/net/pkt1/queues/rx-1/rps_cpus 02 + for f in '/sys/class/net/$1/queues/rx-*' ++ cut -d - -f2 ++ echo /sys/class/net/pkt1/queues/rx-2 + q=2 + r=2 + s=0 + (( mask=1<<2 )) + str=(`printf "%x" $mask`) ++ printf %x 4 + '[' 0 -gt 0 ']' + echo 4 ++ cat /sys/class/net/pkt1/queues/rx-2/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-2/rps_cpus\n04' INFO: /sys/class/net/pkt1/queues/rx-2/rps_cpus 04 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-3 ++ cut -d - -f2 + q=3 + r=3 + s=0 + (( mask=1<<3 )) + str=(`printf "%x" $mask`) ++ printf %x 8 + '[' 0 -gt 0 ']' + echo 8 ++ cat /sys/class/net/pkt1/queues/rx-3/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-3/rps_cpus\n08' INFO: /sys/class/net/pkt1/queues/rx-3/rps_cpus 08 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-4 ++ cut -d - -f2 + q=4 + r=4 + s=0 + (( mask=1<<4 )) + str=(`printf "%x" $mask`) ++ printf %x 16 + '[' 0 -gt 0 ']' + echo 10 ++ cat /sys/class/net/pkt1/queues/rx-4/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-4/rps_cpus\n10' INFO: /sys/class/net/pkt1/queues/rx-4/rps_cpus 10 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-5 ++ cut -d - -f2 + q=5 + r=5 + s=0 + (( mask=1<<5 )) + str=(`printf "%x" $mask`) ++ printf %x 32 + '[' 0 -gt 0 ']' + echo 20 ++ cat /sys/class/net/pkt1/queues/rx-5/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-5/rps_cpus\n20' INFO: /sys/class/net/pkt1/queues/rx-5/rps_cpus 20 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-6 ++ cut -d - -f2 + q=6 + r=6 + s=0 + (( mask=1<<6 )) + str=(`printf "%x" $mask`) ++ printf %x 64 + '[' 0 -gt 0 ']' + echo 40 ++ cat /sys/class/net/pkt1/queues/rx-6/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-6/rps_cpus\n40' INFO: /sys/class/net/pkt1/queues/rx-6/rps_cpus 40 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-7 ++ cut -d - -f2 + q=7 + r=7 + s=0 + (( mask=1<<7 )) + str=(`printf "%x" $mask`) ++ printf %x 128 + '[' 0 -gt 0 ']' + echo 80 ++ cat /sys/class/net/pkt1/queues/rx-7/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-7/rps_cpus\n80' INFO: /sys/class/net/pkt1/queues/rx-7/rps_cpus 80 + ip link set dev pkt1 up + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + declare q r s mask str i + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-0 ++ cut -d - -f2 + q=0 + r=0 + s=0 + (( mask=1<<0 )) + str=(`printf "%x" $mask`) ++ printf %x 1 + '[' 0 -gt 0 ']' + echo 1 ++ cat /sys/class/net/pkt2/queues/rx-0/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-0/rps_cpus\n01' INFO: /sys/class/net/pkt2/queues/rx-0/rps_cpus 01 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-1 ++ cut -d - -f2 + q=1 + r=1 + s=0 + (( mask=1<<1 )) + str=(`printf "%x" $mask`) ++ printf %x 2 + '[' 0 -gt 0 ']' + echo 2 ++ cat /sys/class/net/pkt2/queues/rx-1/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-1/rps_cpus\n02' INFO: /sys/class/net/pkt2/queues/rx-1/rps_cpus 02 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-2 ++ cut -d - -f2 + q=2 + r=2 + s=0 + (( mask=1<<2 )) + str=(`printf "%x" $mask`) ++ printf %x 4 + '[' 0 -gt 0 ']' + echo 4 ++ cat /sys/class/net/pkt2/queues/rx-2/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-2/rps_cpus\n04' INFO: /sys/class/net/pkt2/queues/rx-2/rps_cpus 04 + for f in '/sys/class/net/$1/queues/rx-*' ++ cut -d - -f2 ++ echo /sys/class/net/pkt2/queues/rx-3 + q=3 + r=3 + s=0 + (( mask=1<<3 )) + str=(`printf "%x" $mask`) ++ printf %x 8 + '[' 0 -gt 0 ']' + echo 8 ++ cat /sys/class/net/pkt2/queues/rx-3/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-3/rps_cpus\n08' INFO: /sys/class/net/pkt2/queues/rx-3/rps_cpus 08 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-4 ++ cut -d - -f2 + q=4 + r=4 + s=0 + (( mask=1<<4 )) + str=(`printf "%x" $mask`) ++ printf %x 16 + '[' 0 -gt 0 ']' + echo 10 ++ cat /sys/class/net/pkt2/queues/rx-4/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-4/rps_cpus\n10' INFO: /sys/class/net/pkt2/queues/rx-4/rps_cpus 10 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-5 ++ cut -d - -f2 + q=5 + r=5 + s=0 + (( mask=1<<5 )) + str=(`printf "%x" $mask`) ++ printf %x 32 + '[' 0 -gt 0 ']' + echo 20 ++ cat /sys/class/net/pkt2/queues/rx-5/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-5/rps_cpus\n20' INFO: /sys/class/net/pkt2/queues/rx-5/rps_cpus 20 + for f in '/sys/class/net/$1/queues/rx-*' ++ cut -d - -f2 ++ echo /sys/class/net/pkt2/queues/rx-6 + q=6 + r=6 + s=0 + (( mask=1<<6 )) + str=(`printf "%x" $mask`) ++ printf %x 64 + '[' 0 -gt 0 ']' + echo 40 ++ cat /sys/class/net/pkt2/queues/rx-6/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-6/rps_cpus\n40' INFO: /sys/class/net/pkt2/queues/rx-6/rps_cpus 40 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-7 ++ cut -d - -f2 + q=7 + r=7 + s=0 + (( mask=1<<7 )) + str=(`printf "%x" $mask`) ++ printf %x 128 + '[' 0 -gt 0 ']' + echo 80 ++ cat /sys/class/net/pkt2/queues/rx-7/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-7/rps_cpus\n80' INFO: /sys/class/net/pkt2/queues/rx-7/rps_cpus 80 + ip link set dev pkt2 up + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + declare q r s mask str i + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-0 ++ cut -d - -f2 + q=0 + r=0 + s=0 + (( mask=1<<0 )) + str=(`printf "%x" $mask`) ++ printf %x 1 + '[' 0 -gt 0 ']' + echo 1 ++ cat /sys/class/net/pkt3/queues/rx-0/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-0/rps_cpus\n01' INFO: /sys/class/net/pkt3/queues/rx-0/rps_cpus 01 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-1 ++ cut -d - -f2 + q=1 + r=1 + s=0 + (( mask=1<<1 )) + str=(`printf "%x" $mask`) ++ printf %x 2 + '[' 0 -gt 0 ']' + echo 2 ++ cat /sys/class/net/pkt3/queues/rx-1/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-1/rps_cpus\n02' INFO: /sys/class/net/pkt3/queues/rx-1/rps_cpus 02 + for f in '/sys/class/net/$1/queues/rx-*' ++ cut -d - -f2 ++ echo /sys/class/net/pkt3/queues/rx-2 + q=2 + r=2 + s=0 + (( mask=1<<2 )) + str=(`printf "%x" $mask`) ++ printf %x 4 + '[' 0 -gt 0 ']' + echo 4 ++ cat /sys/class/net/pkt3/queues/rx-2/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-2/rps_cpus\n04' INFO: /sys/class/net/pkt3/queues/rx-2/rps_cpus 04 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-3 ++ cut -d - -f2 + q=3 + r=3 + s=0 + (( mask=1<<3 )) + str=(`printf "%x" $mask`) ++ printf %x 8 + '[' 0 -gt 0 ']' + echo 8 ++ cat /sys/class/net/pkt3/queues/rx-3/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-3/rps_cpus\n08' INFO: /sys/class/net/pkt3/queues/rx-3/rps_cpus 08 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-4 ++ cut -d - -f2 + q=4 + r=4 + s=0 + (( mask=1<<4 )) + str=(`printf "%x" $mask`) ++ printf %x 16 + '[' 0 -gt 0 ']' + echo 10 ++ cat /sys/class/net/pkt3/queues/rx-4/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-4/rps_cpus\n10' INFO: /sys/class/net/pkt3/queues/rx-4/rps_cpus 10 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-5 ++ cut -d - -f2 + q=5 + r=5 + s=0 + (( mask=1<<5 )) + str=(`printf "%x" $mask`) ++ printf %x 32 + '[' 0 -gt 0 ']' + echo 20 ++ cat /sys/class/net/pkt3/queues/rx-5/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-5/rps_cpus\n20' INFO: /sys/class/net/pkt3/queues/rx-5/rps_cpus 20 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-6 ++ cut -d - -f2 + q=6 + r=6 + s=0 + (( mask=1<<6 )) + str=(`printf "%x" $mask`) ++ printf %x 64 + '[' 0 -gt 0 ']' + echo 40 ++ cat /sys/class/net/pkt3/queues/rx-6/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-6/rps_cpus\n40' INFO: /sys/class/net/pkt3/queues/rx-6/rps_cpus 40 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-7 ++ cut -d - -f2 + q=7 + r=7 + s=0 + (( mask=1<<7 )) + str=(`printf "%x" $mask`) ++ printf %x 128 + '[' 0 -gt 0 ']' + echo 80 ++ cat /sys/class/net/pkt3/queues/rx-7/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-7/rps_cpus\n80' INFO: /sys/class/net/pkt3/queues/rx-7/rps_cpus 80 + ip link set dev pkt3 up + vif --create vhost0 --mac fa:16:3e:eb:14:9a + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens6 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:eb:14:9a ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens6 --mac fa:16:3e:eb:14:9a --vrf 0 --vhost-phys --type physical + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:eb:14:9a --vrf 0 --type vhost --xconnect ens6 + ip link set dev vhost0 address fa:16:3e:eb:14:9a + ip link set dev vhost0 up + bind_type=kernel + bind_int=ens6 + local ret=0 + [[ -e /etc/sysconfig/network-scripts/ifcfg-ens6 ]] + [[ -e /etc/sysconfig/network-scripts/contrail.org.ifcfg-ens6 ]] + [[ -e /etc/sysconfig/network-scripts/ifcfg-vhost0 ]] + echo 'INFO: there is no ifcfg-ens6 and ifcfg-vhost0, so initialize vhost0 manually' INFO: there is no ifcfg-ens6 and ifcfg-vhost0, so initialize vhost0 manually + is_dpdk + test kernel == dpdk + kill_dhcp_clients ens6 + local phys_int=ens6 ++ get_dhcp_client_pids ens6 +++ ps -A -o pid,cmd +++ grep dhclient +++ grep ens6 +++ awk '{print $1}' +++ grep -v grep ++ local pids= ++ echo + local dhcpcl_id= + '[' -n '' ']' + echo 'INFO: Changing physical interface to vhost in ip table' INFO: Changing physical interface to vhost in ip table + echo '10.20.0.12/24 brd 10.20.0.255 fe80::f816:3eff:feeb:149a/64' + IFS= + read -r line + is_dpdk + test kernel == dpdk ++ echo 10.20.0.12/24 brd 10.20.0.255 ++ cut -d ' ' -f 1 + local addr_to_del=10.20.0.12/24 + ip address delete 10.20.0.12/24 dev ens6 ++ echo 10.20.0.12/24 brd 10.20.0.255 ++ sed s/brd/broadcast/ + local 'addr_to_add=10.20.0.12/24 broadcast 10.20.0.255' + ip address add 10.20.0.12/24 broadcast 10.20.0.255 dev vhost0 + IFS= + read -r line + is_dpdk + test kernel == dpdk ++ echo fe80::f816:3eff:feeb:149a/64 ++ cut -d ' ' -f 1 + local addr_to_del=fe80::f816:3eff:feeb:149a/64 + ip address delete fe80::f816:3eff:feeb:149a/64 dev ens6 ++ echo fe80::f816:3eff:feeb:149a/64 ++ sed s/brd/broadcast/ + local addr_to_add=fe80::f816:3eff:feeb:149a/64 + ip address add fe80::f816:3eff:feeb:149a/64 dev vhost0 RTNETLINK answers: File exists + echo 'ERROR: failed to add address fe80::f816:3eff:feeb:149a/64 to vhost0.' ERROR: failed to add address fe80::f816:3eff:feeb:149a/64 to vhost0. + ret=1 + IFS= + read -r line + [[ -n 1500 ]] + echo 'INFO: set mtu' INFO: set mtu + ip link set dev vhost0 mtu 1500 + '[' -n 1500 ']' + check_physical_mtu 1500 ens6 + local mtu=1500 + local phys_int=ens6 ++ cat /sys/class/net/ens6/mtu + local mtu_after_vhost=1500 + [[ 1500 != \1\5\0\0 ]] + set_dev_routes vhost0 '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + local dev=vhost0 + local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' ']' + local route ++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 ' + IFS= + read -r route + echo 'INFO: ip route replace 10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 dev vhost0' INFO: ip route replace 10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 dev vhost0 + ip route replace 10.20.0.0/24 proto kernel scope link src 10.20.0.12 metric 100 dev vhost0 + IFS= + read -r route + is_dpdk + test kernel == dpdk ++ get_dev_routes ens6 ++ local dev=ens6 +++ ip route list dev ens6 +++ grep -v default ++ local routes_list= ++ '[' -n '' ']' +++ ip route list dev ens6 +++ grep default ++ routes_list= ++ '[' -n '' ']' + local _phys_int_routes= + del_dev_routes ens6 '' + local dev=ens6 + local routes_list= + '[' -n '' ']' + [[ 0 == 0 ]] + ensure_host_resolv_conf + local path=/etc/resolv.conf + local host_path=/host/etc/resolv.conf + [[ -e /etc/resolv.conf ]] + [[ -e /host/etc/resolv.conf ]] + diff -U 3 /host/etc/resolv.conf /etc/resolv.conf + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version + local loaded_vrouter_ver=nightly ++ modinfo -F version vrouter + local available_vrouter_ver=nightly + echo 'INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly' INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly + return 0 + [[ 0 != 0 ]] + '[' -e /etc/dhcp/dhclient.conf ']' ++ cat /sys/devices/virtual/dmi/id/chassis_vendor ++ cat /sys/devices/virtual/dmi/id/product_version + azure_or_gcp_or_aws='Red Hat 15.51.1-1.cmpt.el7' + [[ red hat 15.51.1-1.cmpt.el7 =~ ^(.*microsoft*.|.*google*.|.*amazon*.) ]] + check_vrouter_agent_settings + '[' -n '' ']' + nodes=(`echo $CONTROL_NODES | tr ',' ' '`) ++ echo 10.20.0.12 ++ tr , ' ' + local nodes + [[ 10 == 0 ]] ++ resolve_host_ip 10.20.0.12 ++ local name_or_ip=10.20.0.12 ++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' + local resolved_ip=10.20.0.12 ++ get_gateway_nic_for_ip 10.20.0.12 ++ command -v ip ++ local ip=10.20.0.12 +++ ip route get 10.20.0.12 +++ grep -o 'dev.*' +++ awk '{print $2}' ++ local iface=lo ++ [[ lo == \l\o ]] +++ ip address show +++ grep -F 'inet 10.20.0.12/' +++ awk '{print($NF)}' +++ grep -m 1 vhost0 ++ iface=vhost0 ++ '[' -z vhost0 ']' ++ echo vhost0 + local iface=vhost0 + [[ vhost0 != \v\h\o\s\t\0 ]] + (( 10 > 1 )) + for node in '${nodes[@]}' ++ resolve_host_ip 10.20.0.12 ++ local name_or_ip=10.20.0.12 ++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' + local resolved_ip=10.20.0.12 ++ get_gateway_nic_for_ip 10.20.0.12 ++ command -v ip ++ local ip=10.20.0.12 +++ ip route get 10.20.0.12 +++ grep -o 'dev.*' +++ awk '{print $2}' ++ local iface=lo ++ [[ lo == \l\o ]] +++ ip address show +++ grep -F 'inet 10.20.0.12/' +++ awk '{print($NF)}' +++ grep -m 1 vhost0 ++ iface=vhost0 ++ '[' -z vhost0 ']' ++ echo vhost0 + local cur_iface=vhost0 + [[ vhost0 != \v\h\o\s\t\0 ]] + return 0 + is_encryption_supported + local enc=False + [[ FALSE == \F\A\L\S\E ]] + return 1 + echo 'INFO: Kernel version does not support the driver required for vrouter to vrouter encryption' INFO: Kernel version does not support the driver required for vrouter to vrouter encryption + init_sriov + [[ -z '' ]] + [[ -z '' ]] + echo 'INFO: sriov parameters are not provided' INFO: sriov parameters are not provided + return + wait_vhost0 + local max=60 + local pause=5 + local i=0 + local 'grep_str=inet ' + [[ -n '' ]] + (( i=0 )) + (( i 0 )) + (( HUGE_PAGES_2MB > 0 )) + HUGEPAGES_DIR=/dev/hugepages + ensure_hugepages /dev/hugepages + local hp_dir=/dev/hugepages + hp_dir=/dev/hugepages + local mp + local fs ++ mount -t hugetlbfs ++ awk '{print($3)}' + for mp in '$(mount -t hugetlbfs | awk '\''{print($3)}'\'')' + [[ /dev/hugepages == \/\d\e\v\/\h\u\g\e\p\a\g\e\s ]] + return ++ cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages + allocated_pages_2MB=0 + echo 'INFO: Requested HP2MB 256 available 0' INFO: Requested HP2MB 256 available 0 + (( HUGE_PAGES_2MB > allocated_pages_2MB )) + echo 'INFO: Requested HP2MB 256 more then available 0.. try to allocate' INFO: Requested HP2MB 256 more then available 0.. try to allocate + echo 256 + local INTROSPECT_IP=0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + local COMPUTE_NODE_ADDRESS + [[ -n '' ]] + COMPUTE_NODE_ADDRESS=10.20.0.12 ++ get_server_list CONTROL ':5269 ' ++ local server_typ=CONTROL_NODES ++ local 'port_with_delim=:5269 ' ++ local server_list= ++ IFS=, ++ read -ra server_list ++ local extended_server_list= ++ for server in '"${server_list[@]}"' +++ echo 10.20.0.12 ++ local server_address=10.20.0.12 ++ extended_server_list+='10.20.0.12:5269 ' ++ '[' -n '10.20.0.12:5269 ' ']' ++ echo 10.20.0.12:5269 + local XMPP_SERVERS_LIST=10.20.0.12:5269 ++ get_ip_for_vrouter_from_control +++ get_iface_for_vrouter_from_control +++ local node_ip +++ [[ -n '' ]] ++++ echo +++ node_ip= +++ [[ -z '' ]] ++++ resolve_1st_control_node_ip +++++ echo 10.20.0.12 +++++ cut -d , -f 1 ++++ local first_item=10.20.0.12 ++++ resolve_host_ip 10.20.0.12 ++++ local name_or_ip=10.20.0.12 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.12'\''))' +++ node_ip=10.20.0.12 ++++ get_gateway_nic_for_ip 10.20.0.12 ++++ command -v ip ++++ local ip=10.20.0.12 +++++ ip route get 10.20.0.12 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=lo ++++ [[ lo == \l\o ]] +++++ ip address show +++++ grep -F 'inet 10.20.0.12/' +++++ awk '{print($NF)}' +++++ grep -m 1 vhost0 ++++ iface=vhost0 ++++ '[' -z vhost0 ']' ++++ echo vhost0 +++ local iface=vhost0 +++ echo vhost0 ++ local iface=vhost0 ++ get_ip_for_nic vhost0 ++ local nic=vhost0 ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ cut -d / -f 1 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 + local CONTROL_NETWORK_IP=10.20.0.12 ++ get_server_list DNS ':53 ' ++ local server_typ=DNS_NODES ++ local 'port_with_delim=:53 ' ++ local server_list= ++ IFS=, ++ read -ra server_list ++ local extended_server_list= ++ for server in '"${server_list[@]}"' +++ echo 10.20.0.12 ++ local server_address=10.20.0.12 ++ extended_server_list+='10.20.0.12:53 ' ++ '[' -n '10.20.0.12:53 ' ']' ++ echo 10.20.0.12:53 + local DNS_SERVERS_LIST=10.20.0.12:53 + local k8s_token_file + [[ -z '' ]] + k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token + [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]] + local result_params= + local key line ++ cat /parameters-template.sh + local 'params=AGENT_MODE= AGENT_NAME= AUTH_MODE= BARBICAN_PASSWORD= BARBICAN_TENANT_NAME= BARBICAN_USER= CLOUD_ORCHESTRATOR= COLLECTOR_SERVERS= COMPUTE_NODE_ADDRESS= CONFIG_API_SERVER_CA_CERTFILE= CONFIG_API_SSL_ENABLE= CONFIG_NODES= CONTAINER_LOG_DIR= CONTROL_NETWORK_IP= DEFAULT_LOCAL_IP= DNS_SERVERS_LIST= DPDK_UIO_DRIVER= FABRIC_SNAT_HASH_TABLE_SIZE= HUGEPAGES_DIR= HUGE_PAGES_1GB= HUGE_PAGES_2MB= HYPERVISOR_TYPE= INTROSPECT_IP= INTROSPECT_SSL_ENABLE= INTROSPECT_SSL_INSECURE= IS_ENCRYPTION_SUPPORTED_FLAG= IS_VLAN_ENABLED= K8S_TOKEN= KEYSTONE_AUTH_ADMIN_PORT= KEYSTONE_AUTH_CA_CERTFILE= KEYSTONE_AUTH_CERTFILE= KEYSTONE_AUTH_HOST= KEYSTONE_AUTH_INSECURE= KEYSTONE_AUTH_KEYFILE= KEYSTONE_AUTH_PROJECT_DOMAIN_NAME= KEYSTONE_AUTH_PROTO= KEYSTONE_AUTH_REGION_NAME= KEYSTONE_AUTH_REGION_NAME= KEYSTONE_AUTH_URL_TOKENS= KEYSTONE_AUTH_URL_VERSION= KEYSTONE_AUTH_USER_DOMAIN_NAME= KUBERNETES_API_PORT= KUBERNETES_API_SECURE_PORT= KUBERNETES_API_SERVER= L3MH_CIDR= LOG_LEVEL= LOG_LOCAL= METADATA_PROXY_SECRET= METADATA_SSL_CA_CERTFILE= METADATA_SSL_CERTFILE= METADATA_SSL_CERT_TYPE= METADATA_SSL_ENABLE= METADATA_SSL_KEYFILE= PCI_ADDRESS= PHYS_INT= PHYS_INT_MAC= PHYS_INT_IPS= PRIORITY_BANDWIDTH= PRIORITY_ID= PRIORITY_SCHEDULING= PRIORITY_TAGGING= QOS_DEF_HW_QUEUE= QOS_LOGICAL_QUEUES= QOS_QUEUE_ID= SAMPLE_DESTINATION= SANDESH_CA_CERTFILE= SANDESH_CERTFILE= SANDESH_KEYFILE= SANDESH_SERVER_CERTFILE= SANDESH_SERVER_KEYFILE= SANDESH_SSL_ENABLE= SLO_DESTINATION= STATS_COLLECTOR_DESTINATION_PATH= SUBCLUSTER= TSN_AGENT_MODE= TSN_NODES= VMWARE_PHYS_INT= VROUTER_AGENT_INTROSPECT_PORT= VROUTER_CIDR= VROUTER_CRYPT_INTERFACE= VROUTER_GATEWAY= XMPP_SERVER_CA_CERTFILE= XMPP_SERVER_CERTFILE= XMPP_SERVER_KEYFILE= XMPP_SERVERS_LIST= XMPP_SSL_ENABLE=' + read line ++ echo AGENT_MODE= ++ cut -d = -f 1 + key=AGENT_MODE + [[ -n AGENT_MODE ]] + read -r -d '' result_params + true + read line ++ echo AGENT_NAME= ++ cut -d = -f 1 + key=AGENT_NAME + [[ -n AGENT_NAME ]] + read -r -d '' result_params + true + read line ++ echo AUTH_MODE= ++ cut -d = -f 1 + key=AUTH_MODE + [[ -n AUTH_MODE ]] + read -r -d '' result_params + true + read line ++ echo BARBICAN_PASSWORD= ++ cut -d = -f 1 + key=BARBICAN_PASSWORD + [[ -n BARBICAN_PASSWORD ]] + read -r -d '' result_params + true + read line ++ echo BARBICAN_TENANT_NAME= ++ cut -d = -f 1 + key=BARBICAN_TENANT_NAME + [[ -n BARBICAN_TENANT_NAME ]] + read -r -d '' result_params + true + read line ++ echo BARBICAN_USER= ++ cut -d = -f 1 + key=BARBICAN_USER + [[ -n BARBICAN_USER ]] + read -r -d '' result_params + true + read line ++ echo CLOUD_ORCHESTRATOR= ++ cut -d = -f 1 + key=CLOUD_ORCHESTRATOR + [[ -n CLOUD_ORCHESTRATOR ]] + read -r -d '' result_params + true + read line ++ echo COLLECTOR_SERVERS= ++ cut -d = -f 1 + key=COLLECTOR_SERVERS + [[ -n COLLECTOR_SERVERS ]] + read -r -d '' result_params + true + read line ++ echo COMPUTE_NODE_ADDRESS= ++ cut -d = -f 1 + key=COMPUTE_NODE_ADDRESS + [[ -n COMPUTE_NODE_ADDRESS ]] + read -r -d '' result_params + true + read line ++ echo CONFIG_API_SERVER_CA_CERTFILE= ++ cut -d = -f 1 + key=CONFIG_API_SERVER_CA_CERTFILE + [[ -n CONFIG_API_SERVER_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo CONFIG_API_SSL_ENABLE= ++ cut -d = -f 1 + key=CONFIG_API_SSL_ENABLE + [[ -n CONFIG_API_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo CONFIG_NODES= ++ cut -d = -f 1 + key=CONFIG_NODES + [[ -n CONFIG_NODES ]] + read -r -d '' result_params + true + read line ++ echo CONTAINER_LOG_DIR= ++ cut -d = -f 1 + key=CONTAINER_LOG_DIR + [[ -n CONTAINER_LOG_DIR ]] + read -r -d '' result_params + true + read line ++ echo CONTROL_NETWORK_IP= ++ cut -d = -f 1 + key=CONTROL_NETWORK_IP + [[ -n CONTROL_NETWORK_IP ]] + read -r -d '' result_params + true + read line ++ echo DEFAULT_LOCAL_IP= ++ cut -d = -f 1 + key=DEFAULT_LOCAL_IP + [[ -n DEFAULT_LOCAL_IP ]] + read -r -d '' result_params + true + read line ++ echo DNS_SERVERS_LIST= ++ cut -d = -f 1 + key=DNS_SERVERS_LIST + [[ -n DNS_SERVERS_LIST ]] + read -r -d '' result_params + true + read line ++ echo DPDK_UIO_DRIVER= ++ cut -d = -f 1 + key=DPDK_UIO_DRIVER + [[ -n DPDK_UIO_DRIVER ]] + read -r -d '' result_params + true + read line ++ echo FABRIC_SNAT_HASH_TABLE_SIZE= ++ cut -d = -f 1 + key=FABRIC_SNAT_HASH_TABLE_SIZE + [[ -n FABRIC_SNAT_HASH_TABLE_SIZE ]] + read -r -d '' result_params + true + read line ++ echo HUGEPAGES_DIR= ++ cut -d = -f 1 + key=HUGEPAGES_DIR + [[ -n HUGEPAGES_DIR ]] + read -r -d '' result_params + true + read line ++ echo HUGE_PAGES_1GB= ++ cut -d = -f 1 + key=HUGE_PAGES_1GB + [[ -n HUGE_PAGES_1GB ]] + read -r -d '' result_params + true + read line ++ echo HUGE_PAGES_2MB= ++ cut -d = -f 1 + key=HUGE_PAGES_2MB + [[ -n HUGE_PAGES_2MB ]] + read -r -d '' result_params + true + read line ++ echo HYPERVISOR_TYPE= ++ cut -d = -f 1 + key=HYPERVISOR_TYPE + [[ -n HYPERVISOR_TYPE ]] + read -r -d '' result_params + true + read line ++ cut -d = -f 1 ++ echo INTROSPECT_IP= + key=INTROSPECT_IP + [[ -n INTROSPECT_IP ]] + read -r -d '' result_params + true + read line ++ echo INTROSPECT_SSL_ENABLE= ++ cut -d = -f 1 + key=INTROSPECT_SSL_ENABLE + [[ -n INTROSPECT_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo INTROSPECT_SSL_INSECURE= ++ cut -d = -f 1 + key=INTROSPECT_SSL_INSECURE + [[ -n INTROSPECT_SSL_INSECURE ]] + read -r -d '' result_params + true + read line ++ echo IS_ENCRYPTION_SUPPORTED_FLAG= ++ cut -d = -f 1 + key=IS_ENCRYPTION_SUPPORTED_FLAG + [[ -n IS_ENCRYPTION_SUPPORTED_FLAG ]] + read -r -d '' result_params + true + read line ++ echo IS_VLAN_ENABLED= ++ cut -d = -f 1 + key=IS_VLAN_ENABLED + [[ -n IS_VLAN_ENABLED ]] + read -r -d '' result_params + true + read line ++ echo K8S_TOKEN= ++ cut -d = -f 1 + key=K8S_TOKEN + [[ -n K8S_TOKEN ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_ADMIN_PORT= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_ADMIN_PORT + [[ -n KEYSTONE_AUTH_ADMIN_PORT ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_CA_CERTFILE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_CA_CERTFILE + [[ -n KEYSTONE_AUTH_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_CERTFILE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_CERTFILE + [[ -n KEYSTONE_AUTH_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_HOST= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_HOST + [[ -n KEYSTONE_AUTH_HOST ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_INSECURE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_INSECURE + [[ -n KEYSTONE_AUTH_INSECURE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_KEYFILE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_KEYFILE + [[ -n KEYSTONE_AUTH_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_PROJECT_DOMAIN_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_PROJECT_DOMAIN_NAME + [[ -n KEYSTONE_AUTH_PROJECT_DOMAIN_NAME ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_PROTO= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_PROTO + [[ -n KEYSTONE_AUTH_PROTO ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_REGION_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_REGION_NAME + [[ -n KEYSTONE_AUTH_REGION_NAME ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_REGION_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_REGION_NAME + [[ -n KEYSTONE_AUTH_REGION_NAME ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_URL_TOKENS= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_URL_TOKENS + [[ -n KEYSTONE_AUTH_URL_TOKENS ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_URL_VERSION= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_URL_VERSION + [[ -n KEYSTONE_AUTH_URL_VERSION ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_USER_DOMAIN_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_USER_DOMAIN_NAME + [[ -n KEYSTONE_AUTH_USER_DOMAIN_NAME ]] + read -r -d '' result_params + true + read line ++ echo KUBERNETES_API_PORT= ++ cut -d = -f 1 + key=KUBERNETES_API_PORT + [[ -n KUBERNETES_API_PORT ]] + read -r -d '' result_params + true + read line ++ echo KUBERNETES_API_SECURE_PORT= ++ cut -d = -f 1 + key=KUBERNETES_API_SECURE_PORT + [[ -n KUBERNETES_API_SECURE_PORT ]] + read -r -d '' result_params + true + read line ++ echo KUBERNETES_API_SERVER= ++ cut -d = -f 1 + key=KUBERNETES_API_SERVER + [[ -n KUBERNETES_API_SERVER ]] + read -r -d '' result_params + true + read line ++ echo L3MH_CIDR= ++ cut -d = -f 1 + key=L3MH_CIDR + [[ -n L3MH_CIDR ]] + read -r -d '' result_params + true + read line ++ echo LOG_LEVEL= ++ cut -d = -f 1 + key=LOG_LEVEL + [[ -n LOG_LEVEL ]] + read -r -d '' result_params + true + read line ++ echo LOG_LOCAL= ++ cut -d = -f 1 + key=LOG_LOCAL + [[ -n LOG_LOCAL ]] + read -r -d '' result_params + true + read line ++ echo METADATA_PROXY_SECRET= ++ cut -d = -f 1 + key=METADATA_PROXY_SECRET + [[ -n METADATA_PROXY_SECRET ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_CA_CERTFILE= ++ cut -d = -f 1 + key=METADATA_SSL_CA_CERTFILE + [[ -n METADATA_SSL_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_CERTFILE= ++ cut -d = -f 1 + key=METADATA_SSL_CERTFILE + [[ -n METADATA_SSL_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_CERT_TYPE= ++ cut -d = -f 1 + key=METADATA_SSL_CERT_TYPE + [[ -n METADATA_SSL_CERT_TYPE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_ENABLE= ++ cut -d = -f 1 + key=METADATA_SSL_ENABLE + [[ -n METADATA_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_KEYFILE= ++ cut -d = -f 1 + key=METADATA_SSL_KEYFILE + [[ -n METADATA_SSL_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo PCI_ADDRESS= ++ cut -d = -f 1 + key=PCI_ADDRESS + [[ -n PCI_ADDRESS ]] + read -r -d '' result_params + true + read line ++ echo PHYS_INT= ++ cut -d = -f 1 + key=PHYS_INT + [[ -n PHYS_INT ]] + read -r -d '' result_params + true + read line ++ echo PHYS_INT_MAC= ++ cut -d = -f 1 + key=PHYS_INT_MAC + [[ -n PHYS_INT_MAC ]] + read -r -d '' result_params + true + read line ++ echo PHYS_INT_IPS= ++ cut -d = -f 1 + key=PHYS_INT_IPS + [[ -n PHYS_INT_IPS ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_BANDWIDTH= ++ cut -d = -f 1 + key=PRIORITY_BANDWIDTH + [[ -n PRIORITY_BANDWIDTH ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_ID= ++ cut -d = -f 1 + key=PRIORITY_ID + [[ -n PRIORITY_ID ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_SCHEDULING= ++ cut -d = -f 1 + key=PRIORITY_SCHEDULING + [[ -n PRIORITY_SCHEDULING ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_TAGGING= ++ cut -d = -f 1 + key=PRIORITY_TAGGING + [[ -n PRIORITY_TAGGING ]] + read -r -d '' result_params + true + read line ++ echo QOS_DEF_HW_QUEUE= ++ cut -d = -f 1 + key=QOS_DEF_HW_QUEUE + [[ -n QOS_DEF_HW_QUEUE ]] + read -r -d '' result_params + true + read line ++ echo QOS_LOGICAL_QUEUES= ++ cut -d = -f 1 + key=QOS_LOGICAL_QUEUES + [[ -n QOS_LOGICAL_QUEUES ]] + read -r -d '' result_params + true + read line ++ echo QOS_QUEUE_ID= ++ cut -d = -f 1 + key=QOS_QUEUE_ID + [[ -n QOS_QUEUE_ID ]] + read -r -d '' result_params + true + read line ++ echo SAMPLE_DESTINATION= ++ cut -d = -f 1 + key=SAMPLE_DESTINATION + [[ -n SAMPLE_DESTINATION ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_CA_CERTFILE= ++ cut -d = -f 1 + key=SANDESH_CA_CERTFILE + [[ -n SANDESH_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_CERTFILE= ++ cut -d = -f 1 + key=SANDESH_CERTFILE + [[ -n SANDESH_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_KEYFILE= ++ cut -d = -f 1 + key=SANDESH_KEYFILE + [[ -n SANDESH_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_SERVER_CERTFILE= ++ cut -d = -f 1 + key=SANDESH_SERVER_CERTFILE + [[ -n SANDESH_SERVER_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_SERVER_KEYFILE= ++ cut -d = -f 1 + key=SANDESH_SERVER_KEYFILE + [[ -n SANDESH_SERVER_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_SSL_ENABLE= ++ cut -d = -f 1 + key=SANDESH_SSL_ENABLE + [[ -n SANDESH_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo SLO_DESTINATION= ++ cut -d = -f 1 + key=SLO_DESTINATION + [[ -n SLO_DESTINATION ]] + read -r -d '' result_params + true + read line ++ echo STATS_COLLECTOR_DESTINATION_PATH= ++ cut -d = -f 1 + key=STATS_COLLECTOR_DESTINATION_PATH + [[ -n STATS_COLLECTOR_DESTINATION_PATH ]] + read -r -d '' result_params + true + read line ++ echo SUBCLUSTER= ++ cut -d = -f 1 + key=SUBCLUSTER + [[ -n SUBCLUSTER ]] + read -r -d '' result_params + true + read line ++ echo TSN_AGENT_MODE= ++ cut -d = -f 1 + key=TSN_AGENT_MODE + [[ -n TSN_AGENT_MODE ]] + read -r -d '' result_params + true + read line ++ echo TSN_NODES= ++ cut -d = -f 1 + key=TSN_NODES + [[ -n TSN_NODES ]] + read -r -d '' result_params + true + read line ++ echo VMWARE_PHYS_INT= ++ cut -d = -f 1 + key=VMWARE_PHYS_INT + [[ -n VMWARE_PHYS_INT ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_AGENT_INTROSPECT_PORT= ++ cut -d = -f 1 + key=VROUTER_AGENT_INTROSPECT_PORT + [[ -n VROUTER_AGENT_INTROSPECT_PORT ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_CIDR= ++ cut -d = -f 1 + key=VROUTER_CIDR + [[ -n VROUTER_CIDR ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_CRYPT_INTERFACE= ++ cut -d = -f 1 + key=VROUTER_CRYPT_INTERFACE + [[ -n VROUTER_CRYPT_INTERFACE ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_GATEWAY= ++ cut -d = -f 1 + key=VROUTER_GATEWAY + [[ -n VROUTER_GATEWAY ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVER_CA_CERTFILE= ++ cut -d = -f 1 + key=XMPP_SERVER_CA_CERTFILE + [[ -n XMPP_SERVER_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ cut -d = -f 1 ++ echo XMPP_SERVER_CERTFILE= + key=XMPP_SERVER_CERTFILE + [[ -n XMPP_SERVER_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVER_KEYFILE= ++ cut -d = -f 1 + key=XMPP_SERVER_KEYFILE + [[ -n XMPP_SERVER_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVERS_LIST= ++ cut -d = -f 1 + key=XMPP_SERVERS_LIST + [[ -n XMPP_SERVERS_LIST ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SSL_ENABLE= ++ cut -d = -f 1 + key=XMPP_SSL_ENABLE + [[ -n XMPP_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ mktemp --dry-run + local tname=/tmp/tmp.iQrXN51H70 + echo 'AGENT_MODE="kernel" AGENT_NAME="cn-jenkins-deploy-platform-ansible-os-2121-1" AUTH_MODE="keystone" BARBICAN_PASSWORD="contrail123" BARBICAN_TENANT_NAME="service" BARBICAN_USER="barbican" CLOUD_ORCHESTRATOR="openstack" COLLECTOR_SERVERS="10.0.0.32:8086" COMPUTE_NODE_ADDRESS="10.20.0.12" CONFIG_API_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem" CONFIG_API_SSL_ENABLE="false" CONFIG_NODES="10.0.0.32" CONTAINER_LOG_DIR="/var/log/contrail/vrouter-agent" CONTROL_NETWORK_IP="10.20.0.12" DEFAULT_LOCAL_IP="10.0.0.32" DNS_SERVERS_LIST="10.20.0.12:53" DPDK_UIO_DRIVER="uio_pci_generic" FABRIC_SNAT_HASH_TABLE_SIZE="4096" HUGEPAGES_DIR="/dev/hugepages" HUGE_PAGES_1GB="0" HUGE_PAGES_2MB="256" HYPERVISOR_TYPE="kvm" INTROSPECT_IP="0.0.0.0" INTROSPECT_SSL_ENABLE="false" INTROSPECT_SSL_INSECURE="True" IS_ENCRYPTION_SUPPORTED_FLAG="false" IS_VLAN_ENABLED="false" K8S_TOKEN="" KEYSTONE_AUTH_ADMIN_PORT="5000" KEYSTONE_AUTH_CA_CERTFILE="" KEYSTONE_AUTH_CERTFILE="" KEYSTONE_AUTH_HOST="10.0.0.32" KEYSTONE_AUTH_INSECURE="True" KEYSTONE_AUTH_KEYFILE="" KEYSTONE_AUTH_PROJECT_DOMAIN_NAME="Default" KEYSTONE_AUTH_PROTO="http" KEYSTONE_AUTH_REGION_NAME="RegionOne" KEYSTONE_AUTH_REGION_NAME="RegionOne" KEYSTONE_AUTH_URL_TOKENS="/v3/auth/tokens" KEYSTONE_AUTH_URL_VERSION="/v3" KEYSTONE_AUTH_USER_DOMAIN_NAME="Default" KUBERNETES_API_PORT="" KUBERNETES_API_SECURE_PORT="" KUBERNETES_API_SERVER="" L3MH_CIDR="" LOG_LEVEL="SYS_DEBUG" LOG_LOCAL="1" METADATA_PROXY_SECRET="contrail" METADATA_SSL_CA_CERTFILE="" METADATA_SSL_CERTFILE="" METADATA_SSL_CERT_TYPE="" METADATA_SSL_ENABLE="false" METADATA_SSL_KEYFILE="" PCI_ADDRESS="0000:00:06.0" PHYS_INT="ens6" PHYS_INT_MAC="fa:16:3e:eb:14:9a" PHYS_INT_IPS="" PRIORITY_BANDWIDTH="" PRIORITY_ID="" PRIORITY_SCHEDULING="" PRIORITY_TAGGING="True" QOS_DEF_HW_QUEUE="False" QOS_LOGICAL_QUEUES="" QOS_QUEUE_ID="" SAMPLE_DESTINATION="collector" SANDESH_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem" SANDESH_CERTFILE="/etc/contrail/ssl/certs/server.pem" SANDESH_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem" SANDESH_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem" SANDESH_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem" SANDESH_SSL_ENABLE="false" SLO_DESTINATION="collector" STATS_COLLECTOR_DESTINATION_PATH="" SUBCLUSTER="" TSN_AGENT_MODE="" TSN_NODES="[]" VMWARE_PHYS_INT="" VROUTER_AGENT_INTROSPECT_PORT="" VROUTER_CIDR="10.20.0.12/24" VROUTER_CRYPT_INTERFACE="crypt0" VROUTER_GATEWAY="" XMPP_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem" XMPP_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem" XMPP_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem" XMPP_SERVERS_LIST="10.20.0.12:5269" XMPP_SSL_ENABLE="false"' + mv -f /tmp/tmp.iQrXN51H70 /parameters.sh ++ mktemp --dry-run + tname=/tmp/tmp.HPDZ2EY8Bd + echo ready + mv -f /tmp/tmp.HPDZ2EY8Bd /parameters_state + cleanup_lbaas_netns_config ++ ip netns ++ awk '/^vrouter-/{print $1}' + rm -rf '/var/lib/contrail/loadbalancer/*' + create_agent_config /usr/bin/contrail-vrouter-agent + echo 'INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf' INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf + [[ ! -f /parameters.sh ]] + source /parameters.sh ++ AGENT_MODE=kernel ++ AGENT_NAME=cn-jenkins-deploy-platform-ansible-os-2121-1 ++ AUTH_MODE=keystone ++ BARBICAN_PASSWORD=contrail123 ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ CLOUD_ORCHESTRATOR=openstack ++ COLLECTOR_SERVERS=10.0.0.32:8086 ++ COMPUTE_NODE_ADDRESS=10.20.0.12 ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_NODES=10.0.0.32 ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTROL_NETWORK_IP=10.20.0.12 ++ DEFAULT_LOCAL_IP=10.0.0.32 ++ DNS_SERVERS_LIST=10.20.0.12:53 ++ DPDK_UIO_DRIVER=uio_pci_generic ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ HUGEPAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HYPERVISOR_TYPE=kvm ++ INTROSPECT_IP=0.0.0.0 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ IS_ENCRYPTION_SUPPORTED_FLAG=false ++ IS_VLAN_ENABLED=false ++ K8S_TOKEN= ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_HOST=10.0.0.32 ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KUBERNETES_API_PORT= ++ KUBERNETES_API_SECURE_PORT= ++ KUBERNETES_API_SERVER= ++ L3MH_CIDR= ++ LOG_LEVEL=SYS_DEBUG ++ LOG_LOCAL=1 ++ METADATA_PROXY_SECRET=contrail ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_KEYFILE= ++ PCI_ADDRESS=0000:00:06.0 ++ PHYS_INT=ens6 ++ PHYS_INT_MAC=fa:16:3e:eb:14:9a ++ PHYS_INT_IPS= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_ID= ++ PRIORITY_SCHEDULING= ++ PRIORITY_TAGGING=True ++ QOS_DEF_HW_QUEUE=False ++ QOS_LOGICAL_QUEUES= ++ QOS_QUEUE_ID= ++ SAMPLE_DESTINATION=collector ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SSL_ENABLE=false ++ SLO_DESTINATION=collector ++ STATS_COLLECTOR_DESTINATION_PATH= ++ SUBCLUSTER= ++ TSN_AGENT_MODE= ++ TSN_NODES='[]' ++ VMWARE_PHYS_INT= ++ VROUTER_AGENT_INTROSPECT_PORT= ++ VROUTER_CIDR=10.20.0.12/24 ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_GATEWAY= ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVERS_LIST=10.20.0.12:5269 ++ XMPP_SSL_ENABLE=false + [[ -z ens6 ]] + [[ -z fa:16:3e:eb:14:9a ]] + echo 'INFO: Physical interface: nic=ens6, mac=fa:16:3e:eb:14:9a' INFO: Physical interface: nic=ens6, mac=fa:16:3e:eb:14:9a + local agent_mode_options=physical_interface_mac=fa:16:3e:eb:14:9a + [[ kernel == \d\p\d\k ]] + local tsn_agent_mode= + [[ -n '' ]] + local vrouter_opts= + local nic= + local phys_ints phys_ips gateway ipaddr + local binding_data_dir=/var/run/vrouter + [[ -n '' ]] + vrouter_opts=physical_interface=ens6 + [[ -n '' ]] + local subcluster_option= + [[ -n '' ]] + local tsn_server_list= + read -r -d '' tsn_server_list ++ tr , ' ' ++ echo '[]' + true + local priority_group_option priority_id_list priority_bandwidth_list priority_scheduling_list + local qos_niantic + [[ -n '' ]] + local qos_queueing_option= + local qos_queue_id qos_logical_queue qos_config qos_def + [[ -n '' ]] + local metadata_ssl_conf= + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + local crypt_interface_option= + [[ false == \t\r\u\e ]] + local hugepages_option= + local xmpp_certs_config sandesh_client_config collector_stats_config + (( HUGE_PAGES_1GB > 0 )) + (( HUGE_PAGES_2MB > 0 )) + read -r -d '' hugepages_option + true + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + xmpp_certs_config= + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + read -r -d '' sandesh_client_config + true + [[ -n '' ]] + collector_stats_config= + introspect_opts=http_server_ip=0.0.0.0 + '[' -n '' ']' + upgrade_old_logs vrouter-agent + local template=vrouter-agent ++ dirname /var/log/contrail/vrouter-agent + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/vrouter-agent + chmod 755 /var/log/contrail/vrouter-agent + mv -n '/var/log/contrail/*vrouter-agent.log*' /var/log/contrail/vrouter-agent/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/vrouter-agent + find /var/log/contrail/vrouter-agent -uid 0 -exec chown 1999:1999 '{}' + + mkdir -p /etc/contrail + cat + add_ini_params_from_env VROUTER_AGENT /etc/contrail/contrail-vrouter-agent.conf + local service_name=VROUTER_AGENT + local cfg_path=/etc/contrail/contrail-vrouter-agent.conf + local delim=__ ++ set -o posix ++ set ++ grep '^VROUTER_AGENT__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^VROUTER_AGENT__//g' + local vars= + local section= + echo 'INFO: /etc/contrail/contrail-vrouter-agent.conf' INFO: /etc/contrail/contrail-vrouter-agent.conf + cat /etc/contrail/contrail-vrouter-agent.conf [CONTROL-NODE] servers=10.20.0.12:5269 [DEFAULT] http_server_ip=0.0.0.0 collectors=10.0.0.32:8086 log_file=/var/log/contrail/vrouter-agent/contrail-vrouter-agent.log log_level=SYS_DEBUG log_local=1 hostname=cn-jenkins-deploy-platform-ansible-os-2121-1 agent_name=cn-jenkins-deploy-platform-ansible-os-2121-1 xmpp_dns_auth_enable=false xmpp_auth_enable=false physical_interface_mac=fa:16:3e:eb:14:9a tsn_servers = [] [SANDESH] introspect_ssl_enable=false sandesh_ssl_enable=false [NETWORKS] control_network_ip=10.20.0.12 [DNS] servers=10.20.0.12:53 [METADATA] metadata_proxy_secret=contrail [VIRTUAL-HOST-INTERFACE] name=vhost0 ip=10.20.0.12/24 compute_node_address=10.20.0.12 physical_interface=ens6 [SERVICE-INSTANCE] netns_command=/usr/bin/opencontrail-vrouter-netns docker_command=/usr/bin/opencontrail-vrouter-docker [HYPERVISOR] type = kvm [FLOWS] fabric_snat_hash_table_size = 4096 [SESSION] slo_destination = collector sample_destination = collector [RESTART] huge_page_2M=/dev/hugepages/bridge /dev/hugepages/flow + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + cat + start_agent /usr/bin/contrail-vrouter-agent + echo 'INFO: Run start_agent' INFO: Run start_agent + [[ ! -f /etc/contrail/contrail-vrouter-agent.conf ]] + set_qos + local interface_list mode policy slaves pci_addresses bond_numa + [[ -n '' ]] + [[ -n '' ]] + true + rm -f /var/run/restart_agent + [[ 1 == \0 ]] + echo 'INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent' INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent + local vrouter_agent_process=106538 + /usr/bin/contrail-vrouter-agent + echo 106538 + is_encryption_supported + local enc=False + [[ FALSE == \F\A\L\S\E ]] + return 1 + echo 'INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter' INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter + echo 'INFO: vrouter agent process PID: 106538' INFO: vrouter agent process PID: 106538 ++ cat /var/run/vrouter-agent.pid + wait 106538 Config file parsing completed. log4cplus:ERROR No appenders could be found for logger (root). log4cplus:ERROR Please initialize the log4cplus system properly. INFO: wait vhost0 to be initilaized... 0/60 INFO: vhost0 is ready. dev_idx = 12, dev_name = vhost0