+++ date
++ echo 'INFO: =================== Mon Apr  7 02:10:19 UTC 2025 ==================='
INFO: =================== Mon Apr  7 02:10:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ cut -d / -f 1
++ DEFAULT_LOCAL_IP=10.0.0.29
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.29
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.29
++ ANALYTICSDB_NODES=10.0.0.29
++ ANALYTICS_SNMP_NODES=10.0.0.29
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8081 '
+++ '[' -n '10.0.0.29:8081 ' ']'
+++ echo 10.0.0.29:8081
++ ANALYTICS_SERVERS=10.0.0.29:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9042 '
+++ '[' -n '10.0.0.29:9042 ' ']'
+++ echo 10.0.0.29:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.29:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.29
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8086 '
+++ '[' -n '10.0.0.29:8086 ' ']'
+++ echo 10.0.0.29:8086
++ COLLECTOR_SERVERS=10.0.0.29:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.29
++ CONFIGDB_NODES=10.0.0.29
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8082 '
+++ '[' -n '10.0.0.29:8082 ' ']'
+++ echo 10.0.0.29:8082
++ CONFIG_SERVERS=10.0.0.29:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9161 '
+++ '[' -n '10.0.0.29:9161 ' ']'
+++ echo 10.0.0.29:9161
++ CONFIGDB_SERVERS=10.0.0.29:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9041 '
+++ '[' -n '10.0.0.29:9041 ' ']'
+++ echo 10.0.0.29:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.29:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.8
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.8
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.29
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+=10.0.0.29:2181,
+++ '[' -n 10.0.0.29:2181, ']'
+++ echo 10.0.0.29:2181
++ ZOOKEEPER_SERVERS=10.0.0.29:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:2181 '
+++ '[' -n '10.0.0.29:2181 ' ']'
+++ echo 10.0.0.29:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.29:2181
++ RABBITMQ_NODES=10.0.0.29
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+=10.0.0.29:5673,
+++ '[' -n 10.0.0.29:5673, ']'
+++ echo 10.0.0.29:5673
++ RABBITMQ_SERVERS=10.0.0.29:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:6379 '
+++ '[' -n '10.0.0.29:6379 ' ']'
+++ echo 10.0.0.29:6379
++ REDIS_SERVERS=10.0.0.29:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.29
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9092 '
+++ '[' -n '10.0.0.29:9092 ' ']'
+++ echo 10.0.0.29:9092
++ KAFKA_SERVERS=10.0.0.29:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.29
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.29
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.29
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ get_listen_ip_for_node WEBUI
+++ find_my_ip_and_order_for_node WEBUI
+++ local server_typ=WEBUI_NODES
+++ find_my_ip_and_order_for_node_list 10.0.0.29
+++ cut -d ' ' -f 1
+++ local servers=10.0.0.29
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++++ get_local_ips
++++ tr '\n' ,
++++ cat /proc/net/fib_trie
++++ awk '/32 host/ { print f } {f=$2}'
++++ grep -vi host
++++ sort
++++ uniq
+++ local local_ips=,10.0.0.29,10.20.0.8,127.0.0.1,172.17.0.1,,
+++ local ord=1
+++ for server in '"${server_list[@]}"'
+++ local ret=0
++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.29'\''))'
+++ local server_ip=10.0.0.29
+++ [[ 0 == 0 ]]
+++ [[ -n 10.0.0.29 ]]
+++ [[ ,10.0.0.29,10.20.0.8,127.0.0.1,172.17.0.1,, =~ ,10\.0\.0\.29, ]]
+++ echo 10.0.0.29 1
+++ return
++ local ip=10.0.0.29
++ [[ -z 10.0.0.29 ]]
++ echo 10.0.0.29
+ host_ip=10.0.0.29
+ init_tls
+ SSL_ENABLE=true
+ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
+ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
+ SERVER_CA_KEYFILE=
+ SERVER_CA_CERTFILE=
+ /certs-init.sh
++ LOG_DIR=/var/log/contrail
++ export CONTAINER_LOG_DIR=/var/log/contrail/webui-job
++ CONTAINER_LOG_DIR=/var/log/contrail/webui-job
++ mkdir -p /var/log/contrail/webui-job
++ log_file=/var/log/contrail/webui-job/console.log
++ touch /var/log/contrail/webui-job/console.log
++ chmod 600 /var/log/contrail/webui-job/console.log
++ exec
+++ tee -a /var/log/contrail/webui-job/console.log
+++ date
+++ date
++ echo 'INFO: =================== Mon Apr  7 02:10:19 UTC 2025 ==================='
++ echo 'INFO: =================== Mon Apr  7 02:10:19 UTC 2025 ==================='
INFO: =================== Mon Apr  7 02:10:19 UTC 2025 ===================
INFO: =================== Mon Apr  7 02:10:19 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
+++ get_default_ip
++++ get_default_nic
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ command -v ip
++++ local ip=1
++++ local ip=1
+++++ ip route get 1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.29
++ DEFAULT_LOCAL_IP=10.0.0.29
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=true
++ SSL_ENABLE=true
++ SSL_INSECURE=True
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SERVER_CA_CERTFILE=
++ SERVER_CA_CERTFILE=
++ SERVER_CA_KEYFILE=
++ SERVER_CA_KEYFILE=
++ SELFSIGNED_CERTS_WITH_IPS=True
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.29
++ CONTROLLER_NODES=10.0.0.29
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.29
++ ANALYTICS_NODES=10.0.0.29
++ ANALYTICSDB_NODES=10.0.0.29
++ ANALYTICS_SNMP_NODES=10.0.0.29
++ ANALYTICSDB_NODES=10.0.0.29
++ ANALYTICS_SNMP_NODES=10.0.0.29
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8081 '
+++ extended_server_list+='10.0.0.29:8081 '
+++ '[' -n '10.0.0.29:8081 ' ']'
+++ '[' -n '10.0.0.29:8081 ' ']'
+++ echo 10.0.0.29:8081
+++ echo 10.0.0.29:8081
++ ANALYTICS_SERVERS=10.0.0.29:8081
++ ANALYTICS_SERVERS=10.0.0.29:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9042 '
+++ extended_server_list+='10.0.0.29:9042 '
+++ '[' -n '10.0.0.29:9042 ' ']'
+++ '[' -n '10.0.0.29:9042 ' ']'
+++ echo 10.0.0.29:9042
+++ echo 10.0.0.29:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.29:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.29:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.29
++ ANALYTICS_ALARM_NODES=10.0.0.29
++ ALARMGEN_INTROSPECT_PORT=5995
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8086 '
+++ '[' -n '10.0.0.29:8086 ' ']'
+++ echo 10.0.0.29:8086
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8086 '
+++ '[' -n '10.0.0.29:8086 ' ']'
+++ echo 10.0.0.29:8086
++ COLLECTOR_SERVERS=10.0.0.29:8086
++ COLLECTOR_SERVERS=10.0.0.29:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.29
++ CONFIG_NODES=10.0.0.29
++ CONFIGDB_NODES=10.0.0.29
++ CONFIGDB_NODES=10.0.0.29
++ CONFIG_API_PORT=8082
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:8082 '
+++ '[' -n '10.0.0.29:8082 ' ']'
+++ echo 10.0.0.29:8082
+++ extended_server_list+='10.0.0.29:8082 '
+++ '[' -n '10.0.0.29:8082 ' ']'
+++ echo 10.0.0.29:8082
++ CONFIG_SERVERS=10.0.0.29:8082
++ CONFIG_SERVERS=10.0.0.29:8082
+++ get_server_list CONFIGDB ':9161 '
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9161 '
+++ extended_server_list+='10.0.0.29:9161 '
+++ '[' -n '10.0.0.29:9161 ' ']'
+++ '[' -n '10.0.0.29:9161 ' ']'
+++ echo 10.0.0.29:9161
+++ echo 10.0.0.29:9161
++ CONFIGDB_SERVERS=10.0.0.29:9161
++ CONFIGDB_SERVERS=10.0.0.29:9161
+++ get_server_list CONFIGDB ':9041 '
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9041 '
+++ extended_server_list+='10.0.0.29:9041 '
+++ '[' -n '10.0.0.29:9041 ' ']'
+++ '[' -n '10.0.0.29:9041 ' ']'
+++ echo 10.0.0.29:9041
+++ echo 10.0.0.29:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.29:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.29:9041
++ CONFIG_API_VIP=
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=true
++ CONFIG_API_SSL_ENABLE=true
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CONFIG_API_SERVER_CA_CERTFILE=
++ CONFIG_API_SERVER_CA_CERTFILE=
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=true
++ ANALYTICS_API_SSL_ENABLE=true
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=
++ ANALYTICS_API_SERVER_CA_CERTFILE=
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CASSANDRA_SSL_CA_CERTFILE=
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CASSANDRA_SSL_CA_CERTFILE=
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.8
++ CONTROL_NODES=10.20.0.8
++ CONTROL_INTROSPECT_PORT=8083
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.8
++ DNS_NODES=10.20.0.8
++ DNS_SERVER_PORT=53
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.29
++ ZOOKEEPER_NODES=10.0.0.29
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+=10.0.0.29:2181,
+++ extended_server_list+=10.0.0.29:2181,
+++ '[' -n 10.0.0.29:2181, ']'
+++ '[' -n 10.0.0.29:2181, ']'
+++ echo 10.0.0.29:2181
+++ echo 10.0.0.29:2181
++ ZOOKEEPER_SERVERS=10.0.0.29:2181
++ ZOOKEEPER_SERVERS=10.0.0.29:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:2181 '
+++ '[' -n '10.0.0.29:2181 ' ']'
+++ extended_server_list+='10.0.0.29:2181 '
+++ '[' -n '10.0.0.29:2181 ' ']'
+++ echo 10.0.0.29:2181
+++ echo 10.0.0.29:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.29:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.29:2181
++ RABBITMQ_NODES=10.0.0.29
++ RABBITMQ_NODE_PORT=5673
++ RABBITMQ_NODES=10.0.0.29
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+=10.0.0.29:5673,
+++ '[' -n 10.0.0.29:5673, ']'
+++ echo 10.0.0.29:5673
+++ extended_server_list+=10.0.0.29:5673,
+++ '[' -n 10.0.0.29:5673, ']'
+++ echo 10.0.0.29:5673
++ RABBITMQ_SERVERS=10.0.0.29:5673
++ RABBITMQ_SERVERS=10.0.0.29:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_SSL_CACERTFILE=
++ RABBITMQ_SSL_CACERTFILE=
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=
++ RABBITMQ_CLIENT_SSL_CACERTFILE=
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:6379 '
+++ '[' -n '10.0.0.29:6379 ' ']'
+++ echo 10.0.0.29:6379
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:6379 '
+++ '[' -n '10.0.0.29:6379 ' ']'
+++ echo 10.0.0.29:6379
++ REDIS_SERVERS=10.0.0.29:6379
++ REDIS_SERVERS=10.0.0.29:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=true
++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ REDIS_SSL_CACERTFILE=
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ read -r -d '' redis_ssl_config
++ REDIS_SSL_ENABLE=true
++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ REDIS_SSL_CACERTFILE=
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' redis_ssl_config
++ true
++ KAFKA_NODES=10.0.0.29
++ true
++ KAFKA_PORT=9092
++ KAFKA_NODES=10.0.0.29
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ IFS=,
+++ read -ra server_list
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.29
++++ echo 10.0.0.29
+++ local server_address=10.0.0.29
+++ local server_address=10.0.0.29
+++ extended_server_list+='10.0.0.29:9092 '
+++ extended_server_list+='10.0.0.29:9092 '
+++ '[' -n '10.0.0.29:9092 ' ']'
+++ '[' -n '10.0.0.29:9092 ' ']'
+++ echo 10.0.0.29:9092
+++ echo 10.0.0.29:9092
++ KAFKA_SERVERS=10.0.0.29:9092
++ KAFKA_SERVERS=10.0.0.29:9092
++ KAFKA_SSL_ENABLE=true
++ KAFKA_SSL_ENABLE=true
++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ KAFKA_SSL_CACERTFILE=
++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KAFKA_SSL_CACERTFILE=
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.29
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_HOST=10.0.0.29
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.29
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBEMANAGER_NODES=10.0.0.29
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ KUBERNETES_CNI_META_PLUGIN=multus
++ BARBICAN_TENANT_NAME=service
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ BARBICAN_PASSWORD=contrail123
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_MODULE_OPTIONS=
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ VROUTER_MODULE_OPTIONS=
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ PRIORITY_BANDWIDTH=
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_SCHEDULING=
++ PRIORITY_BANDWIDTH=
++ QOS_QUEUE_ID=
++ PRIORITY_SCHEDULING=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ QOS_QUEUE_ID=
++ PRIORITY_TAGGING=True
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ SLO_DESTINATION=collector
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.29
++ WEBUI_NODES=10.0.0.29
++ WEBUI_JOB_SERVER_PORT=3000
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=true
++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ XMPP_SERVER_CA_CERTFILE=
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=true
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ INTROSPECT_CA_CERTFILE=
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=true
++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_CA_CERTFILE=
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ TORAGENT_SSL_CACERTFILE=
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' xmpp_certs_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' analytics_api_ssl_opts
++ true
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' kafka_ssl_config
++ true
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]]
+ [[ -z /etc/contrail/webui_ssl/cs-key.pem ]]
+ FORCE_GENERATE_CERT=false
+ [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]]
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=true
++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ XMPP_SERVER_CA_CERTFILE=
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=true
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ INTROSPECT_CA_CERTFILE=
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=true
++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_CA_CERTFILE=
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ TORAGENT_SSL_CACERTFILE=
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' xmpp_certs_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' analytics_api_ssl_opts
++ true
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' kafka_ssl_config
++ true
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]]
+ [[ -z /etc/contrail/webui_ssl/cs-key.pem ]]
+ FORCE_GENERATE_CERT=false
+ [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]]
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
+ cert_dir_name=/etc/contrail/webui_ssl
+ cert_dir_name=/etc/contrail/webui_ssl
+ SERVER_CA_CERTFILE=/etc/contrail/webui_ssl/ca-cert.pem
+ SERVER_CA_CERTFILE=/etc/contrail/webui_ssl/ca-cert.pem
+ mkdir -p /etc/contrail/webui_ssl
+ mkdir -p /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/cs-key.pem
++ dirname /etc/contrail/webui_ssl/cs-key.pem
+ mkdir -p -m 750 /etc/contrail/webui_ssl
+ mkdir -p -m 750 /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
+ mkdir -p /etc/contrail/webui_ssl
+ mkdir -p /etc/contrail/webui_ssl
++ mktemp -p /etc/contrail/webui_ssl .lock.XXXXXXXX
++ mktemp -p /etc/contrail/webui_ssl .lock.XXXXXXXX
+ tmp_lock_name=/etc/contrail/webui_ssl/.lock.QrUlELMS
+ tmp_lock_name=/etc/contrail/webui_ssl/.lock.QrUlELMS
+ lock_file_name=/etc/contrail/webui_ssl/cs-cert.pem.lock
+ lock_file_name=/etc/contrail/webui_ssl/cs-cert.pem.lock
+ mv /etc/contrail/webui_ssl/.lock.QrUlELMS /etc/contrail/webui_ssl/cs-cert.pem.lock
+ mv /etc/contrail/webui_ssl/.lock.QrUlELMS /etc/contrail/webui_ssl/cs-cert.pem.lock
+ trap 'rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp' EXIT
+ ca_provider=
+ trap 'rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp' EXIT
+ ca_provider=
+ k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token
+ k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token
+ k8s_ca_file=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
+ k8s_ca_file=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
+ [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]]
+ [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]]
++ hostname -s
++ hostname -s
+ short_host_name=cn-jenkins-deploy-platform-ansible-os-3042-1
+ short_host_name=cn-jenkins-deploy-platform-ansible-os-3042-1
++ hostname -f
++ hostname -f
+ full_host_name=cn-jenkins-deploy-platform-ansible-os-3042-1.
+ full_host_name=cn-jenkins-deploy-platform-ansible-os-3042-1.
++ getent hosts
++ getent hosts
++ grep cn-jenkins-deploy-platform-ansible-os-3042-1
++ grep cn-jenkins-deploy-platform-ansible-os-3042-1
++ cut -d ' ' -f2-
++ cut -d ' ' -f2-
++ xargs
++ xargs
+ dns_names_all='cn-jenkins-deploy-platform-ansible-os-3042-1 cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1'
+ dns_names_all='cn-jenkins-deploy-platform-ansible-os-3042-1 cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1'
++ echo 'cn-jenkins-deploy-platform-ansible-os-3042-1 cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1'
++ echo 'cn-jenkins-deploy-platform-ansible-os-3042-1 cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1. cn-jenkins-deploy-platform-ansible-os-3042-1'
++ tr ' ' '\n'
++ tr ' ' '\n'
++ sort -u
++ sort -u
+ dns_names='cn-jenkins-deploy-platform-ansible-os-3042-1
cn-jenkins-deploy-platform-ansible-os-3042-1.'
+ dns_names='cn-jenkins-deploy-platform-ansible-os-3042-1
cn-jenkins-deploy-platform-ansible-os-3042-1.'
+ alt_names=
+ alt_names=
+ alt_name_num=1
+ alt_name_num=1
+ for n in '$dns_names'
+ '[' -z '' ']'
+ for n in '$dns_names'
+ '[' -z '' ']'
+ alt_names+='DNS.1 = cn-jenkins-deploy-platform-ansible-os-3042-1'
+ ((  alt_name_num+=1  ))
+ alt_names+='DNS.1 = cn-jenkins-deploy-platform-ansible-os-3042-1'
+ ((  alt_name_num+=1  ))
+ for n in '$dns_names'
+ for n in '$dns_names'
+ '[' -z 'DNS.1 = cn-jenkins-deploy-platform-ansible-os-3042-1' ']'
+ alt_names+='\n'
+ alt_names+='DNS.2 = cn-jenkins-deploy-platform-ansible-os-3042-1.'
+ ((  alt_name_num+=1  ))
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ alt_name_num=1
+ '[' -z 'DNS.1 = cn-jenkins-deploy-platform-ansible-os-3042-1' ']'
+ alt_names+='\n'
+ alt_names+='DNS.2 = cn-jenkins-deploy-platform-ansible-os-3042-1.'
+ ((  alt_name_num+=1  ))
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ alt_name_num=1
++ get_local_ips
++ get_local_ips
++ cat /proc/net/fib_trie
++ cat /proc/net/fib_trie
++ awk '/32 host/ { print f } {f=$2}'
++ awk '/32 host/ { print f } {f=$2}'
++ grep -vi host
++ grep -vi host
++ sort
++ sort
++ uniq
++ uniq
+ for ip in '$(get_local_ips)'
+ [[ 10.0.0.29 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.1 = 10.0.0.29'
+ for ip in '$(get_local_ips)'
+ [[ 10.0.0.29 != \1\2\7\.\0\.\0\.\1 ]]
+ ((  alt_name_num+=1  ))
+ alt_names+='\nIP.1 = 10.0.0.29'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 10.20.0.8 != \1\2\7\.\0\.\0\.\1 ]]
+ for ip in '$(get_local_ips)'
+ [[ 10.20.0.8 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.2 = 10.20.0.8'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ alt_names+='\nIP.2 = 10.20.0.8'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 127.0.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ for ip in '$(get_local_ips)'
+ [[ 172.17.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ [[ 127.0.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ for ip in '$(get_local_ips)'
+ [[ 172.17.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.3 = 172.17.0.1'
+ alt_names+='\nIP.3 = 172.17.0.1'
+ ((  alt_name_num+=1  ))
+ ((  alt_name_num+=1  ))
+ working_dir=/tmp/contrail_ssl_gen
+ SERVER_CA_KEYFILE=/tmp/contrail_ssl_gen/certs/ca.key.pem
+ working_dir=/tmp/contrail_ssl_gen
+ rm -rf /tmp/contrail_ssl_gen
+ SERVER_CA_KEYFILE=/tmp/contrail_ssl_gen/certs/ca.key.pem
+ rm -rf /tmp/contrail_ssl_gen
+ mkdir -p /tmp/contrail_ssl_gen/certs
+ mkdir -p /tmp/contrail_ssl_gen/certs
+ touch /tmp/contrail_ssl_gen/index.txt /tmp/contrail_ssl_gen/index.txt.attr
+ touch /tmp/contrail_ssl_gen/index.txt /tmp/contrail_ssl_gen/index.txt.attr
+ echo 01
+ echo 01
+ openssl_config_file=/tmp/contrail_ssl_gen/contrail_openssl.cfg
+ openssl_config_file=/tmp/contrail_ssl_gen/contrail_openssl.cfg
+ cat
+ cat
++ echo -e DNS.1 = 'cn-jenkins-deploy-platform-ansible-os-3042-1\nDNS.2' = 'cn-jenkins-deploy-platform-ansible-os-3042-1.\nIP.1' = '10.0.0.29\nIP.2' = '10.20.0.8\nIP.3' = 172.17.0.1
++ echo -e DNS.1 = 'cn-jenkins-deploy-platform-ansible-os-3042-1\nDNS.2' = 'cn-jenkins-deploy-platform-ansible-os-3042-1.\nIP.1' = '10.0.0.29\nIP.2' = '10.20.0.8\nIP.3' = 172.17.0.1
+ echo 'INFO: openssl config file'
INFO: openssl config file
+ cat /tmp/contrail_ssl_gen/contrail_openssl.cfg
+ echo 'INFO: openssl config file'
INFO: openssl config file
+ cat /tmp/contrail_ssl_gen/contrail_openssl.cfg
[req]
default_bits = 2048
prompt = no
default_md = sha256
default_days = 375
req_extensions = v3_req
distinguished_name = req_distinguished_name
x509_extensions = v3_ca

[ req_distinguished_name ]
commonName              = Contrail
countryName             = US
stateOrProvinceName     = CA
organizationName        = JuniperNetworks
organizationalUnitName  = JuniperCA
localityName            = Sunnyvale

[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = cn-jenkins-deploy-platform-ansible-os-3042-1
DNS.2 = cn-jenkins-deploy-platform-ansible-os-3042-1.
IP.1 = 10.0.0.29
IP.2 = 10.20.0.8
IP.3 = 172.17.0.1

[ ca ]
default_ca = CA_default

[ CA_default ]
# Directory and file locations.
dir               = /tmp/contrail_ssl_gen
crl_dir           = $dir/crl
new_certs_dir     = $dir/certs
database          = $dir/index.txt
serial            = $dir/serial.txt
RANDFILE          = $dir/.rand
# For certificate revocation lists.
crlnumber         = $dir/crlnumber
crl               = $dir/crl/crl.pem
crl_extensions    = crl_ext
default_crl_days  = 30
# The root key and root certificate.
private_key       = /tmp/contrail_ssl_gen/certs/ca.key.pem
certificate       = /etc/contrail/webui_ssl/ca-cert.pem
# SHA-1 is deprecated, so use SHA-2 instead.
default_md        = sha256
name_opt          = ca_default
cert_opt          = ca_default
default_days      = 375
preserve          = no
policy            = policy_optional

[ policy_optional ]
countryName            = optional
stateOrProvinceName    = optional
organizationName       = optional
organizationalUnitName = optional
commonName             = supplied
emailAddress           = optional
localityName           = optional

[ v3_ca]
# Extensions for a typical CA
# PKIX recommendation.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = CA:true

[ crl_ext ]
authorityKeyIdentifier=keyid:always,issuer:always
[req]
default_bits = 2048
prompt = no
default_md = sha256
default_days = 375
req_extensions = v3_req
distinguished_name = req_distinguished_name
x509_extensions = v3_ca

[ req_distinguished_name ]
commonName              = Contrail
countryName             = US
stateOrProvinceName     = CA
organizationName        = JuniperNetworks
organizationalUnitName  = JuniperCA
localityName            = Sunnyvale

[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = cn-jenkins-deploy-platform-ansible-os-3042-1
DNS.2 = cn-jenkins-deploy-platform-ansible-os-3042-1.
IP.1 = 10.0.0.29
IP.2 = 10.20.0.8
IP.3 = 172.17.0.1

[ ca ]
default_ca = CA_default

[ CA_default ]
# Directory and file locations.
dir               = /tmp/contrail_ssl_gen
crl_dir           = $dir/crl
new_certs_dir     = $dir/certs
database          = $dir/index.txt
serial            = $dir/serial.txt
RANDFILE          = $dir/.rand
# For certificate revocation lists.
crlnumber         = $dir/crlnumber
crl               = $dir/crl/crl.pem
crl_extensions    = crl_ext
default_crl_days  = 30
# The root key and root certificate.
private_key       = /tmp/contrail_ssl_gen/certs/ca.key.pem
certificate       = /etc/contrail/webui_ssl/ca-cert.pem
# SHA-1 is deprecated, so use SHA-2 instead.
default_md        = sha256
name_opt          = ca_default
cert_opt          = ca_default
default_days      = 375
preserve          = no
policy            = policy_optional

[ policy_optional ]
countryName            = optional
stateOrProvinceName    = optional
organizationName       = optional
organizationalUnitName = optional
commonName             = supplied
emailAddress           = optional
localityName           = optional

[ v3_ca]
# Extensions for a typical CA
# PKIX recommendation.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = CA:true

[ crl_ext ]
authorityKeyIdentifier=keyid:always,issuer:always
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ generate_local_ca
+ [[ ! -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ generate_local_ca
+ [[ ! -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ openssl genrsa -out /tmp/contrail_ssl_gen/certs/ca.key.pem 4096
+ openssl genrsa -out /tmp/contrail_ssl_gen/certs/ca.key.pem 4096
Generating RSA private key, 4096 bit long modulus
Generating RSA private key, 4096 bit long modulus
............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................+++
+
............................................................................+++
+
e is 65537 (0x10001)
e is 65537 (0x10001)
++ dirname /tmp/contrail_ssl_gen/certs/ca.key.pem
++ dirname /tmp/contrail_ssl_gen/certs/ca.key.pem
+ chgrp -R contrail /tmp/contrail_ssl_gen/certs
+ chgrp -R contrail /tmp/contrail_ssl_gen/certs
+ chmod 640 /tmp/contrail_ssl_gen/certs/ca.key.pem
+ chmod 640 /tmp/contrail_ssl_gen/certs/ca.key.pem
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -new -x509 -days 365 -extensions v3_ca -key /tmp/contrail_ssl_gen/certs/ca.key.pem -out /etc/contrail/webui_ssl/ca-cert.pem
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -new -x509 -days 365 -extensions v3_ca -key /tmp/contrail_ssl_gen/certs/ca.key.pem -out /etc/contrail/webui_ssl/ca-cert.pem
+ chmod 644 /etc/contrail/webui_ssl/ca-cert.pem
+ chmod 644 /etc/contrail/webui_ssl/ca-cert.pem
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
+ chgrp -R contrail /etc/contrail/webui_ssl
+ chgrp -R contrail /etc/contrail/webui_ssl
+ [[ -f /etc/contrail/webui_ssl/ca-cert.pem ]]
+ [[ -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ [[ -f /etc/contrail/webui_ssl/ca-cert.pem ]]
+ [[ -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ csr_file=/tmp/contrail_ssl_gen/server.pem.csr
+ csr_file=/tmp/contrail_ssl_gen/server.pem.csr
+ openssl genrsa -out /etc/contrail/webui_ssl/cs-key.pem.tmp 2048
+ openssl genrsa -out /etc/contrail/webui_ssl/cs-key.pem.tmp 2048
Generating RSA private key, 2048 bit long modulus
Generating RSA private key, 2048 bit long modulus
............................+++++
+
......................................................................................................................................................................................+++++
+
e is 65537 (0x10001)
e is 65537 (0x10001)
+ chmod 640 /etc/contrail/webui_ssl/cs-key.pem.tmp
+ chmod 640 /etc/contrail/webui_ssl/cs-key.pem.tmp
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -key /etc/contrail/webui_ssl/cs-key.pem.tmp -new -out /tmp/contrail_ssl_gen/server.pem.csr
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -key /etc/contrail/webui_ssl/cs-key.pem.tmp -new -out /tmp/contrail_ssl_gen/server.pem.csr
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ sign_csr_local_ca
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ sign_csr_local_ca
+ yes
+ yes
+ openssl ca -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -extensions v3_req -days 365 -in /tmp/contrail_ssl_gen/server.pem.csr -out /etc/contrail/webui_ssl/cs-cert.pem.tmp
+ openssl ca -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -extensions v3_req -days 365 -in /tmp/contrail_ssl_gen/server.pem.csr -out /etc/contrail/webui_ssl/cs-cert.pem.tmp
Using configuration from /tmp/contrail_ssl_gen/contrail_openssl.cfg
Using configuration from /tmp/contrail_ssl_gen/contrail_openssl.cfg
Check that the request matches the signature
Check that the request matches the signature
Signature ok
Signature ok
Certificate Details:
        Serial Number: 1 (0x1)
        Validity
            Not Before: Apr  7 02:10:20 2025 GMT
            Not After : Apr  7 02:10:20 2026 GMT
        Subject:
            countryName      Certificate Details:
        Serial Number: 1 (0x1)
        Validity
            Not Before:          = US
            stateOrProvinceName   Apr  7 02:10:20 2025 GMT
            Not After : Apr  7 02:10:20 2026 GMT
        Subject:
            countryName                 = CA
         = US
            stateOrProvinceName       = CA     organizationName          = Junipe
            organizationName rNetwo         = JuniperNetworks
            organizationalUnitNamerks
         = JuniperCA
                   organizationalUnitName    = JuncommonName             iperCA
            commonName         = Contrail
              = Cont        localityName              = Sunnyvale
        X509v3 extensions:
            X509v3 Basic Constraints: 
rail
                           CA:FALSE
            X509v3 Key Usage: 
                Digital Signature, Non Repudiation,  localityName              = Sunnyvale
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            Key Encipherment
            X509v3 Subject Alternative Name: 
X509v3 Key Usage: 
                Digital Signature, Non Repudiation, Key Encipherment
            X509v3 Subject Alternative Name                DNS:cn-jenkins-deploy-platform-ansible-os-3042-1, DNS:cn-jenkins-deploy-platform-ansible-os-3042-1., : 
                IP Address:10.0.0.29, IP Address:10.20.0.8, IP Address:172.17.0.1
Certificate is to be certified until DNS:cn-jenkins-deploy-platform-ansible-os-3042-1, DNS:cn-jenkins-deploy-platform-ansible-os-3042-1., IP Address:10.0.0.29, IP Address:10.20.0.8, IP Address:172.17.0.1Apr  7 02:10:20 2026 GMT (365 days)
Sign the certificate? [y/n]:
Certificate is to be certified until Apr  7 02:10:20 2026 GMT (365 days)
Sign the certificate? [y/n]:

1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries


1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries
Data Base Updated
Data Base Updated
+ chmod 644 /etc/contrail/webui_ssl/cs-cert.pem.tmp
+ chmod 644 /etc/contrail/webui_ssl/cs-cert.pem.tmp
++ dirname /etc/contrail/webui_ssl/cs-key.pem
++ dirname /etc/contrail/webui_ssl/cs-key.pem
+ chgrp -R contrail /etc/contrail/webui_ssl
+ chgrp -R contrail /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
+ chgrp -R contrail /etc/contrail/webui_ssl
+ chgrp -R contrail /etc/contrail/webui_ssl
+ mv /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-key.pem
+ mv /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-key.pem
+ mv /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem
+ mv /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem
+ rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp
+ rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp
+ orchestration_manager=openstack
+ [[ openstack == \k\u\b\e\r\n\e\t\e\s ]]
+ [[ -n /v3 ]]
+ identityManager_apiVersion='['\''v3'\'']'
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ introspect_strict_ssl=false
+ [[ true == \f\a\l\s\e ]]
+ identityManager_strict_ssl=false
+ [[ true == \f\a\l\s\e ]]
+ '[' -n '' ']'
+ '[' -n '' ']'
+ set_to_lower orchestrationModuleEndPointFromConfig false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval orchestrationModuleEndPointFromConfig=false
++ orchestrationModuleEndPointFromConfig=false
+ set_to_lower contrailEndPointFromConfig true
++ echo true
++ tr '[:upper:]' '[:lower:]'
+ local val=true
+ eval contrailEndPointFromConfig=true
++ contrailEndPointFromConfig=true
+ set_to_lower regionsFromConfig false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval regionsFromConfig=false
++ regionsFromConfig=false
+ set_to_lower networkManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval networkManager_strictSSL=false
++ networkManager_strictSSL=false
+ set_to_lower imageManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval imageManager_strictSSL=false
++ imageManager_strictSSL=false
+ set_to_lower computeManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval computeManager_strictSSL=false
++ computeManager_strictSSL=false
+ set_to_lower storageManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval storageManager_strictSSL=false
++ storageManager_strictSSL=false
+ set_to_lower cnfg_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval cnfg_strictSSL=false
++ cnfg_strictSSL=false
+ set_to_lower analytics_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval analytics_strictSSL=false
++ analytics_strictSSL=false
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ set_to_lower analytics_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval analytics_strictSSL=false
++ analytics_strictSSL=false
+ set_to_lower cassandra_enable_edit false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval cassandra_enable_edit=false
++ cassandra_enable_edit=false
+ set_to_lower WEBUI_INSECURE_ACCESS false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval WEBUI_INSECURE_ACCESS=false
++ WEBUI_INSECURE_ACCESS=false
+ set_to_lower serviceEndPointTakePublicURL true
++ echo true
++ tr '[:upper:]' '[:lower:]'
+ local val=true
+ eval serviceEndPointTakePublicURL=true
++ serviceEndPointTakePublicURL=true
+ mkdir -p /etc/contrail
+ cat
++ get_server_json_list CONFIG
++ server_typ=CONFIG_NODES
+++ echo 10.0.0.29
+++ sed 's/^,*//'
+++ sed 's/,*$//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.29
++ echo '['\''10.0.0.29'\'']'
++ get_server_json_list ANALYTICS
++ server_typ=ANALYTICS_NODES
+++ echo 10.0.0.29
+++ sed 's/^,*//'
+++ sed 's/,*$//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.29
++ echo '['\''10.0.0.29'\'']'
++ get_server_json_list CONTROL
++ server_typ=CONTROL_NODES
+++ echo 10.20.0.8
+++ sed 's/^,*//'
+++ sed 's/,*$//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.20.0.8
++ echo '['\''10.20.0.8'\'']'
++ get_server_json_list CONFIGDB
++ server_typ=CONFIGDB_NODES
+++ echo 10.0.0.29
+++ sed 's/^,*//'
+++ sed 's/,*$//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.29
++ echo '['\''10.0.0.29'\'']'
+ [[ keystone == \n\o\a\u\t\h ]]
+ echo 'INFO: config /etc/contrail/config.global.js'
INFO: config /etc/contrail/config.global.js
+ cat /etc/contrail/config.global.js
/*
 * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved.
 */

var config = {};

config.orchestration = {};
config.orchestration.Manager = "openstack";

config.orchestrationModuleEndPointFromConfig = false;
config.contrailEndPointFromConfig = true;

config.regionsFromConfig = false;

config.endpoints = {};
config.endpoints.apiServiceType = "ApiServer";
config.endpoints.opServiceType = "OpServer";

config.regions = {};
config.regions.RegionOne = "http://127.0.0.1:5000/v2.0";

config.serviceEndPointTakePublicURL = true;

config.networkManager = {};
config.networkManager.ip = "10.0.0.29";
config.networkManager.port = "9696";
config.networkManager.authProtocol = "http";
config.networkManager.apiVersion = [];
config.networkManager.strictSSL = false;
config.networkManager.ca = "";

config.imageManager = {};
config.imageManager.ip = "10.0.0.29";
config.imageManager.port = "9292";
config.imageManager.authProtocol = "http";
config.imageManager.apiVersion = ['v1', 'v2'];
config.imageManager.strictSSL = false;
config.imageManager.ca = "";

config.computeManager = {};
config.computeManager.ip = "10.0.0.29";
config.computeManager.port = "8774";
config.computeManager.authProtocol = "http";
config.computeManager.apiVersion = ['v1.1', 'v2'];
config.computeManager.strictSSL = false;
config.computeManager.ca = "";

config.identityManager = {};
config.identityManager.ip = "10.0.0.29";
config.identityManager.port = "5000";
config.identityManager.authProtocol = "http";
config.identityManager.apiVersion = ['v3'];
config.identityManager.strictSSL = false;
config.identityManager.ca = "";

config.storageManager = {};
config.storageManager.ip = "127.0.0.1";
config.storageManager.port = "8776";
config.storageManager.authProtocol = "http";
config.storageManager.apiVersion = ['v1'];
config.storageManager.strictSSL = false;
config.storageManager.ca = "";

config.cnfg = {};
config.cnfg.server_ip = ['10.0.0.29'];
config.cnfg.server_port = "8082";
config.cnfg.authProtocol = "http";
config.cnfg.strictSSL = false;
config.cnfg.ca = "/etc/contrail/ssl/certs/ca-cert.pem";
config.cnfg.statusURL = '/global-system-configs';

config.analytics = {};
config.analytics.server_ip = ['10.0.0.29'];
config.analytics.server_port = "8081";
config.analytics.authProtocol = "http";
config.analytics.strictSSL = false;
config.analytics.ca = "/etc/contrail/ssl/certs/ca-cert.pem";
config.analytics.statusURL = '/analytics/uves/bgp-peers';

config.dns = {};
config.dns.server_ip = ['10.20.0.8'];
config.dns.server_port = '8092';
config.dns.statusURL = '/Snh_PageReq?x=AllEntries%20VdnsServersReq';

config.introspect = {};
config.introspect.ssl = {};
config.introspect.ssl.enabled = false;
config.introspect.ssl.key = '/etc/contrail/ssl/private/server-privkey.pem';
config.introspect.ssl.cert = '/etc/contrail/ssl/certs/server.pem';
config.introspect.ssl.ca = '/etc/contrail/ssl/certs/ca-cert.pem';
config.introspect.ssl.strictSSL = false;

config.jobServer = {};
config.jobServer.server_ip = '127.0.0.1';
config.jobServer.server_port = '3000';

config.files = {};
config.files.download_path = '/tmp';

config.cassandra = {};
config.cassandra.server_ips = ['10.0.0.29'];
config.cassandra.server_port = '9041';
config.cassandra.enable_edit = false;
config.cassandra.use_ssl = false;
config.cassandra.ca_certs = '/etc/contrail/ssl/certs/ca-cert.pem';

config.kue = {};
config.kue.ui_port = '3002'

config.webui_addresses = ['10.0.0.29'];

config.insecure_access = false;

config.http_port = '8180';

config.https_port = '8143';

config.require_auth = false;

config.node_worker_count = 1;

config.maxActiveJobs = 10;

config.redisDBIndex = 3;

config.CONTRAIL_SERVICE_RETRY_TIME = 300000; //5 minutes

config.redis_server_port = '6379';
config.redis_server_ip = '127.0.0.1';
config.redis_dump_file = '/var/lib/redis/dump-webui.rdb';
config.redis_password = '';

config.logo_file = '/opt/contrail/images/logo.png';
config.favicon_file = '/opt/contrail/images/favicon.ico';

config.featurePkg = {};
config.featurePkg.webController = {};
config.featurePkg.webController.path = '/usr/src/contrail/contrail-web-controller';
config.featurePkg.webController.enable = true;

config.qe = {};
config.qe.enable_stat_queries = false;

config.logs = {};
config.logs.level = 'debug';

config.getDomainProjectsFromApiServer = false;
config.network = {};
config.network.L2_enable = false;

config.getDomainsFromApiServer = false;
config.jsonSchemaPath = "/usr/src/contrail/contrail-web-core/src/serverroot/configJsonSchemas";

config.server_options = {};
config.server_options.key_file = '/etc/contrail/webui_ssl/cs-key.pem';
config.server_options.cert_file = '/etc/contrail/webui_ssl/cs-cert.pem';
config.server_options.ciphers = 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA';

module.exports = config;
+ cat
+ echo 'INFO: config /etc/contrail/contrail-webui-userauth.js'
INFO: config /etc/contrail/contrail-webui-userauth.js
+ cat /etc/contrail/contrail-webui-userauth.js
/*
 * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved.
 */

var auth = {};
auth.admin_user = 'admin';
auth.admin_password = 'contrail123';
auth.admin_token = '';
auth.admin_tenant_name = 'admin';
auth.project_domain_name = 'Default';
auth.user_domain_name = 'Default';

module.exports = auth;
+ set_vnc_api_lib_ini
+ local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp
+ cat
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ [[ keystone == \k\e\y\s\t\o\n\e ]]
+ cat
+ [[ http == \h\t\t\p\s ]]
+ mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini
+ run_service /usr/bin/node jobServerStart.js
+ [[ -n 1999 ]]
+ [[ -n 1999 ]]
+ local owner_opts=1999:1999
+ mkdir -p /etc/contrail /var/lib/contrail
+ chown 1999:1999 /etc/contrail /var/lib/contrail
+ find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' +
+ chmod 755 /etc/contrail
+ do_run_service /usr/bin/node jobServerStart.js
+ [[ -n 1999 ]]
+ [[ -n 1999 ]]
+ mkdir -p /var/crashes
+ chmod 777 /var/crashes
++ id -un 1999
+ local user_name=contrail
+ export HOME=/home/contrail
+ HOME=/home/contrail
+ mkdir -p /home/contrail
+ chown -R 1999:1999 /home/contrail
+ exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/node jobServerStart.js
04/07/2025 02:10:20 AM - debug: Redis: connect
04/07/2025 02:10:20 AM - debug: Redis: ready
04/07/2025 02:10:20 AM - debug: Redis FLUSHDB 3 done
04/07/2025 02:10:20 AM - debug: Redis FLUSHDB 5 done
04/07/2025 02:10:20 AM - debug: Redis FLUSHDB 4 done
04/07/2025 02:10:21 AM - debug: Built Package List as:[{"pkgName":null,"parseURL.xml":["/src/serverroot/common/url.routes.js","/src/serverroot/utils/url.routes.js","/src/serverroot/web/routes/url.routes.js","/webroot/reports/qe/api/url.routes.js","/webroot/reports/udd/api/url.routes.js"],"jobProcess.xml":["/src/serverroot/jobs/core/jobsCb.api.js"],"featureList.xml":["/src/serverroot/web/core/feature.list.js"]},{"pkgName":"webController","jobProcess.xml":["/webroot/monitor/infrastructure/controlnode/jobs/jobsCb.api.js","/webroot/monitor/infrastructure/vrouter/jobs/jobsCb.api.js","/webroot/monitor/networking/jobs/jobsCb.api.js"],"featureList.xml":["/webroot/common/api/feature.list.js"],"parseURL.xml":["/webroot/common/api/url.routes.js","/webroot/config/common/api/url.routes.js","/webroot/config/dns/records/api/url.routes.js","/webroot/config/dns/servers/api/url.routes.js","/webroot/config/firewall/common/fwpolicy/api/url.routes.js","/webroot/config/infra/bgp/api/url.routes.js","/webroot/config/infra/linklocalservices/api/url.routes.js","/webroot/config/infra/quotas/api/url.routes.js","/webroot/config/infra/serviceappliance/api/url.routes.js","/webroot/config/infra/serviceapplianceset/api/url.routes.js","/webroot/config/infra/vrouters/api/url.routes.js","/webroot/config/networking/fip/api/url.routes.js","/webroot/config/networking/ipam/api/url.routes.js","/webroot/config/networking/loadbalancer/api/url.routes.js","/webroot/config/networking/logicalrouter/api/url.routes.js","/webroot/config/networking/networks/api/url.routes.js","/webroot/config/networking/policy/api/url.routes.js","/webroot/config/networking/port/api/url.routes.js","/webroot/config/networking/routetable/api/url.routes.js","/webroot/config/networking/routingpolicy/api/url.routes.js","/webroot/config/networking/securitygroup/api/url.routes.js","/webroot/config/physicaldevices/interfaces/api/url.routes.js","/webroot/config/physicaldevices/physicalrouters/api/url.routes.js","/webroot/config/port/api/url.routes.js","/webroot/config/services/bgpasaservice/api/url.routes.js","/webroot/config/services/instances/api/url.routes.js","/webroot/config/services/templates/api/url.routes.js","/webroot/monitor/infrastructure/analyticsnode/api/url.routes.js","/webroot/monitor/infrastructure/confignode/api/url.routes.js","/webroot/monitor/infrastructure/controlnode/api/url.routes.js","/webroot/monitor/infrastructure/databasenode/api/url.routes.js","/webroot/monitor/infrastructure/globalcontroller/api/url.routes.js","/webroot/monitor/infrastructure/underlay/api/url.routes.js","/webroot/monitor/infrastructure/vrouter/api/url.routes.js","/webroot/monitor/networking/api/url.routes.js","/webroot/setting/configdb/ui/api/url.routes.js"]}]
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis FLUSHDB 3 done
04/07/2025 02:10:21 AM - debug: Redis FLUSHDB 4 done
04/07/2025 02:10:21 AM - debug: Redis FLUSHDB 5 done
04/07/2025 02:10:21 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-core/src/serverroot/jobs/core/jobsCb.api.js
04/07/2025 02:10:21 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/controlnode/jobs/jobsCb.api.js
04/07/2025 02:10:21 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/vrouter/jobs/jobsCb.api.js
04/07/2025 02:10:21 AM - debug: Registering jobListeners: /usr/src/contrail/contrail-web-controller/webroot/monitor/networking/jobs/jobsCb.api.js
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
Error: connect ECONNREFUSED
    at errnoException (net.js:905:11)
    at Object.afterConnect [as oncomplete] (net.js:896:19)
04/07/2025 02:10:21 AM - error: URL [http://10.20.0.8:8092/Snh_PageReq?x=AllEntries%20VdnsServersReq] returned error [{"code":"ECONNREFUSED","errno":"ECONNREFUSED","syscall":"connect"}]
04/07/2025 02:10:21 AM - debug: Contrail Service Response Updated by process:251 {"dns-server":[]}
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: connect
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis: ready
04/07/2025 02:10:21 AM - debug: Redis DB 3 SELECT suuccess:
04/07/2025 02:10:22 AM - debug: Got the token successfully for tenant:admin
04/07/2025 02:10:23 AM - debug: Got the token successfully for tenant:admin
Error: connect ECONNREFUSED
    at errnoException (net.js:905:11)
    at Object.afterConnect [as oncomplete] (net.js:896:19)
04/07/2025 02:10:23 AM - error: URL [http://10.0.0.29:8081/analytics/uves/bgp-peers] returned error [{"code":"ECONNREFUSED","errno":"ECONNREFUSED","syscall":"connect"}]
04/07/2025 02:10:23 AM - debug: Contrail Service Response Updated by process:251 {"OpServer":[]}
04/07/2025 02:10:23 AM - debug: Contrail Service Response Updated by process:251 {"ApiServer":[{"@publisher-id":"10.0.0.29","ip-address":"10.0.0.29","port":"8082","status":"up"}]}
04/07/2025 02:15:21 AM - debug: Contrail Service Response Updated by process:251 {"dns-server":[{"@publisher-id":"10.20.0.8","ip-address":"10.20.0.8","port":"8092","status":"up"}]}
04/07/2025 02:15:21 AM - debug: Contrail Service Response Updated by process:251 {"OpServer":[{"@publisher-id":"10.0.0.29","ip-address":"10.0.0.29","port":"8081","status":"up"}]}