+++ date ++ echo 'INFO: =================== Thu Nov 7 02:15:49 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:15:49 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 88285 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 ++++++ grep -F 'inet 10.0.0.35/' +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.6G 5.1G 47M 17G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 +++ date ++ echo 'INFO: =================== Thu Nov 7 02:15:53 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:15:53 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 89079 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ head -n 1 ++ awk '{print $2}' Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= +++ date ++ echo 'INFO: =================== Thu Nov 7 02:15:54 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:15:54 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 89270 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 +++ date ++ echo 'INFO: =================== Thu Nov 7 02:15:55 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:15:55 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 89515 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.7G 19G 40M 3.2G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.7G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. +++ date ++ echo 'INFO: =================== Thu Nov 7 02:15:56 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:15:56 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 89776 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.7G 19G 40M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.7G 19G 40M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ tr , ' ' ++ echo ens3 + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 +++ date ++ echo 'INFO: =================== Thu Nov 7 02:15:58 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:15:58 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 89998 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ head -n 1 ++ grep 'inet ' ++ awk '{print $2}' Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.7G 19G 40M 3.2G 21G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.7G 19G 40M 3.2G 21G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ tr , ' ' ++ echo ens3 + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 +++ date ++ echo 'INFO: =================== Thu Nov 7 02:16:02 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:16:02 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 90417 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.5G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. +++ date ++ echo 'INFO: =================== Thu Nov 7 02:16:09 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:16:09 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 91190 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ head -n 1 ++ awk '{print $2}' Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' ++ ip addr show dev ens3 + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= +++ date ++ echo 'INFO: =================== Thu Nov 7 02:16:22 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:16:22 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ cut -d / -f 1 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 91875 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 40M 3.2G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.6G 19G 42M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter modprobe: FATAL: Module vrouter not found. + echo 'WARNING: failed to load vrouter driver' WARNING: failed to load vrouter driver + return 1 + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + return 0 + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + return 0 + vif --create vhost0 --mac fa:16:3e:43:9c:7c vhost_create: Unknown error -95 + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ tr , ' ' ++ echo ens3 + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical Error registering NetLink client: No such file or directory (2) + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 Error registering NetLink client: No such file or directory (2) + ip link set dev vhost0 address fa:16:3e:43:9c:7c Cannot find device "vhost0" + ip link set dev vhost0 up Cannot find device "vhost0" + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version cat: /sys/module/vrouter/version: No such file or directory + local loaded_vrouter_ver= ++ modinfo -F version vrouter modinfo: ERROR: Module vrouter not found. + local available_vrouter_ver= + echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=' INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter= + return 1 + res=1 + [[ 1 != 0 ]] + echo 'FATAL: failed to init vhost0' FATAL: failed to init vhost0 + exit 1 +++ date ++ echo 'INFO: =================== Thu Nov 7 02:16:48 UTC 2024 ===================' INFO: =================== Thu Nov 7 02:16:48 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR=/dev/hugepages ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.35 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.35 ++ ANALYTICSDB_NODES=10.0.0.35 ++ ANALYTICS_SNMP_NODES=10.0.0.35 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8081 ' +++ '[' -n '10.0.0.35:8081 ' ']' +++ echo 10.0.0.35:8081 ++ ANALYTICS_SERVERS=10.0.0.35:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9042 ' +++ '[' -n '10.0.0.35:9042 ' ']' +++ echo 10.0.0.35:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.35:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.35 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8086 ' +++ '[' -n '10.0.0.35:8086 ' ']' +++ echo 10.0.0.35:8086 ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.35 ++ CONFIGDB_NODES=10.0.0.35 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:8082 ' +++ '[' -n '10.0.0.35:8082 ' ']' +++ echo 10.0.0.35:8082 ++ CONFIG_SERVERS=10.0.0.35:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9161 ' +++ '[' -n '10.0.0.35:9161 ' ']' +++ echo 10.0.0.35:9161 ++ CONFIGDB_SERVERS=10.0.0.35:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9041 ' +++ '[' -n '10.0.0.35:9041 ' ']' +++ echo 10.0.0.35:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.35:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.35 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.35 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.35 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:2181, +++ '[' -n 10.0.0.35:2181, ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS=10.0.0.35:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:2181 ' +++ '[' -n '10.0.0.35:2181 ' ']' +++ echo 10.0.0.35:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.35:2181 ++ RABBITMQ_NODES=10.0.0.35 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+=10.0.0.35:5673, +++ '[' -n 10.0.0.35:5673, ']' +++ echo 10.0.0.35:5673 ++ RABBITMQ_SERVERS=10.0.0.35:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:6379 ' +++ '[' -n '10.0.0.35:6379 ' ']' +++ echo 10.0.0.35:6379 ++ REDIS_SERVERS=10.0.0.35:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.35 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.35 +++ local server_address=10.0.0.35 +++ extended_server_list+='10.0.0.35:9092 ' +++ '[' -n '10.0.0.35:9092 ' ']' +++ echo 10.0.0.35:9092 ++ KAFKA_SERVERS=10.0.0.35:9092 ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.35 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.35 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /agent-functions.sh ++ source /network-functions-vrouter-kernel +++ . ./network-functions-vrouter ++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00 ++++ L3MH_VRRP_MAC=00:00:5e:00:01:00 ++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0 + set_traps + echo 'INFO: Start set_traps' INFO: Start set_traps + echo 94349 + trap trap_vrouter_agent_quit SIGQUIT + trap trap_vrouter_agent_term SIGTERM SIGINT + trap trap_vrouter_agent_hup SIGHUP + mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup + chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup + vhost0_init + echo 'INFO: Start vhost0_init' INFO: Start vhost0_init + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return ++ cat /contrail_build_version + export BUILD_VERSION=nightly + BUILD_VERSION=nightly + export KERNEL_INIT_VHOST0=true + KERNEL_INIT_VHOST0=true + is_dpdk + test kernel == dpdk + is_enabled true + local val=true + [[ true == \t\r\u\e ]] + local res=0 + [[ -n '' ]] + init_vhost0 + check_vhost0 + [[ -z '' ]] ++ get_cidr_for_nic vhost0 ++ command -v ip ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 Device "vhost0" does not exist. + '[' -n '' ']' + return 1 + declare phys_int phys_int_mac addrs bind_type bind_int mtu routes + is_dpdk + test kernel == dpdk + IFS=' ' + read -r phys_int phys_int_mac ++ get_physical_nic_and_mac ++ local nic=vhost0 +++ get_iface_mac vhost0 +++ local nic=vhost0 +++ cat /sys/class/net/vhost0/address cat: /sys/class/net/vhost0/address: No such file or directory ++ local mac= ++ [[ -n '' ]] +++ get_vrouter_physical_iface +++ local iface= +++ [[ -z '' ]] ++++ get_iface_for_vrouter_from_control ++++ local node_ip ++++ [[ -n '' ]] +++++ echo ++++ node_ip= ++++ [[ -z '' ]] +++++ resolve_1st_control_node_ip ++++++ echo 10.0.0.35 ++++++ cut -d , -f 1 +++++ local first_item=10.0.0.35 +++++ resolve_host_ip 10.0.0.35 +++++ local name_or_ip=10.0.0.35 +++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' ++++ node_ip=10.0.0.35 +++++ get_gateway_nic_for_ip 10.0.0.35 +++++ command -v ip +++++ local ip=10.0.0.35 ++++++ ip route get 10.0.0.35 ++++++ grep -o 'dev.*' ++++++ awk '{print $2}' +++++ local iface=lo +++++ [[ lo == \l\o ]] ++++++ ip address show ++++++ grep -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' ++++++ grep -m 1 vhost0 +++++ iface= +++++ '[' -z '' ']' ++++++ ip address show ++++++ grep -m 1 -F 'inet 10.0.0.35/' ++++++ awk '{print($NF)}' +++++ iface=ens3 +++++ echo ens3 ++++ local iface=ens3 ++++ echo ens3 +++ iface=ens3 +++ [[ -z ens3 ]] +++ echo ens3 ++ nic=ens3 +++ get_iface_mac ens3 +++ local nic=ens3 +++ cat /sys/class/net/ens3/address ++ mac=fa:16:3e:43:9c:7c ++ [[ ens3 == '' ]] ++ [[ fa:16:3e:43:9c:7c == '' ]] ++ [[ ens3 == \v\h\o\s\t\0 ]] ++ echo ens3 fa:16:3e:43:9c:7c + '[' -z '' ']' ++ get_addrs_for_nic ens3 ++ local nic=ens3 ++ ip addr show dev ens3 ++ grep inet ++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*' + addrs='10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' ++ get_iface_mtu ens3 ++ local nic=ens3 ++ cat /sys/class/net/ens3/mtu + mtu=1500 ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' +++ ip route list dev ens3 +++ grep default ++ routes_list='default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ++ '[' -n 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' ++ echo 'default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + routes='10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c' INFO: creating vhost0 for nic mode: nic: ens3, mac=fa:16:3e:43:9c:7c + create_vhost0 ens3 fa:16:3e:43:9c:7c + local phys_int=ens3 + local phys_int_mac=fa:16:3e:43:9c:7c + local vhost0_mac=fa:16:3e:43:9c:7c + pkt_create_configs + [[ -d /etc/sysconfig/network-scripts ]] + load_vrouter + lsmod + grep -q vrouter + free -h total used free shared buff/cache available Mem: 31G 8.4G 19G 40M 3.4G 22G Swap: 0B 0B 0B + sync + echo 2 + free -h total used free shared buff/cache available Mem: 31G 8.4G 19G 40M 3.2G 22G Swap: 0B 0B 0B + local vrouter_opts= + vrouter_opts= + load_kernel_module vrouter + local module=vrouter + shift 1 + local opts= + echo 'INFO: load vrouter kernel module, options='\'''\''' INFO: load vrouter kernel module, options='' + modprobe -v vrouter insmod /lib/modules/5.15.0-100-generic/updates/dkms/vrouter.ko + pkt_setup pkt1 + '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']' + declare q r s mask str i + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-0 ++ cut -d - -f2 + q=0 + r=0 + s=0 + (( mask=1<<0 )) + str=(`printf "%x" $mask`) ++ printf %x 1 + '[' 0 -gt 0 ']' + echo 1 ++ cat /sys/class/net/pkt1/queues/rx-0/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-0/rps_cpus\n01' INFO: /sys/class/net/pkt1/queues/rx-0/rps_cpus 01 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-1 ++ cut -d - -f2 + q=1 + r=1 + s=0 + (( mask=1<<1 )) + str=(`printf "%x" $mask`) ++ printf %x 2 + '[' 0 -gt 0 ']' + echo 2 ++ cat /sys/class/net/pkt1/queues/rx-1/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-1/rps_cpus\n02' INFO: /sys/class/net/pkt1/queues/rx-1/rps_cpus 02 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-2 ++ cut -d - -f2 + q=2 + r=2 + s=0 + (( mask=1<<2 )) + str=(`printf "%x" $mask`) ++ printf %x 4 + '[' 0 -gt 0 ']' + echo 4 ++ cat /sys/class/net/pkt1/queues/rx-2/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-2/rps_cpus\n04' INFO: /sys/class/net/pkt1/queues/rx-2/rps_cpus 04 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-3 ++ cut -d - -f2 + q=3 + r=3 + s=0 + (( mask=1<<3 )) + str=(`printf "%x" $mask`) ++ printf %x 8 + '[' 0 -gt 0 ']' + echo 8 ++ cat /sys/class/net/pkt1/queues/rx-3/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-3/rps_cpus\n08' INFO: /sys/class/net/pkt1/queues/rx-3/rps_cpus 08 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-4 ++ cut -d - -f2 + q=4 + r=4 + s=0 + (( mask=1<<4 )) + str=(`printf "%x" $mask`) ++ printf %x 16 + '[' 0 -gt 0 ']' + echo 10 ++ cat /sys/class/net/pkt1/queues/rx-4/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-4/rps_cpus\n10' INFO: /sys/class/net/pkt1/queues/rx-4/rps_cpus 10 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-5 ++ cut -d - -f2 + q=5 + r=5 + s=0 + (( mask=1<<5 )) + str=(`printf "%x" $mask`) ++ printf %x 32 + '[' 0 -gt 0 ']' + echo 20 ++ cat /sys/class/net/pkt1/queues/rx-5/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-5/rps_cpus\n20' INFO: /sys/class/net/pkt1/queues/rx-5/rps_cpus 20 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-6 ++ cut -d - -f2 + q=6 + r=6 + s=0 + (( mask=1<<6 )) + str=(`printf "%x" $mask`) ++ printf %x 64 + '[' 0 -gt 0 ']' + echo 40 ++ cat /sys/class/net/pkt1/queues/rx-6/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-6/rps_cpus\n40' INFO: /sys/class/net/pkt1/queues/rx-6/rps_cpus 40 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt1/queues/rx-7 ++ cut -d - -f2 + q=7 + r=7 + s=0 + (( mask=1<<7 )) + str=(`printf "%x" $mask`) ++ printf %x 128 + '[' 0 -gt 0 ']' + echo 80 ++ cat /sys/class/net/pkt1/queues/rx-7/rps_cpus + echo -e 'INFO: /sys/class/net/pkt1/queues/rx-7/rps_cpus\n80' INFO: /sys/class/net/pkt1/queues/rx-7/rps_cpus 80 + ip link set dev pkt1 up + pkt_setup pkt2 + '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']' + declare q r s mask str i + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-0 ++ cut -d - -f2 + q=0 + r=0 + s=0 + (( mask=1<<0 )) + str=(`printf "%x" $mask`) ++ printf %x 1 + '[' 0 -gt 0 ']' + echo 1 ++ cat /sys/class/net/pkt2/queues/rx-0/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-0/rps_cpus\n01' INFO: /sys/class/net/pkt2/queues/rx-0/rps_cpus 01 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-1 ++ cut -d - -f2 + q=1 + r=1 + s=0 + (( mask=1<<1 )) + str=(`printf "%x" $mask`) ++ printf %x 2 + '[' 0 -gt 0 ']' + echo 2 ++ cat /sys/class/net/pkt2/queues/rx-1/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-1/rps_cpus\n02' INFO: /sys/class/net/pkt2/queues/rx-1/rps_cpus 02 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-2 ++ cut -d - -f2 + q=2 + r=2 + s=0 + (( mask=1<<2 )) + str=(`printf "%x" $mask`) ++ printf %x 4 + '[' 0 -gt 0 ']' + echo 4 ++ cat /sys/class/net/pkt2/queues/rx-2/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-2/rps_cpus\n04' INFO: /sys/class/net/pkt2/queues/rx-2/rps_cpus 04 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-3 ++ cut -d - -f2 + q=3 + r=3 + s=0 + (( mask=1<<3 )) + str=(`printf "%x" $mask`) ++ printf %x 8 + '[' 0 -gt 0 ']' + echo 8 ++ cat /sys/class/net/pkt2/queues/rx-3/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-3/rps_cpus\n08' INFO: /sys/class/net/pkt2/queues/rx-3/rps_cpus 08 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-4 ++ cut -d - -f2 + q=4 + r=4 + s=0 + (( mask=1<<4 )) + str=(`printf "%x" $mask`) ++ printf %x 16 + '[' 0 -gt 0 ']' + echo 10 ++ cat /sys/class/net/pkt2/queues/rx-4/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-4/rps_cpus\n10' INFO: /sys/class/net/pkt2/queues/rx-4/rps_cpus 10 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-5 ++ cut -d - -f2 + q=5 + r=5 + s=0 + (( mask=1<<5 )) + str=(`printf "%x" $mask`) ++ printf %x 32 + '[' 0 -gt 0 ']' + echo 20 ++ cat /sys/class/net/pkt2/queues/rx-5/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-5/rps_cpus\n20' INFO: /sys/class/net/pkt2/queues/rx-5/rps_cpus 20 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt2/queues/rx-6 ++ cut -d - -f2 + q=6 + r=6 + s=0 + (( mask=1<<6 )) + str=(`printf "%x" $mask`) ++ printf %x 64 + '[' 0 -gt 0 ']' + echo 40 ++ cat /sys/class/net/pkt2/queues/rx-6/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-6/rps_cpus\n40' INFO: /sys/class/net/pkt2/queues/rx-6/rps_cpus 40 + for f in '/sys/class/net/$1/queues/rx-*' ++ cut -d - -f2 ++ echo /sys/class/net/pkt2/queues/rx-7 + q=7 + r=7 + s=0 + (( mask=1<<7 )) + str=(`printf "%x" $mask`) ++ printf %x 128 + '[' 0 -gt 0 ']' + echo 80 ++ cat /sys/class/net/pkt2/queues/rx-7/rps_cpus + echo -e 'INFO: /sys/class/net/pkt2/queues/rx-7/rps_cpus\n80' INFO: /sys/class/net/pkt2/queues/rx-7/rps_cpus 80 + ip link set dev pkt2 up + pkt_setup pkt3 + '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']' + declare q r s mask str i + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-0 ++ cut -d - -f2 + q=0 + r=0 + s=0 + (( mask=1<<0 )) + str=(`printf "%x" $mask`) ++ printf %x 1 + '[' 0 -gt 0 ']' + echo 1 ++ cat /sys/class/net/pkt3/queues/rx-0/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-0/rps_cpus\n01' INFO: /sys/class/net/pkt3/queues/rx-0/rps_cpus 01 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-1 ++ cut -d - -f2 + q=1 + r=1 + s=0 + (( mask=1<<1 )) + str=(`printf "%x" $mask`) ++ printf %x 2 + '[' 0 -gt 0 ']' + echo 2 ++ cat /sys/class/net/pkt3/queues/rx-1/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-1/rps_cpus\n02' INFO: /sys/class/net/pkt3/queues/rx-1/rps_cpus 02 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-2 ++ cut -d - -f2 + q=2 + r=2 + s=0 + (( mask=1<<2 )) + str=(`printf "%x" $mask`) ++ printf %x 4 + '[' 0 -gt 0 ']' + echo 4 ++ cat /sys/class/net/pkt3/queues/rx-2/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-2/rps_cpus\n04' INFO: /sys/class/net/pkt3/queues/rx-2/rps_cpus 04 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-3 ++ cut -d - -f2 + q=3 + r=3 + s=0 + (( mask=1<<3 )) + str=(`printf "%x" $mask`) ++ printf %x 8 + '[' 0 -gt 0 ']' + echo 8 ++ cat /sys/class/net/pkt3/queues/rx-3/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-3/rps_cpus\n08' INFO: /sys/class/net/pkt3/queues/rx-3/rps_cpus 08 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-4 ++ cut -d - -f2 + q=4 + r=4 + s=0 + (( mask=1<<4 )) + str=(`printf "%x" $mask`) ++ printf %x 16 + '[' 0 -gt 0 ']' + echo 10 ++ cat /sys/class/net/pkt3/queues/rx-4/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-4/rps_cpus\n10' INFO: /sys/class/net/pkt3/queues/rx-4/rps_cpus 10 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-5 ++ cut -d - -f2 + q=5 + r=5 + s=0 + (( mask=1<<5 )) + str=(`printf "%x" $mask`) ++ printf %x 32 + '[' 0 -gt 0 ']' + echo 20 ++ cat /sys/class/net/pkt3/queues/rx-5/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-5/rps_cpus\n20' INFO: /sys/class/net/pkt3/queues/rx-5/rps_cpus 20 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-6 ++ cut -d - -f2 + q=6 + r=6 + s=0 + (( mask=1<<6 )) + str=(`printf "%x" $mask`) ++ printf %x 64 + '[' 0 -gt 0 ']' + echo 40 ++ cat /sys/class/net/pkt3/queues/rx-6/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-6/rps_cpus\n40' INFO: /sys/class/net/pkt3/queues/rx-6/rps_cpus 40 + for f in '/sys/class/net/$1/queues/rx-*' ++ echo /sys/class/net/pkt3/queues/rx-7 ++ cut -d - -f2 + q=7 + r=7 + s=0 + (( mask=1<<7 )) + str=(`printf "%x" $mask`) ++ printf %x 128 + '[' 0 -gt 0 ']' + echo 80 ++ cat /sys/class/net/pkt3/queues/rx-7/rps_cpus + echo -e 'INFO: /sys/class/net/pkt3/queues/rx-7/rps_cpus\n80' INFO: /sys/class/net/pkt3/queues/rx-7/rps_cpus 80 + ip link set dev pkt3 up + vif --create vhost0 --mac fa:16:3e:43:9c:7c + phys_int_arr=($(echo $phys_int | tr ',' ' ')) ++ echo ens3 ++ tr , ' ' + local phys_int_arr + phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' ')) ++ echo fa:16:3e:43:9c:7c ++ tr , ' ' + local phys_int_mac_arr + local i=1 + (( i-- )) + (( i>=0 )) + vif --add ens3 --mac fa:16:3e:43:9c:7c --vrf 0 --vhost-phys --type physical + (( i-- )) + (( i>=0 )) + vif --add vhost0 --mac fa:16:3e:43:9c:7c --vrf 0 --type vhost --xconnect ens3 + ip link set dev vhost0 address fa:16:3e:43:9c:7c + ip link set dev vhost0 up + bind_type=kernel + bind_int=ens3 + local ret=0 + [[ -e /etc/sysconfig/network-scripts/ifcfg-ens3 ]] + [[ -e /etc/sysconfig/network-scripts/contrail.org.ifcfg-ens3 ]] + [[ -e /etc/sysconfig/network-scripts/ifcfg-vhost0 ]] + echo 'INFO: there is no ifcfg-ens3 and ifcfg-vhost0, so initialize vhost0 manually' INFO: there is no ifcfg-ens3 and ifcfg-vhost0, so initialize vhost0 manually + is_dpdk + test kernel == dpdk + kill_dhcp_clients ens3 + local phys_int=ens3 ++ get_dhcp_client_pids ens3 +++ ps -A -o pid,cmd +++ grep dhclient +++ grep ens3 +++ grep -v grep +++ awk '{print $1}' ++ local pids= ++ echo + local dhcpcl_id= + '[' -n '' ']' + echo 'INFO: Changing physical interface to vhost in ip table' INFO: Changing physical interface to vhost in ip table + echo '10.0.0.35/24 brd 10.0.0.255 fe80::f816:3eff:fe43:9c7c/64' + IFS= + read -r line + is_dpdk + test kernel == dpdk ++ echo 10.0.0.35/24 brd 10.0.0.255 ++ cut -d ' ' -f 1 + local addr_to_del=10.0.0.35/24 + ip address delete 10.0.0.35/24 dev ens3 ++ echo 10.0.0.35/24 brd 10.0.0.255 ++ sed s/brd/broadcast/ + local 'addr_to_add=10.0.0.35/24 broadcast 10.0.0.255' + ip address add 10.0.0.35/24 broadcast 10.0.0.255 dev vhost0 + IFS= + read -r line + is_dpdk + test kernel == dpdk ++ echo fe80::f816:3eff:fe43:9c7c/64 ++ cut -d ' ' -f 1 + local addr_to_del=fe80::f816:3eff:fe43:9c7c/64 + ip address delete fe80::f816:3eff:fe43:9c7c/64 dev ens3 ++ echo fe80::f816:3eff:fe43:9c7c/64 ++ sed s/brd/broadcast/ + local addr_to_add=fe80::f816:3eff:fe43:9c7c/64 + ip address add fe80::f816:3eff:fe43:9c7c/64 dev vhost0 RTNETLINK answers: File exists + echo 'ERROR: failed to add address fe80::f816:3eff:fe43:9c7c/64 to vhost0.' ERROR: failed to add address fe80::f816:3eff:fe43:9c7c/64 to vhost0. + ret=1 + IFS= + read -r line + [[ -n 1500 ]] + echo 'INFO: set mtu' INFO: set mtu + ip link set dev vhost0 mtu 1500 + '[' -n 1500 ']' + check_physical_mtu 1500 ens3 + local mtu=1500 + local phys_int=ens3 ++ cat /sys/class/net/ens3/mtu + local mtu_after_vhost=1500 + [[ 1500 != \1\5\0\0 ]] + set_dev_routes vhost0 '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + local dev=vhost0 + local 'routes_list=10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + '[' -n '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' ']' + local route + IFS= + read -r route ++ echo '10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 ' + echo 'INFO: ip route replace 10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 dev vhost0' INFO: ip route replace 10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 dev vhost0 + ip route replace 10.0.0.0/24 proto kernel scope link src 10.0.0.35 metric 100 dev vhost0 + IFS= + read -r route + echo 'INFO: ip route replace 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0' INFO: ip route replace 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0 + ip route replace 10.0.0.1 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0 + IFS= + read -r route + echo 'INFO: ip route replace 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0' INFO: ip route replace 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0 + ip route replace 10.0.0.2 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0 + IFS= + read -r route + echo 'INFO: ip route replace 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0' INFO: ip route replace 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0 + ip route replace 10.0.0.4 proto dhcp scope link src 10.0.0.35 metric 100 dev vhost0 + IFS= + read -r route + echo 'INFO: ip route replace 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 dev vhost0' INFO: ip route replace 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 dev vhost0 + ip route replace 169.254.169.254 via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 dev vhost0 + IFS= + read -r route + echo 'INFO: ip route replace default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 dev vhost0' INFO: ip route replace default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 dev vhost0 + ip route replace default via 10.0.0.1 proto dhcp src 10.0.0.35 metric 100 dev vhost0 + IFS= + read -r route + is_dpdk + test kernel == dpdk ++ get_dev_routes ens3 ++ local dev=ens3 +++ ip route list dev ens3 +++ grep -v default ++ local routes_list= ++ '[' -n '' ']' +++ ip route list dev ens3 +++ grep default ++ routes_list= ++ '[' -n '' ']' + local _phys_int_routes= + del_dev_routes ens3 '' + local dev=ens3 + local routes_list= + '[' -n '' ']' + [[ 0 == 0 ]] + ensure_host_resolv_conf + local path=/etc/resolv.conf + local host_path=/host/etc/resolv.conf + [[ -e /etc/resolv.conf ]] + [[ -e /host/etc/resolv.conf ]] + diff -U 3 /host/etc/resolv.conf /etc/resolv.conf + dbg_trace_agent_vers + local agent_ver=nightly ++ cat /sys/module/vrouter/version + local loaded_vrouter_ver=nightly ++ modinfo -F version vrouter + local available_vrouter_ver=nightly + echo 'INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly' INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly + return 0 + [[ 0 != 0 ]] + '[' -e /etc/dhcp/dhclient.conf ']' ++ cat /sys/devices/virtual/dmi/id/chassis_vendor ++ cat /sys/devices/virtual/dmi/id/product_version + azure_or_gcp_or_aws='Red Hat 15.51.3-1.cmpt.el7' + [[ red hat 15.51.3-1.cmpt.el7 =~ ^(.*microsoft*.|.*google*.|.*amazon*.) ]] + check_vrouter_agent_settings + '[' -n '' ']' + nodes=(`echo $CONTROL_NODES | tr ',' ' '`) ++ echo 10.0.0.35 ++ tr , ' ' + local nodes + [[ 9 == 0 ]] ++ resolve_host_ip 10.0.0.35 ++ local name_or_ip=10.0.0.35 ++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' + local resolved_ip=10.0.0.35 ++ get_gateway_nic_for_ip 10.0.0.35 ++ command -v ip ++ local ip=10.0.0.35 +++ ip route get 10.0.0.35 +++ awk '{print $2}' +++ grep -o 'dev.*' ++ local iface=lo ++ [[ lo == \l\o ]] +++ ip address show +++ grep -F 'inet 10.0.0.35/' +++ awk '{print($NF)}' +++ grep -m 1 vhost0 ++ iface=vhost0 ++ '[' -z vhost0 ']' ++ echo vhost0 + local iface=vhost0 + [[ vhost0 != \v\h\o\s\t\0 ]] + (( 9 > 1 )) + for node in '${nodes[@]}' ++ resolve_host_ip 10.0.0.35 ++ local name_or_ip=10.0.0.35 ++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.35'\''))' + local resolved_ip=10.0.0.35 ++ get_gateway_nic_for_ip 10.0.0.35 ++ command -v ip ++ local ip=10.0.0.35 +++ ip route get 10.0.0.35 +++ grep -o 'dev.*' +++ awk '{print $2}' ++ local iface=lo ++ [[ lo == \l\o ]] +++ ip address show +++ grep -F 'inet 10.0.0.35/' +++ grep -m 1 vhost0 +++ awk '{print($NF)}' ++ iface=vhost0 ++ '[' -z vhost0 ']' ++ echo vhost0 + local cur_iface=vhost0 + [[ vhost0 != \v\h\o\s\t\0 ]] + return 0 + is_encryption_supported + local enc=False + [[ FALSE == \F\A\L\S\E ]] + return 1 + echo 'INFO: Kernel version does not support the driver required for vrouter to vrouter encryption' INFO: Kernel version does not support the driver required for vrouter to vrouter encryption + init_sriov + [[ -z '' ]] + [[ -z '' ]] + echo 'INFO: sriov parameters are not provided' INFO: sriov parameters are not provided + return + wait_vhost0 + local max=60 + local pause=5 + local i=0 + local 'grep_str=inet ' + [[ -n '' ]] + (( i=0 )) + (( i 0 )) + (( HUGE_PAGES_2MB > 0 )) + HUGEPAGES_DIR=/dev/hugepages + ensure_hugepages /dev/hugepages + local hp_dir=/dev/hugepages + hp_dir=/dev/hugepages + local mp + local fs ++ mount -t hugetlbfs ++ awk '{print($3)}' + for mp in '$(mount -t hugetlbfs | awk '\''{print($3)}'\'')' + [[ /dev/hugepages == \/\d\e\v\/\h\u\g\e\p\a\g\e\s ]] + return ++ cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages + allocated_pages_2MB=0 + echo 'INFO: Requested HP2MB 256 available 0' INFO: Requested HP2MB 256 available 0 + (( HUGE_PAGES_2MB > allocated_pages_2MB )) + echo 'INFO: Requested HP2MB 256 more then available 0.. try to allocate' INFO: Requested HP2MB 256 more then available 0.. try to allocate + echo 256 + local INTROSPECT_IP=0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + local COMPUTE_NODE_ADDRESS + [[ -n '' ]] + COMPUTE_NODE_ADDRESS=10.0.0.35 ++ get_server_list CONTROL ':5269 ' ++ local server_typ=CONTROL_NODES ++ local 'port_with_delim=:5269 ' ++ local server_list= ++ IFS=, ++ read -ra server_list ++ local extended_server_list= ++ for server in '"${server_list[@]}"' +++ echo 10.0.0.35 ++ local server_address=10.0.0.35 ++ extended_server_list+='10.0.0.35:5269 ' ++ '[' -n '10.0.0.35:5269 ' ']' ++ echo 10.0.0.35:5269 + local XMPP_SERVERS_LIST=10.0.0.35:5269 ++ get_ip_for_vrouter_from_control +++ get_iface_for_vrouter_from_control +++ local node_ip +++ [[ -n '' ]] ++++ echo 10.0.0.1 +++ node_ip=10.0.0.1 +++ [[ -z 10.0.0.1 ]] ++++ get_gateway_nic_for_ip 10.0.0.1 ++++ command -v ip ++++ local ip=10.0.0.1 +++++ ip route get 10.0.0.1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local iface=vhost0 +++ echo vhost0 ++ local iface=vhost0 ++ get_ip_for_nic vhost0 ++ local nic=vhost0 ++ get_cidr_for_nic vhost0 ++ command -v ip ++ cut -d / -f 1 ++ local nic=vhost0 ++ ip addr show dev vhost0 ++ grep 'inet ' ++ awk '{print $2}' ++ head -n 1 + local CONTROL_NETWORK_IP=10.0.0.35 ++ get_server_list DNS ':53 ' ++ local server_typ=DNS_NODES ++ local 'port_with_delim=:53 ' ++ local server_list= ++ IFS=, ++ read -ra server_list ++ local extended_server_list= ++ for server in '"${server_list[@]}"' +++ echo 10.0.0.35 ++ local server_address=10.0.0.35 ++ extended_server_list+='10.0.0.35:53 ' ++ '[' -n '10.0.0.35:53 ' ']' ++ echo 10.0.0.35:53 + local DNS_SERVERS_LIST=10.0.0.35:53 + local k8s_token_file + [[ -z '' ]] + k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token + [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]] + local result_params= + local key line ++ cat /parameters-template.sh + local 'params=AGENT_MODE= AGENT_NAME= AUTH_MODE= BARBICAN_PASSWORD= BARBICAN_TENANT_NAME= BARBICAN_USER= CLOUD_ORCHESTRATOR= COLLECTOR_SERVERS= COMPUTE_NODE_ADDRESS= CONFIG_API_SERVER_CA_CERTFILE= CONFIG_API_SSL_ENABLE= CONFIG_NODES= CONTAINER_LOG_DIR= CONTROL_NETWORK_IP= DEFAULT_LOCAL_IP= DNS_SERVERS_LIST= DPDK_UIO_DRIVER= FABRIC_SNAT_HASH_TABLE_SIZE= HUGEPAGES_DIR= HUGE_PAGES_1GB= HUGE_PAGES_2MB= HYPERVISOR_TYPE= INTROSPECT_IP= INTROSPECT_SSL_ENABLE= INTROSPECT_SSL_INSECURE= IS_ENCRYPTION_SUPPORTED_FLAG= IS_VLAN_ENABLED= K8S_TOKEN= KEYSTONE_AUTH_ADMIN_PORT= KEYSTONE_AUTH_CA_CERTFILE= KEYSTONE_AUTH_CERTFILE= KEYSTONE_AUTH_HOST= KEYSTONE_AUTH_INSECURE= KEYSTONE_AUTH_KEYFILE= KEYSTONE_AUTH_PROJECT_DOMAIN_NAME= KEYSTONE_AUTH_PROTO= KEYSTONE_AUTH_REGION_NAME= KEYSTONE_AUTH_REGION_NAME= KEYSTONE_AUTH_URL_TOKENS= KEYSTONE_AUTH_URL_VERSION= KEYSTONE_AUTH_USER_DOMAIN_NAME= KUBERNETES_API_PORT= KUBERNETES_API_SECURE_PORT= KUBERNETES_API_SERVER= L3MH_CIDR= LOG_LEVEL= LOG_LOCAL= METADATA_PROXY_SECRET= METADATA_SSL_CA_CERTFILE= METADATA_SSL_CERTFILE= METADATA_SSL_CERT_TYPE= METADATA_SSL_ENABLE= METADATA_SSL_KEYFILE= PCI_ADDRESS= PHYS_INT= PHYS_INT_MAC= PHYS_INT_IPS= PRIORITY_BANDWIDTH= PRIORITY_ID= PRIORITY_SCHEDULING= PRIORITY_TAGGING= QOS_DEF_HW_QUEUE= QOS_LOGICAL_QUEUES= QOS_QUEUE_ID= SAMPLE_DESTINATION= SANDESH_CA_CERTFILE= SANDESH_CERTFILE= SANDESH_KEYFILE= SANDESH_SERVER_CERTFILE= SANDESH_SERVER_KEYFILE= SANDESH_SSL_ENABLE= SLO_DESTINATION= STATS_COLLECTOR_DESTINATION_PATH= SUBCLUSTER= TSN_AGENT_MODE= TSN_NODES= VMWARE_PHYS_INT= VROUTER_AGENT_INTROSPECT_PORT= VROUTER_CIDR= VROUTER_CRYPT_INTERFACE= VROUTER_GATEWAY= XMPP_SERVER_CA_CERTFILE= XMPP_SERVER_CERTFILE= XMPP_SERVER_KEYFILE= XMPP_SERVERS_LIST= XMPP_SSL_ENABLE=' + read line ++ echo AGENT_MODE= ++ cut -d = -f 1 + key=AGENT_MODE + [[ -n AGENT_MODE ]] + read -r -d '' result_params + true + read line ++ echo AGENT_NAME= ++ cut -d = -f 1 + key=AGENT_NAME + [[ -n AGENT_NAME ]] + read -r -d '' result_params + true + read line ++ echo AUTH_MODE= ++ cut -d = -f 1 + key=AUTH_MODE + [[ -n AUTH_MODE ]] + read -r -d '' result_params + true + read line ++ echo BARBICAN_PASSWORD= ++ cut -d = -f 1 + key=BARBICAN_PASSWORD + [[ -n BARBICAN_PASSWORD ]] + read -r -d '' result_params + true + read line ++ echo BARBICAN_TENANT_NAME= ++ cut -d = -f 1 + key=BARBICAN_TENANT_NAME + [[ -n BARBICAN_TENANT_NAME ]] + read -r -d '' result_params + true + read line ++ echo BARBICAN_USER= ++ cut -d = -f 1 + key=BARBICAN_USER + [[ -n BARBICAN_USER ]] + read -r -d '' result_params + true + read line ++ echo CLOUD_ORCHESTRATOR= ++ cut -d = -f 1 + key=CLOUD_ORCHESTRATOR + [[ -n CLOUD_ORCHESTRATOR ]] + read -r -d '' result_params + true + read line ++ echo COLLECTOR_SERVERS= ++ cut -d = -f 1 + key=COLLECTOR_SERVERS + [[ -n COLLECTOR_SERVERS ]] + read -r -d '' result_params + true + read line ++ echo COMPUTE_NODE_ADDRESS= ++ cut -d = -f 1 + key=COMPUTE_NODE_ADDRESS + [[ -n COMPUTE_NODE_ADDRESS ]] + read -r -d '' result_params + true + read line ++ echo CONFIG_API_SERVER_CA_CERTFILE= ++ cut -d = -f 1 + key=CONFIG_API_SERVER_CA_CERTFILE + [[ -n CONFIG_API_SERVER_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo CONFIG_API_SSL_ENABLE= ++ cut -d = -f 1 + key=CONFIG_API_SSL_ENABLE + [[ -n CONFIG_API_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo CONFIG_NODES= ++ cut -d = -f 1 + key=CONFIG_NODES + [[ -n CONFIG_NODES ]] + read -r -d '' result_params + true + read line ++ echo CONTAINER_LOG_DIR= ++ cut -d = -f 1 + key=CONTAINER_LOG_DIR + [[ -n CONTAINER_LOG_DIR ]] + read -r -d '' result_params + true + read line ++ echo CONTROL_NETWORK_IP= ++ cut -d = -f 1 + key=CONTROL_NETWORK_IP + [[ -n CONTROL_NETWORK_IP ]] + read -r -d '' result_params + true + read line ++ echo DEFAULT_LOCAL_IP= ++ cut -d = -f 1 + key=DEFAULT_LOCAL_IP + [[ -n DEFAULT_LOCAL_IP ]] + read -r -d '' result_params + true + read line ++ echo DNS_SERVERS_LIST= ++ cut -d = -f 1 + key=DNS_SERVERS_LIST + [[ -n DNS_SERVERS_LIST ]] + read -r -d '' result_params + true + read line ++ echo DPDK_UIO_DRIVER= ++ cut -d = -f 1 + key=DPDK_UIO_DRIVER + [[ -n DPDK_UIO_DRIVER ]] + read -r -d '' result_params + true + read line ++ echo FABRIC_SNAT_HASH_TABLE_SIZE= ++ cut -d = -f 1 + key=FABRIC_SNAT_HASH_TABLE_SIZE + [[ -n FABRIC_SNAT_HASH_TABLE_SIZE ]] + read -r -d '' result_params + true + read line ++ echo HUGEPAGES_DIR= ++ cut -d = -f 1 + key=HUGEPAGES_DIR + [[ -n HUGEPAGES_DIR ]] + read -r -d '' result_params + true + read line ++ echo HUGE_PAGES_1GB= ++ cut -d = -f 1 + key=HUGE_PAGES_1GB + [[ -n HUGE_PAGES_1GB ]] + read -r -d '' result_params + true + read line ++ echo HUGE_PAGES_2MB= ++ cut -d = -f 1 + key=HUGE_PAGES_2MB + [[ -n HUGE_PAGES_2MB ]] + read -r -d '' result_params + true + read line ++ echo HYPERVISOR_TYPE= ++ cut -d = -f 1 + key=HYPERVISOR_TYPE + [[ -n HYPERVISOR_TYPE ]] + read -r -d '' result_params + true + read line ++ echo INTROSPECT_IP= ++ cut -d = -f 1 + key=INTROSPECT_IP + [[ -n INTROSPECT_IP ]] + read -r -d '' result_params + true + read line ++ echo INTROSPECT_SSL_ENABLE= ++ cut -d = -f 1 + key=INTROSPECT_SSL_ENABLE + [[ -n INTROSPECT_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo INTROSPECT_SSL_INSECURE= ++ cut -d = -f 1 + key=INTROSPECT_SSL_INSECURE + [[ -n INTROSPECT_SSL_INSECURE ]] + read -r -d '' result_params + true + read line ++ echo IS_ENCRYPTION_SUPPORTED_FLAG= ++ cut -d = -f 1 + key=IS_ENCRYPTION_SUPPORTED_FLAG + [[ -n IS_ENCRYPTION_SUPPORTED_FLAG ]] + read -r -d '' result_params + true + read line ++ echo IS_VLAN_ENABLED= ++ cut -d = -f 1 + key=IS_VLAN_ENABLED + [[ -n IS_VLAN_ENABLED ]] + read -r -d '' result_params + true + read line ++ echo K8S_TOKEN= ++ cut -d = -f 1 + key=K8S_TOKEN + [[ -n K8S_TOKEN ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_ADMIN_PORT= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_ADMIN_PORT + [[ -n KEYSTONE_AUTH_ADMIN_PORT ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_CA_CERTFILE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_CA_CERTFILE + [[ -n KEYSTONE_AUTH_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_CERTFILE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_CERTFILE + [[ -n KEYSTONE_AUTH_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_HOST= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_HOST + [[ -n KEYSTONE_AUTH_HOST ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_INSECURE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_INSECURE + [[ -n KEYSTONE_AUTH_INSECURE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_KEYFILE= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_KEYFILE + [[ -n KEYSTONE_AUTH_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_PROJECT_DOMAIN_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_PROJECT_DOMAIN_NAME + [[ -n KEYSTONE_AUTH_PROJECT_DOMAIN_NAME ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_PROTO= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_PROTO + [[ -n KEYSTONE_AUTH_PROTO ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_REGION_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_REGION_NAME + [[ -n KEYSTONE_AUTH_REGION_NAME ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_REGION_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_REGION_NAME + [[ -n KEYSTONE_AUTH_REGION_NAME ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_URL_TOKENS= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_URL_TOKENS + [[ -n KEYSTONE_AUTH_URL_TOKENS ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_URL_VERSION= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_URL_VERSION + [[ -n KEYSTONE_AUTH_URL_VERSION ]] + read -r -d '' result_params + true + read line ++ echo KEYSTONE_AUTH_USER_DOMAIN_NAME= ++ cut -d = -f 1 + key=KEYSTONE_AUTH_USER_DOMAIN_NAME + [[ -n KEYSTONE_AUTH_USER_DOMAIN_NAME ]] + read -r -d '' result_params + true + read line ++ echo KUBERNETES_API_PORT= ++ cut -d = -f 1 + key=KUBERNETES_API_PORT + [[ -n KUBERNETES_API_PORT ]] + read -r -d '' result_params + true + read line ++ echo KUBERNETES_API_SECURE_PORT= ++ cut -d = -f 1 + key=KUBERNETES_API_SECURE_PORT + [[ -n KUBERNETES_API_SECURE_PORT ]] + read -r -d '' result_params + true + read line ++ echo KUBERNETES_API_SERVER= ++ cut -d = -f 1 + key=KUBERNETES_API_SERVER + [[ -n KUBERNETES_API_SERVER ]] + read -r -d '' result_params + true + read line ++ echo L3MH_CIDR= ++ cut -d = -f 1 + key=L3MH_CIDR + [[ -n L3MH_CIDR ]] + read -r -d '' result_params + true + read line ++ echo LOG_LEVEL= ++ cut -d = -f 1 + key=LOG_LEVEL + [[ -n LOG_LEVEL ]] + read -r -d '' result_params + true + read line ++ echo LOG_LOCAL= ++ cut -d = -f 1 + key=LOG_LOCAL + [[ -n LOG_LOCAL ]] + read -r -d '' result_params + true + read line ++ echo METADATA_PROXY_SECRET= ++ cut -d = -f 1 + key=METADATA_PROXY_SECRET + [[ -n METADATA_PROXY_SECRET ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_CA_CERTFILE= ++ cut -d = -f 1 + key=METADATA_SSL_CA_CERTFILE + [[ -n METADATA_SSL_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_CERTFILE= ++ cut -d = -f 1 + key=METADATA_SSL_CERTFILE + [[ -n METADATA_SSL_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_CERT_TYPE= ++ cut -d = -f 1 + key=METADATA_SSL_CERT_TYPE + [[ -n METADATA_SSL_CERT_TYPE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_ENABLE= ++ cut -d = -f 1 + key=METADATA_SSL_ENABLE + [[ -n METADATA_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo METADATA_SSL_KEYFILE= ++ cut -d = -f 1 + key=METADATA_SSL_KEYFILE + [[ -n METADATA_SSL_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo PCI_ADDRESS= ++ cut -d = -f 1 + key=PCI_ADDRESS + [[ -n PCI_ADDRESS ]] + read -r -d '' result_params + true + read line ++ echo PHYS_INT= ++ cut -d = -f 1 + key=PHYS_INT + [[ -n PHYS_INT ]] + read -r -d '' result_params + true + read line ++ echo PHYS_INT_MAC= ++ cut -d = -f 1 + key=PHYS_INT_MAC + [[ -n PHYS_INT_MAC ]] + read -r -d '' result_params + true + read line ++ echo PHYS_INT_IPS= ++ cut -d = -f 1 + key=PHYS_INT_IPS + [[ -n PHYS_INT_IPS ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_BANDWIDTH= ++ cut -d = -f 1 + key=PRIORITY_BANDWIDTH + [[ -n PRIORITY_BANDWIDTH ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_ID= ++ cut -d = -f 1 + key=PRIORITY_ID + [[ -n PRIORITY_ID ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_SCHEDULING= ++ cut -d = -f 1 + key=PRIORITY_SCHEDULING + [[ -n PRIORITY_SCHEDULING ]] + read -r -d '' result_params + true + read line ++ echo PRIORITY_TAGGING= ++ cut -d = -f 1 + key=PRIORITY_TAGGING + [[ -n PRIORITY_TAGGING ]] + read -r -d '' result_params + true + read line ++ echo QOS_DEF_HW_QUEUE= ++ cut -d = -f 1 + key=QOS_DEF_HW_QUEUE + [[ -n QOS_DEF_HW_QUEUE ]] + read -r -d '' result_params + true + read line ++ echo QOS_LOGICAL_QUEUES= ++ cut -d = -f 1 + key=QOS_LOGICAL_QUEUES + [[ -n QOS_LOGICAL_QUEUES ]] + read -r -d '' result_params + true + read line ++ echo QOS_QUEUE_ID= ++ cut -d = -f 1 + key=QOS_QUEUE_ID + [[ -n QOS_QUEUE_ID ]] + read -r -d '' result_params + true + read line ++ echo SAMPLE_DESTINATION= ++ cut -d = -f 1 + key=SAMPLE_DESTINATION + [[ -n SAMPLE_DESTINATION ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_CA_CERTFILE= ++ cut -d = -f 1 + key=SANDESH_CA_CERTFILE + [[ -n SANDESH_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_CERTFILE= ++ cut -d = -f 1 + key=SANDESH_CERTFILE + [[ -n SANDESH_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_KEYFILE= ++ cut -d = -f 1 + key=SANDESH_KEYFILE + [[ -n SANDESH_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_SERVER_CERTFILE= ++ cut -d = -f 1 + key=SANDESH_SERVER_CERTFILE + [[ -n SANDESH_SERVER_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_SERVER_KEYFILE= ++ cut -d = -f 1 + key=SANDESH_SERVER_KEYFILE + [[ -n SANDESH_SERVER_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo SANDESH_SSL_ENABLE= ++ cut -d = -f 1 + key=SANDESH_SSL_ENABLE + [[ -n SANDESH_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ echo SLO_DESTINATION= ++ cut -d = -f 1 + key=SLO_DESTINATION + [[ -n SLO_DESTINATION ]] + read -r -d '' result_params + true + read line ++ echo STATS_COLLECTOR_DESTINATION_PATH= ++ cut -d = -f 1 + key=STATS_COLLECTOR_DESTINATION_PATH + [[ -n STATS_COLLECTOR_DESTINATION_PATH ]] + read -r -d '' result_params + true + read line ++ echo SUBCLUSTER= ++ cut -d = -f 1 + key=SUBCLUSTER + [[ -n SUBCLUSTER ]] + read -r -d '' result_params + true + read line ++ echo TSN_AGENT_MODE= ++ cut -d = -f 1 + key=TSN_AGENT_MODE + [[ -n TSN_AGENT_MODE ]] + read -r -d '' result_params + true + read line ++ echo TSN_NODES= ++ cut -d = -f 1 + key=TSN_NODES + [[ -n TSN_NODES ]] + read -r -d '' result_params + true + read line ++ echo VMWARE_PHYS_INT= ++ cut -d = -f 1 + key=VMWARE_PHYS_INT + [[ -n VMWARE_PHYS_INT ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_AGENT_INTROSPECT_PORT= ++ cut -d = -f 1 + key=VROUTER_AGENT_INTROSPECT_PORT + [[ -n VROUTER_AGENT_INTROSPECT_PORT ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_CIDR= ++ cut -d = -f 1 + key=VROUTER_CIDR + [[ -n VROUTER_CIDR ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_CRYPT_INTERFACE= ++ cut -d = -f 1 + key=VROUTER_CRYPT_INTERFACE + [[ -n VROUTER_CRYPT_INTERFACE ]] + read -r -d '' result_params + true + read line ++ echo VROUTER_GATEWAY= ++ cut -d = -f 1 + key=VROUTER_GATEWAY + [[ -n VROUTER_GATEWAY ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVER_CA_CERTFILE= ++ cut -d = -f 1 + key=XMPP_SERVER_CA_CERTFILE + [[ -n XMPP_SERVER_CA_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVER_CERTFILE= ++ cut -d = -f 1 + key=XMPP_SERVER_CERTFILE + [[ -n XMPP_SERVER_CERTFILE ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVER_KEYFILE= ++ cut -d = -f 1 + key=XMPP_SERVER_KEYFILE + [[ -n XMPP_SERVER_KEYFILE ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SERVERS_LIST= ++ cut -d = -f 1 + key=XMPP_SERVERS_LIST + [[ -n XMPP_SERVERS_LIST ]] + read -r -d '' result_params + true + read line ++ echo XMPP_SSL_ENABLE= ++ cut -d = -f 1 + key=XMPP_SSL_ENABLE + [[ -n XMPP_SSL_ENABLE ]] + read -r -d '' result_params + true + read line ++ mktemp --dry-run + local tname=/tmp/tmp.FvFxgXAmft + echo 'AGENT_MODE="kernel" AGENT_NAME="cn-jenkins-deploy-platform-ansible-os-2207-1." AUTH_MODE="keystone" BARBICAN_PASSWORD="contrail123" BARBICAN_TENANT_NAME="service" BARBICAN_USER="barbican" CLOUD_ORCHESTRATOR="openstack" COLLECTOR_SERVERS="10.0.0.35:8086" COMPUTE_NODE_ADDRESS="10.0.0.35" CONFIG_API_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem" CONFIG_API_SSL_ENABLE="false" CONFIG_NODES="10.0.0.35" CONTAINER_LOG_DIR="/var/log/contrail/vrouter-agent" CONTROL_NETWORK_IP="10.0.0.35" DEFAULT_LOCAL_IP="10.0.0.35" DNS_SERVERS_LIST="10.0.0.35:53" DPDK_UIO_DRIVER="uio_pci_generic" FABRIC_SNAT_HASH_TABLE_SIZE="4096" HUGEPAGES_DIR="/dev/hugepages" HUGE_PAGES_1GB="0" HUGE_PAGES_2MB="256" HYPERVISOR_TYPE="kvm" INTROSPECT_IP="0.0.0.0" INTROSPECT_SSL_ENABLE="false" INTROSPECT_SSL_INSECURE="True" IS_ENCRYPTION_SUPPORTED_FLAG="false" IS_VLAN_ENABLED="false" K8S_TOKEN="" KEYSTONE_AUTH_ADMIN_PORT="5000" KEYSTONE_AUTH_CA_CERTFILE="" KEYSTONE_AUTH_CERTFILE="" KEYSTONE_AUTH_HOST="10.0.0.35" KEYSTONE_AUTH_INSECURE="True" KEYSTONE_AUTH_KEYFILE="" KEYSTONE_AUTH_PROJECT_DOMAIN_NAME="Default" KEYSTONE_AUTH_PROTO="http" KEYSTONE_AUTH_REGION_NAME="RegionOne" KEYSTONE_AUTH_REGION_NAME="RegionOne" KEYSTONE_AUTH_URL_TOKENS="/v3/auth/tokens" KEYSTONE_AUTH_URL_VERSION="/v3" KEYSTONE_AUTH_USER_DOMAIN_NAME="Default" KUBERNETES_API_PORT="" KUBERNETES_API_SECURE_PORT="" KUBERNETES_API_SERVER="" L3MH_CIDR="" LOG_LEVEL="SYS_DEBUG" LOG_LOCAL="1" METADATA_PROXY_SECRET="contrail" METADATA_SSL_CA_CERTFILE="" METADATA_SSL_CERTFILE="" METADATA_SSL_CERT_TYPE="" METADATA_SSL_ENABLE="false" METADATA_SSL_KEYFILE="" PCI_ADDRESS="0000:00:03.0" PHYS_INT="ens3" PHYS_INT_MAC="fa:16:3e:43:9c:7c" PHYS_INT_IPS="" PRIORITY_BANDWIDTH="" PRIORITY_ID="" PRIORITY_SCHEDULING="" PRIORITY_TAGGING="True" QOS_DEF_HW_QUEUE="False" QOS_LOGICAL_QUEUES="" QOS_QUEUE_ID="" SAMPLE_DESTINATION="collector" SANDESH_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem" SANDESH_CERTFILE="/etc/contrail/ssl/certs/server.pem" SANDESH_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem" SANDESH_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem" SANDESH_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem" SANDESH_SSL_ENABLE="false" SLO_DESTINATION="collector" STATS_COLLECTOR_DESTINATION_PATH="" SUBCLUSTER="" TSN_AGENT_MODE="" TSN_NODES="[]" VMWARE_PHYS_INT="" VROUTER_AGENT_INTROSPECT_PORT="" VROUTER_CIDR="10.0.0.35/24" VROUTER_CRYPT_INTERFACE="crypt0" VROUTER_GATEWAY="10.0.0.1" XMPP_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem" XMPP_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem" XMPP_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem" XMPP_SERVERS_LIST="10.0.0.35:5269" XMPP_SSL_ENABLE="false"' + mv -f /tmp/tmp.FvFxgXAmft /parameters.sh ++ mktemp --dry-run + tname=/tmp/tmp.xBiaWA3xBS + echo ready + mv -f /tmp/tmp.xBiaWA3xBS /parameters_state + cleanup_lbaas_netns_config ++ ip netns ++ awk '/^vrouter-/{print $1}' + rm -rf '/var/lib/contrail/loadbalancer/*' + create_agent_config /usr/bin/contrail-vrouter-agent + echo 'INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf' INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf + [[ ! -f /parameters.sh ]] + source /parameters.sh ++ AGENT_MODE=kernel ++ AGENT_NAME=cn-jenkins-deploy-platform-ansible-os-2207-1. ++ AUTH_MODE=keystone ++ BARBICAN_PASSWORD=contrail123 ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ CLOUD_ORCHESTRATOR=openstack ++ COLLECTOR_SERVERS=10.0.0.35:8086 ++ COMPUTE_NODE_ADDRESS=10.0.0.35 ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_NODES=10.0.0.35 ++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent ++ CONTROL_NETWORK_IP=10.0.0.35 ++ DEFAULT_LOCAL_IP=10.0.0.35 ++ DNS_SERVERS_LIST=10.0.0.35:53 ++ DPDK_UIO_DRIVER=uio_pci_generic ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ HUGEPAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HYPERVISOR_TYPE=kvm ++ INTROSPECT_IP=0.0.0.0 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ IS_ENCRYPTION_SUPPORTED_FLAG=false ++ IS_VLAN_ENABLED=false ++ K8S_TOKEN= ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_HOST=10.0.0.35 ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KUBERNETES_API_PORT= ++ KUBERNETES_API_SECURE_PORT= ++ KUBERNETES_API_SERVER= ++ L3MH_CIDR= ++ LOG_LEVEL=SYS_DEBUG ++ LOG_LOCAL=1 ++ METADATA_PROXY_SECRET=contrail ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_KEYFILE= ++ PCI_ADDRESS=0000:00:03.0 ++ PHYS_INT=ens3 ++ PHYS_INT_MAC=fa:16:3e:43:9c:7c ++ PHYS_INT_IPS= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_ID= ++ PRIORITY_SCHEDULING= ++ PRIORITY_TAGGING=True ++ QOS_DEF_HW_QUEUE=False ++ QOS_LOGICAL_QUEUES= ++ QOS_QUEUE_ID= ++ SAMPLE_DESTINATION=collector ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SSL_ENABLE=false ++ SLO_DESTINATION=collector ++ STATS_COLLECTOR_DESTINATION_PATH= ++ SUBCLUSTER= ++ TSN_AGENT_MODE= ++ TSN_NODES='[]' ++ VMWARE_PHYS_INT= ++ VROUTER_AGENT_INTROSPECT_PORT= ++ VROUTER_CIDR=10.0.0.35/24 ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_GATEWAY=10.0.0.1 ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVERS_LIST=10.0.0.35:5269 ++ XMPP_SSL_ENABLE=false + [[ -z ens3 ]] + [[ -z fa:16:3e:43:9c:7c ]] + echo 'INFO: Physical interface: nic=ens3, mac=fa:16:3e:43:9c:7c' INFO: Physical interface: nic=ens3, mac=fa:16:3e:43:9c:7c + local agent_mode_options=physical_interface_mac=fa:16:3e:43:9c:7c + [[ kernel == \d\p\d\k ]] + local tsn_agent_mode= + [[ -n '' ]] + local vrouter_opts= + local nic= + local phys_ints phys_ips gateway ipaddr + local binding_data_dir=/var/run/vrouter + [[ -n '' ]] + vrouter_opts=physical_interface=ens3 + [[ -n 10.0.0.1 ]] + vrouter_opts+=' gateway=10.0.0.1' + local subcluster_option= + [[ -n '' ]] + local tsn_server_list= + read -r -d '' tsn_server_list ++ tr , ' ' ++ echo '[]' + true + local priority_group_option priority_id_list priority_bandwidth_list priority_scheduling_list + local qos_niantic + [[ -n '' ]] + local qos_queueing_option= + local qos_queue_id qos_logical_queue qos_config qos_def + [[ -n '' ]] + local metadata_ssl_conf= + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + local crypt_interface_option= + [[ false == \t\r\u\e ]] + local hugepages_option= + local xmpp_certs_config sandesh_client_config collector_stats_config + (( HUGE_PAGES_1GB > 0 )) + (( HUGE_PAGES_2MB > 0 )) + read -r -d '' hugepages_option + true + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + xmpp_certs_config= + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + read -r -d '' sandesh_client_config + true + [[ -n '' ]] + collector_stats_config= + introspect_opts=http_server_ip=0.0.0.0 + '[' -n '' ']' + upgrade_old_logs vrouter-agent + local template=vrouter-agent ++ dirname /var/log/contrail/vrouter-agent + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/vrouter-agent + chmod 755 /var/log/contrail/vrouter-agent + mv -n '/var/log/contrail/*vrouter-agent.log*' /var/log/contrail/vrouter-agent/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/vrouter-agent + find /var/log/contrail/vrouter-agent -uid 0 -exec chown 1999:1999 '{}' + + mkdir -p /etc/contrail + cat + add_ini_params_from_env VROUTER_AGENT /etc/contrail/contrail-vrouter-agent.conf + local service_name=VROUTER_AGENT + local cfg_path=/etc/contrail/contrail-vrouter-agent.conf + local delim=__ ++ set -o posix ++ grep '^VROUTER_AGENT__.*__.*=.*$' ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^VROUTER_AGENT__//g' + local vars= + local section= + echo 'INFO: /etc/contrail/contrail-vrouter-agent.conf' INFO: /etc/contrail/contrail-vrouter-agent.conf + cat /etc/contrail/contrail-vrouter-agent.conf [CONTROL-NODE] servers=10.0.0.35:5269 [DEFAULT] http_server_ip=0.0.0.0 collectors=10.0.0.35:8086 log_file=/var/log/contrail/vrouter-agent/contrail-vrouter-agent.log log_level=SYS_DEBUG log_local=1 hostname=cn-jenkins-deploy-platform-ansible-os-2207-1. agent_name=cn-jenkins-deploy-platform-ansible-os-2207-1. xmpp_dns_auth_enable=false xmpp_auth_enable=false physical_interface_mac=fa:16:3e:43:9c:7c tsn_servers = [] [SANDESH] introspect_ssl_enable=false sandesh_ssl_enable=false [NETWORKS] control_network_ip=10.0.0.35 [DNS] servers=10.0.0.35:53 [METADATA] metadata_proxy_secret=contrail [VIRTUAL-HOST-INTERFACE] name=vhost0 ip=10.0.0.35/24 compute_node_address=10.0.0.35 physical_interface=ens3 gateway=10.0.0.1 [SERVICE-INSTANCE] netns_command=/usr/bin/opencontrail-vrouter-netns docker_command=/usr/bin/opencontrail-vrouter-docker [HYPERVISOR] type = kvm [FLOWS] fabric_snat_hash_table_size = 4096 [SESSION] slo_destination = collector sample_destination = collector [RESTART] huge_page_2M=/dev/hugepages/bridge /dev/hugepages/flow + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + cat + start_agent /usr/bin/contrail-vrouter-agent + echo 'INFO: Run start_agent' INFO: Run start_agent + [[ ! -f /etc/contrail/contrail-vrouter-agent.conf ]] + set_qos + local interface_list mode policy slaves pci_addresses bond_numa + [[ -n '' ]] + [[ -n '' ]] + true + rm -f /var/run/restart_agent + [[ 1 == \0 ]] + echo 'INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent' INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent + local vrouter_agent_process=95177 + /usr/bin/contrail-vrouter-agent + echo 95177 + is_encryption_supported + local enc=False + [[ FALSE == \F\A\L\S\E ]] + return 1 + echo 'INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter' INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter + echo 'INFO: vrouter agent process PID: 95177' INFO: vrouter agent process PID: 95177 ++ cat /var/run/vrouter-agent.pid + wait 95177 Config file parsing completed. log4cplus:ERROR No appenders could be found for logger (root). log4cplus:ERROR Please initialize the log4cplus system properly. INFO: wait vhost0 to be initilaized... 0/60 INFO: vhost0 is ready. dev_idx = 7, dev_name = vhost0 error: internal error: End of file from qemu monitor (vm='instance-00000011')