+++ date ++ echo 'INFO: =================== Mon Jan 20 00:47:49 UTC 2025 ===================' INFO: =================== Mon Jan 20 00:47:49 UTC 2025 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ head -n 1 +++ ip addr show dev ens3 +++ awk '{print $2}' +++ grep 'inet ' ++ DEFAULT_LOCAL_IP=10.0.0.42 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR= ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICSDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_SNMP_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8081 ' +++ '[' -n '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081 ' ']' +++ echo '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' ++ ANALYTICS_SERVERS='10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9042 ' +++ '[' -n '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042 ' ']' +++ echo '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICSDB_CQL_SERVERS='10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8086 ' +++ '[' -n '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086 ' ']' +++ echo '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ COLLECTOR_SERVERS='10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIGDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8082 ' +++ '[' -n '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082 ' ']' +++ echo '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' ++ CONFIG_SERVERS='10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9161 ' +++ '[' -n '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161 ' ']' +++ echo '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' ++ CONFIGDB_SERVERS='10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9041 ' +++ '[' -n '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ' ']' +++ echo '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIGDB_CQL_SERVERS='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:2181, +++ '[' -n 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181, ']' +++ echo 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 ++ ZOOKEEPER_SERVERS=10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:2181 ' +++ '[' -n '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181 ' ']' +++ echo '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ ZOOKEEPER_SERVERS_SPACE_DELIM='10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ RABBITMQ_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:5673, +++ '[' -n 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673, ']' +++ echo 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SERVERS=10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:6379 ' +++ '[' -n '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379 ' ']' +++ echo '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_SERVERS='10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9092 ' +++ '[' -n '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092 ' ']' +++ echo '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SERVERS='10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.42 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return + wait_for_cassandra ++ echo 10.0.0.42,10.0.0.22,10.0.0.49 ++ cut -d , -f 1 + local cassandra=10.0.0.42 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node CONFIG +++ find_my_ip_and_order_for_node CONFIG +++ local server_typ=CONFIG_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.42,10.0.0.22,10.0.0.49 +++ local servers=10.0.0.42,10.0.0.22,10.0.0.49 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ uniq ++++ awk '/32 host/ { print f } {f=$2}' +++ cut -d ' ' -f 1 ++++ grep -vi host ++++ sort ++++ cat /proc/net/fib_trie +++ local local_ips=,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.42'\''))' +++ local server_ip=10.0.0.42 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.42 ]] +++ [[ ,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.42, ]] +++ echo 10.0.0.42 1 +++ return ++ local ip=10.0.0.42 ++ [[ -z 10.0.0.42 ]] ++ echo 10.0.0.42 + host_ip=10.0.0.42 + [[ cql == \c\q\l ]] ++ echo 10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ++ sed 's/,/ /g' + cassandra_server_list='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node CONFIG ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env DEVICE_MANAGER /etc/contrail/contrail-device-manager.conf + local service_name=DEVICE_MANAGER + local cfg_path=/etc/contrail/contrail-device-manager.conf + local delim=__ ++ sed 's/^DEVICE_MANAGER__//g' ++ grep '^DEVICE_MANAGER__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ set -o posix ++ set + local vars= + local section= + cat + add_ini_params_from_env FABRIC_ANSIBLE /etc/contrail/contrail-fabric-ansible.conf + local service_name=FABRIC_ANSIBLE + local cfg_path=/etc/contrail/contrail-fabric-ansible.conf + local delim=__ ++ sed 's/^FABRIC_ANSIBLE__//g' ++ grep '^FABRIC_ANSIBLE__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ set -o posix ++ set + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs fabric-ansible + local template=fabric-ansible ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*fabric-ansible.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + upgrade_old_logs device-manager + local template=device-manager ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*device-manager.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + exec /usr/bin/contrail-device-manager --conf_file /etc/contrail/contrail-device-manager.conf --conf_file /etc/contrail/contrail-keystone-auth.conf +++ date ++ echo 'INFO: =================== Mon Jan 20 01:47:33 UTC 2025 ===================' INFO: =================== Mon Jan 20 01:47:33 UTC 2025 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ head -n 1 +++ awk '{print $2}' +++ grep 'inet ' ++ DEFAULT_LOCAL_IP=10.0.0.42 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ tail -n 1 +++ awk '/pagesize=2M/{print($3)}' +++ mount -t hugetlbfs ++ HUGE_PAGES_2MB_DIR= ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICSDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_SNMP_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8081 ' +++ '[' -n '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081 ' ']' +++ echo '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' ++ ANALYTICS_SERVERS='10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9042 ' +++ '[' -n '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042 ' ']' +++ echo '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICSDB_CQL_SERVERS='10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8086 ' +++ '[' -n '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086 ' ']' +++ echo '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ COLLECTOR_SERVERS='10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIGDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8082 ' +++ '[' -n '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082 ' ']' +++ echo '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' ++ CONFIG_SERVERS='10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9161 ' +++ '[' -n '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161 ' ']' +++ echo '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' ++ CONFIGDB_SERVERS='10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9041 ' +++ '[' -n '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ' ']' +++ echo '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIGDB_CQL_SERVERS='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:2181, +++ '[' -n 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181, ']' +++ echo 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 ++ ZOOKEEPER_SERVERS=10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:2181 ' +++ '[' -n '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181 ' ']' +++ echo '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ ZOOKEEPER_SERVERS_SPACE_DELIM='10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ RABBITMQ_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:5673, +++ '[' -n 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673, ']' +++ echo 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SERVERS=10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:6379 ' +++ '[' -n '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379 ' ']' +++ echo '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_SERVERS='10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9092 ' +++ '[' -n '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092 ' ']' +++ echo '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SERVERS='10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.42 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return + wait_for_cassandra ++ echo 10.0.0.42,10.0.0.22,10.0.0.49 ++ cut -d , -f 1 + local cassandra=10.0.0.42 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node CONFIG +++ find_my_ip_and_order_for_node CONFIG +++ local server_typ=CONFIG_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.42,10.0.0.22,10.0.0.49 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.42,10.0.0.22,10.0.0.49 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ tr '\n' , ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq +++ local local_ips=,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.42'\''))' +++ local server_ip=10.0.0.42 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.42 ]] +++ [[ ,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.42, ]] +++ echo 10.0.0.42 1 +++ return ++ local ip=10.0.0.42 ++ [[ -z 10.0.0.42 ]] ++ echo 10.0.0.42 + host_ip=10.0.0.42 + [[ cql == \c\q\l ]] ++ echo 10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ++ sed 's/,/ /g' + cassandra_server_list='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node CONFIG ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env DEVICE_MANAGER /etc/contrail/contrail-device-manager.conf + local service_name=DEVICE_MANAGER + local cfg_path=/etc/contrail/contrail-device-manager.conf + local delim=__ ++ set -o posix ++ set ++ grep '^DEVICE_MANAGER__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ sed 's/^DEVICE_MANAGER__//g' + local vars= + local section= + cat + add_ini_params_from_env FABRIC_ANSIBLE /etc/contrail/contrail-fabric-ansible.conf + local service_name=FABRIC_ANSIBLE + local cfg_path=/etc/contrail/contrail-fabric-ansible.conf + local delim=__ ++ sort ++ cut -d = -f 1 ++ set -o posix ++ set ++ sed 's/^FABRIC_ANSIBLE__//g' ++ grep '^FABRIC_ANSIBLE__.*__.*=.*$' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs fabric-ansible + local template=fabric-ansible ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*fabric-ansible.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + upgrade_old_logs device-manager + local template=device-manager ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*device-manager.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + exec /usr/bin/contrail-device-manager --conf_file /etc/contrail/contrail-device-manager.conf --conf_file /etc/contrail/contrail-keystone-auth.conf TypeError: sigterm_handler() takes 0 positional arguments but 2 were given 2025-01-20T01:49:58Z TypeError Python 3.6.8: /usr/bin/python3 Mon Jan 20 01:49:58 2025 A problem occurred in a Python script. Here is the sequence of function calls leading up to the error, in the order they occurred. /usr/bin/contrail-device-manager in () 29 30 31 if __name__ == '__main__': 32 sys.argv[0] = re.sub(r'(-script\.pyw?|\.exe)?$', '', sys.argv[0]) 33 sys.exit(load_entry_point('device-manager==0.1.dev0', 'console_scripts', 'contrail-device-manager')()) sys = sys.exit = load_entry_point = /usr/lib/python3.6/site-packages/device_manager/dm_server.py in server_main() 285 def server_main(): 286 vnc_cgitb.enable(format='text') 287 main() 288 # end server_main 289 global main = /usr/lib/python3.6/site-packages/device_manager/dm_server.py in main(args_str='--conf_file /etc/contrail/contrail-device-manage...nf_file /etc/contrail/contrail-keystone-auth.conf') 279 run_partial_dm(pid) 280 _zookeeper_client.master_election(zk_path_pfx + "/device-manager", 281 os.getpid(), run_full_dm, pid) 282 # end main 283 global os = os.getpid = global run_full_dm = pid = 1 /usr/lib/python3.6/site-packages/cfgm_common/zkclient.py in master_election(self=, path='/device-manager', identifier=1, func=, *args=(1,), **kwargs={}) 578 def master_election(self, path, identifier, func, *args, **kwargs): 579 self._election = self._zk_client.Election(path, identifier) 580 self._election.run(func, *args, **kwargs) 581 # end master_election 582 self = self._election = self._election.run = > func = args = (1,) kwargs = {} /usr/local/lib/python3.6/site-packages/kazoo/recipe/election.py in run(self=, func=, *args=(1,), **kwargs={}) 52 53 try: 54 with self.lock: 55 func(*args, **kwargs) 56 self = self.lock = /usr/local/lib/python3.6/site-packages/kazoo/recipe/lock.py in __enter__(self=) 392 393 def __enter__(self): 394 self.acquire() 395 396 def __exit__(self, exc_type, exc_value, traceback): self = self.acquire = > /usr/local/lib/python3.6/site-packages/kazoo/recipe/lock.py in acquire(self=, blocking=True, timeout=None, ephemeral=True) 187 blocking=blocking, 188 timeout=timeout, 189 ephemeral=ephemeral, 190 ) 191 except RetryFailedError: ephemeral = True /usr/local/lib/python3.6/site-packages/kazoo/retry.py in __call__(self=, func=>, *args=(), **kwargs={'blocking': True, 'ephemeral': True, 'timeout': None}) 130 if self.deadline is not None and self._cur_stoptime is None: 131 self._cur_stoptime = time.time() + self.deadline 132 return func(*args, **kwargs) 133 except ConnectionClosedError: 134 raise func = > args = () kwargs = {'blocking': True, 'ephemeral': True, 'timeout': None} /usr/local/lib/python3.6/site-packages/kazoo/recipe/lock.py in _inner_acquire(self=, blocking=True, timeout=None, ephemeral=True) 257 pass # predecessor has already been deleted 258 else: 259 self.wake_event.wait(timeout) 260 if not self.wake_event.is_set(): 261 raise LockTimeout( self = self.wake_event = self.wake_event.wait = > timeout = None /src/gevent/event.py in gevent._gevent_cevent.Event.wait() /src/gevent/_abstract_linkable.py in gevent._gevent_c_abstract_linkable.AbstractLinkable._wait() /src/gevent/_abstract_linkable.py in gevent._gevent_c_abstract_linkable.AbstractLinkable._wait_core() /src/gevent/_abstract_linkable.py in gevent._gevent_c_abstract_linkable.AbstractLinkable._wait_core() /src/gevent/_abstract_linkable.py in gevent._gevent_c_abstract_linkable.AbstractLinkable._AbstractLinkable__wait_to_be_notified() /src/gevent/_abstract_linkable.py in gevent._gevent_c_abstract_linkable.AbstractLinkable._switch_to_hub() /src/gevent/_greenlet_primitives.py in gevent._gevent_c_greenlet_primitives.SwitchOutGreenletWithLoop.switch() /src/gevent/_greenlet_primitives.py in gevent._gevent_c_greenlet_primitives.SwitchOutGreenletWithLoop.switch() /src/gevent/_gevent_c_greenlet_primitives.pxd in gevent._gevent_c_greenlet_primitives._greenlet_switch() TypeError: sigterm_handler() takes 0 positional arguments but 2 were given __cause__ = None __class__ = __context__ = None __delattr__ = __dict__ = {} __dir__ = __doc__ = 'Inappropriate argument type.' __eq__ = __format__ = __ge__ = __getattribute__ = __gt__ = __hash__ = __init__ = __init_subclass__ = __le__ = __lt__ = __ne__ = __new__ = __reduce__ = __reduce_ex__ = __repr__ = __setattr__ = __setstate__ = __sizeof__ = __str__ = __subclasshook__ = __suppress_context__ = False __traceback__ = args = ('sigterm_handler() takes 0 positional arguments but 2 were given',) with_traceback = The above is a description of an error in a Python program. Here is the original traceback: Traceback (most recent call last): File "/usr/bin/contrail-device-manager", line 33, in sys.exit(load_entry_point('device-manager==0.1.dev0', 'console_scripts', 'contrail-device-manager')()) File "/usr/lib/python3.6/site-packages/device_manager/dm_server.py", line 287, in server_main main() File "/usr/lib/python3.6/site-packages/device_manager/dm_server.py", line 281, in main os.getpid(), run_full_dm, pid) File "/usr/lib/python3.6/site-packages/cfgm_common/zkclient.py", line 580, in master_election self._election.run(func, *args, **kwargs) File "/usr/local/lib/python3.6/site-packages/kazoo/recipe/election.py", line 54, in run with self.lock: File "/usr/local/lib/python3.6/site-packages/kazoo/recipe/lock.py", line 394, in __enter__ self.acquire() File "/usr/local/lib/python3.6/site-packages/kazoo/recipe/lock.py", line 189, in acquire ephemeral=ephemeral, File "/usr/local/lib/python3.6/site-packages/kazoo/retry.py", line 132, in __call__ return func(*args, **kwargs) File "/usr/local/lib/python3.6/site-packages/kazoo/recipe/lock.py", line 259, in _inner_acquire self.wake_event.wait(timeout) File "src/gevent/event.py", line 163, in gevent._gevent_cevent.Event.wait File "src/gevent/_abstract_linkable.py", line 521, in gevent._gevent_c_abstract_linkable.AbstractLinkable._wait File "src/gevent/_abstract_linkable.py", line 487, in gevent._gevent_c_abstract_linkable.AbstractLinkable._wait_core File "src/gevent/_abstract_linkable.py", line 490, in gevent._gevent_c_abstract_linkable.AbstractLinkable._wait_core File "src/gevent/_abstract_linkable.py", line 442, in gevent._gevent_c_abstract_linkable.AbstractLinkable._AbstractLinkable__wait_to_be_notified File "src/gevent/_abstract_linkable.py", line 451, in gevent._gevent_c_abstract_linkable.AbstractLinkable._switch_to_hub File "src/gevent/_greenlet_primitives.py", line 61, in gevent._gevent_c_greenlet_primitives.SwitchOutGreenletWithLoop.switch File "src/gevent/_greenlet_primitives.py", line 65, in gevent._gevent_c_greenlet_primitives.SwitchOutGreenletWithLoop.switch File "src/gevent/_gevent_c_greenlet_primitives.pxd", line 35, in gevent._gevent_c_greenlet_primitives._greenlet_switch TypeError: sigterm_handler() takes 0 positional arguments but 2 were given +++ date ++ echo 'INFO: =================== Mon Jan 20 01:51:27 UTC 2025 ===================' INFO: =================== Mon Jan 20 01:51:27 UTC 2025 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ cut -d / -f 1 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.42 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ tail -n 1 +++ awk '/pagesize=2M/{print($3)}' +++ mount -t hugetlbfs ++ HUGE_PAGES_2MB_DIR= ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICSDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_SNMP_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8081 ' +++ '[' -n '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081 ' ']' +++ echo '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' ++ ANALYTICS_SERVERS='10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9042 ' +++ '[' -n '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042 ' ']' +++ echo '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICSDB_CQL_SERVERS='10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8086 ' +++ '[' -n '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086 ' ']' +++ echo '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ COLLECTOR_SERVERS='10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIGDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8082 ' +++ '[' -n '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082 ' ']' +++ echo '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' ++ CONFIG_SERVERS='10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9161 ' +++ '[' -n '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161 ' ']' +++ echo '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' ++ CONFIGDB_SERVERS='10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9041 ' +++ '[' -n '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ' ']' +++ echo '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIGDB_CQL_SERVERS='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:2181, +++ '[' -n 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181, ']' +++ echo 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 ++ ZOOKEEPER_SERVERS=10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:2181 ' +++ '[' -n '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181 ' ']' +++ echo '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ ZOOKEEPER_SERVERS_SPACE_DELIM='10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ RABBITMQ_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:5673, +++ '[' -n 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673, ']' +++ echo 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SERVERS=10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:6379 ' +++ '[' -n '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379 ' ']' +++ echo '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_SERVERS='10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9092 ' +++ '[' -n '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092 ' ']' +++ echo '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SERVERS='10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.42 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return + wait_for_cassandra ++ cut -d , -f 1 ++ echo 10.0.0.42,10.0.0.22,10.0.0.49 + local cassandra=10.0.0.42 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node CONFIG +++ find_my_ip_and_order_for_node CONFIG +++ cut -d ' ' -f 1 +++ local server_typ=CONFIG_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.42,10.0.0.22,10.0.0.49 +++ local servers=10.0.0.42,10.0.0.22,10.0.0.49 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ tr '\n' , ++++ get_local_ips ++++ sort ++++ grep -vi host ++++ uniq ++++ awk '/32 host/ { print f } {f=$2}' ++++ cat /proc/net/fib_trie +++ local local_ips=,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.42'\''))' +++ local server_ip=10.0.0.42 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.42 ]] +++ [[ ,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.42, ]] +++ echo 10.0.0.42 1 +++ return ++ local ip=10.0.0.42 ++ [[ -z 10.0.0.42 ]] ++ echo 10.0.0.42 + host_ip=10.0.0.42 + [[ cql == \c\q\l ]] ++ sed 's/,/ /g' ++ echo 10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 + cassandra_server_list='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node CONFIG ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env DEVICE_MANAGER /etc/contrail/contrail-device-manager.conf + local service_name=DEVICE_MANAGER + local cfg_path=/etc/contrail/contrail-device-manager.conf + local delim=__ ++ set -o posix ++ set ++ grep '^DEVICE_MANAGER__.*__.*=.*$' ++ sort ++ sed 's/^DEVICE_MANAGER__//g' ++ cut -d = -f 1 + local vars= + local section= + cat + add_ini_params_from_env FABRIC_ANSIBLE /etc/contrail/contrail-fabric-ansible.conf + local service_name=FABRIC_ANSIBLE + local cfg_path=/etc/contrail/contrail-fabric-ansible.conf + local delim=__ ++ sed 's/^FABRIC_ANSIBLE__//g' ++ set -o posix ++ set ++ sort ++ grep '^FABRIC_ANSIBLE__.*__.*=.*$' ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs fabric-ansible + local template=fabric-ansible ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*fabric-ansible.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + upgrade_old_logs device-manager + local template=device-manager ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*device-manager.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + exec /usr/local/bin/contrail-device-manager --conf_file /etc/contrail/contrail-device-manager.conf --conf_file /etc/contrail/contrail-keystone-auth.conf +++ date ++ echo 'INFO: =================== Mon Jan 20 01:55:31 UTC 2025 ===================' INFO: =================== Mon Jan 20 01:55:31 UTC 2025 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ cut -d / -f 1 +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.42 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ tail -n 1 +++ awk '/pagesize=2M/{print($3)}' ++ HUGE_PAGES_2MB_DIR= ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICSDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_SNMP_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8081 ' +++ '[' -n '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081 ' ']' +++ echo '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' ++ ANALYTICS_SERVERS='10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9042 ' +++ '[' -n '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042 ' ']' +++ echo '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICSDB_CQL_SERVERS='10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8086 ' +++ '[' -n '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086 ' ']' +++ echo '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ COLLECTOR_SERVERS='10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIGDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8082 ' +++ '[' -n '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082 ' ']' +++ echo '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' ++ CONFIG_SERVERS='10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9161 ' +++ '[' -n '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161 ' ']' +++ echo '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' ++ CONFIGDB_SERVERS='10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9041 ' +++ '[' -n '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ' ']' +++ echo '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIGDB_CQL_SERVERS='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:2181, +++ '[' -n 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181, ']' +++ echo 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 ++ ZOOKEEPER_SERVERS=10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:2181 ' +++ '[' -n '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181 ' ']' +++ echo '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ ZOOKEEPER_SERVERS_SPACE_DELIM='10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ RABBITMQ_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:5673, +++ '[' -n 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673, ']' +++ echo 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SERVERS=10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:6379 ' +++ '[' -n '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379 ' ']' +++ echo '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_SERVERS='10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9092 ' +++ '[' -n '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092 ' ']' +++ echo '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SERVERS='10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.42 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return + wait_for_cassandra ++ echo 10.0.0.42,10.0.0.22,10.0.0.49 ++ cut -d , -f 1 + local cassandra=10.0.0.42 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Waiting for cassandra 2/30' INFO: Waiting for cassandra 2/30 + sleep 10 + (( i++ )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Waiting for cassandra 3/30' INFO: Waiting for cassandra 3/30 + sleep 10 + (( i++ )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Waiting for cassandra 4/30' INFO: Waiting for cassandra 4/30 + sleep 10 + (( i++ )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Waiting for cassandra 5/30' INFO: Waiting for cassandra 5/30 + sleep 10 + (( i++ )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Waiting for cassandra 6/30' INFO: Waiting for cassandra 6/30 + sleep 10 + (( i++ )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Waiting for cassandra 7/30' INFO: Waiting for cassandra 7/30 + sleep 10 + (( i++ )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node CONFIG +++ find_my_ip_and_order_for_node CONFIG +++ local server_typ=CONFIG_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.42,10.0.0.22,10.0.0.49 +++ local servers=10.0.0.42,10.0.0.22,10.0.0.49 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ tr '\n' , ++++ get_local_ips ++++ grep -vi host ++++ sort ++++ awk '/32 host/ { print f } {f=$2}' ++++ cat /proc/net/fib_trie ++++ uniq +++ local local_ips=,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.42'\''))' +++ local server_ip=10.0.0.42 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.42 ]] +++ [[ ,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.42, ]] +++ echo 10.0.0.42 1 +++ return ++ local ip=10.0.0.42 ++ [[ -z 10.0.0.42 ]] ++ echo 10.0.0.42 + host_ip=10.0.0.42 + [[ cql == \c\q\l ]] ++ sed 's/,/ /g' ++ echo 10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 + cassandra_server_list='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node CONFIG ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env DEVICE_MANAGER /etc/contrail/contrail-device-manager.conf + local service_name=DEVICE_MANAGER + local cfg_path=/etc/contrail/contrail-device-manager.conf + local delim=__ ++ set -o posix ++ set ++ sed 's/^DEVICE_MANAGER__//g' ++ cut -d = -f 1 ++ grep '^DEVICE_MANAGER__.*__.*=.*$' ++ sort + local vars= + local section= + cat + add_ini_params_from_env FABRIC_ANSIBLE /etc/contrail/contrail-fabric-ansible.conf + local service_name=FABRIC_ANSIBLE + local cfg_path=/etc/contrail/contrail-fabric-ansible.conf + local delim=__ ++ set -o posix ++ set ++ grep '^FABRIC_ANSIBLE__.*__.*=.*$' ++ sed 's/^FABRIC_ANSIBLE__//g' ++ sort ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs fabric-ansible + local template=fabric-ansible ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*fabric-ansible.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + upgrade_old_logs device-manager + local template=device-manager ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*device-manager.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + exec /usr/local/bin/contrail-device-manager --conf_file /etc/contrail/contrail-device-manager.conf --conf_file /etc/contrail/contrail-keystone-auth.conf +++ date ++ echo 'INFO: =================== Mon Jan 20 01:57:10 UTC 2025 ===================' INFO: =================== Mon Jan 20 01:57:10 UTC 2025 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ awk '{print $2}' +++ head -n 1 +++ grep 'inet ' ++ DEFAULT_LOCAL_IP=10.0.0.42 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' +++ tail -n 1 ++ HUGE_PAGES_2MB_DIR= ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICSDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_SNMP_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8081 ' +++ '[' -n '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081 ' ']' +++ echo '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' ++ ANALYTICS_SERVERS='10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9042 ' +++ '[' -n '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042 ' ']' +++ echo '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICSDB_CQL_SERVERS='10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8086 ' +++ '[' -n '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086 ' ']' +++ echo '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ COLLECTOR_SERVERS='10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIGDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8082 ' +++ '[' -n '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082 ' ']' +++ echo '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' ++ CONFIG_SERVERS='10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9161 ' +++ '[' -n '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161 ' ']' +++ echo '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' ++ CONFIGDB_SERVERS='10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9041 ' +++ '[' -n '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ' ']' +++ echo '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIGDB_CQL_SERVERS='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:2181, +++ '[' -n 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181, ']' +++ echo 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 ++ ZOOKEEPER_SERVERS=10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:2181 ' +++ '[' -n '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181 ' ']' +++ echo '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ ZOOKEEPER_SERVERS_SPACE_DELIM='10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ RABBITMQ_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:5673, +++ '[' -n 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673, ']' +++ echo 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SERVERS=10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:6379 ' +++ '[' -n '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379 ' ']' +++ echo '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_SERVERS='10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9092 ' +++ '[' -n '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092 ' ']' +++ echo '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SERVERS='10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.42 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return + wait_for_cassandra ++ echo 10.0.0.42,10.0.0.22,10.0.0.49 ++ cut -d , -f 1 + local cassandra=10.0.0.42 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node CONFIG +++ find_my_ip_and_order_for_node CONFIG +++ local server_typ=CONFIG_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.42,10.0.0.22,10.0.0.49 +++ local servers=10.0.0.42,10.0.0.22,10.0.0.49 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ sort ++++ uniq ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host +++ local local_ips=,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.42'\''))' +++ local server_ip=10.0.0.42 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.42 ]] +++ [[ ,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.42, ]] +++ echo 10.0.0.42 1 +++ return ++ local ip=10.0.0.42 ++ [[ -z 10.0.0.42 ]] ++ echo 10.0.0.42 + host_ip=10.0.0.42 + [[ cql == \c\q\l ]] ++ echo 10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ++ sed 's/,/ /g' + cassandra_server_list='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node CONFIG ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env DEVICE_MANAGER /etc/contrail/contrail-device-manager.conf + local service_name=DEVICE_MANAGER + local cfg_path=/etc/contrail/contrail-device-manager.conf + local delim=__ ++ set -o posix ++ grep '^DEVICE_MANAGER__.*__.*=.*$' ++ set ++ sort ++ sed 's/^DEVICE_MANAGER__//g' ++ cut -d = -f 1 + local vars= + local section= + cat + add_ini_params_from_env FABRIC_ANSIBLE /etc/contrail/contrail-fabric-ansible.conf + local service_name=FABRIC_ANSIBLE + local cfg_path=/etc/contrail/contrail-fabric-ansible.conf + local delim=__ ++ set -o posix ++ set ++ grep '^FABRIC_ANSIBLE__.*__.*=.*$' ++ cut -d = -f 1 ++ sed 's/^FABRIC_ANSIBLE__//g' ++ sort + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs fabric-ansible + local template=fabric-ansible ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*fabric-ansible.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + upgrade_old_logs device-manager + local template=device-manager ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*device-manager.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + exec /usr/local/bin/contrail-device-manager --conf_file /etc/contrail/contrail-device-manager.conf --conf_file /etc/contrail/contrail-keystone-auth.conf +++ date ++ echo 'INFO: =================== Mon Jan 20 01:58:45 UTC 2025 ===================' INFO: =================== Mon Jan 20 01:58:45 UTC 2025 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' +++++ ip route get 1 ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ cut -d / -f 1 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ head -n 1 +++ awk '{print $2}' +++ grep 'inet ' +++ ip addr show dev ens3 ++ DEFAULT_LOCAL_IP=10.0.0.42 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=256 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 256 ]] ++ [[ -z '' ]] +++ tail -n 1 +++ mount -t hugetlbfs +++ awk '/pagesize=2M/{print($3)}' ++ HUGE_PAGES_2MB_DIR= ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=keystone ++ AUTH_PARAMS= ++ SSL_ENABLE=false ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICSDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_SNMP_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8081 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8081 ' +++ '[' -n '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081 ' ']' +++ echo '10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' ++ ANALYTICS_SERVERS='10.0.0.42:8081 10.0.0.22:8081 10.0.0.49:8081' +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9042 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9042 ' +++ '[' -n '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042 ' ']' +++ echo '10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICSDB_CQL_SERVERS='10.0.0.42:9042 10.0.0.22:9042 10.0.0.49:9042' ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8086 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8086 ' +++ '[' -n '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086 ' ']' +++ echo '10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ COLLECTOR_SERVERS='10.0.0.42:8086 10.0.0.22:8086 10.0.0.49:8086' ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIGDB_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:8082 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:8082 ' +++ '[' -n '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082 ' ']' +++ echo '10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' ++ CONFIG_SERVERS='10.0.0.42:8082 10.0.0.22:8082 10.0.0.49:8082' +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9161 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9161 ' +++ '[' -n '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161 ' ']' +++ echo '10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' ++ CONFIGDB_SERVERS='10.0.0.42:9161 10.0.0.22:9161 10.0.0.49:9161' +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9041 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9041 ' +++ '[' -n '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ' ']' +++ echo '10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIGDB_CQL_SERVERS='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=false ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=false ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=false ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.20.0.7,10.20.0.11,10.20.0.18 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:2181, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:2181, +++ '[' -n 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181, ']' +++ echo 10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 ++ ZOOKEEPER_SERVERS=10.0.0.42:2181,10.0.0.22:2181,10.0.0.49:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:2181 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:2181 ' +++ '[' -n '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181 ' ']' +++ echo '10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ ZOOKEEPER_SERVERS_SPACE_DELIM='10.0.0.42:2181 10.0.0.22:2181 10.0.0.49:2181' ++ RABBITMQ_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+=10.0.0.42:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+=10.0.0.22:5673, +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+=10.0.0.49:5673, +++ '[' -n 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673, ']' +++ echo 10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SERVERS=10.0.0.42:5673,10.0.0.22:5673,10.0.0.49:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=false ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:6379 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:6379 ' +++ '[' -n '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379 ' ']' +++ echo '10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_SERVERS='10.0.0.42:6379 10.0.0.22:6379 10.0.0.49:6379' ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=false ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ redis_ssl_config= ++ KAFKA_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.42 +++ local server_address=10.0.0.42 +++ extended_server_list+='10.0.0.42:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.22 +++ local server_address=10.0.0.22 +++ extended_server_list+='10.0.0.22:9092 ' +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.49 +++ local server_address=10.0.0.49 +++ extended_server_list+='10.0.0.49:9092 ' +++ '[' -n '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092 ' ']' +++ echo '10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SERVERS='10.0.0.42:9092 10.0.0.22:9092 10.0.0.49:9092' ++ KAFKA_SSL_ENABLE=false ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123 ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=10.0.0.42 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5000 ++ KEYSTONE_AUTH_PUBLIC_PORT=5000 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=contrail123 ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.42,10.0.0.22,10.0.0.49 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=false ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=false ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=false ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password contrail123' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ xmpp_certs_config= ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ analytics_api_ssl_opts= ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ is_enabled false ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ kafka_ssl_config= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + return + wait_for_cassandra ++ echo 10.0.0.42,10.0.0.22,10.0.0.49 ++ cut -d , -f 1 + local cassandra=10.0.0.42 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.42 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node CONFIG +++ find_my_ip_and_order_for_node CONFIG +++ local server_typ=CONFIG_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.42,10.0.0.22,10.0.0.49 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.42,10.0.0.22,10.0.0.49 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ sort ++++ awk '/32 host/ { print f } {f=$2}' ++++ uniq ++++ grep -vi host +++ local local_ips=,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.42'\''))' +++ local server_ip=10.0.0.42 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.42 ]] +++ [[ ,10.0.0.42,10.20.0.7,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.42, ]] +++ echo 10.0.0.42 1 +++ return ++ local ip=10.0.0.42 ++ [[ -z 10.0.0.42 ]] ++ echo 10.0.0.42 + host_ip=10.0.0.42 + [[ cql == \c\q\l ]] ++ echo 10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041 ++ sed 's/,/ /g' + cassandra_server_list='10.0.0.42:9041 10.0.0.22:9041 10.0.0.49:9041' + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node CONFIG ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env DEVICE_MANAGER /etc/contrail/contrail-device-manager.conf + local service_name=DEVICE_MANAGER + local cfg_path=/etc/contrail/contrail-device-manager.conf + local delim=__ ++ set -o posix ++ set ++ cut -d = -f 1 ++ sort ++ sed 's/^DEVICE_MANAGER__//g' ++ grep '^DEVICE_MANAGER__.*__.*=.*$' + local vars= + local section= + cat + add_ini_params_from_env FABRIC_ANSIBLE /etc/contrail/contrail-fabric-ansible.conf + local service_name=FABRIC_ANSIBLE + local cfg_path=/etc/contrail/contrail-fabric-ansible.conf + local delim=__ ++ set -o posix ++ set ++ grep '^FABRIC_ANSIBLE__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ sed 's/^FABRIC_ANSIBLE__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled false + local val=false + [[ false == \t\r\u\e ]] + [[ false == \y\e\s ]] + [[ false == \e\n\a\b\l\e\d ]] + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs fabric-ansible + local template=fabric-ansible ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*fabric-ansible.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + upgrade_old_logs device-manager + local template=device-manager ++ dirname /var/log/contrail/config-device-manager + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/config-device-manager + chmod 755 /var/log/contrail/config-device-manager + mv -n '/var/log/contrail/*device-manager.log*' /var/log/contrail/config-device-manager/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/config-device-manager + find /var/log/contrail/config-device-manager -uid 0 -exec chown 1999:1999 '{}' + + exec /usr/local/bin/contrail-device-manager --conf_file /etc/contrail/contrail-device-manager.conf --conf_file /etc/contrail/contrail-keystone-auth.conf