INFO: agent started in kernel mode
++ LOG_DIR=/var/log/contrail
++ export CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent
++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent
++ mkdir -p /var/log/contrail/vrouter-agent
++ log_file=/var/log/contrail/vrouter-agent/console.log
++ touch /var/log/contrail/vrouter-agent/console.log
++ chmod 600 /var/log/contrail/vrouter-agent/console.log
++ exec
+++ tee -a /var/log/contrail/vrouter-agent/console.log
+++ date
++ echo 'INFO: =================== Mon Apr 21 01:56:56 UTC 2025 ==================='
INFO: =================== Mon Apr 21 01:56:56 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=vhost0
++++ [[ vhost0 == \l\o ]]
++++ echo vhost0
+++ local nic=vhost0
+++ get_ip_for_nic vhost0
+++ local nic=vhost0
+++ cut -d / -f 1
+++ get_cidr_for_nic vhost0
+++ command -v ip
+++ local nic=vhost0
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev vhost0
++ DEFAULT_LOCAL_IP=10.0.0.56
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=/dev/hugepages2M
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z /dev/hugepages2M ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.57
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.57
++ ANALYTICSDB_NODES=10.0.0.57
++ ANALYTICS_SNMP_NODES=10.0.0.57
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:8081 '
+++ '[' -n '10.0.0.57:8081 ' ']'
+++ echo 10.0.0.57:8081
++ ANALYTICS_SERVERS=10.0.0.57:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:9042 '
+++ '[' -n '10.0.0.57:9042 ' ']'
+++ echo 10.0.0.57:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.57:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.57
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:8086 '
+++ '[' -n '10.0.0.57:8086 ' ']'
+++ echo 10.0.0.57:8086
++ COLLECTOR_SERVERS=10.0.0.57:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.57
++ CONFIGDB_NODES=10.0.0.57
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:8082 '
+++ '[' -n '10.0.0.57:8082 ' ']'
+++ echo 10.0.0.57:8082
++ CONFIG_SERVERS=10.0.0.57:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:9161 '
+++ '[' -n '10.0.0.57:9161 ' ']'
+++ echo 10.0.0.57:9161
++ CONFIGDB_SERVERS=10.0.0.57:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:9041 '
+++ '[' -n '10.0.0.57:9041 ' ']'
+++ echo 10.0.0.57:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.57:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.57
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.57
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.57
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+=10.0.0.57:2181,
+++ '[' -n 10.0.0.57:2181, ']'
+++ echo 10.0.0.57:2181
++ ZOOKEEPER_SERVERS=10.0.0.57:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:2181 '
+++ '[' -n '10.0.0.57:2181 ' ']'
+++ echo 10.0.0.57:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.57:2181
++ RABBITMQ_NODES=10.0.0.57
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+=10.0.0.57:5673,
+++ '[' -n 10.0.0.57:5673, ']'
+++ echo 10.0.0.57:5673
++ RABBITMQ_SERVERS=10.0.0.57:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:6379 '
+++ '[' -n '10.0.0.57:6379 ' ']'
+++ echo 10.0.0.57:6379
++ REDIS_SERVERS=10.0.0.57:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.57
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.57
+++ local server_address=10.0.0.57
+++ extended_server_list+='10.0.0.57:9092 '
+++ '[' -n '10.0.0.57:9092 ' ']'
+++ echo 10.0.0.57:9092
++ KAFKA_SERVERS=10.0.0.57:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.57
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.57
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 149880
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ grep 'inet '
++ ip addr show dev vhost0
++ awk '{print $2}'
++ head -n 1
+ '[' -n 10.0.0.56/24 ']'
+ return
+ echo 'INFO: vhost0 is already up'
INFO: vhost0 is already up
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
+ local loaded_vrouter_ver=nightly
++ modinfo -F version vrouter
+ local available_vrouter_ver=nightly
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly'
INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly
+ ensure_host_resolv_conf
+ local path=/etc/resolv.conf
+ local host_path=/host/etc/resolv.conf
+ [[ -e /etc/resolv.conf ]]
+ [[ -e /host/etc/resolv.conf ]]
+ diff -U 3 /host/etc/resolv.conf /etc/resolv.conf
+ return 0
+ [[ 0 != 0 ]]
+ '[' -e /etc/dhcp/dhclient.conf ']'
++ cat /sys/devices/virtual/dmi/id/chassis_vendor
++ cat /sys/devices/virtual/dmi/id/product_version
+ azure_or_gcp_or_aws='Red Hat
15.52.9-1.cmpt.el7'
+ [[ red hat
15.52.9-1.cmpt.el7 =~ ^(.*microsoft*.|.*google*.|.*amazon*.) ]]
+ check_vrouter_agent_settings
+ '[' -n '' ']'
+ nodes=(`echo $CONTROL_NODES | tr ',' ' '`)
++ tr , ' '
++ echo 10.0.0.57
+ local nodes
+ [[ 9 == 0 ]]
++ resolve_host_ip 10.0.0.57
++ local name_or_ip=10.0.0.57
++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.57'\''))'
+ local resolved_ip=10.0.0.57
++ get_gateway_nic_for_ip 10.0.0.57
++ command -v ip
++ local ip=10.0.0.57
+++ ip route get 10.0.0.57
+++ awk '{print $2}'
+++ grep -o 'dev.*'
++ local iface=vhost0
++ [[ vhost0 == \l\o ]]
++ echo vhost0
+ local iface=vhost0
+ [[ vhost0 != \v\h\o\s\t\0 ]]
+ ((  9 > 1  ))
+ for node in '${nodes[@]}'
++ resolve_host_ip 10.0.0.57
++ local name_or_ip=10.0.0.57
++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.57'\''))'
+ local resolved_ip=10.0.0.57
++ get_gateway_nic_for_ip 10.0.0.57
++ command -v ip
++ local ip=10.0.0.57
+++ awk '{print $2}'
+++ grep -o 'dev.*'
+++ ip route get 10.0.0.57
++ local iface=vhost0
++ [[ vhost0 == \l\o ]]
++ echo vhost0
+ local cur_iface=vhost0
+ [[ vhost0 != \v\h\o\s\t\0 ]]
+ return 0
+ is_encryption_supported
+ local enc=FALSE
+ [[ FALSE == \F\A\L\S\E ]]
+ return 1
+ echo 'INFO: Kernel version does not support the driver required for vrouter to vrouter encryption'
INFO: Kernel version does not support the driver required for vrouter to vrouter encryption
+ init_sriov
+ [[ -z '' ]]
+ [[ -z '' ]]
+ echo 'INFO: sriov parameters are not provided'
INFO: sriov parameters are not provided
+ return
+ wait_vhost0
+ local max=60
+ local pause=5
+ local i=0
+ local 'grep_str=inet '
+ [[ -n '' ]]
+ (( i=0 ))
+ (( i<max ))
+ echo 'INFO: wait vhost0 to be initilaized... 0/60'
INFO: wait vhost0 to be initilaized... 0/60
+ grep -q 'inet '
+ ip addr show dev vhost0
+ echo 'INFO: vhost0 is ready.'
INFO: vhost0 is ready.
+ return 0
+ prepare_agent_config_vars /usr/bin/contrail-vrouter-agent
+ echo 'INFO: Start prepare_agent_config_vars'
INFO: Start prepare_agent_config_vars
+ local VROUTER_CIDR=
+ local vrouter_ip
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ head -n 1
++ awk '{print $2}'
++ grep 'inet '
++ ip addr show dev vhost0
+ VROUTER_CIDR=10.0.0.56/24
+ [[ -z 10.0.0.56/24 ]]
+ echo 'INFO: vhost0 cidr 10.0.0.56/24'
INFO: vhost0 cidr 10.0.0.56/24
+ vrouter_ip=10.0.0.56
+ local PHYS_INT_MAC PHYS_INT PCI_ADDRESS PHYS_INT_IPS
+ is_dpdk
+ test kernel == dpdk
+ '[' -n '' ']'
+ IFS=' '
+ read -r PHYS_INT PHYS_INT_MAC
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
++ local mac=fa:16:3e:28:21:42
++ [[ -n fa:16:3e:28:21:42 ]]
+++ head -1
+++ awk '{print($3)}'
+++ grep 'Type:Physical HWaddr:fa:16:3e:28:21:42' -B1
+++ vif --list
++ nic=ens3
++ [[ -z ens3 ]]
++ [[ -n ens3 ]]
++ [[ ! ens3 =~ ^[0-9] ]]
+++ get_iface_mac ens3
+++ local nic=ens3
+++ cat /sys/class/net/ens3/address
++ local _mac=fa:16:3e:28:21:42
++ [[ -n fa:16:3e:28:21:42 ]]
++ mac=fa:16:3e:28:21:42
++ [[ ens3 == '' ]]
++ [[ fa:16:3e:28:21:42 == '' ]]
++ [[ ens3 == \v\h\o\s\t\0 ]]
++ echo ens3 fa:16:3e:28:21:42
++ get_pci_address_for_nic ens3
++ local nic=ens3
++ is_vlan ens3
++ local dev=ens3
++ '[' -f /proc/net/vlan/ens3 ']'
++ is_bonding ens3
++ local dev=ens3
++ '[' -d /sys/class/net/ens3/bonding ']'
++ awk '{print $2}'
++ tr -d ' '
++ grep bus-info
++ ethtool -i ens3
+ PCI_ADDRESS=0000:00:03.0
+ [[ -z ens3 ]]
+ [[ -z fa:16:3e:28:21:42 ]]
+ echo 'INFO: Physical interface: ens3, mac=fa:16:3e:28:21:42, pci=0000:00:03.0'
INFO: Physical interface: ens3, mac=fa:16:3e:28:21:42, pci=0000:00:03.0
+ VROUTER_GATEWAY=10.0.0.1
+ [[ -z 10.0.0.1 ]]
+ echo 'INFO: vrouter gateway: 10.0.0.1'
INFO: vrouter gateway: 10.0.0.1
+ '[' kubernetes == kubernetes ']'
+ '[' -n 10.0.0.1 ']'
+ add_k8s_pod_cidr_route
+ local pod_cidr=10.32.0.0/12
+ local via_opts=
+ [[ -z '' ]]
+ via_opts='via 10.0.0.1'
+ ip route add 10.32.0.0/12 via 10.0.0.1 dev vhost0
RTNETLINK answers: File exists
+ ip route replace 10.32.0.0/12 via 10.0.0.1 dev vhost0
+ HYPERVISOR_TYPE=kvm
+ local AGENT_NAME=an-jenkins-deploy-platform-juju-k8s-1155-1
+ '[' -z an-jenkins-deploy-platform-juju-k8s-1155-1 ']'
++ cat /sys/devices/virtual/dmi/id/chassis_vendor
+ local 'gcp=Red Hat'
+ '[' 'Red Hat' == Google ']'
+ local IS_VLAN_ENABLED IS_ENCRYPTION_SUPPORTED_FLAG
+ is_vlan ens3
+ local dev=ens3
+ '[' -f /proc/net/vlan/ens3 ']'
+ IS_VLAN_ENABLED=false
+ is_encryption_supported
+ local enc=FALSE
+ [[ FALSE == \F\A\L\S\E ]]
+ return 1
+ IS_ENCRYPTION_SUPPORTED_FLAG=false
+ local hugepages_option=
+ local HUGEPAGES_DIR allocated_pages_1GB allocated_pages_2MB
+ ((  HUGE_PAGES_1GB > 0  ))
+ ((  HUGE_PAGES_2MB > 0  ))
+ HUGEPAGES_DIR=/dev/hugepages2M
+ ensure_hugepages /dev/hugepages2M
+ local hp_dir=/dev/hugepages2M
+ hp_dir=/dev/hugepages2M
+ local mp
+ local fs
++ awk '{print($3)}'
++ mount -t hugetlbfs
+ for mp in '$(mount -t hugetlbfs | awk '\''{print($3)}'\'')'
+ [[ /dev/hugepages == \/\d\e\v\/\h\u\g\e\p\a\g\e\s\2\M ]]
+ for mp in '$(mount -t hugetlbfs | awk '\''{print($3)}'\'')'
+ [[ /dev/hugepages2M == \/\d\e\v\/\h\u\g\e\p\a\g\e\s\2\M ]]
+ return
++ cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages
+ allocated_pages_2MB=256
+ echo 'INFO: Requested HP2MB  256 available 256'
INFO: Requested HP2MB  256 available 256
+ ((  HUGE_PAGES_2MB > allocated_pages_2MB  ))
+ local INTROSPECT_IP=0.0.0.0
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local COMPUTE_NODE_ADDRESS
+ [[ -n '' ]]
+ COMPUTE_NODE_ADDRESS=10.0.0.56
++ get_server_list CONTROL ':5269 '
++ local server_typ=CONTROL_NODES
++ local 'port_with_delim=:5269 '
++ local server_list=
++ IFS=,
++ read -ra server_list
++ local extended_server_list=
++ for server in '"${server_list[@]}"'
+++ echo 10.0.0.57
++ local server_address=10.0.0.57
++ extended_server_list+='10.0.0.57:5269 '
++ '[' -n '10.0.0.57:5269 ' ']'
++ echo 10.0.0.57:5269
+ local XMPP_SERVERS_LIST=10.0.0.57:5269
++ get_ip_for_vrouter_from_control
+++ get_iface_for_vrouter_from_control
+++ local node_ip
+++ [[ -n '' ]]
++++ echo 10.0.0.1
+++ node_ip=10.0.0.1
+++ [[ -z 10.0.0.1 ]]
++++ get_gateway_nic_for_ip 10.0.0.1
++++ command -v ip
++++ local ip=10.0.0.1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
+++++ ip route get 10.0.0.1
++++ local iface=vhost0
++++ [[ vhost0 == \l\o ]]
++++ echo vhost0
+++ local iface=vhost0
+++ echo vhost0
++ local iface=vhost0
++ get_ip_for_nic vhost0
++ local nic=vhost0
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ head -n 1
++ cut -d / -f 1
++ awk '{print $2}'
++ grep 'inet '
++ ip addr show dev vhost0
+ local CONTROL_NETWORK_IP=10.0.0.56
++ get_server_list DNS ':53 '
++ local server_typ=DNS_NODES
++ local 'port_with_delim=:53 '
++ local server_list=
++ IFS=,
++ read -ra server_list
++ local extended_server_list=
++ for server in '"${server_list[@]}"'
+++ echo 10.0.0.57
++ local server_address=10.0.0.57
++ extended_server_list+='10.0.0.57:53 '
++ '[' -n '10.0.0.57:53 ' ']'
++ echo 10.0.0.57:53
+ local DNS_SERVERS_LIST=10.0.0.57:53
+ local k8s_token_file
+ [[ -z eyJhbGciOiJSUzI1NiIsImtpZCI6ImowUWJVNFZxRDJma241RU9SVVgyWUNFcV9oQjlwbU81SXczcmpSb2xQZ2MifQ.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.sCt4Hns1AKF-zCu3rt5V4WnMDOe6tlcoA34U4YyKIsTPv4MsrjDd-Pd6H8lnezB31VfWaOvEt6dr8932-gvBgNTlpmgv_wWnHMMkaxjfv-RT49kIj2XmLu9iHi5unYIQPxVPht7YGz2yYNCB84pqT-z5Y_Q3Y0U58PTK6hZQjqx2AZB6w8mugbQQZlN_wOjgB6cMqGPnKDt1ObbHVkDaHF9g6CUS4lpMcp8YLqvbGE3F8e_xpjaOO7cojQ4kphW580yeqzeEJH6o2X0XSnNVil-js1AG3-5hLnL7ZEYNkEtYeZ8OD1jh4WFWKODQuh2ga2xDHrYG2xeodBCDJarhSQ ]]
+ local result_params=
+ local key line
++ cat /parameters-template.sh
+ local 'params=AGENT_MODE=
AGENT_NAME=
AUTH_MODE=
BARBICAN_PASSWORD=
BARBICAN_TENANT_NAME=
BARBICAN_USER=
CLOUD_ORCHESTRATOR=
COLLECTOR_SERVERS=
COMPUTE_NODE_ADDRESS=
CONFIG_API_SERVER_CA_CERTFILE=
CONFIG_API_SSL_ENABLE=
CONFIG_NODES=
CONTAINER_LOG_DIR=
CONTROL_NETWORK_IP=
DEFAULT_LOCAL_IP=
DNS_SERVERS_LIST=
DPDK_UIO_DRIVER=
FABRIC_SNAT_HASH_TABLE_SIZE=
HUGEPAGES_DIR=
HUGE_PAGES_1GB=
HUGE_PAGES_2MB=
HYPERVISOR_TYPE=
INTROSPECT_IP=
INTROSPECT_SSL_ENABLE=
INTROSPECT_SSL_INSECURE=
IS_ENCRYPTION_SUPPORTED_FLAG=
IS_VLAN_ENABLED=
K8S_TOKEN=
KEYSTONE_AUTH_ADMIN_PORT=
KEYSTONE_AUTH_CA_CERTFILE=
KEYSTONE_AUTH_CERTFILE=
KEYSTONE_AUTH_HOST=
KEYSTONE_AUTH_INSECURE=
KEYSTONE_AUTH_KEYFILE=
KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=
KEYSTONE_AUTH_PROTO=
KEYSTONE_AUTH_REGION_NAME=
KEYSTONE_AUTH_REGION_NAME=
KEYSTONE_AUTH_URL_TOKENS=
KEYSTONE_AUTH_URL_VERSION=
KEYSTONE_AUTH_USER_DOMAIN_NAME=
KUBERNETES_API_PORT=
KUBERNETES_API_SECURE_PORT=
KUBERNETES_API_SERVER=
L3MH_CIDR=
LOG_LEVEL=
LOG_LOCAL=
METADATA_PROXY_SECRET=
METADATA_SSL_CA_CERTFILE=
METADATA_SSL_CERTFILE=
METADATA_SSL_CERT_TYPE=
METADATA_SSL_ENABLE=
METADATA_SSL_KEYFILE=
PCI_ADDRESS=
PHYS_INT=
PHYS_INT_MAC=
PHYS_INT_IPS=
PRIORITY_BANDWIDTH=
PRIORITY_ID=
PRIORITY_SCHEDULING=
PRIORITY_TAGGING=
QOS_DEF_HW_QUEUE=
QOS_LOGICAL_QUEUES=
QOS_QUEUE_ID=
SAMPLE_DESTINATION=
SANDESH_CA_CERTFILE=
SANDESH_CERTFILE=
SANDESH_KEYFILE=
SANDESH_SERVER_CERTFILE=
SANDESH_SERVER_KEYFILE=
SANDESH_SSL_ENABLE=
SLO_DESTINATION=
STATS_COLLECTOR_DESTINATION_PATH=
SUBCLUSTER=
TSN_AGENT_MODE=
TSN_NODES=
VROUTER_AGENT_INTROSPECT_PORT=
VROUTER_CIDR=
VROUTER_CRYPT_INTERFACE=
VROUTER_GATEWAY=
XMPP_SERVER_CA_CERTFILE=
XMPP_SERVER_CERTFILE=
XMPP_SERVER_KEYFILE=
XMPP_SERVERS_LIST=
XMPP_SSL_ENABLE='
+ read line
++ cut -d = -f 1
++ echo AGENT_MODE=
+ key=AGENT_MODE
+ [[ -n AGENT_MODE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo AGENT_NAME=
+ key=AGENT_NAME
+ [[ -n AGENT_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo AUTH_MODE=
+ key=AUTH_MODE
+ [[ -n AUTH_MODE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo BARBICAN_PASSWORD=
+ key=BARBICAN_PASSWORD
+ [[ -n BARBICAN_PASSWORD ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo BARBICAN_TENANT_NAME=
+ key=BARBICAN_TENANT_NAME
+ [[ -n BARBICAN_TENANT_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo BARBICAN_USER=
+ key=BARBICAN_USER
+ [[ -n BARBICAN_USER ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo CLOUD_ORCHESTRATOR=
+ key=CLOUD_ORCHESTRATOR
+ [[ -n CLOUD_ORCHESTRATOR ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo COLLECTOR_SERVERS=
+ key=COLLECTOR_SERVERS
+ [[ -n COLLECTOR_SERVERS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo COMPUTE_NODE_ADDRESS=
++ cut -d = -f 1
+ key=COMPUTE_NODE_ADDRESS
+ [[ -n COMPUTE_NODE_ADDRESS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONFIG_API_SERVER_CA_CERTFILE=
++ cut -d = -f 1
+ key=CONFIG_API_SERVER_CA_CERTFILE
+ [[ -n CONFIG_API_SERVER_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONFIG_API_SSL_ENABLE=
++ cut -d = -f 1
+ key=CONFIG_API_SSL_ENABLE
+ [[ -n CONFIG_API_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo CONFIG_NODES=
+ key=CONFIG_NODES
+ [[ -n CONFIG_NODES ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo CONTAINER_LOG_DIR=
+ key=CONTAINER_LOG_DIR
+ [[ -n CONTAINER_LOG_DIR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONTROL_NETWORK_IP=
++ cut -d = -f 1
+ key=CONTROL_NETWORK_IP
+ [[ -n CONTROL_NETWORK_IP ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo DEFAULT_LOCAL_IP=
++ cut -d = -f 1
+ key=DEFAULT_LOCAL_IP
+ [[ -n DEFAULT_LOCAL_IP ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo DNS_SERVERS_LIST=
++ cut -d = -f 1
+ key=DNS_SERVERS_LIST
+ [[ -n DNS_SERVERS_LIST ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo DPDK_UIO_DRIVER=
++ cut -d = -f 1
+ key=DPDK_UIO_DRIVER
+ [[ -n DPDK_UIO_DRIVER ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo FABRIC_SNAT_HASH_TABLE_SIZE=
+ key=FABRIC_SNAT_HASH_TABLE_SIZE
+ [[ -n FABRIC_SNAT_HASH_TABLE_SIZE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo HUGEPAGES_DIR=
+ key=HUGEPAGES_DIR
+ [[ -n HUGEPAGES_DIR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo HUGE_PAGES_1GB=
++ cut -d = -f 1
+ key=HUGE_PAGES_1GB
+ [[ -n HUGE_PAGES_1GB ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo HUGE_PAGES_2MB=
+ key=HUGE_PAGES_2MB
+ [[ -n HUGE_PAGES_2MB ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo HYPERVISOR_TYPE=
+ key=HYPERVISOR_TYPE
+ [[ -n HYPERVISOR_TYPE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo INTROSPECT_IP=
++ cut -d = -f 1
+ key=INTROSPECT_IP
+ [[ -n INTROSPECT_IP ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo INTROSPECT_SSL_ENABLE=
++ cut -d = -f 1
+ key=INTROSPECT_SSL_ENABLE
+ [[ -n INTROSPECT_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo INTROSPECT_SSL_INSECURE=
+ key=INTROSPECT_SSL_INSECURE
+ [[ -n INTROSPECT_SSL_INSECURE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo IS_ENCRYPTION_SUPPORTED_FLAG=
++ cut -d = -f 1
+ key=IS_ENCRYPTION_SUPPORTED_FLAG
+ [[ -n IS_ENCRYPTION_SUPPORTED_FLAG ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo IS_VLAN_ENABLED=
+ key=IS_VLAN_ENABLED
+ [[ -n IS_VLAN_ENABLED ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo K8S_TOKEN=
+ key=K8S_TOKEN
+ [[ -n K8S_TOKEN ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_ADMIN_PORT=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_ADMIN_PORT
+ [[ -n KEYSTONE_AUTH_ADMIN_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_CA_CERTFILE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_CA_CERTFILE
+ [[ -n KEYSTONE_AUTH_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_CERTFILE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_CERTFILE
+ [[ -n KEYSTONE_AUTH_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_HOST=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_HOST
+ [[ -n KEYSTONE_AUTH_HOST ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_INSECURE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_INSECURE
+ [[ -n KEYSTONE_AUTH_INSECURE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_KEYFILE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_KEYFILE
+ [[ -n KEYSTONE_AUTH_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_PROJECT_DOMAIN_NAME
+ [[ -n KEYSTONE_AUTH_PROJECT_DOMAIN_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_PROTO=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_PROTO
+ [[ -n KEYSTONE_AUTH_PROTO ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_REGION_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_REGION_NAME
+ [[ -n KEYSTONE_AUTH_REGION_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_REGION_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_REGION_NAME
+ [[ -n KEYSTONE_AUTH_REGION_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_URL_TOKENS=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_URL_TOKENS
+ [[ -n KEYSTONE_AUTH_URL_TOKENS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_URL_VERSION=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_URL_VERSION
+ [[ -n KEYSTONE_AUTH_URL_VERSION ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_USER_DOMAIN_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_USER_DOMAIN_NAME
+ [[ -n KEYSTONE_AUTH_USER_DOMAIN_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo KUBERNETES_API_PORT=
+ key=KUBERNETES_API_PORT
+ [[ -n KUBERNETES_API_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KUBERNETES_API_SECURE_PORT=
++ cut -d = -f 1
+ key=KUBERNETES_API_SECURE_PORT
+ [[ -n KUBERNETES_API_SECURE_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo KUBERNETES_API_SERVER=
+ key=KUBERNETES_API_SERVER
+ [[ -n KUBERNETES_API_SERVER ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo L3MH_CIDR=
+ key=L3MH_CIDR
+ [[ -n L3MH_CIDR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo LOG_LEVEL=
++ cut -d = -f 1
+ key=LOG_LEVEL
+ [[ -n LOG_LEVEL ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo LOG_LOCAL=
++ cut -d = -f 1
+ key=LOG_LOCAL
+ [[ -n LOG_LOCAL ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo METADATA_PROXY_SECRET=
+ key=METADATA_PROXY_SECRET
+ [[ -n METADATA_PROXY_SECRET ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo METADATA_SSL_CA_CERTFILE=
+ key=METADATA_SSL_CA_CERTFILE
+ [[ -n METADATA_SSL_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo METADATA_SSL_CERTFILE=
+ key=METADATA_SSL_CERTFILE
+ [[ -n METADATA_SSL_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo METADATA_SSL_CERT_TYPE=
+ key=METADATA_SSL_CERT_TYPE
+ [[ -n METADATA_SSL_CERT_TYPE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_ENABLE=
++ cut -d = -f 1
+ key=METADATA_SSL_ENABLE
+ [[ -n METADATA_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_KEYFILE=
++ cut -d = -f 1
+ key=METADATA_SSL_KEYFILE
+ [[ -n METADATA_SSL_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PCI_ADDRESS=
++ cut -d = -f 1
+ key=PCI_ADDRESS
+ [[ -n PCI_ADDRESS ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo PHYS_INT=
+ key=PHYS_INT
+ [[ -n PHYS_INT ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo PHYS_INT_MAC=
+ key=PHYS_INT_MAC
+ [[ -n PHYS_INT_MAC ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PHYS_INT_IPS=
++ cut -d = -f 1
+ key=PHYS_INT_IPS
+ [[ -n PHYS_INT_IPS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_BANDWIDTH=
++ cut -d = -f 1
+ key=PRIORITY_BANDWIDTH
+ [[ -n PRIORITY_BANDWIDTH ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo PRIORITY_ID=
+ key=PRIORITY_ID
+ [[ -n PRIORITY_ID ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_SCHEDULING=
++ cut -d = -f 1
+ key=PRIORITY_SCHEDULING
+ [[ -n PRIORITY_SCHEDULING ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_TAGGING=
++ cut -d = -f 1
+ key=PRIORITY_TAGGING
+ [[ -n PRIORITY_TAGGING ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo QOS_DEF_HW_QUEUE=
++ cut -d = -f 1
+ key=QOS_DEF_HW_QUEUE
+ [[ -n QOS_DEF_HW_QUEUE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo QOS_LOGICAL_QUEUES=
++ cut -d = -f 1
+ key=QOS_LOGICAL_QUEUES
+ [[ -n QOS_LOGICAL_QUEUES ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo QOS_QUEUE_ID=
+ key=QOS_QUEUE_ID
+ [[ -n QOS_QUEUE_ID ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SAMPLE_DESTINATION=
+ key=SAMPLE_DESTINATION
+ [[ -n SAMPLE_DESTINATION ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SANDESH_CA_CERTFILE=
+ key=SANDESH_CA_CERTFILE
+ [[ -n SANDESH_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SANDESH_CERTFILE=
+ key=SANDESH_CERTFILE
+ [[ -n SANDESH_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_KEYFILE=
++ cut -d = -f 1
+ key=SANDESH_KEYFILE
+ [[ -n SANDESH_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_SERVER_CERTFILE=
++ cut -d = -f 1
+ key=SANDESH_SERVER_CERTFILE
+ [[ -n SANDESH_SERVER_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SANDESH_SERVER_KEYFILE=
+ key=SANDESH_SERVER_KEYFILE
+ [[ -n SANDESH_SERVER_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SANDESH_SSL_ENABLE=
+ key=SANDESH_SSL_ENABLE
+ [[ -n SANDESH_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SLO_DESTINATION=
+ key=SLO_DESTINATION
+ [[ -n SLO_DESTINATION ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo STATS_COLLECTOR_DESTINATION_PATH=
+ key=STATS_COLLECTOR_DESTINATION_PATH
+ [[ -n STATS_COLLECTOR_DESTINATION_PATH ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo SUBCLUSTER=
+ key=SUBCLUSTER
+ [[ -n SUBCLUSTER ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo TSN_AGENT_MODE=
+ key=TSN_AGENT_MODE
+ [[ -n TSN_AGENT_MODE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo TSN_NODES=
+ key=TSN_NODES
+ [[ -n TSN_NODES ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo VROUTER_AGENT_INTROSPECT_PORT=
+ key=VROUTER_AGENT_INTROSPECT_PORT
+ [[ -n VROUTER_AGENT_INTROSPECT_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo VROUTER_CIDR=
+ key=VROUTER_CIDR
+ [[ -n VROUTER_CIDR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo VROUTER_CRYPT_INTERFACE=
++ cut -d = -f 1
+ key=VROUTER_CRYPT_INTERFACE
+ [[ -n VROUTER_CRYPT_INTERFACE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo VROUTER_GATEWAY=
+ key=VROUTER_GATEWAY
+ [[ -n VROUTER_GATEWAY ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo XMPP_SERVER_CA_CERTFILE=
+ key=XMPP_SERVER_CA_CERTFILE
+ [[ -n XMPP_SERVER_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo XMPP_SERVER_CERTFILE=
+ key=XMPP_SERVER_CERTFILE
+ [[ -n XMPP_SERVER_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SERVER_KEYFILE=
++ cut -d = -f 1
+ key=XMPP_SERVER_KEYFILE
+ [[ -n XMPP_SERVER_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ cut -d = -f 1
++ echo XMPP_SERVERS_LIST=
+ key=XMPP_SERVERS_LIST
+ [[ -n XMPP_SERVERS_LIST ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SSL_ENABLE=
++ cut -d = -f 1
+ key=XMPP_SSL_ENABLE
+ [[ -n XMPP_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ mktemp --dry-run
+ local tname=/tmp/tmp.yIcEfJ6hcI
+ echo 'AGENT_MODE="kernel"
AGENT_NAME="an-jenkins-deploy-platform-juju-k8s-1155-1"
AUTH_MODE="noauth"
BARBICAN_PASSWORD="contrail123"
BARBICAN_TENANT_NAME="service"
BARBICAN_USER="barbican"
CLOUD_ORCHESTRATOR="kubernetes"
COLLECTOR_SERVERS="10.0.0.57:8086"
COMPUTE_NODE_ADDRESS="10.0.0.56"
CONFIG_API_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem"
CONFIG_API_SSL_ENABLE="False"
CONFIG_NODES="10.0.0.57"
CONTAINER_LOG_DIR="/var/log/contrail/vrouter-agent"
CONTROL_NETWORK_IP="10.0.0.56"
DEFAULT_LOCAL_IP="10.0.0.56"
DNS_SERVERS_LIST="10.0.0.57:53"
DPDK_UIO_DRIVER=""
FABRIC_SNAT_HASH_TABLE_SIZE="4096"
HUGEPAGES_DIR="/dev/hugepages2M"
HUGE_PAGES_1GB="0"
HUGE_PAGES_2MB="256"
HYPERVISOR_TYPE="kvm"
INTROSPECT_IP="0.0.0.0"
INTROSPECT_SSL_ENABLE="False"
INTROSPECT_SSL_INSECURE="True"
IS_ENCRYPTION_SUPPORTED_FLAG="false"
IS_VLAN_ENABLED="false"
K8S_TOKEN="eyJhbGciOiJSUzI1NiIsImtpZCI6ImowUWJVNFZxRDJma241RU9SVVgyWUNFcV9oQjlwbU81SXczcmpSb2xQZ2MifQ.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.sCt4Hns1AKF-zCu3rt5V4WnMDOe6tlcoA34U4YyKIsTPv4MsrjDd-Pd6H8lnezB31VfWaOvEt6dr8932-gvBgNTlpmgv_wWnHMMkaxjfv-RT49kIj2XmLu9iHi5unYIQPxVPht7YGz2yYNCB84pqT-z5Y_Q3Y0U58PTK6hZQjqx2AZB6w8mugbQQZlN_wOjgB6cMqGPnKDt1ObbHVkDaHF9g6CUS4lpMcp8YLqvbGE3F8e_xpjaOO7cojQ4kphW580yeqzeEJH6o2X0XSnNVil-js1AG3-5hLnL7ZEYNkEtYeZ8OD1jh4WFWKODQuh2ga2xDHrYG2xeodBCDJarhSQ"
KEYSTONE_AUTH_ADMIN_PORT="5000"
KEYSTONE_AUTH_CA_CERTFILE=""
KEYSTONE_AUTH_CERTFILE=""
KEYSTONE_AUTH_HOST="127.0.0.1"
KEYSTONE_AUTH_INSECURE="True"
KEYSTONE_AUTH_KEYFILE=""
KEYSTONE_AUTH_PROJECT_DOMAIN_NAME="Default"
KEYSTONE_AUTH_PROTO="http"
KEYSTONE_AUTH_REGION_NAME="RegionOne"
KEYSTONE_AUTH_REGION_NAME="RegionOne"
KEYSTONE_AUTH_URL_TOKENS="/v3/auth/tokens"
KEYSTONE_AUTH_URL_VERSION="/"
KEYSTONE_AUTH_USER_DOMAIN_NAME="Default"
KUBERNETES_API_PORT=""
KUBERNETES_API_SECURE_PORT="6443"
KUBERNETES_API_SERVER="10.0.0.57"
L3MH_CIDR=""
LOG_LEVEL="SYS_DEBUG"
LOG_LOCAL="1"
METADATA_PROXY_SECRET="contrail"
METADATA_SSL_CA_CERTFILE=""
METADATA_SSL_CERTFILE=""
METADATA_SSL_CERT_TYPE=""
METADATA_SSL_ENABLE="false"
METADATA_SSL_KEYFILE=""
PCI_ADDRESS="0000:00:03.0"
PHYS_INT="ens3"
PHYS_INT_MAC="fa:16:3e:28:21:42"
PHYS_INT_IPS=""
PRIORITY_BANDWIDTH=""
PRIORITY_ID=""
PRIORITY_SCHEDULING=""
PRIORITY_TAGGING="True"
QOS_DEF_HW_QUEUE="False"
QOS_LOGICAL_QUEUES=""
QOS_QUEUE_ID=""
SAMPLE_DESTINATION="collector"
SANDESH_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem"
SANDESH_CERTFILE="/etc/contrail/ssl/certs/server.pem"
SANDESH_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem"
SANDESH_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem"
SANDESH_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem"
SANDESH_SSL_ENABLE="False"
SLO_DESTINATION="collector"
STATS_COLLECTOR_DESTINATION_PATH=""
SUBCLUSTER=""
TSN_AGENT_MODE=""
TSN_NODES="[]"
VROUTER_AGENT_INTROSPECT_PORT=""
VROUTER_CIDR="10.0.0.56/24"
VROUTER_CRYPT_INTERFACE="crypt0"
VROUTER_GATEWAY="10.0.0.1"
XMPP_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem"
XMPP_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem"
XMPP_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem"
XMPP_SERVERS_LIST="10.0.0.57:5269"
XMPP_SSL_ENABLE="False"'
+ mv -f /tmp/tmp.yIcEfJ6hcI /parameters.sh
++ mktemp --dry-run
+ tname=/tmp/tmp.j02OZUC2To
+ echo ready
+ mv -f /tmp/tmp.j02OZUC2To /parameters_state
+ cleanup_lbaas_netns_config
++ ip netns
++ awk '/^vrouter-/{print $1}'
+ rm -rf '/var/lib/contrail/loadbalancer/*'
+ create_agent_config /usr/bin/contrail-vrouter-agent
+ echo 'INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf'
INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf
+ [[ ! -f /parameters.sh ]]
+ source /parameters.sh
++ AGENT_MODE=kernel
++ AGENT_NAME=an-jenkins-deploy-platform-juju-k8s-1155-1
++ AUTH_MODE=noauth
++ BARBICAN_PASSWORD=contrail123
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ CLOUD_ORCHESTRATOR=kubernetes
++ COLLECTOR_SERVERS=10.0.0.57:8086
++ COMPUTE_NODE_ADDRESS=10.0.0.56
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_NODES=10.0.0.57
++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent
++ CONTROL_NETWORK_IP=10.0.0.56
++ DEFAULT_LOCAL_IP=10.0.0.56
++ DNS_SERVERS_LIST=10.0.0.57:53
++ DPDK_UIO_DRIVER=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ HUGEPAGES_DIR=/dev/hugepages2M
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HYPERVISOR_TYPE=kvm
++ INTROSPECT_IP=0.0.0.0
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ IS_ENCRYPTION_SUPPORTED_FLAG=false
++ IS_VLAN_ENABLED=false
++ K8S_TOKEN=eyJhbGciOiJSUzI1NiIsImtpZCI6ImowUWJVNFZxRDJma241RU9SVVgyWUNFcV9oQjlwbU81SXczcmpSb2xQZ2MifQ.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.sCt4Hns1AKF-zCu3rt5V4WnMDOe6tlcoA34U4YyKIsTPv4MsrjDd-Pd6H8lnezB31VfWaOvEt6dr8932-gvBgNTlpmgv_wWnHMMkaxjfv-RT49kIj2XmLu9iHi5unYIQPxVPht7YGz2yYNCB84pqT-z5Y_Q3Y0U58PTK6hZQjqx2AZB6w8mugbQQZlN_wOjgB6cMqGPnKDt1ObbHVkDaHF9g6CUS4lpMcp8YLqvbGE3F8e_xpjaOO7cojQ4kphW580yeqzeEJH6o2X0XSnNVil-js1AG3-5hLnL7ZEYNkEtYeZ8OD1jh4WFWKODQuh2ga2xDHrYG2xeodBCDJarhSQ
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KUBERNETES_API_PORT=
++ KUBERNETES_API_SECURE_PORT=6443
++ KUBERNETES_API_SERVER=10.0.0.57
++ L3MH_CIDR=
++ LOG_LEVEL=SYS_DEBUG
++ LOG_LOCAL=1
++ METADATA_PROXY_SECRET=contrail
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_KEYFILE=
++ PCI_ADDRESS=0000:00:03.0
++ PHYS_INT=ens3
++ PHYS_INT_MAC=fa:16:3e:28:21:42
++ PHYS_INT_IPS=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_ID=
++ PRIORITY_SCHEDULING=
++ PRIORITY_TAGGING=True
++ QOS_DEF_HW_QUEUE=False
++ QOS_LOGICAL_QUEUES=
++ QOS_QUEUE_ID=
++ SAMPLE_DESTINATION=collector
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SSL_ENABLE=False
++ SLO_DESTINATION=collector
++ STATS_COLLECTOR_DESTINATION_PATH=
++ SUBCLUSTER=
++ TSN_AGENT_MODE=
++ TSN_NODES='[]'
++ VROUTER_AGENT_INTROSPECT_PORT=
++ VROUTER_CIDR=10.0.0.56/24
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_GATEWAY=10.0.0.1
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVERS_LIST=10.0.0.57:5269
++ XMPP_SSL_ENABLE=False
+ [[ -z ens3 ]]
+ [[ -z fa:16:3e:28:21:42 ]]
+ echo 'INFO: Physical interface: nic=ens3, mac=fa:16:3e:28:21:42'
INFO: Physical interface: nic=ens3, mac=fa:16:3e:28:21:42
+ local agent_mode_options=physical_interface_mac=fa:16:3e:28:21:42
+ [[ kernel == \d\p\d\k ]]
+ local tsn_agent_mode=
+ [[ -n '' ]]
+ local vrouter_opts=
+ local nic=
+ local phys_ints phys_ips gateway ipaddr
+ local binding_data_dir=/var/run/vrouter
+ [[ -n '' ]]
+ vrouter_opts=physical_interface=ens3
+ [[ -n 10.0.0.1 ]]
+ vrouter_opts+='
gateway=10.0.0.1'
+ local subcluster_option=
+ [[ -n '' ]]
+ local tsn_server_list=
+ read -r -d '' tsn_server_list
++ tr , ' '
++ echo '[]'
+ true
+ local priority_group_option priority_id_list priority_bandwidth_list priority_scheduling_list
+ local qos_niantic
+ [[ -n '' ]]
+ local qos_queueing_option=
+ local qos_queue_id qos_logical_queue qos_config qos_def
+ [[ -n '' ]]
+ local metadata_ssl_conf=
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ local crypt_interface_option=
+ [[ false == \t\r\u\e ]]
+ local hugepages_option=
+ local xmpp_certs_config sandesh_client_config collector_stats_config
+ ((  HUGE_PAGES_1GB > 0  ))
+ ((  HUGE_PAGES_2MB > 0  ))
+ read -r -d '' hugepages_option
+ true
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ xmpp_certs_config=
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ read -r -d '' sandesh_client_config
+ true
+ [[ -n '' ]]
+ collector_stats_config=
+ introspect_opts=http_server_ip=0.0.0.0
+ '[' -n '' ']'
+ upgrade_old_logs vrouter-agent
+ local template=vrouter-agent
++ dirname /var/log/contrail/vrouter-agent
+ local old_dir=/var/log/contrail
+ mkdir -p /var/log/contrail/vrouter-agent
+ chmod 755 /var/log/contrail/vrouter-agent
+ mv -n '/var/log/contrail/*vrouter-agent.log*' /var/log/contrail/vrouter-agent/
+ true
+ [[ -n 1999 ]]
+ [[ -n 1999 ]]
+ local owner_opts=1999:1999
+ chown 1999:1999 /var/log/contrail/vrouter-agent
+ find /var/log/contrail/vrouter-agent -uid 0 -exec chown 1999:1999 '{}' +
+ mkdir -p /etc/contrail
+ cat
+ add_ini_params_from_env VROUTER_AGENT /etc/contrail/contrail-vrouter-agent.conf
+ local service_name=VROUTER_AGENT
+ local cfg_path=/etc/contrail/contrail-vrouter-agent.conf
+ local delim=__
++ set -o posix
++ set
++ sort
++ sed 's/^VROUTER_AGENT__//g'
++ cut -d = -f 1
++ grep '^VROUTER_AGENT__.*__.*=.*$'
+ local vars=
+ local section=
+ echo 'INFO: /etc/contrail/contrail-vrouter-agent.conf'
INFO: /etc/contrail/contrail-vrouter-agent.conf
+ cat /etc/contrail/contrail-vrouter-agent.conf
[CONTROL-NODE]
servers=10.0.0.57:5269


[DEFAULT]
http_server_ip=0.0.0.0
collectors=10.0.0.57:8086
log_file=/var/log/contrail/vrouter-agent/contrail-vrouter-agent.log
log_level=SYS_DEBUG
log_local=1

hostname=an-jenkins-deploy-platform-juju-k8s-1155-1
agent_name=an-jenkins-deploy-platform-juju-k8s-1155-1

xmpp_dns_auth_enable=False
xmpp_auth_enable=False


physical_interface_mac=fa:16:3e:28:21:42

tsn_servers = []

[SANDESH]
introspect_ssl_enable=False
sandesh_ssl_enable=False

[NETWORKS]
control_network_ip=10.0.0.56

[DNS]
servers=10.0.0.57:53

[METADATA]
metadata_proxy_secret=contrail


[VIRTUAL-HOST-INTERFACE]
name=vhost0
ip=10.0.0.56/24
compute_node_address=10.0.0.56
physical_interface=ens3
gateway=10.0.0.1

[SERVICE-INSTANCE]
netns_command=/usr/local/bin/opencontrail-vrouter-netns
docker_command=/usr/local/bin/opencontrail-vrouter-docker

[HYPERVISOR]
type = kvm

[FLOWS]
fabric_snat_hash_table_size = 4096







[SESSION]
slo_destination = collector
sample_destination = collector



[RESTART]
huge_page_2M=/dev/hugepages2M/bridge /dev/hugepages2M/flow
+ set_vnc_api_lib_ini
+ local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp
+ cat
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ [[ noauth == \k\e\y\s\t\o\n\e ]]
+ cat
+ mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini
+ cat
+ start_agent /usr/bin/contrail-vrouter-agent
+ echo 'INFO: Run start_agent'
INFO: Run start_agent
+ [[ ! -f /etc/contrail/contrail-vrouter-agent.conf ]]
+ set_qos
+ local interface_list mode policy slaves pci_addresses bond_numa
+ [[ -n '' ]]
+ [[ -n '' ]]
+ true
+ rm -f /var/run/restart_agent
+ [[ 1 == \0 ]]
+ echo 'INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent'
INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent
+ local vrouter_agent_process=150986
+ echo 150986
+ is_encryption_supported
+ local enc=FALSE
+ [[ FALSE == \F\A\L\S\E ]]
+ return 1
+ echo 'INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter'
INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter
+ echo 'INFO: vrouter agent process PID: 150986'
INFO: vrouter agent process PID: 150986
++ cat /var/run/vrouter-agent.pid
+ wait 150986
+ /usr/bin/contrail-vrouter-agent
Config file </etc/contrail/contrail-vrouter-agent.conf> parsing completed.
log4cplus:ERROR No appenders could be found for logger (root).
log4cplus:ERROR Please initialize the log4cplus system properly.
INFO: wait vhost0 to be initilaized... 0/60
INFO: vhost0 is ready.
dev_idx = 10, dev_name = vhost0