+++ date ++ echo 'INFO: =================== Mon Oct 28 01:54:01 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:01 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ head -n 1 +++ grep 'inet ' +++ awk '{print $2}' +++ cut -d / -f 1 ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8086 ' +++ '[' -n '10.0.0.30:8086 ' ']' +++ echo 10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:2181 ' +++ '[' -n '10.0.0.30:2181 ' ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] ++ get_listen_ip_for_node WEBUI +++ find_my_ip_and_order_for_node WEBUI +++ local server_typ=WEBUI_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.30 +++ local servers=10.0.0.30 +++ local server_list= +++ cut -d ' ' -f 1 +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ tr '\n' , ++++ uniq ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ grep -vi host +++ local local_ips=,10.0.0.30,10.129.221.1,127.0.0.1,172.17.0.1,252.30.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.30'\''))' +++ local server_ip=10.0.0.30 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.30 ]] +++ [[ ,10.0.0.30,10.129.221.1,127.0.0.1,172.17.0.1,252.30.0.1,, =~ ,10\.0\.0\.30, ]] +++ echo 10.0.0.30 1 +++ return ++ local ip=10.0.0.30 ++ [[ -z 10.0.0.30 ]] ++ echo 10.0.0.30 + host_ip=10.0.0.30 + init_tls + SSL_ENABLE=true + SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem + SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem + SERVER_CA_KEYFILE= + SERVER_CA_CERTFILE= + /certs-init.sh ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/webui-job ++ CONTAINER_LOG_DIR=/var/log/contrail/webui-job ++ mkdir -p /var/log/contrail/webui-job ++ log_file=/var/log/contrail/webui-job/console.log ++ touch /var/log/contrail/webui-job/console.log ++ chmod 600 /var/log/contrail/webui-job/console.log ++ exec +++ tee -a /var/log/contrail/webui-job/console.log +++ date +++ date ++ echo 'INFO: =================== Mon Oct 28 01:54:01 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:01 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh ++ echo 'INFO: =================== Mon Oct 28 01:54:01 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:01 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip +++ get_default_ip ++++ get_default_nic ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ command -v ip ++++ local ip=1 ++++ local ip=1 +++++ ip route get 1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ grep -o 'dev.*' +++++ awk '{print $2}' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ cut -d / -f 1 +++ cut -d / -f 1 +++ head -n 1 +++ head -n 1 +++ grep 'inet ' +++ grep 'inet ' +++ awk '{print $2}' +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=true ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SERVER_CA_CERTFILE= ++ SERVER_CA_KEYFILE= ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=true ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SERVER_CA_CERTFILE= ++ SERVER_CA_KEYFILE= ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ read -ra server_list +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8086 ' +++ extended_server_list+='10.0.0.30:8086 ' +++ '[' -n '10.0.0.30:8086 ' ']' +++ '[' -n '10.0.0.30:8086 ' ']' +++ echo 10.0.0.30:8086 +++ echo 10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ extended_server_list+='10.0.0.30:8082 ' +++ '[' -n '10.0.0.30:8082 ' ']' +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 +++ get_server_list CONFIGDB ':9161 ' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9161 ' +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 +++ echo 10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 +++ get_server_list CONFIGDB ':9041 ' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CONFIG_API_SERVER_CA_CERTFILE= ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE= ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CASSANDRA_SSL_CA_CERTFILE= ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CONFIG_API_SERVER_CA_CERTFILE= ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE= ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CASSANDRA_SSL_CA_CERTFILE= ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local port_with_delim=:2181, +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:2181 ' +++ extended_server_list+='10.0.0.30:2181 ' +++ '[' -n '10.0.0.30:2181 ' ']' +++ '[' -n '10.0.0.30:2181 ' ']' +++ echo 10.0.0.30:2181 +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SSL_CACERTFILE= ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE= ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SSL_CACERTFILE= ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE= ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 +++ echo 10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ REDIS_SSL_CACERTFILE= ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ REDIS_SSL_CACERTFILE= ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=true ++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ KAFKA_SSL_CACERTFILE= ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=true ++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ KAFKA_SSL_CACERTFILE= ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=true ++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ XMPP_SERVER_CA_CERTFILE= ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=true ++ INTROSPECT_SSL_INSECURE=True ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=true ++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ XMPP_SERVER_CA_CERTFILE= ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=true ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_CA_CERTFILE= ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=true ++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_CA_CERTFILE= ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=true ++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_CA_CERTFILE= ++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_CA_CERTFILE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ TORAGENT_SSL_CACERTFILE= ++ [[ /v3 == \/\v\2\.\0 ]] ++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ TORAGENT_SSL_CACERTFILE= ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled true ++ local val=true ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ read -r -d '' sandesh_client_config ++ true ++ true ++ is_enabled true ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ read -r -d '' xmpp_certs_config ++ true ++ true ++ is_enabled True ++ is_enabled True ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ read -r -d '' analytics_api_ssl_opts ++ true ++ true ++ read -r -d '' rabbitmq_config ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ read -r -d '' rabbit_config ++ true ++ true ++ is_enabled True ++ is_enabled True ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ read -r -d '' kafka_ssl_config ++ true ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + CA_PRIVATE_KEY_BITS=4096 ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + CA_PRIVATE_KEY_BITS=4096 + PRIVATE_KEY_BITS=2048 + PRIVATE_KEY_BITS=2048 + is_ssl_enabled + is_enabled true + local val=true + is_ssl_enabled + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + [[ true == \t\r\u\e ]] + [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-key.pem ]] + FORCE_GENERATE_CERT=false + [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-key.pem ]] + FORCE_GENERATE_CERT=false + [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]] ++ dirname /etc/contrail/webui_ssl/cs-cert.pem ++ dirname /etc/contrail/webui_ssl/cs-cert.pem + cert_dir_name=/etc/contrail/webui_ssl + cert_dir_name=/etc/contrail/webui_ssl + SERVER_CA_CERTFILE=/etc/contrail/webui_ssl/ca-cert.pem + SERVER_CA_CERTFILE=/etc/contrail/webui_ssl/ca-cert.pem + mkdir -p /etc/contrail/webui_ssl + mkdir -p /etc/contrail/webui_ssl ++ dirname /etc/contrail/webui_ssl/cs-key.pem ++ dirname /etc/contrail/webui_ssl/cs-key.pem + mkdir -p -m 750 /etc/contrail/webui_ssl + mkdir -p -m 750 /etc/contrail/webui_ssl ++ dirname /etc/contrail/webui_ssl/ca-cert.pem ++ dirname /etc/contrail/webui_ssl/ca-cert.pem + mkdir -p /etc/contrail/webui_ssl + mkdir -p /etc/contrail/webui_ssl ++ mktemp -p /etc/contrail/webui_ssl .lock.XXXXXXXX ++ mktemp -p /etc/contrail/webui_ssl .lock.XXXXXXXX + tmp_lock_name=/etc/contrail/webui_ssl/.lock.h2LwipJm + tmp_lock_name=/etc/contrail/webui_ssl/.lock.h2LwipJm + lock_file_name=/etc/contrail/webui_ssl/cs-cert.pem.lock + lock_file_name=/etc/contrail/webui_ssl/cs-cert.pem.lock + mv /etc/contrail/webui_ssl/.lock.h2LwipJm /etc/contrail/webui_ssl/cs-cert.pem.lock + mv /etc/contrail/webui_ssl/.lock.h2LwipJm /etc/contrail/webui_ssl/cs-cert.pem.lock + trap 'rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp' EXIT + ca_provider= + k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token + trap 'rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp' EXIT + ca_provider= + k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token + k8s_ca_file=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt + k8s_ca_file=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt + [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]] + [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]] ++ hostname -s ++ hostname -s + short_host_name=cn-jenkins-deploy-platform-juju-os-441-1 + short_host_name=cn-jenkins-deploy-platform-juju-os-441-1 ++ hostname -f ++ hostname -f + full_host_name=cn-jenkins-deploy-platform-juju-os-441-1 + full_host_name=cn-jenkins-deploy-platform-juju-os-441-1 ++ getent hosts ++ getent hosts ++ grep cn-jenkins-deploy-platform-juju-os-441-1 ++ grep cn-jenkins-deploy-platform-juju-os-441-1 ++ cut -d ' ' -f2- ++ cut -d ' ' -f2- ++ xargs ++ xargs + dns_names_all='cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1' + dns_names_all='cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1' ++ echo 'cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1' ++ echo 'cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1 cn-jenkins-deploy-platform-juju-os-441-1' ++ sort -u ++ tr ' ' '\n' ++ sort -u ++ tr ' ' '\n' + dns_names=cn-jenkins-deploy-platform-juju-os-441-1 + alt_names= + alt_name_num=1 + for n in '$dns_names' + '[' -z '' ']' + alt_names+='DNS.1 = cn-jenkins-deploy-platform-juju-os-441-1' + (( alt_name_num+=1 )) + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + alt_name_num=1 ++ get_local_ips ++ cat /proc/net/fib_trie ++ awk '/32 host/ { print f } {f=$2}' ++ grep -vi host + dns_names=cn-jenkins-deploy-platform-juju-os-441-1 + alt_names= + alt_name_num=1 + for n in '$dns_names' + '[' -z '' ']' + alt_names+='DNS.1 = cn-jenkins-deploy-platform-juju-os-441-1' + (( alt_name_num+=1 )) + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + alt_name_num=1 ++ get_local_ips ++ cat /proc/net/fib_trie ++ awk '/32 host/ { print f } {f=$2}' ++ grep -vi host ++ sort ++ sort ++ uniq ++ uniq + for ip in '$(get_local_ips)' + [[ 10.0.0.30 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.1 = 10.0.0.30' + (( alt_name_num+=1 )) + for ip in '$(get_local_ips)' + [[ 10.129.221.1 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.2 = 10.129.221.1' + (( alt_name_num+=1 )) + for ip in '$(get_local_ips)' + [[ 127.0.0.1 != \1\2\7\.\0\.\0\.\1 ]] + for ip in '$(get_local_ips)' + [[ 172.17.0.1 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.3 = 172.17.0.1' + (( alt_name_num+=1 )) + for ip in '$(get_local_ips)' + [[ 252.30.0.1 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.4 = 252.30.0.1' + (( alt_name_num+=1 )) + working_dir=/tmp/contrail_ssl_gen + SERVER_CA_KEYFILE=/tmp/contrail_ssl_gen/certs/ca.key.pem + rm -rf /tmp/contrail_ssl_gen + for ip in '$(get_local_ips)' + [[ 10.0.0.30 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.1 = 10.0.0.30' + (( alt_name_num+=1 )) + for ip in '$(get_local_ips)' + [[ 10.129.221.1 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.2 = 10.129.221.1' + (( alt_name_num+=1 )) + for ip in '$(get_local_ips)' + [[ 127.0.0.1 != \1\2\7\.\0\.\0\.\1 ]] + for ip in '$(get_local_ips)' + [[ 172.17.0.1 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.3 = 172.17.0.1' + (( alt_name_num+=1 )) + for ip in '$(get_local_ips)' + [[ 252.30.0.1 != \1\2\7\.\0\.\0\.\1 ]] + alt_names+='\nIP.4 = 252.30.0.1' + (( alt_name_num+=1 )) + working_dir=/tmp/contrail_ssl_gen + SERVER_CA_KEYFILE=/tmp/contrail_ssl_gen/certs/ca.key.pem + rm -rf /tmp/contrail_ssl_gen + mkdir -p /tmp/contrail_ssl_gen/certs + mkdir -p /tmp/contrail_ssl_gen/certs + touch /tmp/contrail_ssl_gen/index.txt /tmp/contrail_ssl_gen/index.txt.attr + touch /tmp/contrail_ssl_gen/index.txt /tmp/contrail_ssl_gen/index.txt.attr + echo 01 + openssl_config_file=/tmp/contrail_ssl_gen/contrail_openssl.cfg + cat + echo 01 + openssl_config_file=/tmp/contrail_ssl_gen/contrail_openssl.cfg + cat ++ echo -e DNS.1 = 'cn-jenkins-deploy-platform-juju-os-441-1\nIP.1' = '10.0.0.30\nIP.2' = '10.129.221.1\nIP.3' = '172.17.0.1\nIP.4' = 252.30.0.1 ++ echo -e DNS.1 = 'cn-jenkins-deploy-platform-juju-os-441-1\nIP.1' = '10.0.0.30\nIP.2' = '10.129.221.1\nIP.3' = '172.17.0.1\nIP.4' = 252.30.0.1 + echo 'INFO: openssl config file' INFO: openssl config file + cat /tmp/contrail_ssl_gen/contrail_openssl.cfg + echo 'INFO: openssl config file' INFO: openssl config file + cat /tmp/contrail_ssl_gen/contrail_openssl.cfg [req] default_bits = 2048 prompt = no default_md = sha256 default_days = 375 req_extensions = v3_req distinguished_name = req_distinguished_name x509_extensions = v3_ca [ req_distinguished_name ] commonName = Contrail countryName = US stateOrProvinceName = CA organizationName = JuniperNetworks organizationalUnitName = JuniperCA localityName = Sunnyvale [ v3_req ] basicConstraints = CA:false keyUsage = nonRepudiation, digitalSignature, keyEncipherment subjectAltName = @alt_names [ alt_names ] DNS.1 = cn-jenkins-deploy-platform-juju-os-441-1 IP.1 = 10.0.0.30 IP.2 = 10.129.221.1 IP.3 = 172.17.0.1 IP.4 = 252.30.0.1 [ ca ] default_ca = CA_default [ CA_default ] # Directory and file locations. dir = /tmp/contrail_ssl_gen crl_dir = $dir/crl new_certs_dir = $dir/certs database = $dir/index.txt serial = $dir/serial.txt RANDFILE = $dir/.rand # For certificate revocation lists. crlnumber = $dir/crlnumber crl = $dir/crl/crl.pem crl_extensions = crl_ext default_crl_days = 30 # The root key and root certificate. private_key = /tmp/contrail_ssl_gen/certs/ca.key.pem certificate = /etc/contrail/webui_ssl/ca-cert.pem # SHA-1 is deprecated, so use SHA-2 instead. default_md = sha256 name_opt = ca_default cert_opt = ca_default default_days = 375 preserve = no policy = policy_optional [ policy_optional ] countryName = optional stateOrProvinceName = optional organizationName = optional organizationalUnitName = optional commonName = supplied emailAddress = optional localityName = optional [ v3_ca] # Extensions for a typical CA # PKIX recommendation. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid:always,issuer:always basicConstraints = CA:true [ crl_ext ] authorityKeyIdentifier=keyid:always,issuer:always [req] default_bits = 2048 prompt = no default_md = sha256 default_days = 375 req_extensions = v3_req distinguished_name = req_distinguished_name x509_extensions = v3_ca [ req_distinguished_name ] commonName = Contrail countryName = US stateOrProvinceName = CA organizationName = JuniperNetworks organizationalUnitName = JuniperCA localityName = Sunnyvale [ v3_req ] basicConstraints = CA:false keyUsage = nonRepudiation, digitalSignature, keyEncipherment subjectAltName = @alt_names [ alt_names ] DNS.1 = cn-jenkins-deploy-platform-juju-os-441-1 IP.1 = 10.0.0.30 IP.2 = 10.129.221.1 IP.3 = 172.17.0.1 IP.4 = 252.30.0.1 [ ca ] default_ca = CA_default [ CA_default ] # Directory and file locations. dir = /tmp/contrail_ssl_gen crl_dir = $dir/crl new_certs_dir = $dir/certs database = $dir/index.txt serial = $dir/serial.txt RANDFILE = $dir/.rand # For certificate revocation lists. crlnumber = $dir/crlnumber crl = $dir/crl/crl.pem crl_extensions = crl_ext default_crl_days = 30 # The root key and root certificate. private_key = /tmp/contrail_ssl_gen/certs/ca.key.pem certificate = /etc/contrail/webui_ssl/ca-cert.pem # SHA-1 is deprecated, so use SHA-2 instead. default_md = sha256 name_opt = ca_default cert_opt = ca_default default_days = 375 preserve = no policy = policy_optional [ policy_optional ] countryName = optional stateOrProvinceName = optional organizationName = optional organizationalUnitName = optional commonName = supplied emailAddress = optional localityName = optional [ v3_ca] # Extensions for a typical CA # PKIX recommendation. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid:always,issuer:always basicConstraints = CA:true [ crl_ext ] authorityKeyIdentifier=keyid:always,issuer:always + [[ '' != \k\u\b\e\r\n\e\t\e\s ]] + generate_local_ca + [[ ! -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]] + openssl genrsa -out /tmp/contrail_ssl_gen/certs/ca.key.pem 4096 + [[ '' != \k\u\b\e\r\n\e\t\e\s ]] + generate_local_ca + [[ ! -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]] + openssl genrsa -out /tmp/contrail_ssl_gen/certs/ca.key.pem 4096 Generating RSA private key, 4096 bit long modulus Generating RSA private key, 4096 bit long modulus ........................................................................++++ ..............................................++++ e is 65537 (0x10001) e is 65537 (0x10001) ++ dirname /tmp/contrail_ssl_gen/certs/ca.key.pem ++ dirname /tmp/contrail_ssl_gen/certs/ca.key.pem + chgrp -R contrail /tmp/contrail_ssl_gen/certs + chgrp -R contrail /tmp/contrail_ssl_gen/certs + chmod 640 /tmp/contrail_ssl_gen/certs/ca.key.pem + chmod 640 /tmp/contrail_ssl_gen/certs/ca.key.pem + openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -new -x509 -days 365 -extensions v3_ca -key /tmp/contrail_ssl_gen/certs/ca.key.pem -out /etc/contrail/webui_ssl/ca-cert.pem + openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -new -x509 -days 365 -extensions v3_ca -key /tmp/contrail_ssl_gen/certs/ca.key.pem -out /etc/contrail/webui_ssl/ca-cert.pem + chmod 644 /etc/contrail/webui_ssl/ca-cert.pem + chmod 644 /etc/contrail/webui_ssl/ca-cert.pem ++ dirname /etc/contrail/webui_ssl/ca-cert.pem ++ dirname /etc/contrail/webui_ssl/ca-cert.pem + chgrp -R contrail /etc/contrail/webui_ssl + chgrp -R contrail /etc/contrail/webui_ssl + [[ -f /etc/contrail/webui_ssl/ca-cert.pem ]] + [[ -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]] + csr_file=/tmp/contrail_ssl_gen/server.pem.csr + openssl genrsa -out /etc/contrail/webui_ssl/cs-key.pem.tmp 2048 + [[ -f /etc/contrail/webui_ssl/ca-cert.pem ]] + [[ -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]] + csr_file=/tmp/contrail_ssl_gen/server.pem.csr + openssl genrsa -out /etc/contrail/webui_ssl/cs-key.pem.tmp 2048 Generating RSA private key, 2048 bit long modulus Generating RSA private key, 2048 bit long modulus ...............................................................................................................+++ ..+++ .+++++ + e is 65537 (0x10001) e is 65537 (0x10001) + chmod 640 /etc/contrail/webui_ssl/cs-key.pem.tmp + chmod 640 /etc/contrail/webui_ssl/cs-key.pem.tmp + openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -key /etc/contrail/webui_ssl/cs-key.pem.tmp -new -out /tmp/contrail_ssl_gen/server.pem.csr + openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -key /etc/contrail/webui_ssl/cs-key.pem.tmp -new -out /tmp/contrail_ssl_gen/server.pem.csr + [[ '' != \k\u\b\e\r\n\e\t\e\s ]] + sign_csr_local_ca + [[ '' != \k\u\b\e\r\n\e\t\e\s ]] + sign_csr_local_ca + yes + openssl ca -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -extensions v3_req -days 365 -in /tmp/contrail_ssl_gen/server.pem.csr -out /etc/contrail/webui_ssl/cs-cert.pem.tmp + yes + openssl ca -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -extensions v3_req -days 365 -in /tmp/contrail_ssl_gen/server.pem.csr -out /etc/contrail/webui_ssl/cs-cert.pem.tmp Using configuration from /tmp/contrail_ssl_gen/contrail_openssl.cfg Using configuration from /tmp/contrail_ssl_gen/contrail_openssl.cfg Check that the request matches the signature Check that the request matches the signature Signature ok Signature ok Certificate Details: Certificate Details: Serial Number: Serial Number: 1 (0x1) 1 (0x1) Validity Not Before: Oct 28 01:54:01 2024 GMT Not After : Oct 28 01:54:01 2025 GMT Subject: countryName = US stateOrProvinceName = CA organizationName = JuniperNetworks organizationalUnitName = JuniperCA commonName = Contrail localityName = Sunnyvale X509v3 extensions: X509v3 Basic Constraints: CA:FALSE X509v3 Key Usage: Digital Signature, Non Repudiation, Key Encipherment X509v3 Subject Alternative Name: DNS:cn-jenkins-deploy-platform-juju-os-441-1, IP Address:10.0.0.30, IP Address:10.129.221.1, IP Address:172.17.0.1, IP Address:252.30.0.1 Certificate is to be certified until Oct 28 01:54:01 2025 GMT (365 days) Sign the certificate? [y/n]: Validity Not Before: Oct 28 01:54:01 2024 GMT Not After : Oct 28 01:54:01 2025 GMT Subject: countryName = US stateOrProvinceName = CA organizationName = JuniperNetworks organizationalUnitName = JuniperCA commonName = Contrail localityName = Sunnyvale X509v3 extensions: X509v3 Basic Constraints: CA:FALSE X509v3 Key Usage: Digital Signature, Non Repudiation, Key Encipherment X509v3 Subject Alternative Name: DNS:cn-jenkins-deploy-platform-juju-os-441-1, IP Address:10.0.0.30, IP Address:10.129.221.1, IP Address:172.17.0.1, IP Address:252.30.0.1 Certificate is to be certified until Oct 28 01:54:01 2025 GMT (365 days) Sign the certificate? [y/n]: 1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries 1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries Data Base Updated Data Base Updated + chmod 644 /etc/contrail/webui_ssl/cs-cert.pem.tmp + chmod 644 /etc/contrail/webui_ssl/cs-cert.pem.tmp ++ dirname /etc/contrail/webui_ssl/cs-key.pem + chgrp -R contrail /etc/contrail/webui_ssl ++ dirname /etc/contrail/webui_ssl/cs-cert.pem + chgrp -R contrail /etc/contrail/webui_ssl ++ dirname /etc/contrail/webui_ssl/cs-key.pem + chgrp -R contrail /etc/contrail/webui_ssl ++ dirname /etc/contrail/webui_ssl/cs-cert.pem + chgrp -R contrail /etc/contrail/webui_ssl + mv /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-key.pem + mv /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-key.pem + mv /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem + mv /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem + rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp + rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp + orchestration_manager=openstack + [[ openstack == \k\u\b\e\r\n\e\t\e\s ]] + [[ openstack == \m\e\s\o\s ]] + [[ -n /v3 ]] + identityManager_apiVersion='['\''v3'\'']' + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cnfg_authProtocol=https + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + analytics_authProtocol=https + introspect_strict_ssl=false + [[ true == \f\a\l\s\e ]] + identityManager_strict_ssl=false + [[ true == \f\a\l\s\e ]] + '[' -n '' ']' + '[' -n '' ']' + set_to_lower orchestrationModuleEndPointFromConfig false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval orchestrationModuleEndPointFromConfig=false ++ orchestrationModuleEndPointFromConfig=false + set_to_lower contrailEndPointFromConfig true ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval contrailEndPointFromConfig=true ++ contrailEndPointFromConfig=true + set_to_lower regionsFromConfig false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval regionsFromConfig=false ++ regionsFromConfig=false + set_to_lower networkManager_strictSSL false ++ tr '[:upper:]' '[:lower:]' ++ echo false + local val=false + eval networkManager_strictSSL=false ++ networkManager_strictSSL=false + set_to_lower imageManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval imageManager_strictSSL=false ++ imageManager_strictSSL=false + set_to_lower computeManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval computeManager_strictSSL=false ++ computeManager_strictSSL=false + set_to_lower storageManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval storageManager_strictSSL=false ++ storageManager_strictSSL=false + set_to_lower cnfg_strictSSL True ++ tr '[:upper:]' '[:lower:]' ++ echo True + local val=true + eval cnfg_strictSSL=true ++ cnfg_strictSSL=true + set_to_lower analytics_strictSSL True ++ echo True ++ tr '[:upper:]' '[:lower:]' + local val=true + eval analytics_strictSSL=true ++ analytics_strictSSL=true + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + set_to_lower analytics_strictSSL false ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval analytics_strictSSL=true ++ analytics_strictSSL=true + set_to_lower cassandra_enable_edit false ++ tr '[:upper:]' '[:lower:]' ++ echo false + local val=false + eval cassandra_enable_edit=false ++ cassandra_enable_edit=false + set_to_lower WEBUI_INSECURE_ACCESS false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval WEBUI_INSECURE_ACCESS=false ++ WEBUI_INSECURE_ACCESS=false + set_to_lower serviceEndPointTakePublicURL true ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval serviceEndPointTakePublicURL=true ++ serviceEndPointTakePublicURL=true + mkdir -p /etc/contrail + cat ++ get_server_json_list CONFIG ++ server_typ=CONFIG_NODES +++ echo 10.0.0.30 +++ sed 's/,/'\'','\''/g' +++ sed 's/,*$//' +++ sed 's/^,*//' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list ANALYTICS ++ server_typ=ANALYTICS_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,*$//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list CONTROL ++ server_typ=CONTROL_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,*$//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list CONFIGDB ++ server_typ=CONFIGDB_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,/'\'','\''/g' +++ sed 's/,*$//' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' + [[ keystone == \n\o\a\u\t\h ]] + echo 'INFO: config /etc/contrail/config.global.js' INFO: config /etc/contrail/config.global.js + cat /etc/contrail/config.global.js /* * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. */ var config = {}; config.orchestration = {}; config.orchestration.Manager = "openstack"; config.orchestrationModuleEndPointFromConfig = false; config.contrailEndPointFromConfig = true; config.regionsFromConfig = false; config.endpoints = {}; config.endpoints.apiServiceType = "ApiServer"; config.endpoints.opServiceType = "OpServer"; config.regions = {}; config.regions.RegionOne = "http://127.0.0.1:5000/v2.0"; config.serviceEndPointTakePublicURL = true; config.networkManager = {}; config.networkManager.ip = "252.30.133.246"; config.networkManager.port = "9696"; config.networkManager.authProtocol = "http"; config.networkManager.apiVersion = []; config.networkManager.strictSSL = false; config.networkManager.ca = ""; config.imageManager = {}; config.imageManager.ip = "252.30.50.63"; config.imageManager.port = "9292"; config.imageManager.authProtocol = "http"; config.imageManager.apiVersion = ['v1', 'v2']; config.imageManager.strictSSL = false; config.imageManager.ca = ""; config.computeManager = {}; config.computeManager.ip = "252.30.42.113"; config.computeManager.port = "8774"; config.computeManager.authProtocol = "http"; config.computeManager.apiVersion = ['v1.1', 'v2']; config.computeManager.strictSSL = false; config.computeManager.ca = ""; config.identityManager = {}; config.identityManager.ip = "252.30.125.101"; config.identityManager.port = "5050"; config.identityManager.authProtocol = "http"; config.identityManager.apiVersion = ['v3']; config.identityManager.strictSSL = false; config.identityManager.ca = ""; config.storageManager = {}; config.storageManager.ip = "127.0.0.1"; config.storageManager.port = "8776"; config.storageManager.authProtocol = "http"; config.storageManager.apiVersion = ['v1']; config.storageManager.strictSSL = false; config.storageManager.ca = ""; config.cnfg = {}; config.cnfg.server_ip = ['10.0.0.30']; config.cnfg.server_port = "8082"; config.cnfg.authProtocol = "https"; config.cnfg.strictSSL = true; config.cnfg.ca = "/etc/contrail/ssl/certs/ca-cert.pem"; config.cnfg.statusURL = '/global-system-configs'; config.analytics = {}; config.analytics.server_ip = ['10.0.0.30']; config.analytics.server_port = "8081"; config.analytics.authProtocol = "https"; config.analytics.strictSSL = true; config.analytics.ca = "/etc/contrail/ssl/certs/ca-cert.pem"; config.analytics.statusURL = '/analytics/uves/bgp-peers'; config.dns = {}; config.dns.server_ip = ['10.0.0.30']; config.dns.server_port = '8092'; config.dns.statusURL = '/Snh_PageReq?x=AllEntries%20VdnsServersReq'; config.introspect = {}; config.introspect.ssl = {}; config.introspect.ssl.enabled = true; config.introspect.ssl.key = '/etc/contrail/ssl/private/server-privkey.pem'; config.introspect.ssl.cert = '/etc/contrail/ssl/certs/server.pem'; config.introspect.ssl.ca = '/etc/contrail/ssl/certs/ca-cert.pem'; config.introspect.ssl.strictSSL = false; config.jobServer = {}; config.jobServer.server_ip = '127.0.0.1'; config.jobServer.server_port = '3000'; config.files = {}; config.files.download_path = '/tmp'; config.cassandra = {}; config.cassandra.server_ips = ['10.0.0.30']; config.cassandra.server_port = '9041'; config.cassandra.enable_edit = false; config.cassandra.use_ssl = true; config.cassandra.ca_certs = '/etc/contrail/ssl/certs/ca-cert.pem'; config.kue = {}; config.kue.ui_port = '3002' config.webui_addresses = ['10.0.0.30']; config.insecure_access = false; config.http_port = '8180'; config.https_port = '8143'; config.require_auth = false; config.node_worker_count = 1; config.maxActiveJobs = 10; config.redisDBIndex = 3; config.CONTRAIL_SERVICE_RETRY_TIME = 300000; //5 minutes config.redis_server_port = '6379'; config.redis_server_ip = '127.0.0.1'; config.redis_dump_file = '/var/lib/redis/dump-webui.rdb'; config.redis_password = ''; config.logo_file = '/opt/contrail/images/logo.png'; config.favicon_file = '/opt/contrail/images/favicon.ico'; config.featurePkg = {}; config.featurePkg.webController = {}; config.featurePkg.webController.path = '/usr/src/contrail/contrail-web-controller'; config.featurePkg.webController.enable = true; config.qe = {}; config.qe.enable_stat_queries = false; config.logs = {}; config.logs.level = 'debug'; config.getDomainProjectsFromApiServer = false; config.network = {}; config.network.L2_enable = false; config.getDomainsFromApiServer = false; config.jsonSchemaPath = "/usr/src/contrail/contrail-web-core/src/serverroot/configJsonSchemas"; config.server_options = {}; config.server_options.key_file = '/etc/contrail/webui_ssl/cs-key.pem'; config.server_options.cert_file = '/etc/contrail/webui_ssl/cs-cert.pem'; config.server_options.ciphers = 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA'; module.exports = config; + cat + echo 'INFO: config /etc/contrail/contrail-webui-userauth.js' INFO: config /etc/contrail/contrail-webui-userauth.js + cat /etc/contrail/contrail-webui-userauth.js /* * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. */ var auth = {}; auth.admin_user = 'admin'; auth.admin_password = 'password'; auth.admin_token = ''; auth.admin_tenant_name = 'admin'; auth.project_domain_name = 'admin_domain'; auth.user_domain_name = 'admin_domain'; module.exports = auth; + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + run_service /usr/bin/node jobServerStart.js + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/node jobServerStart.js + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/node jobServerStart.js /usr/src/contrail/contrail-web-core/jobServerStart.js:168 throw err; ^ Redis connection to 127.0.0.1:6379 failed - connect ECONNREFUSED +++ date ++ echo 'INFO: =================== Mon Oct 28 01:54:02 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:02 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ cut -d / -f 1 +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8086 ' +++ '[' -n '10.0.0.30:8086 ' ']' +++ echo 10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:2181 ' +++ '[' -n '10.0.0.30:2181 ' ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] ++ get_listen_ip_for_node WEBUI +++ find_my_ip_and_order_for_node WEBUI +++ local server_typ=WEBUI_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.30 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.30 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ sort ++++ awk '/32 host/ { print f } {f=$2}' ++++ uniq +++ local local_ips=,10.0.0.30,10.129.221.1,127.0.0.1,172.17.0.1,252.30.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.30'\''))' +++ local server_ip=10.0.0.30 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.30 ]] +++ [[ ,10.0.0.30,10.129.221.1,127.0.0.1,172.17.0.1,252.30.0.1,, =~ ,10\.0\.0\.30, ]] +++ echo 10.0.0.30 1 +++ return ++ local ip=10.0.0.30 ++ [[ -z 10.0.0.30 ]] ++ echo 10.0.0.30 + host_ip=10.0.0.30 + init_tls + SSL_ENABLE=true + SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem + SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem + SERVER_CA_KEYFILE= + SERVER_CA_CERTFILE= + /certs-init.sh ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/webui-job ++ CONTAINER_LOG_DIR=/var/log/contrail/webui-job ++ mkdir -p /var/log/contrail/webui-job ++ log_file=/var/log/contrail/webui-job/console.log ++ touch /var/log/contrail/webui-job/console.log ++ chmod 600 /var/log/contrail/webui-job/console.log ++ exec +++ tee -a /var/log/contrail/webui-job/console.log +++ date +++ date ++ echo 'INFO: =================== Mon Oct 28 01:54:02 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:02 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ echo 'INFO: =================== Mon Oct 28 01:54:02 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:02 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh ++ source /contrail-functions.sh +++ get_default_ip +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ grep -o 'dev.*' +++++ awk '{print $2}' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ ip addr show dev ens3 +++ cut -d / -f 1 +++ awk '{print $2}' +++ cut -d / -f 1 +++ awk '{print $2}' +++ grep 'inet ' +++ grep 'inet ' +++ head -n 1 +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=true ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SERVER_CA_CERTFILE= ++ SERVER_CA_KEYFILE= ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=true ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SERVER_CA_CERTFILE= ++ SERVER_CA_KEYFILE= ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ local server_typ=ANALYTICS_NODES +++ get_server_list ANALYTICS ':8081 ' +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ local server_typ=ANALYTICS_NODES +++ IFS=, +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ read -ra server_list +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ local server_address=10.0.0.30 +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ local server_address=10.0.0.30 +++ echo 10.0.0.30:9042 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8086 ' +++ local server_address=10.0.0.30 +++ '[' -n '10.0.0.30:8086 ' ']' +++ extended_server_list+='10.0.0.30:8086 ' +++ echo 10.0.0.30:8086 +++ '[' -n '10.0.0.30:8086 ' ']' +++ echo 10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 ++++ echo 10.0.0.30 +++ get_server_list CONFIGDB ':9161 ' +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 +++ local server_typ=CONFIGDB_NODES +++ get_server_list CONFIGDB ':9161 ' +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ local server_address=10.0.0.30 +++ echo 10.0.0.30:9161 +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CONFIG_API_SERVER_CA_CERTFILE= ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE= ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CASSANDRA_SSL_CA_CERTFILE= ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CONFIG_API_SERVER_CA_CERTFILE= ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE= ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CASSANDRA_SSL_CA_CERTFILE= ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ local server_address=10.0.0.30 +++ echo 10.0.0.30:2181 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:2181 ' +++ extended_server_list+='10.0.0.30:2181 ' +++ '[' -n '10.0.0.30:2181 ' ']' +++ '[' -n '10.0.0.30:2181 ' ']' +++ echo 10.0.0.30:2181 +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ get_server_list RABBITMQ :5673, +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SSL_CACERTFILE= ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE= ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ REDIS_SSL_CACERTFILE= ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SSL_CACERTFILE= ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE= ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ REDIS_SSL_CACERTFILE= ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=true ++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ KAFKA_SSL_CACERTFILE= ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=true ++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ XMPP_SERVER_CA_CERTFILE= ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=true ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_CA_CERTFILE= ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=true ++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_CA_CERTFILE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=true ++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ KAFKA_SSL_CACERTFILE= ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=true ++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ XMPP_SERVER_CA_CERTFILE= ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=true ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_CA_CERTFILE= ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=true ++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_CA_CERTFILE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ TORAGENT_SSL_CACERTFILE= ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ TORAGENT_SSL_CACERTFILE= ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ true ++ is_enabled true ++ is_enabled true ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ read -r -d '' xmpp_certs_config ++ true ++ true ++ is_enabled True ++ is_enabled True ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ read -r -d '' analytics_api_ssl_opts ++ true ++ true ++ read -r -d '' rabbitmq_config ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ read -r -d '' rabbit_config ++ true ++ true ++ is_enabled True ++ is_enabled True ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ read -r -d '' rabbitmq_ssl_config ++ true ++ true ++ read -r -d '' kombu_ssl_config ++ read -r -d '' kombu_ssl_config ++ true ++ true ++ is_enabled true ++ is_enabled true ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ read -r -d '' kafka_ssl_config ++ true ++ true ++ [[ -n '' ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ collector_stats_config= ++ [[ -z x ]] ++ [[ -z x ]] ++ [[ -n '' ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + CA_PRIVATE_KEY_BITS=4096 + PRIVATE_KEY_BITS=2048 + is_ssl_enabled + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-key.pem ]] + FORCE_GENERATE_CERT=false + [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -f /etc/contrail/webui_ssl/cs-key.pem ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + echo 'INFO: cert and key files are already exist' INFO: cert and key files are already exist + exit 0 ++ [[ -z x ]] + orchestration_manager=openstack ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + CA_PRIVATE_KEY_BITS=4096 + PRIVATE_KEY_BITS=2048 + is_ssl_enabled + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-key.pem ]] + FORCE_GENERATE_CERT=false + [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -f /etc/contrail/webui_ssl/cs-key.pem ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + echo 'INFO: cert and key files are already exist' INFO: cert and key files are already exist + exit 0 + [[ openstack == \k\u\b\e\r\n\e\t\e\s ]] + [[ openstack == \m\e\s\o\s ]] + [[ -n /v3 ]] + identityManager_apiVersion='['\''v3'\'']' + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cnfg_authProtocol=https + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + analytics_authProtocol=https + introspect_strict_ssl=false + [[ true == \f\a\l\s\e ]] + identityManager_strict_ssl=false + [[ true == \f\a\l\s\e ]] + '[' -n '' ']' + '[' -n '' ']' + set_to_lower orchestrationModuleEndPointFromConfig false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval orchestrationModuleEndPointFromConfig=false ++ orchestrationModuleEndPointFromConfig=false + set_to_lower contrailEndPointFromConfig true ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval contrailEndPointFromConfig=true ++ contrailEndPointFromConfig=true + set_to_lower regionsFromConfig false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval regionsFromConfig=false ++ regionsFromConfig=false + set_to_lower networkManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval networkManager_strictSSL=false ++ networkManager_strictSSL=false + set_to_lower imageManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval imageManager_strictSSL=false ++ imageManager_strictSSL=false + set_to_lower computeManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval computeManager_strictSSL=false ++ computeManager_strictSSL=false + set_to_lower storageManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval storageManager_strictSSL=false ++ storageManager_strictSSL=false + set_to_lower cnfg_strictSSL True ++ echo True ++ tr '[:upper:]' '[:lower:]' + local val=true + eval cnfg_strictSSL=true ++ cnfg_strictSSL=true + set_to_lower analytics_strictSSL True ++ echo True ++ tr '[:upper:]' '[:lower:]' + local val=true + eval analytics_strictSSL=true ++ analytics_strictSSL=true + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + set_to_lower analytics_strictSSL false ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval analytics_strictSSL=true ++ analytics_strictSSL=true + set_to_lower cassandra_enable_edit false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval cassandra_enable_edit=false ++ cassandra_enable_edit=false + set_to_lower WEBUI_INSECURE_ACCESS false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval WEBUI_INSECURE_ACCESS=false ++ WEBUI_INSECURE_ACCESS=false + set_to_lower serviceEndPointTakePublicURL true ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval serviceEndPointTakePublicURL=true ++ serviceEndPointTakePublicURL=true + mkdir -p /etc/contrail + cat ++ get_server_json_list CONFIG ++ server_typ=CONFIG_NODES +++ echo 10.0.0.30 +++ sed 's/,*$//' +++ sed 's/^,*//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list ANALYTICS ++ server_typ=ANALYTICS_NODES +++ echo 10.0.0.30 +++ sed 's/,*$//' +++ sed 's/^,*//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list CONTROL ++ server_typ=CONTROL_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,/'\'','\''/g' +++ sed 's/,*$//' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list CONFIGDB ++ server_typ=CONFIGDB_NODES +++ echo 10.0.0.30 +++ sed 's/,*$//' +++ sed 's/^,*//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' + [[ keystone == \n\o\a\u\t\h ]] + echo 'INFO: config /etc/contrail/config.global.js' INFO: config /etc/contrail/config.global.js + cat /etc/contrail/config.global.js /* * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. */ var config = {}; config.orchestration = {}; config.orchestration.Manager = "openstack"; config.orchestrationModuleEndPointFromConfig = false; config.contrailEndPointFromConfig = true; config.regionsFromConfig = false; config.endpoints = {}; config.endpoints.apiServiceType = "ApiServer"; config.endpoints.opServiceType = "OpServer"; config.regions = {}; config.regions.RegionOne = "http://127.0.0.1:5000/v2.0"; config.serviceEndPointTakePublicURL = true; config.networkManager = {}; config.networkManager.ip = "252.30.133.246"; config.networkManager.port = "9696"; config.networkManager.authProtocol = "http"; config.networkManager.apiVersion = []; config.networkManager.strictSSL = false; config.networkManager.ca = ""; config.imageManager = {}; config.imageManager.ip = "252.30.50.63"; config.imageManager.port = "9292"; config.imageManager.authProtocol = "http"; config.imageManager.apiVersion = ['v1', 'v2']; config.imageManager.strictSSL = false; config.imageManager.ca = ""; config.computeManager = {}; config.computeManager.ip = "252.30.42.113"; config.computeManager.port = "8774"; config.computeManager.authProtocol = "http"; config.computeManager.apiVersion = ['v1.1', 'v2']; config.computeManager.strictSSL = false; config.computeManager.ca = ""; config.identityManager = {}; config.identityManager.ip = "252.30.125.101"; config.identityManager.port = "5050"; config.identityManager.authProtocol = "http"; config.identityManager.apiVersion = ['v3']; config.identityManager.strictSSL = false; config.identityManager.ca = ""; config.storageManager = {}; config.storageManager.ip = "127.0.0.1"; config.storageManager.port = "8776"; config.storageManager.authProtocol = "http"; config.storageManager.apiVersion = ['v1']; config.storageManager.strictSSL = false; config.storageManager.ca = ""; config.cnfg = {}; config.cnfg.server_ip = ['10.0.0.30']; config.cnfg.server_port = "8082"; config.cnfg.authProtocol = "https"; config.cnfg.strictSSL = true; config.cnfg.ca = "/etc/contrail/ssl/certs/ca-cert.pem"; config.cnfg.statusURL = '/global-system-configs'; config.analytics = {}; config.analytics.server_ip = ['10.0.0.30']; config.analytics.server_port = "8081"; config.analytics.authProtocol = "https"; config.analytics.strictSSL = true; config.analytics.ca = "/etc/contrail/ssl/certs/ca-cert.pem"; config.analytics.statusURL = '/analytics/uves/bgp-peers'; config.dns = {}; config.dns.server_ip = ['10.0.0.30']; config.dns.server_port = '8092'; config.dns.statusURL = '/Snh_PageReq?x=AllEntries%20VdnsServersReq'; config.introspect = {}; config.introspect.ssl = {}; config.introspect.ssl.enabled = true; config.introspect.ssl.key = '/etc/contrail/ssl/private/server-privkey.pem'; config.introspect.ssl.cert = '/etc/contrail/ssl/certs/server.pem'; config.introspect.ssl.ca = '/etc/contrail/ssl/certs/ca-cert.pem'; config.introspect.ssl.strictSSL = false; config.jobServer = {}; config.jobServer.server_ip = '127.0.0.1'; config.jobServer.server_port = '3000'; config.files = {}; config.files.download_path = '/tmp'; config.cassandra = {}; config.cassandra.server_ips = ['10.0.0.30']; config.cassandra.server_port = '9041'; config.cassandra.enable_edit = false; config.cassandra.use_ssl = true; config.cassandra.ca_certs = '/etc/contrail/ssl/certs/ca-cert.pem'; config.kue = {}; config.kue.ui_port = '3002' config.webui_addresses = ['10.0.0.30']; config.insecure_access = false; config.http_port = '8180'; config.https_port = '8143'; config.require_auth = false; config.node_worker_count = 1; config.maxActiveJobs = 10; config.redisDBIndex = 3; config.CONTRAIL_SERVICE_RETRY_TIME = 300000; //5 minutes config.redis_server_port = '6379'; config.redis_server_ip = '127.0.0.1'; config.redis_dump_file = '/var/lib/redis/dump-webui.rdb'; config.redis_password = ''; config.logo_file = '/opt/contrail/images/logo.png'; config.favicon_file = '/opt/contrail/images/favicon.ico'; config.featurePkg = {}; config.featurePkg.webController = {}; config.featurePkg.webController.path = '/usr/src/contrail/contrail-web-controller'; config.featurePkg.webController.enable = true; config.qe = {}; config.qe.enable_stat_queries = false; config.logs = {}; config.logs.level = 'debug'; config.getDomainProjectsFromApiServer = false; config.network = {}; config.network.L2_enable = false; config.getDomainsFromApiServer = false; config.jsonSchemaPath = "/usr/src/contrail/contrail-web-core/src/serverroot/configJsonSchemas"; config.server_options = {}; config.server_options.key_file = '/etc/contrail/webui_ssl/cs-key.pem'; config.server_options.cert_file = '/etc/contrail/webui_ssl/cs-cert.pem'; config.server_options.ciphers = 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA'; module.exports = config; + cat + echo 'INFO: config /etc/contrail/contrail-webui-userauth.js' INFO: config /etc/contrail/contrail-webui-userauth.js + cat /etc/contrail/contrail-webui-userauth.js /* * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. */ var auth = {}; auth.admin_user = 'admin'; auth.admin_password = 'password'; auth.admin_token = ''; auth.admin_tenant_name = 'admin'; auth.project_domain_name = 'admin_domain'; auth.user_domain_name = 'admin_domain'; module.exports = auth; + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + run_service /usr/bin/node jobServerStart.js + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/node jobServerStart.js + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/node jobServerStart.js /usr/src/contrail/contrail-web-core/jobServerStart.js:168 throw err; ^ Redis connection to 127.0.0.1:6379 failed - connect ECONNREFUSED +++ date ++ echo 'INFO: =================== Mon Oct 28 01:54:03 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:03 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ awk '{print $2}' +++ grep 'inet ' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8086 ' +++ '[' -n '10.0.0.30:8086 ' ']' +++ echo 10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:2181 ' +++ '[' -n '10.0.0.30:2181 ' ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] ++ get_listen_ip_for_node WEBUI +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node WEBUI +++ local server_typ=WEBUI_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.30 +++ local servers=10.0.0.30 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ sort ++++ awk '/32 host/ { print f } {f=$2}' ++++ uniq +++ local local_ips=,10.0.0.30,10.129.221.1,127.0.0.1,172.17.0.1,252.30.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.30'\''))' +++ local server_ip=10.0.0.30 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.30 ]] +++ [[ ,10.0.0.30,10.129.221.1,127.0.0.1,172.17.0.1,252.30.0.1,, =~ ,10\.0\.0\.30, ]] +++ echo 10.0.0.30 1 +++ return ++ local ip=10.0.0.30 ++ [[ -z 10.0.0.30 ]] ++ echo 10.0.0.30 + host_ip=10.0.0.30 + init_tls + SSL_ENABLE=true + SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem + SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem + SERVER_CA_KEYFILE= + SERVER_CA_CERTFILE= + /certs-init.sh ++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/webui-job ++ CONTAINER_LOG_DIR=/var/log/contrail/webui-job ++ mkdir -p /var/log/contrail/webui-job ++ log_file=/var/log/contrail/webui-job/console.log ++ touch /var/log/contrail/webui-job/console.log ++ chmod 600 /var/log/contrail/webui-job/console.log ++ exec +++ tee -a /var/log/contrail/webui-job/console.log +++ date +++ date ++ echo 'INFO: =================== Mon Oct 28 01:54:03 UTC 2024 ===================' ++ echo 'INFO: =================== Mon Oct 28 01:54:03 UTC 2024 ===================' INFO: =================== Mon Oct 28 01:54:03 UTC 2024 =================== INFO: =================== Mon Oct 28 01:54:03 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh ++ source /contrail-functions.sh +++ get_default_ip +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ cut -d / -f 1 +++ command -v ip +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ grep 'inet ' +++ head -n 1 +++ head -n 1 +++ awk '{print $2}' +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=true ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SERVER_CA_CERTFILE= ++ SERVER_CA_KEYFILE= ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 ++ DEFAULT_LOCAL_IP=10.0.0.30 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=true ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SERVER_CA_CERTFILE= ++ SERVER_CA_KEYFILE= ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.30 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.30 ++ ANALYTICSDB_NODES=10.0.0.30 ++ ANALYTICS_SNMP_NODES=10.0.0.30 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8081 ' +++ extended_server_list+='10.0.0.30:8081 ' +++ '[' -n '10.0.0.30:8081 ' ']' +++ '[' -n '10.0.0.30:8081 ' ']' +++ echo 10.0.0.30:8081 +++ echo 10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 ++ ANALYTICS_SERVERS=10.0.0.30:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9042 ' +++ extended_server_list+='10.0.0.30:9042 ' +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 +++ '[' -n '10.0.0.30:9042 ' ']' +++ echo 10.0.0.30:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.30:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.30 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8086 ' +++ '[' -n '10.0.0.30:8086 ' ']' +++ local server_address=10.0.0.30 +++ echo 10.0.0.30:8086 +++ extended_server_list+='10.0.0.30:8086 ' +++ '[' -n '10.0.0.30:8086 ' ']' +++ echo 10.0.0.30:8086 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 ++ COLLECTOR_SERVERS=10.0.0.30:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.30 ++ CONFIGDB_NODES=10.0.0.30 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:8082 ' +++ local server_address=10.0.0.30 +++ '[' -n '10.0.0.30:8082 ' ']' +++ extended_server_list+='10.0.0.30:8082 ' +++ echo 10.0.0.30:8082 +++ '[' -n '10.0.0.30:8082 ' ']' +++ echo 10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 ++ CONFIG_SERVERS=10.0.0.30:8082 +++ get_server_list CONFIGDB ':9161 ' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9161 ' +++ local server_address=10.0.0.30 +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 +++ extended_server_list+='10.0.0.30:9161 ' +++ '[' -n '10.0.0.30:9161 ' ']' +++ echo 10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 ++ CONFIGDB_SERVERS=10.0.0.30:9161 +++ get_server_list CONFIGDB ':9041 ' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9041 ' +++ '[' -n '10.0.0.30:9041 ' ']' +++ extended_server_list+='10.0.0.30:9041 ' +++ echo 10.0.0.30:9041 +++ '[' -n '10.0.0.30:9041 ' ']' +++ echo 10.0.0.30:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CONFIG_API_SERVER_CA_CERTFILE= ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE= ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CASSANDRA_SSL_CA_CERTFILE= ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 ++ CONFIGDB_CQL_SERVERS=10.0.0.30:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CONFIG_API_SERVER_CA_CERTFILE= ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE= ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ CASSANDRA_SSL_CA_CERTFILE= ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.30 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.30 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.30 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local port_with_delim=:2181, +++ local server_list= +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:2181, +++ '[' -n 10.0.0.30:2181, ']' +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS=10.0.0.30:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:2181 ' +++ extended_server_list+='10.0.0.30:2181 ' +++ '[' -n '10.0.0.30:2181 ' ']' +++ '[' -n '10.0.0.30:2181 ' ']' +++ echo 10.0.0.30:2181 +++ echo 10.0.0.30:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.30:2181 ++ RABBITMQ_NODES=10.0.0.30 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ IFS=, +++ read -ra server_list +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+=10.0.0.30:5673, +++ extended_server_list+=10.0.0.30:5673, +++ '[' -n 10.0.0.30:5673, ']' +++ '[' -n 10.0.0.30:5673, ']' +++ echo 10.0.0.30:5673 +++ echo 10.0.0.30:5673 ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SSL_CACERTFILE= ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SERVERS=10.0.0.30:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_SSL_CACERTFILE= ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE= ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= ++ RABBITMQ_CLIENT_SSL_CACERTFILE= ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ get_server_list ANALYTICS ':6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:6379 ' +++ extended_server_list+='10.0.0.30:6379 ' +++ '[' -n '10.0.0.30:6379 ' ']' +++ '[' -n '10.0.0.30:6379 ' ']' +++ echo 10.0.0.30:6379 +++ echo 10.0.0.30:6379 ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ REDIS_SSL_CACERTFILE= ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ REDIS_SERVERS=10.0.0.30:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ REDIS_SSL_CACERTFILE= ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ true ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 ++ KAFKA_NODES=10.0.0.30 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ get_server_list KAFKA ':9092 ' +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.30 ++++ echo 10.0.0.30 +++ local server_address=10.0.0.30 +++ extended_server_list+='10.0.0.30:9092 ' +++ local server_address=10.0.0.30 +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 +++ extended_server_list+='10.0.0.30:9092 ' +++ '[' -n '10.0.0.30:9092 ' ']' +++ echo 10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SERVERS=10.0.0.30:9092 ++ KAFKA_SSL_ENABLE=true ++ KAFKA_SSL_ENABLE=true ++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ KAFKA_SSL_CACERTFILE= ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ KAFKA_SSL_CACERTFILE= ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.30.125.101 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.30 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.30 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=true ++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ XMPP_SERVER_CA_CERTFILE= ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=true ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_CA_CERTFILE= ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=true ++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_CA_CERTFILE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=true ++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ XMPP_SERVER_CA_CERTFILE= ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=true ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ INTROSPECT_CA_CERTFILE= ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=true ++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ SANDESH_CA_CERTFILE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ TORAGENT_SSL_CACERTFILE= ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem ++ TORAGENT_SSL_CACERTFILE= ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ is_enabled true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ true ++ read -r -d '' rabbitmq_config ++ read -r -d '' rabbitmq_config ++ true ++ true ++ read -r -d '' rabbit_config ++ read -r -d '' rabbit_config ++ true ++ true ++ is_enabled True ++ is_enabled True ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ read -r -d '' rabbitmq_ssl_config ++ true ++ true ++ read -r -d '' kombu_ssl_config ++ read -r -d '' kombu_ssl_config ++ true ++ true ++ is_enabled true ++ is_enabled true ++ local val=true ++ local val=true ++ [[ true == \t\r\u\e ]] ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ read -r -d '' kafka_ssl_config ++ true ++ true ++ [[ -n '' ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ collector_stats_config= ++ [[ -z x ]] ++ [[ -z x ]] ++ [[ -n '' ]] ++ [[ -n '' ]] ++ collector_stats_config= ++ collector_stats_config= ++ [[ -z x ]] ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + CA_PRIVATE_KEY_BITS=4096 + CA_PRIVATE_KEY_BITS=4096 + PRIVATE_KEY_BITS=2048 + PRIVATE_KEY_BITS=2048 + is_ssl_enabled + is_ssl_enabled + is_enabled true + is_enabled true + local val=true + local val=true + [[ true == \t\r\u\e ]] + [[ true == \t\r\u\e ]] + [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-key.pem ]] + [[ -z /etc/contrail/webui_ssl/cs-key.pem ]] + FORCE_GENERATE_CERT=false + FORCE_GENERATE_CERT=false + [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]] + [[ -f /etc/contrail/webui_ssl/cs-key.pem ]] + [[ -f /etc/contrail/webui_ssl/cs-key.pem ]] + is_enabled false + is_enabled false + local val=false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ false == \e\n\a\b\l\e\d ]] + echo 'INFO: cert and key files are already exist' + echo 'INFO: cert and key files are already exist' INFO: cert and key files are already exist INFO: cert and key files are already exist + exit 0 + exit 0 + orchestration_manager=openstack + [[ openstack == \k\u\b\e\r\n\e\t\e\s ]] + [[ openstack == \m\e\s\o\s ]] + [[ -n /v3 ]] + identityManager_apiVersion='['\''v3'\'']' + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cnfg_authProtocol=https + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + analytics_authProtocol=https + introspect_strict_ssl=false + [[ true == \f\a\l\s\e ]] + identityManager_strict_ssl=false + [[ true == \f\a\l\s\e ]] + '[' -n '' ']' + '[' -n '' ']' + set_to_lower orchestrationModuleEndPointFromConfig false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval orchestrationModuleEndPointFromConfig=false ++ orchestrationModuleEndPointFromConfig=false + set_to_lower contrailEndPointFromConfig true ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval contrailEndPointFromConfig=true ++ contrailEndPointFromConfig=true + set_to_lower regionsFromConfig false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval regionsFromConfig=false ++ regionsFromConfig=false + set_to_lower networkManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval networkManager_strictSSL=false ++ networkManager_strictSSL=false + set_to_lower imageManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval imageManager_strictSSL=false ++ imageManager_strictSSL=false + set_to_lower computeManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval computeManager_strictSSL=false ++ computeManager_strictSSL=false + set_to_lower storageManager_strictSSL false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval storageManager_strictSSL=false ++ storageManager_strictSSL=false + set_to_lower cnfg_strictSSL True ++ echo True ++ tr '[:upper:]' '[:lower:]' + local val=true + eval cnfg_strictSSL=true ++ cnfg_strictSSL=true + set_to_lower analytics_strictSSL True ++ echo True ++ tr '[:upper:]' '[:lower:]' + local val=true + eval analytics_strictSSL=true ++ analytics_strictSSL=true + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + set_to_lower analytics_strictSSL false ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval analytics_strictSSL=true ++ analytics_strictSSL=true + set_to_lower cassandra_enable_edit false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval cassandra_enable_edit=false ++ cassandra_enable_edit=false + set_to_lower WEBUI_INSECURE_ACCESS false ++ echo false ++ tr '[:upper:]' '[:lower:]' + local val=false + eval WEBUI_INSECURE_ACCESS=false ++ WEBUI_INSECURE_ACCESS=false + set_to_lower serviceEndPointTakePublicURL true ++ echo true ++ tr '[:upper:]' '[:lower:]' + local val=true + eval serviceEndPointTakePublicURL=true ++ serviceEndPointTakePublicURL=true + mkdir -p /etc/contrail + cat ++ get_server_json_list CONFIG ++ server_typ=CONFIG_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,*$//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list ANALYTICS ++ server_typ=ANALYTICS_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,*$//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list CONTROL ++ server_typ=CONTROL_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,*$//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' ++ get_server_json_list CONFIGDB ++ server_typ=CONFIGDB_NODES +++ echo 10.0.0.30 +++ sed 's/^,*//' +++ sed 's/,*$//' +++ sed 's/,/'\'','\''/g' ++ srv_list=10.0.0.30 ++ echo '['\''10.0.0.30'\'']' + [[ keystone == \n\o\a\u\t\h ]] + echo 'INFO: config /etc/contrail/config.global.js' INFO: config /etc/contrail/config.global.js + cat /etc/contrail/config.global.js /* * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. */ var config = {}; config.orchestration = {}; config.orchestration.Manager = "openstack"; config.orchestrationModuleEndPointFromConfig = false; config.contrailEndPointFromConfig = true; config.regionsFromConfig = false; config.endpoints = {}; config.endpoints.apiServiceType = "ApiServer"; config.endpoints.opServiceType = "OpServer"; config.regions = {}; config.regions.RegionOne = "http://127.0.0.1:5000/v2.0"; config.serviceEndPointTakePublicURL = true; config.networkManager = {}; config.networkManager.ip = "252.30.133.246"; config.networkManager.port = "9696"; config.networkManager.authProtocol = "http"; config.networkManager.apiVersion = []; config.networkManager.strictSSL = false; config.networkManager.ca = ""; config.imageManager = {}; config.imageManager.ip = "252.30.50.63"; config.imageManager.port = "9292"; config.imageManager.authProtocol = "http"; config.imageManager.apiVersion = ['v1', 'v2']; config.imageManager.strictSSL = false; config.imageManager.ca = ""; config.computeManager = {}; config.computeManager.ip = "252.30.42.113"; config.computeManager.port = "8774"; config.computeManager.authProtocol = "http"; config.computeManager.apiVersion = ['v1.1', 'v2']; config.computeManager.strictSSL = false; config.computeManager.ca = ""; config.identityManager = {}; config.identityManager.ip = "252.30.125.101"; config.identityManager.port = "5050"; config.identityManager.authProtocol = "http"; config.identityManager.apiVersion = ['v3']; config.identityManager.strictSSL = false; config.identityManager.ca = ""; config.storageManager = {}; config.storageManager.ip = "127.0.0.1"; config.storageManager.port = "8776"; config.storageManager.authProtocol = "http"; config.storageManager.apiVersion = ['v1']; config.storageManager.strictSSL = false; config.storageManager.ca = ""; config.cnfg = {}; config.cnfg.server_ip = ['10.0.0.30']; config.cnfg.server_port = "8082"; config.cnfg.authProtocol = "https"; config.cnfg.strictSSL = true; config.cnfg.ca = "/etc/contrail/ssl/certs/ca-cert.pem"; config.cnfg.statusURL = '/global-system-configs'; config.analytics = {}; config.analytics.server_ip = ['10.0.0.30']; config.analytics.server_port = "8081"; config.analytics.authProtocol = "https"; config.analytics.strictSSL = true; config.analytics.ca = "/etc/contrail/ssl/certs/ca-cert.pem"; config.analytics.statusURL = '/analytics/uves/bgp-peers'; config.dns = {}; config.dns.server_ip = ['10.0.0.30']; config.dns.server_port = '8092'; config.dns.statusURL = '/Snh_PageReq?x=AllEntries%20VdnsServersReq'; config.introspect = {}; config.introspect.ssl = {}; config.introspect.ssl.enabled = true; config.introspect.ssl.key = '/etc/contrail/ssl/private/server-privkey.pem'; config.introspect.ssl.cert = '/etc/contrail/ssl/certs/server.pem'; config.introspect.ssl.ca = '/etc/contrail/ssl/certs/ca-cert.pem'; config.introspect.ssl.strictSSL = false; config.jobServer = {}; config.jobServer.server_ip = '127.0.0.1'; config.jobServer.server_port = '3000'; config.files = {}; config.files.download_path = '/tmp'; config.cassandra = {}; config.cassandra.server_ips = ['10.0.0.30']; config.cassandra.server_port = '9041'; config.cassandra.enable_edit = false; config.cassandra.use_ssl = true; config.cassandra.ca_certs = '/etc/contrail/ssl/certs/ca-cert.pem'; config.kue = {}; config.kue.ui_port = '3002' config.webui_addresses = ['10.0.0.30']; config.insecure_access = false; config.http_port = '8180'; config.https_port = '8143'; config.require_auth = false; config.node_worker_count = 1; config.maxActiveJobs = 10; config.redisDBIndex = 3; config.CONTRAIL_SERVICE_RETRY_TIME = 300000; //5 minutes config.redis_server_port = '6379'; config.redis_server_ip = '127.0.0.1'; config.redis_dump_file = '/var/lib/redis/dump-webui.rdb'; config.redis_password = ''; config.logo_file = '/opt/contrail/images/logo.png'; config.favicon_file = '/opt/contrail/images/favicon.ico'; config.featurePkg = {}; config.featurePkg.webController = {}; config.featurePkg.webController.path = '/usr/src/contrail/contrail-web-controller'; config.featurePkg.webController.enable = true; config.qe = {}; config.qe.enable_stat_queries = false; config.logs = {}; config.logs.level = 'debug'; config.getDomainProjectsFromApiServer = false; config.network = {}; config.network.L2_enable = false; config.getDomainsFromApiServer = false; config.jsonSchemaPath = "/usr/src/contrail/contrail-web-core/src/serverroot/configJsonSchemas"; config.server_options = {}; config.server_options.key_file = '/etc/contrail/webui_ssl/cs-key.pem'; config.server_options.cert_file = '/etc/contrail/webui_ssl/cs-cert.pem'; config.server_options.ciphers = 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA'; module.exports = config; + cat + echo 'INFO: config /etc/contrail/contrail-webui-userauth.js' INFO: config /etc/contrail/contrail-webui-userauth.js + cat /etc/contrail/contrail-webui-userauth.js /* * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved. */ var auth = {}; auth.admin_user = 'admin'; auth.admin_password = 'password'; auth.admin_token = ''; auth.admin_tenant_name = 'admin'; auth.project_domain_name = 'admin_domain'; auth.user_domain_name = 'admin_domain'; module.exports = auth; + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + run_service /usr/bin/node jobServerStart.js + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/node jobServerStart.js + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/node jobServerStart.js 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis FLUSHDB 3 done 10/28/2024 01:54:04 AM - debug: Redis FLUSHDB 4 done 10/28/2024 01:54:04 AM - debug: Redis FLUSHDB 5 done 10/28/2024 01:54:04 AM - debug: Built Package List as:[{"pkgName":null,"parseURL.xml":["/src/serverroot/common/url.routes.js","/src/serverroot/utils/url.routes.js","/src/serverroot/web/routes/url.routes.js","/webroot/reports/qe/api/url.routes.js","/webroot/reports/udd/api/url.routes.js"],"jobProcess.xml":["/src/serverroot/jobs/core/jobsCb.api.js"],"featureList.xml":["/src/serverroot/web/core/feature.list.js"]},{"pkgName":"webController","parseURL.xml":["/webroot/common/api/url.routes.js","/webroot/config/common/api/url.routes.js","/webroot/config/dns/records/api/url.routes.js","/webroot/config/dns/servers/api/url.routes.js","/webroot/config/firewall/common/fwpolicy/api/url.routes.js","/webroot/config/infra/bgp/api/url.routes.js","/webroot/config/infra/linklocalservices/api/url.routes.js","/webroot/config/infra/quotas/api/url.routes.js","/webroot/config/infra/serviceappliance/api/url.routes.js","/webroot/config/infra/serviceapplianceset/api/url.routes.js","/webroot/config/infra/vrouters/api/url.routes.js","/webroot/config/networking/fip/api/url.routes.js","/webroot/config/networking/ipam/api/url.routes.js","/webroot/config/networking/loadbalancer/api/url.routes.js","/webroot/config/networking/logicalrouter/api/url.routes.js","/webroot/config/networking/networks/api/url.routes.js","/webroot/config/networking/policy/api/url.routes.js","/webroot/config/networking/port/api/url.routes.js","/webroot/config/networking/routetable/api/url.routes.js","/webroot/config/networking/routingpolicy/api/url.routes.js","/webroot/config/networking/securitygroup/api/url.routes.js","/webroot/config/physicaldevices/interfaces/api/url.routes.js","/webroot/config/physicaldevices/physicalrouters/api/url.routes.js","/webroot/config/port/api/url.routes.js","/webroot/config/services/bgpasaservice/api/url.routes.js","/webroot/config/services/instances/api/url.routes.js","/webroot/config/services/templates/api/url.routes.js","/webroot/monitor/infrastructure/analyticsnode/api/url.routes.js","/webroot/monitor/infrastructure/confignode/api/url.routes.js","/webroot/monitor/infrastructure/controlnode/api/url.routes.js","/webroot/monitor/infrastructure/databasenode/api/url.routes.js","/webroot/monitor/infrastructure/globalcontroller/api/url.routes.js","/webroot/monitor/infrastructure/underlay/api/url.routes.js","/webroot/monitor/infrastructure/vrouter/api/url.routes.js","/webroot/monitor/networking/api/url.routes.js","/webroot/setting/configdb/ui/api/url.routes.js"],"jobProcess.xml":["/webroot/monitor/infrastructure/controlnode/jobs/jobsCb.api.js","/webroot/monitor/infrastructure/vrouter/jobs/jobsCb.api.js","/webroot/monitor/networking/jobs/jobsCb.api.js"],"featureList.xml":["/webroot/common/api/feature.list.js"]}] 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis FLUSHDB 3 done 10/28/2024 01:54:04 AM - debug: Redis FLUSHDB 4 done 10/28/2024 01:54:04 AM - debug: Redis FLUSHDB 5 done 10/28/2024 01:54:04 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-core/src/serverroot/jobs/core/jobsCb.api.js 10/28/2024 01:54:04 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/controlnode/jobs/jobsCb.api.js 10/28/2024 01:54:04 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/vrouter/jobs/jobsCb.api.js 10/28/2024 01:54:04 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-controller/webroot/monitor/networking/jobs/jobsCb.api.js 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: connect 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis: ready 10/28/2024 01:54:04 AM - debug: Redis DB 3 SELECT suuccess: 10/28/2024 01:54:05 AM - debug: Got the token successfully for tenant:admin 10/28/2024 01:54:05 AM - error: Error: connect ECONNREFUSED at errnoException (net.js:905:11) at Object.afterConnect [as oncomplete] (net.js:896:19) 10/28/2024 01:54:05 AM - error: URL [https://10.0.0.30:8082/global-system-configs] returned error [{"message":"{ [Error: connect ECONNREFUSED]\n code: 'ECONNREFUSED',\n errno: 'ECONNREFUSED',\n syscall: 'connect' }","custom":true,"responseCode":500,"code":"ECONNREFUSED"}] 10/28/2024 01:54:05 AM - debug: Contrail Service Response Updated by process:191 {"ApiServer":[]} 10/28/2024 01:54:05 AM - debug: Got the token successfully for tenant:admin 10/28/2024 01:54:05 AM - error: Error: connect ECONNREFUSED at errnoException (net.js:905:11) at Object.afterConnect [as oncomplete] (net.js:896:19) 10/28/2024 01:54:05 AM - error: URL [https://10.0.0.30:8081/analytics/uves/bgp-peers] returned error [{"message":"{ [Error: connect ECONNREFUSED]\n code: 'ECONNREFUSED',\n errno: 'ECONNREFUSED',\n syscall: 'connect' }","custom":true,"responseCode":500,"code":"ECONNREFUSED"}] 10/28/2024 01:54:05 AM - debug: Contrail Service Response Updated by process:191 {"OpServer":[]} 10/28/2024 01:54:31 AM - debug: Contrail Service Response Updated by process:191 {"dns-server":[{"@publisher-id":"10.0.0.30","ip-address":"10.0.0.30","port":"8092","status":"up"}]} 10/28/2024 01:59:04 AM - debug: Contrail Service Response Updated by process:191 {"ApiServer":[{"@publisher-id":"10.0.0.30","ip-address":"10.0.0.30","port":"8082","status":"up"}]} 10/28/2024 01:59:05 AM - debug: Contrail Service Response Updated by process:191 {"OpServer":[{"@publisher-id":"10.0.0.30","ip-address":"10.0.0.30","port":"8081","status":"up"}]}